December, 2017

  • 22 December

    METASPLOIT – Penetration Tests from Scratch Download For Free

    METASPLOIT - Penetration Tests from Scratch Download For Free

    INTRODUCTION | METASPLOIT – Penetration Tests from Scratch Download For Free: Hello Everyone! Hope everyone is doing great, TechyTalk.Online Gives Everyone an Amazing Opportunity to Learn Daily. METASPLOIT is a collection of penetration testing tools written in Ruby Available (for Linux and Windows) at http://www.metasploit.com/ INCLUDES: an RPC server and …

  • 21 December

    SSL and TLS

    SSL and TLS

    SSL and TLS: Secure Sockets Layer (SSL) is used to establish a secure communication connection between two TCP-based machines. This protocol uses the handshake method of establishing a session. The number of steps in the handshake depends on whether steps are combined and/or mutual authentication is included. The number of …

  • 20 December

    Understanding Cryptography Standards and Protocols

    Understanding Cryptography Standards and Protocols

    Understanding Cryptography Standards and Protocols: Numerous standards are available to establish secure service. Some of the standard that will be presented in the following section, here we will remind you of them and introduce you to a few more standards. The movement from proprietary governmental standards toward more unified global …

  • 19 December

    Phishing, Spear Phishing, and Vishing

    Phishing, Spear Phishing, and Vishing

    Phishing, Spear Phishing, and Vishing: Phishing is a form of social engineering in which you ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. An email might look as if it is from a bank and contain …

  • 18 December

    Spoofing Attacks – Understanding Various Types of Attacks

    Spoofing Attacks – Understanding Various Types of Attacks

    Spoofing Attacks: A spoofing attack is an attempt by someone or something to masquerade as someone else. This type of attack is usually considered an access attack. A common spoofing attack that was popular for many years on early Unix and other timesharing systems involved a programmer writing a fake …

  • 17 December

    Identifying Denial-of-Service and Distributed Denial-of-Service Attacks

    Identifying Denial-of-Service and Distributed Denial-of-Service Attacks

    Identifying Denial-of-Service and Distributed Denial-of-Service Attacks: Denial-of-service (DoS) attacks prevent access to resources by users authorized to use those resources. An attacker may attempt to bring down an e-commerce website to prevent or deny usage by legitimate customers. Most simple DoS attacks from a single system, and a specific server …

  • 16 December

    Top 10 Mobile Devices Security

    Top 10 Mobile Devices Security

    Mobile Device Security: Mobile device, such as laptops, tablet computers, and Smartphones, provide security challenges above those of desktops workstations, servers, and such in that they leave the office and this increases the odds of their theft. In 2010, AvMed Health Plans, a Florida-based company, had two laptops computer stolen. …

  • 15 December

    Authentication (Single Factor) and Authorization

    Authentication (Single Factor) and Multifactor Authorization

    Authentication (Single Factor) and Authorization: The most basic form of authentication is known as single-factor authentication (SFA), because only one type of authentication is checked. SFA is most often implemented as the traditional username/password combination. A username and password are unique identifiers for a logon process. Here’s a synopsis for …

  • 14 December

    VPNs and VPN Concentrators

    VPNs and VPN Concentrators

    VPNs and VPN Concentrators: A virtual private network (VPN) is a private network connection that occurs through a public networks. A private network provides security over an otherwise unsecure environment. VPNs can be used to connect LANs together across the Internet or other public networks. With a VPN, the remote …

  • 13 December

    SQL: Bypassing Authentication

    SQL: Bypassing Authentication

    We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no rights to retrieve. Bypassing Authentication We know we are dealing with a string column because of the quotes being applied to our input, so we can either the 1=1 or ‘a’=’a …