Thursday , 2 July 2020
Home / IT Security / Security+ (page 13)

Security+

Spoofing Attacks – Understanding Various Types of Attacks

Spoofing Attacks – Understanding Various Types of Attacks

Spoofing Attacks: A spoofing attack is an attempt by someone or something to masquerade as someone else. This type of attack is usually considered an access attack. A common spoofing attack that was popular for many years on early Unix and other timesharing systems involved a programmer writing a fake logon program. It would prompt the user for a user …

Read More »

Identifying Denial-of-Service and Distributed Denial-of-Service Attacks

Identifying Denial-of-Service and Distributed Denial-of-Service Attacks

Identifying Denial-of-Service and Distributed Denial-of-Service Attacks: Denial-of-service (DoS) attacks prevent access to resources by users authorized to use those resources. An attacker may attempt to bring down an e-commerce website to prevent or deny usage by legitimate customers. Most simple DoS attacks from a single system, and a specific server or organization is the target.   TIP: there is not …

Read More »

Authentication (Single Factor) and Authorization

Authentication (Single Factor) and Multifactor Authorization

Authentication (Single Factor) and Authorization: The most basic form of authentication is known as single-factor authentication (SFA), because only one type of authentication is checked. SFA is most often implemented as the traditional username/password combination. A username and password are unique identifiers for a logon process. Here’s a synopsis for how SFA works: when users sit down in front of …

Read More »

VPNs and VPN Concentrators

VPNs and VPN Concentrators

VPNs and VPN Concentrators: A virtual private network (VPN) is a private network connection that occurs through a public networks. A private network provides security over an otherwise unsecure environment. VPNs can be used to connect LANs together across the Internet or other public networks. With a VPN, the remote end appears to be connected to the network as if …

Read More »

NIKTO: INTERROGATING WEB SERVERS

NIKTO: INTERROGATING WEB SERVERS

NIKTO: INTERROGATING WEB SERVERS: After running a port scan and discovering a service running on port 80 on port 443, one of the first tools that should be used to evaluate the service is Nikto. Nikto is a web server vulnerability scanner. This tool was written by Chris Sullo and David Lodge. Nikto automates the process of scanning web servers …

Read More »

USING NMAP TO PERFORM AN SYN SCAN

USING NMAP TO PERFORM AN SYN SCAN: The SYN Scan is arguably the most popular Nmap port scan. There are many reasons for its popularity, including the fact that it happens to be the default Nmap scan. If you run the Nmap command without specifying a scan type (using the –s switch), Nmap will use the SYN scan by default. …

Read More »

The Art of the Ethical Hack: A Q&A with Muhammad Taha Researcher at Riphah International University

1: How to start a career as an Ethical Hacker? To start a career as CEH, learn the fundamentals of Networking and Operating Systems. Learn how Networks are designed, protocols and then the misconfigurations in network designs. Most of the hackers exploit the flaws left by software developers. Learn how to developed secure code and then the flaws in the …

Read More »

Linux Operating System

Linux Operating System: Enter our open source favorite, Linux, which is not a completely foolproof operating system but one with a reputation for being a much more secure player in the OS category than Windows or Apple. As we saw with firewalls, the equipment—or in this case the operating system—is only a secure as the administrator configuration it. With Linux, …

Read More »

Tracing the Evolution Cryptography

Tracing the Evolution: As with the ancient Egyptians and Romans, who used secret writing methods to obscure trade or battle information and hunting routes, one of the most widely used applications of cryptography is in the safeguarding of communications between two parties wanting to share information. Guaranteeing that information is kept secret is one thing, but in the modern world …

Read More »

Knowing Operating Systems Microsoft Windows

Understanding Operating Systems: We all say more about operating systems when we discuss scanning and enumeration, but for now, we are interested in laying out the fundamentals of each of the standard Oss on the market today. Remember Achilles from Greek mythology? The here who got shot in the heel and died because of it? Granted, this is an oversimplification …

Read More »