Saturday , 28 November 2020
Home / Web Hacking

Web Hacking

1000+ WordPress sites Hacked in Scam Campaign

1000+ WordPress sites Hacked in Scam Campaign

According to cybersecurity research, More than 2000 WordPress websites have been hacked as part of a campaign to redirect visitors of sites to a number of scam sites. Which contain unwanted notification subscriptions, Fake Adobe Flash downloads, Fake surveys, and even giveaways. Last week they have detected this hacking campaign. The security firm Sucuri first identified the hacking campaign when …

Read More »

How to Create and Maintain A Strong Password System

How to Create and Maintain A Strong Password System

It gets so complicated for a particular person to remember different passwords at the same time. There are several of you reading this post have access on different sites which requires password logins. It is very dangerous to use some sort of password for all of your existing accounts. In a result, you could receive a heavy loss in face …

Read More »

A Dark Web Seller Gnostic Players removes listings after Data Dump

dark web seller removes listings

This news was seen and claimed by some of the sources after a dark web seller whose name was identified as Gnosticplayers on dream market. The seller removed all the listing that was previously put in for sale. It included the data amount of more than 600 million account records. While removing the list, the data seller said that. “All …

Read More »

Security of Server Rooms and Network

Security of Server Rooms and Network

Server Rooms and Network: Something that also needs to be included in this discussion is protecting server room. Since these rooms contain the living, breathing heart of your network, they require increased levels of protection. This security must be robust and carefully considered because an intruder in these areas can cause catastrophic damage. The server room needs to have several …

Read More »

Firewall Configuration in Network Security

Firewall Configuration

Firewall Configuration: Not all firewalls or firewall setups are created equally, so you need to be familiar with each setup and how it works. Firewalls can be set up and arranged in several ways, each offering its own advantages and disadvantages. In this section we will cover each method. Bastion Host: A bastion host is intended to be the point …

Read More »

Encryption Weaknesses

Encryption Weaknesses

Encryption Weaknesses: In web application, encryption plays a vital role because sensitive information is frequently exchanged between client and server in the form of logons or other types of information. When securing web applications, you must consider the safety of information at two stages: when it is stored and when it is transmitted. Both stages are potential areas for attack. …

Read More »

Scripting Errors

Scripting Errors

Scripting Errors: Web applications, programs, and code such as Common Gateway Interface (CGI), ASP.NET and JavaServer Pages (JSP) are commonly in use in web applications and present their own issues. Vulnerabilities such as a lack of input validation scripts can be a liability. A savvy hacker can use a number of methods to cause grief to the administrator of a …

Read More »

Apache Web Server

Apache Web Server

Apache Web Server: Apache web server is the most popular technology of its type in the world with an estimated 60 percent of web servers on the Internet running the software (62 percent with server derived from Apache included). While it was originally developed for the Unix platform back in 1990s, it has long since been ported to other operating …

Read More »

The PsTools Suite

The PsTools Suite

PsTools Suite: Standing tall next to our other tools is a suite of Microsoft tools designed to extract various kinds of information and perform other tasks involving a system. The tools in the PsTools suite allow you to manage remote systems as well as the local system. NOTE: You can download the PsTools suite for free from Microsoft at https://technet.microsoft …

Read More »

Testing Web Applications

Testing Web Applications

Testing Web Applications: Since web applications are complex, the use of specialized software to analyze or test an application may be necessary. Some of these software packages are included here. Burp Suite Burp Suite is a Java-based application used to test and attack web application. Upon closer inspection the software is actually a collection of tools used to check various …

Read More »