Home Tags Security

Tag: Security

Modify-function-return-value Hack! — Part 1

2
Sometimes it's helpful to think from a hacker's perspective. The information obtained can be used to write better code and a secure application. An...

Securing Apache, Part 9: Attacks that Target PHP-based Instances

3
Beginning with Part 1 of this series, we have covered all major attacks on Web applications and servers, with examples of vulnerable PHP code....

Advanced Nmap: A Recap

0
This final article in the series consolidates information from the previous articles, looks at NMap's future possibilities, and at the new tools from the...

Securing Apache, Part 8: DoS & DDoS Attacks

6
In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning...

Nessus with Metasploit — Track and Hack

1
Networks play an important role in a sysadmin's life. But have you ever wondered about the security of your network, or tried to find...

Advanced Nmap: NMap Script Scanning

0
In previous articles, we have studied NMap in great detail, including live scanning a firewall and verifying the recommendations. Now, it's time to study...

Securing Apache, Part 7: Fool-proofing the Server OS

5
Moving deeper into Web application and Apache security, let's now focus on OS commanding attacks, and those that lead to the disclosure of crucial...

Digital Forensic Analysis Using BackTrack, Part 1

7
Digital forensics, the art of recovering and analysing the contents found on digital devices such as desktops, notebooks/netbooks, tablets, smartphones, etc., was little-known a...

Advanced Nmap: Scanning Firewalls Continued

2
The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead...

Metasploit 101 with Meterpreter Payload

14
The Metasploit framework is well known in the realm of exploit development. It is a standalone tool for security researchers, penetration testers and IDS/IPS...