SQL injection and buffer overflows are hacking techniques used to exploit weaknesses in applications. When programs are written, some parameters used in the creation of the application code can leave weaknesses in the program. SQL injection and buffer overflows are covered in the same chapter because they both are methods used to attack application and are generally caused by programming flaws. ...
Saturday, May 11, 2013
0
The Purpose of SQL Injection
SQL injection attacks are used by hackers to achieve certain results. Some SQL exploits will produce valuable user data stored in the database, and some are just precursors to other attacks.
The following are the most common purposes of a SQL injection attack:
Identifying SQL Injection Vulnerability. The purpose is to probe a web application to discover which parameters and user ...
0
Rogue Access Points
Rogue access points are WLAN access points that aren’t authorized to connect to a network. Rogue APs open a wireless hole into the network. A hacker can plant a rogue AP, or an employee may unknowingly create a security hole by plugging an access point into the network. The resulting rogue AP can be used by anyone who can connect to the AP, including a hacker, giving them access to the wired LAN. ...
0
Wireless Hacking Techniques
Most wireless hacking attacks can be categorized as follows:
Cracking Encryption and Authentication Mechanisms. These mechanisms include cracking WEP, WPA preshared key authentication passphrases, and Cisco’s Lightweight EAP authentication (LEAP). Hackers can use these mechanisms to connect to the WLAN using stolen credentials or can capture other users’ data and decrypt or encrypt it. A ...
0
Securing Home Wireless Networks
Many people setting up wireless home networks rush through the job to get their Internet connectivity working as quickly as possible. The small office, home office (SOHO) networking products on the market make setup quick and easy but not necessarily secure. Configuring additional security features can be time consuming and nonintuitive for some home users, and therefore they may not implement any ...
0
Linux System
Linux is a popular operating system with system administrators because of its open source code and its flexibility, which allows anyone to modify it. Because of the open source nature of Linux, there are many different versions, known as distributions (or distros). Several of the Linux distributions have become robust commercial operating systems for use on workstations as well as servers. Popular ...
0
How ARP Works
ARP allows the network to translate IP addresses into MAC addresses. When one host using TCP/IP on a LAN tries to contact another, it needs the MAC address or hardware address of the host it’s trying to reach. It first looks in its ARP cache to see if it already has the MAC address; if it doesn’t, it broadcasts an ARP request asking, “Who has the IP address I’m looking for?” If the host that has ...
0
How a Sniffer Works
Sniffer software works by capturing packets not destined for the sniffer system’s MAC address but rather for a target’s destination MAC address. This is known as promiscuous mode. Normally, a system on the network reads and responds only to traffic sent directly to its MAC address. However, many hacking tools change the system’s NIC to promiscuous mode. In promiscuous mode, a NIC reads all traffic ...
Subscribe to:
Posts (Atom)
Search
Contents
-
▼
2013
(23)
-
▼
May
(19)
- SQL Injection
- The Purpose of SQL Injection
- Rogue Access Points
- Wireless Hacking Techniques
- Securing Home Wireless Networks
- Linux System
- How ARP Works
- How a Sniffer Works
- Gathering Data from Networks: Sniffers
- Types Of Computer Virus
- Land Attacks,Smurf Attacks,UDP Flooding
- Distributed DOS Attacks
- SYN Attack
- Teardrop
- Ping Of Death
- DOS Attacked
- Movie Download Site List
- ShellCode HandBook Download
- What is Google+ (Google Plus) and do I need it?
-
▼
May
(19)
Visitor
Powered by Blogger.