Home Tags Security

Tag: Security

Securing Apache, Part 7: Fool-proofing the Server OS

5
Moving deeper into Web application and Apache security, let's now focus on OS commanding attacks, and those that lead to the disclosure of crucial...

Digital Forensic Analysis Using BackTrack, Part 1

7
Digital forensics, the art of recovering and analysing the contents found on digital devices such as desktops, notebooks/netbooks, tablets, smartphones, etc., was little-known a...

Advanced Nmap: Scanning Firewalls Continued

2
The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead...

Metasploit 101 with Meterpreter Payload

14
The Metasploit framework is well known in the realm of exploit development. It is a standalone tool for security researchers, penetration testers and IDS/IPS...

Securing Apache, Part 6: Attacks on Session Management

4
In this part of the series, we are going to concentrate on attacks on session management. Application-level attacks on the session is about obtaining...

Advanced Nmap: Scanning Firewalls

1
After four articles on Nmap , which explained a number of command-line options for scan technique specification, target specification, port specifications, host discovery, evasion...

Securing Apache, Part 5: HTTP Message Architecture

2
In the last four articles in this series, we have discussed SQL injection, XSS, CSRF, XST and XSHM attacks, and security solutions. This article...

Advanced Nmap: FIN Scan & OS Detection

1
Nmap is a fantastic tool, and I just can't refrain from praising it, every time I use it. The earlier articles in this series...

Advanced Nmap: Scanning Techniques Continued

1
The earlier articles on Nmap had covered the basic features, the working of the TCP 3-way handshake, and some important scan types, along with...

Securing Apache, Part 3: Cross-Site Request Forgery Attacks (XSRF)

0
Intended for information security experts, systems administrators, and all those concerned about Web security, this third article in the series moves on from SQL...