877.791.9571 |

Monthly Archives: May 2012

Defending yourself from Google hackers

Before looking how we can prevent ourselves from Google hackers, let’s see what Google hacking is.

Google Hacking:

Google hacking is a hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use – Wikipedia

Google is a very powerful […]

iPhone Forensics – Analysis of iOS 5 backups : Part 2

In the first part of this article, we discussed the techniques to read iTunes backups. The following article discloses the procedure to extract protection class keys from the Backup Keybag and covers the techniques & the tools to decrypt the protected backup files and the encrypted backups.

Data protection mechanism […]

Easy Website Keylogging with Metasploit

Hello all, you all know how to create phishing pages. Here is a little preview about creating fake pages.

The History of Phishing:

The Phishing Method was established in 1987, and it was first disclosed in 1995.

Phishing is the technique where an attacker gathers all information from the victim’s machine, like […]

Checking Out Backdoor Shells

A backdoor shell can be a PHP, ASP, JSP, etc. piece of code which can be uploaded on a site to gain or retain access and some privileges on a website. Once uploaded, it allows the attacker to execute commands through the shell_exec () function, upload/delete/modify/download files from the […]

  • owl
    Permalink Gallery

    w3af walkthrough and tutorial part 4 – w3af tools, profiles and scripting

w3af walkthrough and tutorial part 4 – w3af tools, profiles and scripting

This is part 4 in a series.
Part 1 is available here:w3af Tutorial Part 1
Part 2 is available here:Discovery and Audit plugins
Part 3 is available here: Remaining plugins

In the previous articles in this series, we looked at all the plugins available in w3af and looked at their applications in different […]

Firewall Security Testing

Testing firewall and IDS rules is a regular part of penetration testing or security auditing. However, because of the unique complexity involved of different environments, automated scanners are not able to provide much use in this area. Several free and open source tools exist to help craft packets to […]

Man in the Browser Attack vs. Two Factor Authentication

Authentication or E-authentication (Electronic authentication) is the way, technique, and method to establish a connection between two entities. This connection is based on confidence and confirmation that both parties are the legitimate parties to establish the connection (session). The password based authentication method is generally the most common authentication […]

Scanning the Web with Ammonite

Introduction
Ammonite is a Fiddler extension used to scan web applications for common vulnerabilities like verbose and blind SQL injection, OS commanding, local file inclusion, buffer overflows, format string vulnerabilities etc. Ammonite can also scan responses for important information like credit card numbers. One of the unique features of Ammonite […]

Chapter 6 – End-user Device Security

This is Chapter 6 in Tom Olzak’s book, “Enterprise Security: A practitioner’s guide.”
Chapter 5 is available here: VLAN Network Segmentation and Security- Chapter 5
Chapter 4 is available here:Attack Surface Reduction – Chapter 4
Chapter 3 is available here: Building the Foundation: Architecture Design – Chapter 3
Chapter 2 is available here: […]

iPhone Forensics – Analysis of iOS 5 backups : Part 1

iPhone forensics can be performed on the backups made by iTunes or directly on the live device. This Previous article on iPhone forensics detailed the forensic techniques and the technical challenges involved in performing live device forensics. Forensic analysis on a live device reboots the phone and may alter […]

  • chinaphil
    Permalink Gallery

    Understanding the Origins of the China – Philippine Cyber War

Understanding the Origins of the China – Philippine Cyber War

For many years, there has been a territorial dispute between China and Philippines over the Scarborough Shoal (Philippine Term: Panatag Shoal) or Huangyan Island (Chinese Term) and the Spratlys Island. But the most disputed island today is the Scarborough Shoal because of the growing tension after the Chinese government […]