877.791.9571 |

About the Author:

Chintan Gurjar is a System Security Analyst and researcher from London working in Lucideus Tech Pvt Ltd. He has written articles for Europe based magazine namely “Hakin9”, "PentestMag" and India based magazine “Hacker5”. He has done a valuable research in cryptography overhead mechanism. Chintan Gurjar has completed B.Tech in computer science from India and currently pursuing his post graduate degree in computer security & forensics from London (UK). During his academics, he has submitted a small scale research paper on Cryptography Overhead Mechanism in IPsec Protocol. He has also submitted Network Security Auditing and Network services administration and management report. He is very keen to spread cyber awareness world wide. In future he would like to work for his Country’s government in a forensics investigation field.
Anti-Debugging-02122013

Minor Web Application Bugs Simplified

In this article I am going to discuss a few of the most important vulnerabilities which exist in almost all applications in the world. They are cracking the authentication […]

metasploit-01

Information Gathering Using Metasploit

Your goals during information gathering should be to gain accurate information about your targets without revealing your presence or your intentions, to learn how the organization operates, and to […]

News-of-the-World-04032014

Case Study – News of the World Phone Hacking Scandal (NoTW)

Authors –

Edmand Dester Thipursian – Edmand.dester@gmail.com
Sai Thogarcheti – Harikamurthy9@gmail.com
Abdullah Al Fahad – candyman961@hotmail.com
Chintan Gurjar – chintangurjar@outlook.com
Adam Mentsiev – adam.mentsiev@study.beds.ac.uk
Alams Titus Mammuan – alamsx11@gmail.com

1. Introduction

The world is growing rapidly with […]

SecPolSME03272014

Information Security Policy For SME

Information security (IS) is a critical part of any small scale company and a big enterprise, and a challenge for any firm. Information security involves very confidential, important assets […]

scenario031414

Theoretical Methodology for Detecting ICMP Reflected Attacks: SMURF Attacks

There are plenty of different ways to track the original source of a DoS attack, but those techniques are not efficient enough to track a reflected ICMP attack. When […]

biometrics03122014

Notes On Biometric Template Security

In this article I am going to tell you about biometric template security and current technologies in which researchers are working to improve biometric template security. But this won’t […]

FSFP03062014

Computer Forensics Investigation – A Case Study

Disclaimer

We have not performed any live investigation. This was a part of our university assignment, wherein we assumed the roles of forensics investigator, determining what methods were applicable. […]

fuzing02102014

Manual Web Application Penetration Testing – Suffix & Prefix in Fuzzing

Introduction

In this series of articles, last time we talked about fuzzing and various SQL statement special characters which can be used in fuzzing a web application. In this article, […]

Security01302014

Manually Web Application Penetration Testing: Fuzzing

Introduction

When we test a web application, we do not test a single page, but a lot of pages of a single web application. Each page may have more than […]

AppEntryPt01202014

Manual Web Application Penetration Testing: Identifying Application Entry Points

Introduction

In this article, I will show you how to find injection points for your target host and how the webpage is encoded when it comes to the client side […]

OWaspMultilidaeII01172014

Manual Web Application Penetration Testing: Introduction

In this series of articles, I am going to demonstrate how you can manually exploit the vulnerability of a web application, compared to using any automation tool, in order […]

wirlessAttack

Wireless Attacks Unleashed

As we all know, wireless networks are spread at each and every part of the world, starting from personal home to corporate business environments, schools/universities, cafes, etc. The major […]

firewall-12112013

Firewall Unleashed

Introduction

Firewalls are used to control the inbound and outbound traffic on a protected network. They have an ability to block and allow the internal as well as external services […]

TransLevelSec-12022013

Transport Level Security – Part 2 – SSL

Introduction

I’ve already discussed SSL in my previous article. Here I’ll be explaining SSLv3. It was developed by Netscape.

General SSL Architecture

It was designed to secure end-to-end services on the […]

Transport Level Security – Part 1

,

This is a non-technical guide which will make you familiar with the transport layer. The main purpose of writing this guide is to point out why we need major […]

10232013

SSL Unleashed

In this article, I am going to tell you everything about SSL: What it is, why we need it, its technical and non-technical aspects, etc. This article covers the […]

phishing-03012013_r1_c1

Phishing Counter-Measures Unleashed

In this article, I have done my best to gather and explain all the possible ways by which phishing can be avoided. Here I am going to explain phishing […]

NetWorkIntelligence09192013

Network Intelligence Gathering

This article is all about different information-gathering techniques on the network. It is the most essential and important task of attackers. Knowing the opponents and their interests can be […]

CGI-Support09122013

Penetration Testing of Web Services with CGI Support

This article shows hands-on penetration testing using an Apache server with CGI access; it identifies some vulnerabilities and performs exploits attacking these vulnerabilities, then further patches it to mitigate […]