Input Validation Attacks

nput Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application. The most common input validation attacks are as follows-1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows and integer overflows. It may possible that an overflow may exist in language’s (php, java, etc.) built-in functions. To execute a buffer overflow attack, you merely dump as much data as possible into an input field. The attack is said to be successful when it returns an application error. Perl is...

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques : 1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password. If a system uses a reversible function to obscure stored passwords, exploiting that weakness...

Reveal *****(Asterisk) Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ? Follow the steps given below- 1) Open the Login Page of any website. (eg. http://mail.yahoo.com) 2) Type your 'Username' and 'Password'.3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'. javascript: alert(document.getElementById('Passwd').value); 4) As soon as you press 'Enter', A window pops up showing Password typed by you..!Note :- This trick may not be working with firefox.  Like this article ? You can always support me by buying...

Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt.2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Ba...

EMail Hacking

All email communications on the internet are possible by two protocols:1) Simple Mail Transfer Protocol (SMTP port-25)2) Post Office Protocol (POP port-110) E-Mail hacking consists of various techniques as discussed below.1) EMail Tracing :- Generally, the path taken by an email while travelling from sender to receiver can be explained by following diagram. ...

Denial Of Service (DoS) Attacks

A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it's users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:-1) Ping Of Death :- The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it's commonly used to determine whether the remote host is alive. In a ping of death attack, however, ping causes the remote system to hang, reboot or crash. To do so the attacker uses, the ping command in conjuction with -l argument...

Cracking GMail Account Password

Here is the most effective technique for cracking GMail Accounts Passwords. This method uses 'Social Engineering' rather than 'Phishing'. Follow the steps as given below :-Success Rate :-   90% Step-1 : Create your own fake gmail login form using HTML, which may look like one as shown below- ...

Rapidshare Hack

There are two hacks to beat Rapidshare download limits and waiting time.1) Rapidshare Hack (For Firefox Users) :- The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors. The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment. But most of the time, that advantage is available only to people with the programming skills to make the changes they want. That's where Greasemonkey, a free plug-in for Firefox, comes in -- it simplifies hacking the browser. Released at the end 2004, Greasemonkey is the latest in a growing arsenal of Firefox customization tools. It changes...

Administrator are often recording notes

Administrators and educators are often recording notes describing incidences that occur on or around the school. The process of constantly writing notes can be a tedious but necessary process. This little administrative hack facilitates a more efficient use of time for any professional. The administrator makes use of Ontario Ministry licensed software (OSAPAC) and a digital audio recorder in order to speed up the note taking process. What You Will Need:  Dragon Naturally Speaking 8 (speech to text software) installed on your computer (this software is licensed in Ontario for all schools)  Digital Audio Recorder “ (The...
Page 1 of 7512345Next

 
Design by gitstein | Bloggerized by Kuldeep