Kali Linux
-
Understanding Same Origin Policy (SOP) and Cookies: A Practical Lab Guide
In today’s interconnected web landscape, security measures like Same Origin Policy (SOP) and cookie management play pivotal roles in safeguarding user data and ensuring secure interactions between web applications. This lab guide provides…
-
Web Application Attacks
Here are some common web application attacks, each explained with examples: 1. SQL Injection Description: Attacker inserts or manipulates SQL queries to execute arbitrary commands on the database. Example:Input: ' OR '1'='1Query: SELECT…
-
Information Gathering
Learning Objectives Recommended tools Note: IP/domain shown below are for example purpose only . Step 1: Host Discovery – Ping sweep Perform a ping sweep (not a port scan) on the entire netblock and write…
-
Man-in-the-middle Attack
A Man-in-the-Middle (MitM) attack is a form of cyber attack where an attacker intercepts and potentially alters the communication between two parties without their knowledge. The attacker positions themselves between the communicating parties,…
-
What is RDP, How to enumerate for privilege escalation.
RDP stands for Remote Desktop Protocol. It is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user…
- BufferOverflow, CyberSecurity, DoS, Firewall, Kali Linux, Malware, Network, Python, Snort Signature, wireshark
What is Snort Rule and How to write one ?
What is Snort Rule ? It is a Network Intrusion Detection and Prevention System which uses Rules. These rules are the combinations of the signatures, protocols, inspection method like expected malicious behaviour in…