Posts

Showing posts from July, 2020

CEH 15- SQL Injection

Image
↑ Previous Page Next Page What is a Database?  A database is a collection of information that is organized into rows, columns and tables.  It is indexed so that it can be easily accessed, managed and updated.  Data in the database gets updated, expanded and deleted as new information is added. Database software examples: MySQL Oracle Microsoft SQL SQL lite MongoDB Microsoft Access Postgresql Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking. What is SQL?  SQL stands for Structured Query Language. SQL is a database management language used to manage databases, to perform various operations like create, read, update and delete data on the database. 

CEH 14- Hacking Web Applications

Image
↑ Previous Page Next Page Before we are going to talk about "Hacking Web Applications", first we need to know about "Web Application, its development and its working". So let's get started. What is Web Application?  A Web Application is a program that is accessed over internet using HTTP or HTTPS existing in the web server.  The web application is a client-server application. In which client is a web browser like chrome, firefox, safari, etc.  The web application contains a set of web pages, scripts, images, etc.  Web applications help organizations to grow their business.  Web applications include online forms, shopping carts, word processors, spreadsheets, video and photo editing, file conversion, file scanning, and email programs such as Gmail, Yahoo, etc,. Types of websites: Static Website  Dynamic Website  Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose o

CEH 13- Hacking Web Servers

Image
↑ Previous Page Next Page Before we are going to talk about "Hacking Web Servers", first we need to know about "how the Web server works?". What is a Web Server?  Web Server is a computing system that runs on server OS.  It process the HTTP/HTTPS requests and serve the web pages on the world wide web(www).  The pages delivered are HTML documents, which may include images and scripts in addition to the text content.  Clients uses a web browser to interact with the web server.  Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet.  There are many Web server software applications like Xampp, Apache, Nginx, IIS web server, etc. Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime th

CEH 12- Evading IDS, Firewalls & Honeypots

Image
↑ Previous Page Next Page What is a Firewall?  A firewall is a software or hardware device.  It secures the internal trusted network form the intruders by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.  A firewall typically establishes a barrier between a trusted internal network (LAN) and an untrusted external network(Internet).    Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking. Types of Firewalls:  Packet filter firewalls  Circuit-level gateways  Application-level gateways Stateful inspection firewalls  1. Packet Filter Firewalls:  Packet filtering firewall is used to control network access. By

CEH 11- Session Hijacking

Image
↑ Previous Page Next Page What is Session?  A session stores information (in variables) to be used across multiple pages, when a user logs into his online account. Unlike cookies, this information is not stored on the user’s computer. Typically maintained by the server, and created on the first request or after an authentication process. The session-id is exchanged between a web browser and the server on every request. Different ways to exchange session-Id: Hidden Form fields Cookies (most common) Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking. What is Session Token? Session ID or session token is a piece of data that is used in network communications to identify a se

CEH 10- Denial of Service

Image
↑ Previous Page Next Page What is Denial of Service?  A Denial of Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users.  Temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. This can be done by send a huge number of requests to server. Results DoS attack, server cannot handle these requests. Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking. What is Distributed Denial Of Service? A Distributed Denial-of-Service (DDoS) attack occurs when multiple systems flood the targeted system with traffic. With this traffic the resources unavailable to its intended users.  Such an a

CEH 9-Social Engineering

Image
↑ Previous Page Next Page What is Social Engineering? Social engineering is an art of exploiting humans to gain sensitive information.  This technique involves tricking people into breaking security standard.  It is a most significant threat in any organization.  Common targets of social engineering include help desk personnel, technical support executives, system administrators, etc.   Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking. Types of Social Engineering: Social engineering is classified based on the techniques used to attack or commit fraud on the victim to steal the sensitive information.  Types of social engineering attacks are: Human-based Computer-ba