Using Virtual Machines to save time and efforts

Using-Virtual-Machines-to-save-time-and-efforts

Software Requirements : Oracle VirtualBox

One of the biggest problems developers face while working offline is - working across machines. At times like this - when we all have to work from home during the COVID-19 pandemic, it has been quite a hassle for all developers to backup their local machine projects and set them up back again on their machines. Also the next major issue you might face is - your desktop was Linux host and your laptop is windows. Setting up an exact same server on windows to work like it was working before. And whose to forget the problems with the database backup from one machine and set it up all over on the other one. Also using different versions of the same distro might pose some more issues.

Continue reading
0
  341 Hits
  0 Comments
341 Hits
0 Comments

SEH Buffer Overflow exploitation using Egghunter payload

Hacking-FTP-server-using-Buffer-Overflow

In this blog, we will be hacking into an FTP server using a manual Buffer Overflow attack. We will be crafting our own exploit payload as we move forward. Lab setup consists of Windows 7 as host OS and Kali Linux as an attacker machine. The version of FTP we are using is Easy File Sharing Web Server 7.2.

Continue reading
0
  1552 Hits
  0 Comments
1552 Hits
0 Comments

Using Cookies and CSRF tokens effectively

Using-Cookies-and-CSRF-tokens-effectively

What is CSRF?

CSRF (Cross-Site Request Forgery) is a type of attack which tricks the victim to do a task on the victim authenticated web-application on behalf of the interests of the attacker. An application vulnerable to CSRF enables attackers to perform any actions on the victim’s behalf without his/her knowledge.  

Continue reading
0
  1476 Hits
  0 Comments
1476 Hits
0 Comments

Coding secure Joomla Extensions

Joomla-and-its-security

Among the different online content management platforms available, Joomla is preferred for its flexibility and improved security. Yet, this doesn’t stop hackers from prying into your site's vulnerabilities to exploit them. Regardless of the type of website and security level, websites are always susceptible to being hacked. Most times this is due to the use of vulnerable 3rd party extensions.

Continue reading
0
  1487 Hits
  0 Comments
1487 Hits
0 Comments