Executing Applications

Once you gain access to a system and obtain sufficient privileges, it’s time to compromise the system and carry out the attack. Which applications are executed at this point is up to the attacker, but they can either be custom-built applications or off-the-shelf software. An attacker executes different applications on a system with specific goals … Read more

Social Networking Applications

In the last few years, the use of social networks has experienced staggering growth. Sites like Twitter and Facebook serve millions of users per day and generate terabytes of data. Ubuntu 10.04, released on April, 2010, was designed to be “social from the start,” which means that it integrated with social networks seamlessly. Natty Narwhal … Read more

Handy Applications For Linux

Many additional applications might prove useful on a day-to-day basis. Here we review some of the more common ones. Calculator The GNOME Calculator (also known as Gcalctool) can be found on the Applications menu. In its default mode, it shouldn’t present any challenges to anyone who has ever used a real-life calculator. Figure. GNOME Calculator … Read more

Mapping the Application

The first step in the process of attacking an application is to gather and examine some key information about it, in order to gain a better understanding of what you are up against. The mapping exercise begins by enumerating the application’s content and functionality, in order to understand what the application actually does and how … Read more

State and Sessions

The technologies described so far enable the server and client components of a web application to exchange and process data in numerous ways. To implement most kinds of useful functionality, however, applications need to track the state of each user’s interaction with the application across multiple requests. For example, a shopping application may allow users … Read more