Skip to content
Thursday, June 26, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

website

Tutorial Web Hosting Website 

Extracting Useful Data

May 6, 2020 Krishna An MS-SQL Hack, An Oracle Hack, ETHICAL HACKING, Extracting Useful Data, HACKING, Injecting Code, security, wab-hack, web, web-app, web-app-hack, web-site, web-site-hack, website

In order to extract useful data from the database, you normally need to know the names of the tables and

Read more
Tutorial Web Hosting Website 

Disclosure of Tokens in Logs

May 5, 2020 Krishna Attacking Session Management, Disclosure of Tokens in Logs, ETHICAL HACKING, HACKING, web, web application, web hacking, web-hack, website

Aside from the clear-text transmission of session tokens in network communications, the most common place where tokens are simply disclosed

Read more
Tutorial Web Hosting Website 

Weaknesses in Session Token Handling

May 5, 2020 Krishna Attacking Session Management, Disclosure of Tokens on the Network, ETHICAL HACKING, http, Weaknesses in Session Token Handling, web-hack, website, website hacking

No matter how effective an application is at ensuring that the session tokens it generates do not contain any meaningful

Read more
Tutorial Web Hosting Website 

Predictable Tokens

May 4, 2020May 5, 2020 Krishna Attacking Session Management, Concealed Sequences, Full-Blown Tests for Randomness, Predictable Tokens, Time Dependency, Weak Random Number Generation, website, website hacking

Some session tokens do not contain any meaningful data associating them with a particular user but are nevertheless guessable because

Read more
Tutorial Web Hosting Website 

Weaknesses in Session Token Generation

May 4, 2020 Krishna account username, Attacking Session Management, ETHICAL HACKING, HACKING, http, Meaningful Tokens, Weaknesses in Session Token Generation, web hacking, website

Session management mechanisms are often vulnerable to attack because tokens are generated in an unsafe manner that enables an attacker

Read more
Tutorial Web Hosting Website 

Attacking Session Management

May 4, 2020 Krishna Alternatives to Sessions, Attacking Session Management, HACKING, HTTP Authentication, Sessionless state mechanisms, The Need for State, web hacking, web-site hacking, website

The session management mechanism is a fundamental security component in the majority of web applications. It is what enables the

Read more
Tutorial Web Hosting Website 

Defects in Multistage Login Mechanisms

April 30, 2020April 30, 2020 Krishna attacker, Attacking Authentication, Defects in Multistage Login Mechanisms, Fail-Open Login Mechanisms, HACKING, Insecure Storage of Credentials, PASSWORD, security vulnerabilities, web hacking, website

Some applications use elaborate login mechanisms involving multiple stages. For example: ■ Entry of a username and password. ■ A

Read more
Tutorial Web Hosting Website 

Implementation Flaws in Authentication

April 30, 2020 Krishna Attacking Authentication, Authentication, Fail-Open Login Mechanisms, HACKING, Implementation Flaws in Authentication, security, web application, web hacking, website

Even a well-designed authentication mechanism may be highly insecure due to mistakes made in its implementation. These mistakes may lead

Read more
Tutorial Web Hosting Website 

Non-Unique Usernames

April 30, 2020April 30, 2020 Krishna Incomplete Validation of Credentials, Insecure Distribution of Credentials, Non-Unique Usernames, Predictable Initial Passwords, Predictable Usernames, web hacking, Web hosting, website

Some applications that support self-registration allow users to specify their own username, and do not enforce a requirement that usernames

Read more
Tutorial Web Hosting Website 

User Impersonation Functionality

April 30, 2020April 30, 2020 Krishna HACKING, Incomplete Validation of Credentials, PASSWORD, password validation, User Impersonation Functionality, web hacking, website

Some applications implement the facility for a privileged user of the application to impersonate other users, in order to access

Read more
  • ← Previous

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.