Skip to content
Saturday, May 10, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

website hacking

Uncategorized 

Vulnerable Mapping of Tokens to Sessions

May 5, 2020 Krishna Attacking Session Management, Client Exposure to Token Hijacking, ETHICAL HACKING, Vulnerable Mapping of Tokens to Sessions, Vulnerable Session Termination, web-hack, website hacking

Various common vulnerabilities in session management mechanisms arise because of weaknesses in the way the application maps the creation and

Read more
Tutorial Web Hosting Website 

Weaknesses in Session Token Handling

May 5, 2020 Krishna Attacking Session Management, Disclosure of Tokens on the Network, ETHICAL HACKING, http, Weaknesses in Session Token Handling, web-hack, website, website hacking

No matter how effective an application is at ensuring that the session tokens it generates do not contain any meaningful

Read more
Tutorial Web Hosting Website 

Predictable Tokens

May 4, 2020May 5, 2020 Krishna Attacking Session Management, Concealed Sequences, Full-Blown Tests for Randomness, Predictable Tokens, Time Dependency, Weak Random Number Generation, website, website hacking

Some session tokens do not contain any meaningful data associating them with a particular user but are nevertheless guessable because

Read more
Tutorial Web Hosting Website 

Securing Authentication

May 4, 2020 Krishna Attacking Authentication, Handle Credentials Secretively, INTERNET, Prevent Brute-Force Attacks, Prevent Information Leakage, Prevent Misuse of the Password Change Function, Use Strong Credentials, Validate Credentials Properly, web, web hacking, website hacking

Implementing a secure authentication solution involves attempting to simultaneously meet several key security objectives, and in many cases trade off

Read more
Tutorial Web Hosting Website 

ActiveX Controls

April 23, 2020April 23, 2020 Krishna ActiveX controls, Bypassing Client-Side Controls, Decompiling Managed Code, Fixing Inputs Processed by Controls, html, Java, Java applets, Manipulating Exported Functions, Reverse Engineering, Shockwave Flash Objects, web hacking, website hacking

ActiveX controls are a much more heavyweight technology than Java applets. They are effectively native Win32 executables that, once accepted

Read more
Tutorial Web Hosting Website 

Capturing User Data: Thick-Client Components

April 23, 2020 Krishna Bypassing Client-Side Controls, Capturing User Data: Thick-Client Components, Coping with Bytecode Obfuscation, Decompiling Java Bytecode, HTML forms, HTML source, Java, Java applets, JavaScript, web hacking, website hacking

Besides HTML forms, the other main method for capturing, validating, and submitting user data is to use a thick-client component.

Read more
Tutorial Web Hosting Website 

Capturing User Data: HTML Forms

April 23, 2020 Krishna Bypassing Client-Side Controls, Capturing User Data: HTML Forms, Disabled Elements, HTML forms, JavaScript, Length Limits, Script-Based Validation, website hacking

The other principal way in which applications use client-side controls to restrict data submitted by clients occurs with data that

Read more

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.