Getting into Network Security
VIRTUAL BOX
VIRTUAL BOX
It is a powerful x86 and AMD64/Intel64 virtualization product from ORACLE technologies. It is both for Enterprise & home use. It is almost competable for all OS.
STEPS TO INSTALL VIRTUAL BOX IN WINDOWS 7
1. Go to virtualbox.org
2. Click on Downloads from the left part of your screen
3. Now click on x86/amd64 from VirtualBox 4.1.8 for Windows hosts
4. After completing the download open the file
5. Complete the installation using optimized settings
BUFFER OVERFLOW ATTACKS
Buffer overflows are one of attackers most effective weapon on the internet. These dangerous tools, try to gain partial or complete control over the target. Buffer overflow vulnerabilities allow the attacker to execute a malicious code on the target system & also it allows him or her to install back doors on the system for further attacks. This is because buffer overflows are still one of the most powerful methods of breaking into a remote system & causing havoc.
SQL INJECTION
SQL Injection involves entering SQL code into web forms, eg. login fields, or into the browser address field, to access & manipulate the database behind the site, system or application.
CROSS SITE SCRIPTING (XSS)
XSS or Cross Site Scripting is the other major vulnerability which dominates the web hacking landscape, and is an exceptionally tricky customer which seems particularly different to stop. Microsoft, MySpace, Google... all the big company have problems with XSS vulnerabilities. This is some what more complicated than SQL Injection, and we'll just have quick look to get a feel for it.
XSS is about malicious (usually) JavaScript routines embedded in hyperlinks, which are used to hijack sessions, hijack ads in applications and steal personal information.
TUTORIAL LINKS
No comments:
Post a Comment