Thursday, 22 December 2011

                                                        Getting into Network Security

 VIRTUAL BOX
      It is a powerful x86 and AMD64/Intel64 virtualization product from ORACLE technologies. It is both for Enterprise & home use. It is almost competable for all OS.  

STEPS TO INSTALL VIRTUAL BOX IN WINDOWS 7
       1. Go to virtualbox.org
       2. Click on Downloads from the left part of your screen
       3. Now click on x86/amd64 from VirtualBox 4.1.8 for Windows hosts
         4. After completing the download open the file
         5. Complete the installation using optimized settings 

BUFFER OVERFLOW ATTACKS
         Buffer overflows are one of attackers most effective weapon on the internet. These dangerous tools, try to gain partial or complete control over the target. Buffer overflow vulnerabilities allow the attacker to execute a malicious code on the target system & also it allows him or her to install back doors on the system for further attacks. This is because buffer overflows are still one of the most powerful methods of breaking into a remote system & causing havoc.

SQL INJECTION
         SQL Injection involves entering SQL code into web forms, eg. login fields, or into the browser address field, to access & manipulate the database behind the site, system or application.

CROSS SITE SCRIPTING (XSS)
         XSS or Cross Site Scripting is the other major vulnerability which dominates the web hacking landscape, and is an exceptionally tricky customer which seems particularly different to stop. Microsoft, MySpace, Google... all the big company have problems with XSS vulnerabilities. This is some what more complicated than SQL Injection, and we'll just have quick look to get a feel for it.

          XSS is about malicious (usually) JavaScript routines embedded  in hyperlinks, which are used to hijack sessions, hijack ads in applications and steal personal information.

TUTORIAL LINKS
          1. PHP: http://w3schools.com
                                                    http://www.linuxjournal.com/article/2902


No comments:

Post a Comment