DEVIL'S BLOG ON SECURITY


A DEVIL'S BLOG ON COMPUTER AND INFORMATION SECURITY, ETHICAL HACKING AND COUNTERMEASURES


Learn Ethical Hacking | Learn Hacking Online | Learn How To Hack|Hack Counter Hack| Ethical Hacking Tutorials


Home   ||   See All Tutorials  ||   Products  ||   About This Blog   ||  Subscribe To RSS Feed



Join facebook group THE HACKER DEVIL


Web Application Hacking | The Basics

Web Application Hacking | The Basics


In this following post we will have a little basic understanding about web application and web application hacking. Now before our discussion on what is web application hacking lets understand first what a web application is? A web application is application which can be accessed over Internet or Intranet. Usually a term web application is used for a computer application hosted over a web server which can be accessed using web browser.

Scanning

Scanning


Get TuneUp Utilities 2010 For Free

Get TuneUp Utilities 2010 For Free


Today I got an awesome news. Since TuneUp Utilities have released a 2011 version of their software, previous version is being offered for free of cost for promotion. I know 2011 version is out but 2010 version is equally good. TuneUp Utilities is offering you a full working product key free for no catch if you ask with Computer Shopper promo code. Following is promo link for Computer Shopper, just enter your email ID and they will send you product key,

ISS Security Tools

ISS Security Tools


There are several tools available to hack IIS server (type IIS hacking tools on Google you’ll find lot of them) therefore if you are running a IIS server then you must be careful it should be kept overprotected since tools assures that even skids or script kiddies can attempt a hack and can also become successful. Following are some tools that can help you protect an IIS server, please note that you’ll not need all of them, choose them according to your need.

Server Mask:
It modifies all you web server’s “fingerprint” by removing unnecessary HTTP response data, modifying cookie values, removing the need to serve files extensions and adjusting other response data. Server mask makes it difficult to find real banner, fingerprint and vulnerability of system thus fooling an attacker to try wrong exploit thus allowing detection of attack by IDS and IPS.

Reconnaissance

Reconnaissance


Free Ethical Hacking Training | Learn Ethical Hacking Online Free | Learn How To Hack | Hack Counter Hack | Ethical Hacking Tutorials | Devil's Blog On Security