DEVIL'S BLOG ON SECURITY


A DEVIL'S BLOG ON COMPUTER AND INFORMATION SECURITY, ETHICAL HACKING AND COUNTERMEASURES


Learn Ethical Hacking | Learn Hacking Online | Learn How To Hack|Hack Counter Hack| Ethical Hacking Tutorials


Home   ||   See All Tutorials  ||   Products  ||   About This Blog   ||  Subscribe To RSS Feed



Join facebook group THE HACKER DEVIL


Attacks Against Weak Token Generation

Attacks Against Weak Token Generation



During our last post to this we discusses about basics of Session Management Attack which is also known as session hacking. In this post we will have a look on how you can attack weak token generation method to attack session management. Following are most common methods of generating weak tokens,
  • Using meaningful tokens
  • Predictable token generation
  • Adding time dependent variations in tokens

Free Ebooks For Download

Free Ebooks For Download



Since several days people are sending me mails about why I don't offer any free stuff to them for joining mailing list or why I am not offering ebooks for free to download. When such mails began to show up in my inbox I took it easy but now I receive at least 1 email about free stuff everyday and sometimes even 5-10. At an average when I calculated number of emails this month regarding free ebooks they were above 100-120. First of all I want to tell all my readers that I don't want to promote my blog by providing you with illegal and pirated contents. But as I am getting heavy requests about providing free ebooks I have decided to provide you with it. By the way I'll not provide you with any pirated contents that means you'll not get any illegal download from me. So what kind of ebooks I am gonna provide. Internet is full of useful free and legal ebooks which can be downloaded and can be given to anyone for download. So books that you'll receive will be,

Session Hacking | Session Management Attacks | The Basics

Session Hacking | Session Management Attacks | The Basics



So we are here to discus one more topic related to web application hacking, that is session hacking. Note that session hijacking and session hacking are closely related terms but are slightly different. In session hacking application level attacks are concerned where as in session hijacking application level attack as well as TCP/IP level attacks are covered. Session hacking in other terms can also be called as Session Management Attack. So here I must clear we are discussing session hacking not session hijacking. People with confusion in session hacking and session hijacking should read this post carefully I hope that would help them clear up their confusion.

How To Create Create A Strong Defense Against Hackers For Your PC

How To Create Create A Strong Defense Against Hackers For Your PC



Hello all in this following post we will have a look on how to create a strong defense against hackers for your personal computers.

Selection of Anti-Virus:
Stage one of any secured system is anti-virus so selecting a good anti-virus is must. For general users who use their PC for browsing, gaming, movies and music a free anti-virus is good to go. My personal favor is Avast and AVG . Please note that there are several fake free anti-virus online which are nothing but malicious codes so its better to download those which are well known and from their official sites only. For those who use their computer for transactional purposes like online banking, purchase of goods, making online payments, wire transfer, donations, paid subscriptions or services should specially opt for complete Internet Security Suite. Following are my personal recommendations.

Free Ethical Hacking Training | Learn Ethical Hacking Online Free | Learn How To Hack | Hack Counter Hack | Ethical Hacking Tutorials | Devil's Blog On Security