What is RTP in Wireshark?
RTP stands for Real-Time Protocol, which is a protocol that allows the transmission of streaming media over an IP-based network. The protocol determines how audio and video data will be encoded, transmitted, and packaged in data packets along with the information necessary to decode the data at its destination. The communication endpoints involved in an RTP session are called participants. The two participants in an RTP session are called the RTP sender and the RTP receiver....
read more
Client-Side HTTP Parameter Pollution Attack
Client-Side HTTP Parameter Pollution is a client-side security vulnerability in web applications designed to use HTTP requests. HTTP parameter pollution exploits the ability of HTTP methods such as POST, PUT and DELETE to send additional data with a request. This allows attackers to inject arbitrary HTML code which will be processed by the vulnerable application as part of its normal operation. The vulnerability specifically targets web frameworks that facilitate the development of SPAs (Single Page Applications) where content can be dynamically generated before page rendering or in response to user actions....
read more
What is Malicious File Execution?
Cyber attacks are considered to be the most malicious attacks on user privacy in the cyber world. Cyber attacks give cyber criminals the power to unethically conduct activities that lead to the stealing of personal and professional information from the user/ organization systems. Knowledge about cyber attacks is thus very essential....
read more
How to Defend Against Password Cracking of Systems?
To Defend against Password Cracking of systems in Ethical Hacking, you need to know how password cracking functions. Password cracking is the act of using a computer program to try to guess an inputted password. There are many forms of attacks that can be used in this process, but they all result in the same goal of trying to gain access to an account without knowing what the true master password is. This may seem like a low-priority problem for systems administrators, as there are other security measures that can mitigate this risk; however, it’s important for ethical hackers to understand how password cracking functions and how defenses against these attacks can be put into place by properly configuring software firewalls and operating systems....
read more
What is Non-Electronic Password Attack on a System?
Non-electronic password attacks are forms of hacking that seek to bypass any form of authentication or authentication system. Typically, a non-electronic password attack will use an automated script to probe for passwords on the network. One way this may be done is by placing port scanning software on an access point, expecting to gain access without being noticed by the intended users. Another way is through social engineering. In this case, intelligence services send phishing emails or send malware through apps like WhatsApp and Viber, which would then attempt brute force login attempts on the networks they are sent from. Due to the nature of these attacks, this is where effective countermeasures come into play. Most large corporations or organizations will have security teams that are tasked with reducing the chances of an attack from occurring in the first place through a number of means....
read more
What is Failure to Restrict URL Access?
Hacking is a term used to describe the process of gaining remote access to other computers, most commonly through the internet. Ethical hacking refers to the process of hacking with simply the intention of uncovering vulnerabilities that may exist and then reporting them in order to help protect against future incidents. This can be done by researching a vulnerability or by performing penetration testing....
read more
Storm Worm
In this article we will know about the one of biggest malware attacks in 2007, It actually brings a change to the world of cyber security, It is known as Storm Worm....
read more
Printing Packets in Wireshark
Prerequisite: Wireshark – Packet Capturing and Analyzing...
read more
Password Auditing With L0phtcrack 7 Tool
In essence, password auditing programs make guesses about the credentials being used on your network. They accomplish this using a combination of brute force and dictionary assaults, among other techniques, and then inform you of any other ways the passwords may be compromised, such as by being pwned....
read more
How a Connection String Injection Attack is Performed?
This attack can be used to manipulate the web application’s access to a database using database connectivity objects. It is also the often overlooked method for attackers to avoid detection and bypass security controls designed for legitimate users. This type of hacking allows an attacker to bypass authentication controls and take full control over a website or app without requiring any user interaction or account creation, which is typically only available for users with administrative privileges....
read more
7 Ways To Earn Money as an Ethical Hacker
Ethical hacking, also known as “white hat” hacking, is the practice of using computer security skills for the purpose of testing and improving the security of a computer system or network. This type of hacking is conducted with the permission of the owner of the system or network, and the aim is to identify vulnerabilities and weaknesses that could be exploited by malicious hackers....
read more
PRES Users Context List in Wireshark
Wireshark uses tables to show data and statistics to the user. The summarized data displayed in tables reduce the complexity of the information and make it easy for the user to analyze. For managing and editing these tables in Wireshark, the User Table editor is used. Wireshark PRES Users Context List is also a user table to map a presentation context identifier to a given object identifier when the capture does not contain a PRES package with a presentation context definition list for the conversation....
read more