The Basic Authentication scheme uses the username and password and encrypts the password using base64 encoding. In spite of this, there are still many security holes in the Basic Authentication scheme. Although the password is stored on the server in encrypted format, it is passed from the client to the server in plain text format across the network. Hence, any attacker listening with a packet sniffer can easily read the username and password in plain text format. The username and password are passed with every request not just when the user first types them, so the packet sniffer need not listen at any particular time, but just long enough to observe any single request coming across the wire. Besides, the encryption used in the authentication is also very insecure and can be easily decoded.

Explore More

DNS disaster: first attacks reported

The first attacks that are likely to have stemmed from a serious Domain Name System flaw have been reported. Dan Kaminsky (Credit: Kaminsky’s blog) The existence of the Domain Name

Burmese Hackers Hacked Georgia Government’s Web www.moh.gov.ge

Burmese Hackers Group! Named (“BurmeseHackers” or “UnderGround Hackers Group @ ughackersgroup{at}gmail.com”), Hacked Georgia Gorvernment’s Web  www.moh.gov.ge , Really rare event, cos i’ve never heard about this hackers group before! They

Mobile trace – How cell phone tracing works? Technology, and software’s

Is it possible to track a GSM/ CDMA cellular phone? Is there a software in market which tracking the location of the phone? Is it possible to track lost mobile?