IP spoofing

August 13, 2008 0 Comments 0 tags

IP spoofing is about the most advanced attack that can be executed on a computer system. IP spoofing, if done correctly, is one of the smoothest and hardest attacks on

XSS Stealing Cookies

August 13, 2008 0 Comments 0 tags

This method (XSS attacks) is for get the cookies users, so, for get information of users… and then, login into the account of the victim user…u will have to give

How does a cross site scripting (XSS) attack work?

August 11, 2008 0 Comments 0 tags

A cross site scripting attack works in the following manner: * The attacker identifies a web site that has one or more XSS bugs for example, a web site that

Misconfigured security features or Incorrect use of security

August 11, 2008 0 Comments 0 tags

Session cookie is not randomized enoughNumerous applications use a session cookie to maintain the state of a logged in user. The use of authentication to validate the user that has

FEMA Phones Get Hacked

August 8, 2008 0 Comments 0 tags

If you are going to hack a phone system, do you really want to hack the Department of Homeland Security? That’s what happened this weekend when someone made hundreds of

Buffer Overflows

July 28, 2008 0 Comments 0 tags

Buffer Overflow Overview Buffer overflows are the classic security vulnerability that have been around since the beginning of programming, and are still occurring everywhere today. Buffer overflows are very prevalent

Directory Traversal

July 20, 2008 0 Comments 0 tags

Directory Traversal Overview Directory Traversal vulnerabilities occur once again when the user supplied input is not validated. You think we would get tired of saying this, but it appears this