Wireshark: Working with Packet Streams
(For more resources related to this topic, see here.)
Working with Packet Streams
While working on network capture, there can be multiple instances of network activities...
Multi-Factor Authentication System – Is it a Good Idea for an App?
With cyber-attacks on the rise, strong passwords no longer guarantee enough protection to keep your online profiles safe from hackers. In fact, other security...
Blocking Common Attacks using ModSecurity 2.5: Part 3
Source code revelation
Normally, requesting a file with a .php extension will cause mod_php to execute the PHP code contained within the file and then...
Auditing Mobile Applications
In this article by Prashant Verma and Akshay Dikshit, author of the book Mobile Device Exploitation Cookbook we will cover the following topics:
Auditing Android...
CISSP: Security Measures for Access Control
Knowledge requirements
A candidate appearing for the CISSP exam should have knowledge in the following areas that relate to access control:
Control access by applying concepts,...
Homebrew’s Github repo got hacked in 30 mins. How can open source projects fight...
On 31st July 2018, Eric Holmes, a security researcher gained access to Homebrew's GitHub repo easily (He documents his experience in an in-depth Medium...
Ruby and Metasploit Modules
(For more resources related to this topic, see here.)
Reinventing Metasploit
Consider a scenario where the systems under the scope of the penetration test are very...
Ways to improve performance of your server in ModSecurity 2.5
A typical HTTP request
To get a better picture of the possible delay incurred when using a web application firewall, it helps to understand the...
What we can learn from attacks on the WEP Protocol
In the past years, many types of attacks on the WEP protocol have been undertaken. Being successful with such an attack is an important...
New cybersecurity threats posed by artificial intelligence
In 2017, the cybersecurity firm Darktrace reported a novel attack that used machine learning to observe and learn normal user behavior patterns inside a...