Tuesday , September 25 2018
Home / Jahanzaib Khan (page 32)

Jahanzaib Khan

Jahanzaib Khan is Web Designer & Ethical Hacker. He Who has been working since 2014, and is managing several successful websites on the internet for about 3 years. Jahanzaib-khan.com

UNDERSTANDING CYBER SECURITY – Download Free Hacking Books

UNDERSTANDING CYBER SECURITY - Download Free Hacking Books

UNDERSTANDING CYBER SECURITY – Download Free Hacking Books 1.Backgrounding- A. networking technologies (e.g., hardware, infrastructure) web technologies (e.g., web 2.0, skype) systems technologies communication protocols malware operations mobile technologies (e.g., smart phones) telecommunication technologies backups and archiving (e.g., local, network)   2.Analysis/Assessment- A. data analysis systems analysis risk assessments technical …

Read More »

SQL INJECTION ATTACKS: Finding the Vulnerability

SQL INJECTION ATTACKS: Finding the Vulnerability

SQL Injection Attacks: Now that we have the basics of SQL injection down, let’s use our DVWA environment to try it out on a vulnerable page. We have a couple of goals for this section: Crash the application to prove that our input dictates the applications behavior. Retrieve usernames from …

Read More »

The SQL Interpreter

The SQL Interpreter

SQL Interpreter: One of the main aspects of this vulnerability that you must understand is that it leverages an SQL interpreter. An interpreter takes input and acts on it immediately without having to go through traditional programming processes such as linking, compiling, debugging, and running. For example, an SQL interpreter …

Read More »

SQL for Hackers: Learn How Useful SQL

SQL for Hackers

SQL for Hackers: Learn How Useful SQL : As an attacker, it is critical to gain an understanding on how this query is constructed and what exact parts of the query you are in control of. The query is broken out into three distinct parts. SELECT * FROM shoes WHERE …

Read More »

USING NMAP TO PERFORM NULL SCANS

USING NMAP TO PERFORM NULL SCANS

USING NMAP TO PERFORM NULL SCANS: Null scans, Xmas tree scans, are probes made with packets that violate traditional TCP communication. In many ways, the null scan is the exact opposite of a Xmas tree scan because the null scan utilizes packets that are devoid of any flags (completely empty). …

Read More »

Measuring Internet Marketing Programs

Measuring Internet Marketing Programs

Measuring Internet Marketing Programs: Measuring the success of Internet marketing programs involves tracking the actions web visitors take and converting these actions into values that can be used to determine and compare performance. Some of the common measurements include the number of page hits, page views, ad impressions, click through …

Read More »

NMAP SCRIPTING ENGINE: FROM CATERPILLAR TO BUTTERFLY

THE NMAP SCRIPTING ENGINE: FROM CATERPILLAR TO BUTTERFLY

THE NMAP SCRIPTING ENGINE: FROM CATERPILLAR TO BUTTERFLY: Make no mistake. Nmap is an awesome tool. It is mature, robust, well documented, and supported by an active community. However, the NSE provides Nmap with an entirely new skill set and dimension. The NSE is a powerful addition to the classic …

Read More »

PORT SCANNING WRAP UP

PORT SCANNING WRAP UP

Port Scanning Wrap Up: Now that we have covered the basics of port scanning, there are a few additional switches that need to be covered. These switches provide extended functionality that may be useful to you as you progress in your penetration testing career. PORT SCANNING WRAP UP As mentioned …

Read More »

NIKTO: INTERROGATING WEB SERVERS

NIKTO: INTERROGATING WEB SERVERS

NIKTO: INTERROGATING WEB SERVERS: After running a port scan and discovering a service running on port 80 on port 443, one of the first tools that should be used to evaluate the service is Nikto. Nikto is a web server vulnerability scanner. This tool was written by Chris Sullo and …

Read More »

USING NMAP TO PERFORM AN SYN SCAN

USING NMAP TO PERFORM AN SYN SCAN: The SYN Scan is arguably the most popular Nmap port scan. There are many reasons for its popularity, including the fact that it happens to be the default Nmap scan. If you run the Nmap command without specifying a scan type (using the …

Read More »