Home / IT Security / Black Hat (page 10)

Black Hat

DNS Spoofing – Performing DNS Spoofing

DNS Spoofing – Performing DNS Spoofing

DNS Spoofing: DNS is an important service for just about any network today. Some networks, such as those that use Active Directory, cannot even function without DNS being present in the environment. With these points in mind, we need to look at an attack, the attacking party modifies the DNS …

Read More »

Ways to Locate Wireless Networks

Ways to Locate Wireless Networks

Ways to Locate Wireless Networks: In order to attack, you must first find a target, and though site surveys can make this easier, they cannot help in every case. Several tools and mechanism make locating a target network easier.   The following tools can complement wardriving or be used on …

Read More »

USB Password Theft

USB Password Theft

USB Password Theft: In contrast to manual methods, there is some automated mechanism for obtaining passwords, such as via USB drivers. This method entails embedding a password-stealing application on a USB and then physically plugging the drive into a target system. Because many users store they passwords for applications an …

Read More »

Performing a Password Crack – Insecure Logon Systems

Performing a Password Crack

Insecure Logon Systems: Many web applications require some sort of authentication or login process prior to their use. Because of the importance of the logon process, it is essential that it be handled safely and securely. You must take care that the incorrect or improper entry of information does not …

Read More »

DoS | Botnet Specific Defensive Strategies

DoS | Botnet Specific Defensive Strategies

DoS | Botnet Specific Defensive Strategies: Let’s look at some DoS defensive strategies:- Disabling Unnecessary Services: You can help protect against DoS and DDoS attacks by hardening individuals systems and by implementing network measures that protect against such attacks. Using Anti-Malware:  Real-time virus protection can help prevent bot installations by …

Read More »

GOOGLE DIRECTIVES: PRACTICING YOUR GOOLGE-FU

Luckily for us, Google provides “directives” that are easy to user and help us get the most out of every search. These directives are keywords that enable us to more accurately extract information from the Google index. Consider the following example: assume you are looking for information on (TechyTalk) website …

Read More »