SSL/TLS attacks: Part 2 – CRIME Attack
Compression Ratio Info-leak Made Easy (CRIME) attack: In the previous section we saw how the Chosen Plain-text attack was used to weaken the SSL/TLS protocol. […]
Compression Ratio Info-leak Made Easy (CRIME) attack: In the previous section we saw how the Chosen Plain-text attack was used to weaken the SSL/TLS protocol. […]
Recently there has been a lot of news about a new SSL/TLS based attacks which was demonstrated in this year’s BlackHat conference. The attack was […]
Overview: In this following test, I wanted to see whether I was able to view personal details of some other person who was not in […]
Recently “watering hole attacks” are getting popular among the hacking groups for targeting large groups of victims who routinely visit a popular website or discussion […]
I was reading the Joomla Update, http://developer.joomla.org/security/news/563-20130801-core-unauthorised-uploads A bug in Joomla Core and having the criticality is always awesome to see 🙂 I decided to […]
What is a DDoS based attack? A Distributed Denial-of-Service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its […]
What is Fuzzing? Fuzz testing is a testing technique that provides malicious input to the application. Fuzz testing is crashes, assertion failures, and memory leaks […]
Code Analysis Tool (CAT.NET) is a binary source code analysis tool that helps in identifying common security flaws in managed code. These vulnerabilities are listed […]
What is Memcache? Memcache is temporary data storage service which stores data in <key> :< value> format. It improves the overall performance of the website […]
Summary: LinkedIn has a feature called Project wherein you can add project members from your connections. We were able to discover a way to view […]