Posts

Dark Web

  The dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access. The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term "deep web" is mistakenly used to refer specifically to the dark web. The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks like Freenet, I2P, and Tor, operated by public organizations and individuals. Users of the dark web refer to the regular web as the Clearnet due to its unencrypted nature.The Tor dark web may be referred to as onionland ,a reference to the network's top level domain suffix .onion and the traffic anonymization technique of onion routing. Darknet markets Commercial darknet markets, which mediate transactions for illegal drugs and othe

Sendmail Vulnerabilities and smad attack(sendmail accept dos).

Versions of sendmail prior to version 8.8.5 have a variety of vulnerabilities.  Older versions of sendmail may also run in DEBUG mode which could allow access from a malicious user. Impact Malicious users exploiting these vulnerabilities are able to gain unauthorized access, possibly even root access, to a target system. Background sendmail , first released circa 1983, is a mail router program, and was designed to route email between peers on a network and also to route mail between networks. Note that sendmail is a routing program, and not an application that an ordinary user would use to format and send messages. Instead, sendmail accepts formatted messages from an email program (such as Outlook Express, Eudora or Pegasus), and then sends them to the appropriate recipients. The message is sent using the Simple Mail Transfer Protocol (SMTP), which was designed to be a reliable and effective transport for mail messages. The Problems CVE 1999-0047

SQL Injection

Image
SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.             SQL injection (SQLI) is considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project.In 2013, SQLI was rated the number one attack on the OWASP top ten. The five main sub-classes of SQL injection: Classic SQLI Blind or Inference SQL injection Database management system-specific SQ

QUAD ROOTER Vulnerability

  Check Point Software Technologies has revealed details of a new Android vulnerability that affects phones using the Qualcomm chipset. The vulnerability called ‘Quad Rooter’ affects over 900 million devices, according to Check Point.                                                      Quad Rooter is a set of four vulnerabilities affecting Android devices built using Qualcomm chipsets. Qualcomm is the world’s leading designer of LTE chipsets. If any one of the four vulnerabilities is exploited, an attacker can trigger privilege escalations for the purpose of gaining root access to a device. However, this can only be done through the use of a malicious app, so always tread with caution when installing new apps. For example, only download apps from the Google Play Store. The four vulnerabilities in Quad rooter vulnerability is ·          CVE-2016-2059   ·          CVE-2016-2504           ·          CVE-2016-2503 ·          CVE-2016

DENIAL OF SERVICE (DoS)

Image
Denial-of-service ( DoS ) attack is an attempt to make a machine or network resource unavailable to its legitimate users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.      A distributed denial-of-service (DDoS) is where the attack source is more than one, often thousands of, unique IP addresses. It is same to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations. Outcome Unusually slow network performance (opening files or accessing web sites) Unavailability of a particular web site Inability to access any web site Dramatic increase in the number of spam emails received—this type of DoS attack is considered an e-mail bomb Disconnection of a wireless or wired internet connection Long term denial of access to the web or any internet ser