Skip to main content

Posts

Showing posts from July, 2016

Exploiting Software Haking_ATTACK PATTERN - Part 5

SQL Injection Database has been a common repository for many applications that were been develop as a centralized location to store the information. However over the year, we hear a lot of incident around the world regarding issue such as SQL injection and no one take note on it till they have been hit. There are different type of databases are available in the market which the primary function is to store and retrieve data when it was been requested by other software application. Mostly this type of architecture consists of a web which are facing the internet. The function of this web interface it serve as a UI for the users to use. An application server does exists which have a direct connection to the databases it self. No matter what is the size of the infrastructure, the DB will be important repository to store data. Since this architecture was been implemented in all of the company, there is also security vulnerability that exist on the system which part

Exploiting Software Haking_ATTACK PATTERN - Part 4

Network Pen Testing Breaking the Corporate Network through Hackers Perspective We will discuss about performing network penetration testing on the corporate network using grey box approach and exploiting the vulnerabilities from hackers perspective. This article concentrates majorly on usage of NMap, Nessus, Metasploit for network penetration testing. There are 3 approaches for performing network penetration testing. • White box is when the tester has access to the complete network structures and admin credentials. • Grey box is when the tester has the basic network information but does not have admin credentials. • Black box is when the tester has no access to any of the information for starting penetration testing. Generally prefer to go for grey box approach. We are targeting the corporate network we have to keep in mind the we are bound to follow regulatory compliance and using the black box approach may result in wrong results, incomplete vulnerability detection, tar