Skip to main content

Posts

Showing posts from 2017

Blueprinting The Target Part - 1

Basics of  Hacking Hacking is famous and is among the most searched words on search engines. It’s always been an interesting topic for school students. Hacking is an extra mile from the normal information technology field. You need to know many things if you want to peruse your career in the field of ethical hacking or security testing. Prerequisites • Knowledge of TCP/IP protocols • Basic knowledge of Metasploit framework • Prior hands-on experience with Virtual Machines • Understand general concepts of networking technologies • Experienced in any one operating system [Linux, Windows & OSX] • Understands the basics of hacking terminologies, e.g. exploit, payload, vulnerability • Prior experience with any network based security scanners What we will cover As we have just mentioned, learning hacking requires you to know many things, however, we will present for you in a nutshell how to perform ethical hacking but our workshop is limited to focusing on ke

Attacking Network Device PART - 6

Return Oriented Programming  Introduction   Since 1988, the Morris Worm stack overflow has been a nightmare for developers. Several countermeasures have been created to avoid this kind of attack. Compilers are pioneers in developing such techniques.    Sadly, few programmers know very much about compilers' options as they usually compile programs with inherited procedures. For instance, the very well known GCC compiler has a stack protection with the fstack-protector option [1].    In the middle of the past decade, manufacturers introduced the No-eXecute (NX) bit which prevents the execution of code beyond the text area of a program. When this bit is ON, the processor sends a signal to the Operating System (OS). In addition, it is also necessary for the Operating System to be instructed to stop the code execution. In Windows, this is achieved by activating the Data Execution Prevention.     Readers must be aware that the NX bit does not prevent stack overflow and only prevents the

Attacking Network Device PART - 5

Exploits using ICMP protocol Internet Control Message Protocol (shorthand, ICMP) is a part of the Internet Protocol used by network devices to send error messages to other connected hosts; for example, to indicate that a requested service is not available or a router could not be reached. But many times, this protocol is abused in transferring malicious data packets. This article discusses the vulnerabilities and security loopholes associated with such types of data transfers and potential options to prevent these security attacks.  What you will learn...  ● Understanding ICMP and its role in networking  ● ICMP as a potential host for malicious activities ● Potential Attacks with ICMP  ● Security measures  What you should know?  ● Basic knowledge of Computer networks and protocols like IP and ICMP  ● Basic knowledge of network infrastructure.  ● Basic knowledge of packet programming. Understanding ICMP and its role in networking Overview   IP is the principle protocol used for delivery