Skip to main content

Posts

HOW TO HACK WIRELESS NETWORK

What is a wireless network? A wireless network is a network that uses radio waves to link computers and other devices together. The implementation is done at the Layer 1 (physical layer) of the OSI model. How to access a wireless network? You will need a wireless network enabled device such as a laptop, tablet, smartphones, etc. You will also need to be within the transmission radius of a wireless network access point. Most devices (if the wireless network option is turned on) will provide you with a list of available networks. If the network is not password protected, then you just have to click on connect. If it is password protected, then you will need the password to gain access. Wireless Network Authentication Since the network is easily accessible to everyone with a wireless network enabled device, most networks are password protected. Let’s look at some of the most commonly used authentication techniques. WEP WEP is the acronym for Wired Equivalent Privacy. It

HACK WEB

What is a web application? What are Web Threats? A web application (aka website) is an application based on the client-server model. The server provides the database access and the business logic. It is hosted on a web server. The client application runs on the client web browser. Web applications are usually written in languages such as Java, C#, and VB.Net, PHP, ColdFusion Markup Language, etc. the database engines used in web applications include MySQL, MS  SQL  Server, PostgreSQL, SQLite, etc. Most web applications are hosted on public servers accessible via the Internet. This makes them vulnerable to attacks due to easy accessibility. The following are common web application threats. SQL Injection  – the goal of this threat could be to bypass login algorithms, sabotage the data, etc. Denial of Service Attacks – the goal of this threat could be to deny legitimate users access to the resource Cross Site Scripting XSS – the goal of this threat could be to inject code t

HACK WEBSERVER

Topics covered in this tutorial Web server vulnerabilities Types of Web Servers Types of Attacks against Web Servers Effects of successful attacks Web server attack tools How to avoid attacks on Web server Hacking Activity: Hack a WebServer Web server vulnerabilities A web server is a program that stores files (usually web pages) and makes them accessible via the network or the internet . A web server requires both hardware and software. Attackers usually target the exploits in the software to gain authorized entry to the server. Let’s look at some of the common vulnerabilities that attackers take advantage of. Default settings – These settings such as default user id and passwords can be easily guessed by the attackers. Default settings might also allow performing certain tasks such as running commands on the server which can be exploited. Misconfiguration of operating systems and networks – certain configuration such as allowing users to execute commands on the s