Author: Фарҳод

WaterHole attack

Ҳамлаҳои сӯрохи обдиҳӣ: чӣ гуна ҷинояткорони APT ва киберӣ ба инфрасохтори амн ворид мешаванд

My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Read more

credential stuffing

Пур кардани маълумоти эътимоднома DDoS нест!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Read more

ҳамлаҳои ddos ​​барнома

Ҳамлаҳои қабати барномавии DDoS, ва чӣ гуна онҳоро сабук кардан мумкин аст

DDoS (радкунии тақсимоти хидматрасонӣ) ва DoS (рад кардани хидмат) Ҳамлаҳоро дар асоси қабатҳои модели OSI, ки онҳо ҳадаф қарор медиҳанд, ба таври васеъ ба се категория тасниф кардан мумкин аст: қабати шабака (Қабат 3), қабати нақлиёт (Қабат 4), ва қабати татбиқ (Қабат 7). Қабат 3 ва қабат 4 ҳамлаҳо одатан камтар мураккаб мебошанд–even though that they might
Read more

Web Application Firewall (WAF)

WAF мурдааст, зинда бод ВАФ!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) ва қабат 4 (Transport) firewalls, which
Read more

Zombie Cookies Verizon Yahoo AOL

Бо усулҳои нави пайгирӣ чӣ гуна бояд муносибат кард; Кукиҳои зомби ва изи ангуштони Canvas

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% дақиқӣ. The tracking attempt to collect
Read more

PHP Suhosin

The end of Suhosin; what is next?

For many years, I zealously have used Suhosin with any implementations of PHP5 on Apache2 or PHP-FPM Nginx webservers to defend against SQL injection and other common web attacks. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
Read more

Breaking Down Barriers