Blog

WaterHole attack

Fuʻifuʻi e ngaahi ʻohofi ʻo: founga ʻoku kau faihia ai ʻa e infiltrate malu infrastructures

My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Lau ke lahi ange

credential stuffing

Credential ʻoku ʻikai ko ha Uetosi!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Lau ke lahi ange

application ddos attacks

Ko hono fakaʻaongaʻi ʻo e ngaahi ʻohofi ʻa e Uetosi, mo e founga ʻe lava ke fakasiʻisiʻi ange ai

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Lau ke lahi ange

Web Application Firewall (WAF)

Kuo mate ʻa e WAF, moʻui fuoloa ʻi he WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Lau ke lahi ange

Zombie Cookies Verizon Yahoo AOL

Founga ke fehangahangai ai mo e ngaahi founga muimuiʻi foʻou; Zombie kukisi mo e fakatataa fingerprinting

Fakatataa fingerprinting, pea ko Zombie kukisi trackers ʻoku ʻikai ko ha meʻa foʻou ia; ka neongo ia, ʻOku fakalakalaka ʻa e ngaahi founga ko ʻeni pea kuo notoriously ola lelei ʻi he taimi. Ki muí ni mai, Naʻe fakaha ʻe ha ako ko e taha ʻi he fa kotoa pe 10,000 ngaahi uepisaiti lahi taha ʻoku ʻaʻahi ki ai ʻi he ʻInitaneti ʻoku nau fakaʻaongaʻi ʻa e fakatataa fingerprinting ke muimuiʻi ʻa e kau ʻaʻahi ʻo aʻu ki 99.9% tonu. Ko e feinga ke muimuiʻi ke tanaki…
Lau ke lahi ange

PHP Suhosin

Ko e ngataʻanga ʻo Suhosin; ko e hā e meʻa hokó?

ʻI ha ngaahi taʻu lahi, Kuo u ngaue ʻaki ʻa e Suhosin ʻaki ha implementations ʻo PHP5 ʻi he Apache2 pe PHP-pm Nginx webservers ke maluʻi mei sql huhu mo e ngaahi ʻohofi angamaheni kehe. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
Lau ke lahi ange