بلاگ

WaterHole attack

Watering hole attacks: how APT and cyber criminals infiltrate secure infrastructures

My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
مزید پڑھ

credential stuffing

Credential stuffing is no DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
مزید پڑھ

application ddos attacks

Application layer DDoS attacks, and how they can be mitigated

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
مزید پڑھ

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
مزید پڑھ

زومبی کوکیز Verizon Yahoo AOL

نئے ٹریکنگ کی تکنیکوں سے نمٹنے کے لئے کس طرح; زومبی کوکیز اور کینوس فنگر پرنٹنگ

کینوس فنگر پرنٹنگ, اور زومبی کوکی trackers نئے نہیں ہیں; تاہم, یہ طریقے بہتر ہیں اور وقت کے ساتھ بدنام مؤثر بن گئے ہیں. حالیہ, a study revealed that one in every four 10,000 انٹرنیٹ پر سب سے زیادہ ملاحظہ کردہ ویب سائٹس کینوس فنگر پرنٹنگ کے ساتھ زائرین کو ٹریک کرنے کے لئے استعمال کرتا ہے 99.9% درستگی. The tracking attempt to collect
مزید پڑھ

PHP Suhosin

اختتامی گناہ کا اختتام; اگلے کیا ہے?

کئی سالوں کے لئے, میں جوش نے Apache2 یا PHP-FPM Nginx webservers پر PHP5 کے کسی بھی نفاذات کے ساتھ اس کے ساتھ ساتھ Suhosin کا استعمال کیا ہے SQL انجکشن اور دیگر عام ویب حملوں کے خلاف دفاع کرنے کے لئے. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
مزید پڑھ