The importance of web application security is not a hidden truth, the web administrators must secure their web application to be secure in the jungle of web.Defacing of website(s) is now the hobbies of different people.
It is very difficult, it is surely a difficult task to compare Linux and BSD to each other, there are a lots of similarities between Linux and BSD so what actually a difference why we compare and how we compare them? This is a difficult question. The aim of writing this article is not that we want to start a war between BSD and Linux lovers. It just a comparison.
SQL injection is the biggest and rising threat for web applications, by using this injection an attacker may easily find the information about database management and an attacker may exploit it, so while penetration testing a pen-tester must consider this threat for web applications.
Web server is a combination of hardware and some software that delivers us a web page on the Internet. Hardware means a computer on which the web site hosted while software is a program that runs on this computer to provide us a web page. Simply web server is a computer that provides a website.
This article will talk about different software/program that are available to run on a computer to host a website.
Ethical hacking/penetration testing process requires a list of different automatic tools that helps to perform the job easier, effective, reliable and less time consumer. Normally a penetration tester creates their own toolkit for their job, but what if there is a script that will provides the effective tools on a single place that will be really help full.
In the field of web application security there are so many tools available to measure the security of a web application, these tools available for different operating system and can use to find out the bug on a web application. In the era of these tools we have nikto also.
Web application security is a big issue for the administrator of different website and for the hosting provider. How it is a issue for web hosting provider? Well if one the website compromise than there is a chance to compromise all the website that hosted on the same server that has been compromised before.
So, for finding a bug on web application is necessary part of a pen testing.
Security of a website is a very important for any organisation or for personal websites. You have to check the security of your website and you should find the vulnerability into your website before that an attacker will find it and exploit it.
There are different vulnerabilities that might be occur on your website, the famous attacks like SQL-I and XSS etc.
Apache is a power and flexible HTTP server and it provides many features like DBMS (Database Management System), Content negotiation and Virtual host etc. It is an open source and developed by an open source community, apache is available for various operating system including Windows, Linux,MAC, Solaris and FreeBSD etc.
Everyone wants to secure their privacy nobody want to share their privacy and information of their existing, so people want maximum privacy while they are browsing Internet they want to hide their identity by any means.
There are so many techniques available for both windows and Linux based operating system, but for this article these operating systems are not the point of consideration.
Automatic vulnerability scanning tools has a great importance in the field of penetration testing/ethical hacking, professional use different tools for different environment. Now in this post we will discuss about network vulnerability scanning tool and that is nessus, you can find a lot of different article about nessus on the Internet but we will discuss from scratch about nessus.
This is the second episode of a series article about second step of ethical hacking/penetration testing, as we have deeply talked about the importance of port scanning and on the previous article we have discussed some about Nmap.
Click here to read to read the first related article.
Automatic tools has great importance in the world of penetration testing/ethical hacking, these tools save time and money and you can audit your whole IT infrastructure easily. As we have discussed different automatic tools before for both web and networks.
A virus is malicious software or a malicious program which hides in other program and execute when you open this program. A virus is inactive until you execute an infected program. If you want to know more about viruses or if you want to create your own virus than click here.
Technology has been changed and changing rapidly, different viruses has an ability to destroy your anti-virus software so in this case a online virus scanner probably a good choice to use.
The second step of ethical hacking and penetration testing involve two terms that is scanning or port scanning and enumeration, we will discuss the these two steps separately. Before reading this article you must have an idea about first step, if you have not read our previous article on it than read footprinting step by step.