Using Firewall : Firewall may be accustomed drop traffic from suspicious information processing address if attack may be an easy DOS
Encrypting the Cookies : Cookie or Session poisoning may be prevented by encrypting the content of the cookies, associating cookies with the consumer information processing address and temporal arrangement out the cookies once it slow
Validating and confirmative user input : This approach is prepared to stop the type tempering by confirmative and verifying the user input before processing it
Header Sanitizing and validation : This technique is beneficial against cross website scripting or XSS, this method includes verifying and sanitizing headers, parameters passed via the address, type parameters and hidden values to cut back XSS attacks.
What are the tools used for ethical hacking?🛑
There are several moral hacking tools out there within the marketing for different purposes, they are:
NMAP – NMAP stands for Network plotter. It’s associate degree open source tool that’s used wide for network discovery and security auditing.
Metasploit – Metasploit is one amongst the most powerful exploit tool to conduct basic penetration tests.
Burp Suit – Burp Suite could be a widespread platform that’s widely used for playing security testing of internet applications.
Angry IP Scanner – Angry information processing scanner could be a light-weight, cross-platform information processing address and port scanner.
Cain & Abel – Cain & Abel is a password recovery tool for Microsoft operational Systems.
Ettercap – Ettercap stands for local area network Capture. It is used for Man-in-the-Middle attack using a network security tool.
What is Burp Suite? What are the tools does it contain?🛑
Burp Suite is an integrated platform used for attacking net applications. It contains all the tools a hacker would need for attacking any application. a number of these functionalities are
Proxy
Spider
Scanner
Intruder
Repeater
Decoder
Comparer
Sequencer
Type of sql injection Error-based SQL injection🛑
Blind SQL injection
Time-based SQL injection
Enjoy! Follow us for more...
No comments:
Post a Comment