DDoS (Distributed Denial of Service) is a type of attacks to interrupt the continuous healthy response of a server, it's considered one of the hardest attacks to mitigate and has harvested so many sites. To understand how deep, bad and well hidden this type of attacks...
Security Articles
You got “email hacked” message? Here is what you need to do
Almost Daily, we get mails from our readers reporting that their mails got hacked. After getting a copy of these mails, we found out that all mails contain the same message but in different wording and in different language. In English, Korean or Japanese. I am sure...
Important commands to rescue hacked servers.
This post will you a boost in tracing the trails of your server intruder. You can use this post as a reference for your periodic server health checks as well. This is a very important article for server security specialists, white hats and developer in general....
White Hat Hacking : Apple open redirect vulnerability
What is Open Redirect vulnerability? Open redirect vulnerabilities allow the attacker to use a well known website name to redirect the visitor to another website. As mentioned in Everything is vulnerable ( Q4 in internet wars ). You should pay attention to URLs you...
White Hat Hacking – RedHat Cross Site Scripting ( XSS )
White Hat Hacking - Redhat cross site scripting ( XSS ) Using an ordinary Cross site scripting payload, The vulnerability could NOT be exploited. However, I tried to put the payload inside a JavaScript file with JPG extension and the trick worked ! Payload :...
Everything is vulnerable II : Internet wars
Q1. Why was this post written ? This post is highly recommended for all web surfers regardless of their interests; from online shoppers to social networks users. Millions of defrauding are attempted every day and actually many succeed! As a matter of fact, if you have...
Everything is vulnerable I : What are Malwares, viruses, exploits, trojans, hacks and cracks ?
Q1. Why was this post written? To define Malwares and demonstrate the differences between Viruses, Trojans and Spams. Also, We will talk a bit about hacks and cracks. Q2. What are Malwares? Malware is a malicious, invisible and harmful piece of software like viruses,...
Everything is vulnerable : Introduction
“Everything is vulnerable” is a series of posts about computer vulnerabilities, malwares, hacking and security. There is one fact to Illustrate and one goal to reach. The fact : Everything is vulnerable. The goal : Everything can be secured ! This series contains a...
White Hat Hacking : Microsoft XSS & malicious payloads
This vulnerability allows sending malicious files to a 3rd party using Microsoft AFKAR ( Arabic word for ideas ) service.. Proof of concept 1- Use a binary code or interpretted code for 'callback' parameter value ( Like the python code used in the example ). Or HTML...