Detect and block MITM attacks

Today testing the app in Android Intercepter-ng in the laboratory of my wifi network I had many connection problems from my victim. So with the mess he had, I've come to the conclusion And as I release the MITM attack? How do I know if I'm being a victim of a MITM? The answer is…Read more Detect and block MITM attacks

Advertisements

Monitoring to Avoid DNS hijacking

hijacking DNS is something that can have a big impact on the brand, in addition to being the predecessor of attacks such as a targeted phishing, malware or put in the alleged legitimate page. That's why it is very important to be warned in the event of an attack of this nature. In the market…Read more Monitoring to Avoid DNS hijacking

Identifying A Vulnerable Code

No matter how much care you take during development of any software, security issues creep in. Hence, it is important to get the code reviewed for security loopholes. Code is the only advantage for organizations over the hackers and they need to utilise this fact in a planned way. Relying only on penetration testing is…Read more Identifying A Vulnerable Code

Preventing Cross-Site Scripting (XSS) in PHP

Cross-site scripting (XSS) is a type of vulnerability found in web applications. Occurs when a web application gets data from a user and makes use of them without validating, checking, encoding or filtering them. This vulnerability enables attackers to inject malicious client-side scripts into a trusted web site. The end user’s browser will execute the…Read more Preventing Cross-Site Scripting (XSS) in PHP