Skip to main content

Posts

What is session hijacking and how to prevent it.

What is session hijacking Session hijacking is a type of web attack where an attacker takes advantage of an active session.The attack relies on the knowledge of your session cookie, so it is also called cookie hijacking or cookie side-jacking. Although any computer session could be hijacked, session hijacking most commonly applies to browser sessions and web applications. In most cases when we log in web applications, the server always sets a temporary session cookie in your browser to remember you are currently logged in and authenticated. For an attacker to perform session hijacking, he or she needs to know your session id.This can be done by stealing the session cookie or by persuading the user to click on an malicious link.In both cases the attacker can take over the session by using the same session id on his own browser session.And with that  the server has been fooled into treating the attackers session to be the original valid connection. What are the main methods of Sess...

What are browser cookies and how they work

INTRODUCTION. Most internet users are familiar with the term Cookie because we see it pop up in most websites but do we know the purpose it serves. Let us start with what it is ,   a cookie (  also known as browser cookie , internet cookie , web cookie or HTTP cookie ) is small piece of data that websites store on your disk in the form of a text file.Cookies allow websites to store specific information helpful to remember each visitor uniquely. What do browser cookies do. The purpose of the computer cookie is to help the website track of your visits and activity and is not a bad thing.A good example are the online retailers to keep track of the items in user's shopping cart as they explore the site, without the cookies the shopping cart would reset to zero with every click. A website also uses the cookies to store information about you recent visits or record you login information which i do not really recommend from a security perspective Types of browser cookies. Session co...

Linux commands for navigating the file system

Navigating Linux File System Linux is most probably the most used operating system when it comes to development. Learning how to navigate the Linux file system can really benefit if you plan on using linux as you primary operating system or for development purposes Basic Commands 1. pwd: print the name of the current working directory on the terminal Use this command to find out where you are in the directory structure. When you log on to Linux, your starting  directory is always your home directory, so you will be in /home/[your username] as any other than root, or /root if you are logged in as root.     pwd 2) ls: list the contents of the current working directory ls command is the most used ls command in Linux. It is the command that most people use once they are logged in a Linux system. To see what files we have in the current working directory we can use the "ls" command To see all the hidden files ( those starting with a period ), use the following switch: ...

UFW(Uncomplicated firewall ) in Debian linux Distribitions

Computers are connected to each other and the services are growing fast that we cannot deny. Services like Email, Social Media, Online Shop, Chat are services used by the user. A properly configured firewall is one of the most important aspects of overall system security.How about we look on the other side this connectivity just likes a double-side knife. It’s also possible to send bad messages to those computers like Virus , malware , trojan-apps are one of them. The Internet is the biggest computer network and it is not always filled with people with the best intentions at heart. In order to make sure our computers and servers are safe we must protect our computers. One of the must have component on your computer / servers is Firewall . From Wikipedia , a definition is: In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allo...

An introduction to Linux filesystems

KALI LINUX 2020 tty2 ERROR : How to Fix No GUI Error In Kali Linux 2020

TTY in linux and how to use it

Ok, how about we start with what is TTY.It stands for “teletypewriter.” What can tty tell us. In Linux, there is a pseudo-teletype multiplexor which handles the connections from all of the terminal window pseudo-teletypes (PTS). The multiplexor is the master, and the PTS are the "slaves". The multiplexor is addressed by the kernel through the device file located at /dev/ptmx. The tty command will print the name of the device file that your pseudo-teletype slave is using to interface to the master. And that, effectively, is the number of your terminal window. The output shows that we are connected to to the device file at /dev/pts/4. Our terminal window, which is a software emulation of a teletype (TTY), is interfaced to the pseudo-teletype multiplexor as a pseudo-teletype (PTS). And it happens to be number four.For the number at the end shows that. The Silent Option . The -s (silent) option causes tty to generate no output. This is how it will look on your terminal It do...