Pentesting your own Wireless Network Read

Introduction to IEEE 802.11 IEEE 802.11 is a set of protocols used for implementing wireless LAN. IEEE Protocol standards are created and maintained by IEEE LAN/MAN Standard Committee.   WLANs operate in 3 different frequency ranges that is2.4Ghz (802.11b/g/n), 3.6Ghz (802.11y) and …

Effectiveness of Antivirus in Detecting Web Application Backdoors Read

AbstractThis paper gives detailed idea of the effectiveness of Antivirus software’s in detecting various Web Application backdoors that widely affect Web Servers. The analysis would prove the inefficiency of current Antivirus techniques in detecting Web application backdoors and its consequences. Introductionconsidering the …

JavaScript Botnets Read

Anybody who has had even a slight brush with the security industry would have heard of Botnets atleast once. Botnets are a group of computers compromised and controlled by an attacker, these computers or zombies would perform any actions that the attacker …

Android Reverse  Engineering – A  Kick Start Read

Introduction Recently, the open source mobile operating system  'Android' has a large community of developers writing application  programs that extend the functionality of supporting devices. It seems a lot of people are getting crazy about the Android platform these days (everyone is …

Network Attacks Read

Network Attacks

Any method, technique or process used to attack and compromise the security of the network can be termed as a Network attack. There can be a number of motives behind the attacks like fame, terrorism, greed, etc.  A few types of various …

Fake Antivirus Read

Fake Antivirus

IntroductionA sudden injection of fear is a very useful tool for getting people to do what you want. While surfing the Web you must have seen the above pop-up message or similar advertisements. A free PC scan or an offer to clean …

Cloud Security & Threat Read

Cloud Security & Threat

Cloud Computing is basically an outsourced multi-tenanted IT Service model. The security concerns & threats applicable to cloud computing environment are same as applicable to any other IT environment. Only significant difference is that in the Cloud environment organizations lose control over …