Advance XSS Attacks, DOM Based Read

Robert ‘rsnake’ Hensen is considered as Guru of XSS. Let’s learn advance DOM based attack from his own book “XSS attacks: cross-site scripting exploits and defense” Preview of his book is available at http://books.google.com/books?id=Imt5Crr0jJcC DOM-based is unique form of XSS, used very …

Honeypot Read

Honeypot

A Honeypot or a honey trap is an exciting technology with great potential for security community. It is an information system resource (a monitored decoy) used to attract attackers away from critical resources as well as a tool to analyse an attacker’s …

Data Loss Prevention Read

Information=Money! Information can be anything –financial statements, health records of patients, source codes, intellectual property (IP), trade secrets, design specifications, price lists – anything from which an organization generates profits.  Information is one of the business’s most important assets. Business requires accessing …

What is CSRF? Read

What is CSRF?

A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The attack basically uses the session of …

Phishing Read

Phishing

Phishing term originates from the word  “fishing” and the well known pre-fix ”ph”  like in “Phreaks” traces back to early hackers who were involved in “phreaking”- The hacking of telephone systems. Phishing, also referred to as brand spoofing or carding, is a …

Steganography Read

Steganography

What is Steganography? Steganography is the art of hiding information in images. In Greek, Steganography means “covered writing”.In steganography, confidential data is hidden in images to protect it from unauthorized users. So basically it means, hiding a secret message within a cover-medium …

Forensic Analysis of Windows XP Registry Read

WINDOWS XP REGISTRY: Windows stores configuration data in registry. The registry is a hierarchical database, which you can describe it as s configuration database. Configuration database is the data which makes the operating system work. The registry is introduced to replace most …

About Us Read

About Us

Ladies & Gentleman, Hackers & Geeks, Nerds & Newbies. In India we were waiting to see any 'hacking' magazine to happen and the wait was getting little longer. So finally ClubHack decided to come up with its own 1st  Indian "Hacking" Magazine …