Tuesday , August 22 2017
Home / Hacking / Attack Preventions

Attack Preventions

Introduction to HTTP Parameter Pollution

HTTP Parameter Pollution

HTTP Parameter Pollution, or HPP, occurs when a website accepts input from a user and uses it to make an HTTP request to another system without validating that user’s input. This can happen one of two ways, via the server (or back end) and via the client side. Supplying multiple …

Read More »

Server-Side Includes (SSI) Injection

server side includes

SSI Injection (Server side Includes) is a server-side exploit technique that allows an attacker to send code into a web application, which will later be executed locally by the web server. SSI Injection SSI are generally the directives that are present on the web applications which are used to feed …

Read More »

OS Command Injection Vulnerability

Command Injection

Command Injection attack is also known as Arbitrary Code Execution. In Command Injection an attacker generally injects a malicious user input to the system functions which executes system shell commands based on the attacker’s input. The Command Injection vulnerability occurs when the web applications supplies vulnerable (unsafe) input fields to …

Read More »

How to detect code injection attack

code injection attack

Code injection is also known as PHP code injection. Code injection attack is an exploitation technique where a computer bug is exploited by injecting code into an application which is then executed by application itself. PHP code injection attacks are generally performed by injecting a PHP code into the PHP …

Read More »

How To Protect Website From Defacement

website defacement

Every website that exists in today’s digital World represents some particular business. Each website is the face of that specific business. Visitors find the image of business by their website and the marketing analogies (didn’t discuss here). Website defacement is an attack where the hacker changes the visual appearance of …

Read More »

How To Prevent SQL Injection Attacks On PHP Websites

prevent sql injection

Till this point we have gathered enough information about how to exploit a website with SQL Injection attack and its related security threat known as Blind SQL Injection attack. Though both the attacks are very similar to each other but are used in different situations. Time Based SQL Injection is …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free