What is Session Hijacking and How to Prevent It?

Session Hijacking is when an attacker interacts with a server as another user. The attack take advantage of the active session between the victim and the server. What is a session? It is time period that the communication of two system is active. There are two types of session hijacking, a) Application Level - It is the most common now days and include, ID Sniffing, Session Fixation, Session Donation. [Read More]

What Is DOS? How To Perform DOS? How To Defend Against DOS?

I recently dived into Denial of Service or well know as DOS course. In this blog I will be writing on what is DOS/DDOS?, how to perform DDOS? and how to prevent it?. What is DOS? As the name suggest, this is when an attacker make a service unavailable for legitimate users. You operate a delivery business that customers makes call to order their delivery, now the attacker makes the call and leave the line open and doesn’t make an order. [Read More]

Network Security Man in the Middle(MITM) Attacks

In this Article Will be trying to explain how to perform a MITM attack with bettercap + beef + metasploit. Disclaimer: The content shared below is meant for educational purposes and the writer is not responsible on what you decide to use it for. What Is MITM? This is when an attacker convince the target that he is the server and the server that he is the target. What this means is that all packets exchanged between the two, will pass through the attacker. [Read More]

SpyderSec Challenge

1 FLag: I used netdiscover to identify the IP of the machine. 192.168.0.27 Accessed the IP on the browser I then used dirb directory burster to find available directories. dirb http://192.168.0.27 I found one directory, tried to access it but had no permissions. The application suggested that there are several clues on the page. Started by checking the page source. Had an interesting script. Didn’t know what to do with it. [Read More]

Mr Robot CTF Walkthrough

Now back to the CTF: Capturing the first flag: Capturing the 2nd flag: Captured the 3rd Flag: Mr Robot ctf is created from the popular tv show. This was my first attempt to do a CTF, and indeed it was not a walk in the park. Disclaimer, this might not be the efficient way to have solved the CTF and might have many repetitions or unnecessary steps, but it worked for me. [Read More]