Skip to main content

Posts

Evolution of TLS1.3 – Enhanced security and speed Evolution of TLS1.3 – Enhanced security and speed:  As 2016 comes to close and we are preparing for a new year, it’s time to implement TLS 1.3. TLS 1.3 Design Concluded The biggest practical development in cryptography for 2016 is  Transport Layer Security version 1.3 . TLS is the most important and widely used cryptographic protocol and it is the backbone of secure Internet communication. After years of works by hundreds of researchers, finally it was approved by cryptography standpoint.Also now the protocol supported in  Firefox, Chrome  and  Opera . TLS 1.3 is not a minor redesign, it is a major redesign of TLS 1.2. In fact, one of the most contentious issues was if the name should be something else to indicate how much of an improvement TLS 1.3 really is. How might users notice TLS 1.3 Speed ? . TLS 1.3 is designed for speed, specifically by reducing the number of network round-trips required before data can be
How to Perform Manual SQL Injection With Double quotes Error Based String Method If you are trying to hack the databases with methods like  single quotes error based injection ,  Integer based injection  but the databases are not vulnerable to those methods injection will fail and you cannot connect with database. In short, the error based SQL injection will use single quote to break the query and join the query and Integer based injection will be joining the query without the single quote.So Today we are about to learn another method which is double quote injection in the  MySQL database . You can learn best  Web Hacking and Bug Bounty Course  from Leading Elearning Cybersecurity platform. SQL Injection ONLINE LAB: Beginners can use this website to practice skills for SQL injection To Access the LAB Click  Here STEP 1: Breaking the Query Let me try out with error based single quote injection method  http://leettime.net/sqlninja.com/tasks/basic_ch3.php?id=1
RouterSploit – Exploitation Framework for Embedded devices The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid  penetration testing operations: exploits – modules that take advantage of identified vulnerabilities creds – modules designed to test credentials against network services scanners – modules that check if a target is vulnerable to any exploit Requirements gnureadline (OSX only) requests paramiko beautifulsoup4 pysnmp Installation root@kali:~# apt-get install routersploit Usage Exploits The routersploit a similar tool like  Metasploit , very easy to create more modules. Anyone can extend the tool easily with the help of exploit databases. To get the  code skeleton . Also  Read      p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Penetration Testing Tool . Checking for Misfortune Cookie vulnerability : It is a  critical vulnerability