Wireshark and tcpdump is a free and open-source network packet analyzer. Where Wireshark is a desktop application that can be installed on multiple Operating Systems while tcpdump is a commandline utility mainly seen in Linux/Unix based Operating Systems. In this post we are using tcpdump to capture packets from a remote machine and analyse it […]
Tag: security
PETYA Crypto-ransomware
Till now we have heard of ransomware’s targeted computers files will be encrypted, in this scenario users are allowed to login to the Operating System but won’t be able to open encrypted files. The newly discovered PETYA Crypto-Ransomware has crossed one more step and it overwrites the MBR itself to lock users out of their […]
Drown vulnerabilty
Drown stands for Decrypting RSA using Obsolete and Weakened eNcryption, and it provides a way for attackers to decrypt HTTPS communications from servers that are still supporting SSLv2. Most of us think supporting SSLv2 protocol on server is not a problem because most of the modern client software’s just don’t use it. But looks like […]
Illustration of MITM attack
With the latest finding from Google researchers , browser vendors are scrapping SSLv3 in wake of poodle attacks. For more information on poodle attack check this link https://www.technix.in/sslv3-poodle-attack/. Officials at mozilla has confirmed in a blog post that only 0.3% of https connection with Firefox uses SSLv3. They are planning to remove fully SSLv3 in the […]
SSLv3 – Poodle Attack
Researchers at Google has discover a new attack on the SSLv3 protocol, which takes advantage of an issue with the protocol that enables a network attacker to recover the plain text communications of the victim. The attack is known as POODLE. The technique takes advantage of the fact that when a secure communication attempts fails, […]
A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. The bug, discovered by Stephane Schazelas, is related to how Bash processes environmental variables passed by the operating system or […]