Increasing internet threats are becoming a big headache thesedays.Hence it seems very difficult to protect against internet threats during online activities.But with few basic precautions it is very easy to secure yourself fr0m most of the crackers and script kiddies;most of the crackers and script kiddies succeeded due to the ignorancy of the end user.Most …
Category Archives: Applications
how to hijack a tcp connection|hacking tcp sessions
Hijacking a tcp connection requires just a little bit knowledge about IP spoofing and ACK numbers. IP spoofing is a simple technique in which the attacker/hacker replaces the IP address of the sender i.e sends some data by confusing the receiver.ACK or SEQ numbers are used by the web servers to distinguished between different sessions and …
Continue reading “how to hijack a tcp connection|hacking tcp sessions”
what is ip fragment attacks|IP fragmentation hacks
IP Fragment IP fragments is useful in keeping tracks of the different parts of a datagram in TCP/IP suite.When the data packets arrived at the destination field then it is used to reassemble the datagrams.The identification value of all the IP fragments are same so the fragmentation offset is used to indicates the actual position …
Continue reading “what is ip fragment attacks|IP fragmentation hacks”
What is sniffing|sniffers?
Sniffing is the simple process in which the network interface card is used to receive and monitor data that is not intended for that machine.The device or software that does sniffing are known as sniffer or more simply a network analyzer.Sniffing programs are very useful in gathering sensitive information like telnet username and password,ftp username …
How to spoof dns cache?dns cache poisoning/hacking
Spoofing DNS Cache: DNS i.e domain name system is distributed database with a hierarchical structure used to translate the human friendly host names into the IP address,in TCP/IP Network.So when a computer wants to communicate with www.sudobits.com then it first sends a query to the local DNS server and the dns server checks its databases …
Continue reading “How to spoof dns cache?dns cache poisoning/hacking”