A CAPTCHA is a type of challenge-response test used in computing to determine whether the user is human. The process involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because computers are unable to solve the CAPTCHA, any user entering a correct […]
Continue ReadingCategory: Pen Testing
Network Security Risk Assessment
In this article, I will introduce you to some well known tools which security analysts use for Network Security Risk assessment, to know more about the layout of the network they are trying to test and also gather intelligence about that company, which the security analyst can use later on to conduct further tests and […]
Continue ReadingTIBCO Rendezvous RVD Daemon Remote Memory Leak DoS
The TIBCO Rendezvous RVD daemon is vulnerable to a memory leak, which when remotely triggered, prevents any further RV communication until the daemon is manually restarted. Vulnerability Type / Importance: Remote DoS / High Workaround: There are no known workarounds for this vulnerability The RV daemon (RVD) within TIBCO’s Rendezvous messaging product is responsible for […]
Continue ReadingDirty Business: What Security and Pen Testers need to know to get the job done
This article is part # 3 in the series on Penetration Testing. The first in this series talks about Penetration testing as a profession and a general introduction. The second introduces you to some critical keywords and security tips you need to be aware of before proceeding through the rest of this series. When you are performing […]
Continue ReadingIntroduction to Ethical Hacking and Penetration Testing
An Introduction to Ethical hacking through the eyes of a pen tester and hopefully helps anyone reading this blog on how to protect and secure a network by understanding how a Hacker operates and understanding their tools and methodologies. Why would I want to publish such a series of articles; because, I did not want […]
Continue Reading