| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2024年5月21日 星期二
Update to our Terms of Service, Terms of Sale and Privacy Policy.
2024年1月28日 星期日
The OWASP Foundation Has Selected The Technical Writer For Google Season Of Docs
The OWASP Foundation has selected the technical writer for Google Season of Docs by Fabio Cerullo
The OWASP Foundation has been accepted as the organization for the Google Seasons of Docs, a project whose goals are to give technical writers an opportunity to gain experience in contributing to open source projects and to give open-source projects an opportunity to engage the technical writing community.
During the program, technical writers spend a few months working closely with an open-source community. They bring their technical writing expertise to the project's documentation, and at the same time learn about open source and new technologies.
The open-source projects work with the technical writers to improve the project's documentation and processes. Together they may choose to build a new documentation set, or redesign the existing docs, or improve and document the open-source community's contribution procedures and onboarding experience. Together, we raise public awareness of open source docs, of technical writing, and of how we can work together to the benefit of the global open source community.
After a careful review and selection process, the OWASP Foundation has picked the primary technical writer who will work along the OWASP ZAP Team for the next 3 months to create the API documentation of this flagship project.
Congratulations to Nirojan Selvanathan!
Please refer to the linked document where you could look at the deliverables and work execution plan.
Related posts
- Best Pentesting Tools 2018
- Hacking Tools
- Hacker Tools 2020
- Hackers Toolbox
- Hacking Tools For Windows
- Hacker Tools Apk Download
- Hacker Tools For Ios
- Hack Tools Github
- Free Pentest Tools For Windows
- Github Hacking Tools
- Pentest Tools Port Scanner
- Black Hat Hacker Tools
- Hack Tools 2019
- Pentest Tools Alternative
- Growth Hacker Tools
- Hak5 Tools
- Pentest Automation Tools
- Pentest Tools Open Source
- Kik Hack Tools
- Hacker Tools Free
- Hacker Tools Apk Download
- Hacker Tools Mac
- Top Pentest Tools
- Pentest Automation Tools
- Pentest Tools Framework
- Hacker Tools 2020
- Hak5 Tools
- Growth Hacker Tools
- Hacking Tools Online
- Pentest Tools Nmap
- Pentest Tools Online
- Kik Hack Tools
- Hacker Tools Linux
- Blackhat Hacker Tools
- Black Hat Hacker Tools
- Tools 4 Hack
- Hacking Tools And Software
- Pentest Tools Windows
- Black Hat Hacker Tools
- Pentest Tools Android
- Pentest Tools Windows
- Beginner Hacker Tools
- Hack Tools For Ubuntu
- Hacker Tools Online
- How To Hack
- Hacker Tools Windows
- Github Hacking Tools
- Pentest Tools Open Source
- Hacker Tool Kit
- Hacking Tools For Windows
- Hacker Tools Hardware
- Best Hacking Tools 2019
- Hackers Toolbox
- Hack Tools For Games
- Pentest Tools Bluekeep
- Hacker Security Tools
- Hacker Tools 2019
- Nsa Hack Tools
- What Is Hacking Tools
- Hack Tool Apk No Root
- How To Make Hacking Tools
- Hacker Tools 2020
- Hacker Tools Linux
- Hacking Tools Hardware
- Pentest Tools
- Hacker Techniques Tools And Incident Handling
- Wifi Hacker Tools For Windows
- Hacking Apps
- Black Hat Hacker Tools
- Hack Rom Tools
- Best Hacking Tools 2019
- Pentest Tools Open Source
- Hacking Tools
- Hacking Tools Pc
- Hacking Tools For Windows
- Hacking Tools Windows
- Best Hacking Tools 2020
- Kik Hack Tools
- Kik Hack Tools
- Pentest Tools Subdomain
- Nsa Hack Tools
- Hacker Search Tools
- Hacker Tools Free Download
- Bluetooth Hacking Tools Kali
- Pentest Tools Windows
- Hack Tools Online
- Hack Tools Pc
- Hack Tools For Games
- Pentest Tools Bluekeep
- Pentest Tools For Mac
- Hack Tools Github
- Pentest Tools Open Source
- How To Hack
- Hacking Tools For Pc
- Pentest Tools List
- Easy Hack Tools
- Hacking Tools Free Download
- Hacking Tools Hardware
- Hacker Tools Online
- Pentest Tools List
- How To Make Hacking Tools
- Pentest Tools Find Subdomains
- Hacker Tools For Mac
- Pentest Tools
- Hacking Tools For Mac
- Pentest Tools Framework
- Hacker Tools Free Download
- Hack Tools For Ubuntu
- Hak5 Tools
- Wifi Hacker Tools For Windows
- Nsa Hack Tools
- Pentest Tools Github
- Hacker Tools Online
- Hack Tools 2019
- Hack Tools Pc
- Hacking Tools Software
- Hacker Tools For Ios
- Pentest Tools Alternative
- Hack Tools Pc
- Hacking Tools 2019
- Hacking Tools Windows 10
- Physical Pentest Tools
- Beginner Hacker Tools
- Hacking Apps
- Pentest Tools For Windows
Mythbusters: Is An Open (Unencrypted) WiFi More Dangerous Than A WPA2-PSK? Actually, It Is Not.
Introduction
Whenever security professionals recommend the 5 most important IT security practices to average users, one of the items is usually something like: "Avoid using open Wifi" or "Always use VPN while using open WiFi" or "Avoid sensitive websites (e.g. online banking) while using open WiFI", etc.
What I think about this? It is bullshit. But let's not jump to the conclusions. Let's analyze all risks and factors here.
During the following analysis, I made two assumptions. The first one is that we are comparing public WiFi hotspots with no encryption at all (referred to as Open), and we compare this to public WiFi hotspots with WPA2-PSK (and just hope WEP died years before). The other assumption is there are people who are security-aware, and those who just don't care. They just want to browse the web, access Facebook, write e-mails, etc.
The risks
Let's discuss the different threats people face using public hotspots, compared to home/work internet usage:
1. Where the website session data is not protected with SSL/TLS (and the cookie is not protected with secure flag), attackers on the same hotspot can obtain the session data and use it in session/login credentials stealing. Typical protocols affected:
- HTTP sites
- HTTPS sites but unsecured cookie
- FTP without encryption
- IMAP/SMTP/POP3 without SSL/TLS or STARTTLS
2. Attackers can inject extra data into the HTTP traffic, which can be used for exploits, or social engineer attacks (e.g. update Flash player with our malware) – see the Dark Hotel campaign
3. Attackers can use tools like SSLStrip to keep the user's traffic on clear text HTTP and steal password/session data/personal information
4. Attackers can monitor and track user activity
5. Attackers can directly attack the user's machine (e.g. SMB service)
WPA2-PSK security
So, why is a public WPA2-PSK WiFi safer than an open WiFi? Spoiler alert: it is not!
In a generic public WPA2-PSK scenario, all users share the same password. And guess what, the whole traffic can be decrypted with the following information: SSID + shared password + information from the 4-way handshake. https://wiki.wireshark.org/HowToDecrypt802.11
If you want to see it in action, here is a nice tutorial for you
![]() |
| Decrypted WPA2-PSK traffic |
Any user having access to the same WPA2-PSK network knows this information. So they can instantly decrypt your traffic. Or the attackers can just set up an access point with the same SSID, same password, and stronger signal. And now, the attacker can instantly launch active man-in-the-middle attacks. It is a common belief (even among ITSEC experts) that WPA2-PSK is not vulnerable to this attack. I am not sure why this vulnerability was left in the protocol, if you have the answer, let me know. Edit (2015-08-03): I think the key message here is that without server authentication (e.g. via PKI), it is not possible to solve this.
Let me link here one of my previous posts here with a great skiddie tool:
To sum up, attackers on a WPA2-PSK network can:
- Decrypt all HTTP/FTP/IMAP/SMTP/POP3 passwords or other sensitive information
- Can launch active attacks like SSLStrip, or modify HTTP traffic to include exploit/social engineer attacks
- Can monitor/track user activity
The only difference between open and WPA2-PSK networks is that an open network can be hacked with an attacker of the skill level of 1 from 10, while the WPA2-PSK network needs and an attacker with a skill level of 1.5. That is the difference.
The real solutions
1. Website owners, service providers should deploy proper (trusted) SSL/TLS infrastructure, protect session cookies, etc. Whenever a user (or security professional) notices a problem with the quality of the service (e.g. missing SSL/TLS), the service provider has to be notified. If no change is made, it is recommended to drop the service provider and choose a more secure one. Users have to use HTTPS Everywhere plugin.
2. Protect the device against exploits by patching the software on it, use a secure browser (Chrome, IE11 + enhanced protection), disable unnecessary plugins (Java, Flash, Silverlight), or at least use it via click-to-play. Also, the use of exploit mitigations tools (EMET, HitmanPro Alert, Malwarebytes AntiExploit) and a good internet security suite is a good idea.
4. Don't click blindly on fake downloads (like fake Flash Player updates)
5. The benefits of a VPN is usually overestimated. A VPN provider is just another provider, like the hotspot provider, or the ISP. They can do the same malicious stuff (traffic injecting, traffic monitoring, user tracking). Especially when people use free VPNs. And "Average Joe" will choose a free VPN. Also, VPN connections tend to be disconnected, and almost none of the VPN providers provide fail secure VPNs. Also, for the price of a good VPN service you can buy a good data plan and use 4G/3G instead of low-quality public hotspots. But besides this, on mobile OSes (Android, iOS, etc.) I strongly recommend the use of VPN, because it is not practically feasible to know for users which app is using SSL/TLS and which is not.
6. Use a location-aware firewall, and whenever the network is not trusted, set it to a Public.
7. In a small-business/home environment, buy a WiFi router with guest WiFi access possibility, where the different passwords can be set to guest networks than used for the other.
Asking the question "Are you using open WiFi?", or "Do you do online banking on open WiFi?" are the wrong questions. The good questions are:
- Do you trust the operator(s) of the network you are using?
- Are the clients separated?
- If clients are not separated, is it possible that there are people with malicious intent on the network?
- Are you security-aware, and are you following the rules previously mentioned? If you do follow these rules, those will protect you on whatever network you are.
And call me an idiot, but I do online banking, e-shopping, and all the other sensitive stuff while I'm using open WiFi. And whenever I order pizza from an HTTP website, attackers can learn my address. Which is already in the phone book, on Facebook, and in every photo metadata I took with my smartphone about my cat and uploaded to the Internet (http://iknowwhereyourcatlives.com/).
Most articles and research publications are full of FUD about what people can learn from others. Maybe they are just outdated, maybe they are not. But it is totally safe to use Gmail on an open WiFi, no one will be able to read my e-mails.
PS: I know "Average Joe" won't find my blog post, won't start to read it, won't understand half I wrote. But even if they do, they won't patch their browser plugins, pay for a VPN, or check the session cookie. So they are doomed to fail. That's life. Deal with it.
Read more
- Pentest Tools List
- Hacking Tools For Mac
- Top Pentest Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Free Download
- Hacker Tools List
- Underground Hacker Sites
- Hacking Tools Windows 10
- Usb Pentest Tools
- Hacking Tools Mac
- Pentest Box Tools Download
- Best Hacking Tools 2019
- How To Hack
- Hacking Tools For Windows Free Download
- Hacker Tools Mac
- Hack Apps
- Pentest Tools
- New Hacker Tools
- Best Pentesting Tools 2018
- Hacker Tools For Mac
- Hacking Tools Hardware
- Hack Tool Apk No Root
- Pentest Tools Find Subdomains
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Mac
- Hack Tools Mac
- Hacking Tools Mac
- Hack Rom Tools
- Hack Tool Apk
- Hack Tools For Mac
- Pentest Tools Open Source
- Pentest Tools Review
- Hacking Tools And Software
- Pentest Tools Windows
- Hacker Tools Github
- Hacking Tools For Games
- Hack Tools For Pc
- Hacking Tools Mac
- Hacker Security Tools
- New Hack Tools
- Tools Used For Hacking
- How To Hack
- Pentest Tools Nmap
- Pentest Tools For Android
- Hacker Tools Apk
- Install Pentest Tools Ubuntu
- Hack Tools For Ubuntu
- Hacker Tools Free Download
- Pentest Tools For Android
- Hacking App
- Tools Used For Hacking
- Hacker Tools Apk
- How To Install Pentest Tools In Ubuntu
- How To Make Hacking Tools
- Hack Tools Mac
- Pentest Tools List
- Hacking App
- New Hack Tools
- Hacks And Tools
- Hack Tools Github
- Best Pentesting Tools 2018
- Hacking Tools And Software
- Hack Tools For Games
- Pentest Reporting Tools
- Pentest Automation Tools
- Pentest Automation Tools
- Hack Tools Download
- Hacker Security Tools
- Hacking Tools Windows
- Pentest Tools Online
- Physical Pentest Tools
- Hack Apps
- Hacking Tools Usb
- Easy Hack Tools
- Android Hack Tools Github
- Wifi Hacker Tools For Windows
- Hack Tools Github
- Free Pentest Tools For Windows
- Hacker Tools Free Download
- Hacking Tools For Beginners
- Hack Tools 2019
- Hackrf Tools
- Free Pentest Tools For Windows
- Pentest Recon Tools
2024年1月27日 星期六
Top Process Related Commands In Linux Distributions
Commands in Linux are just the keys to explore and close the Linux. As you can do things manually by simple clicking over the programs just like windows to open an applications. But if you don't have any idea about commands of Linux and definitely you also don't know about the Linux terminal. You cannot explore Linux deeply. Because terminal is the brain of the Linux and you can do everything by using Linux terminal in any Linux distribution. So, if you wanna work over the Linux distro then you should know about the commands as well. In this blog you will exactly get the content about Linux processes commands which are are given below.
ps
The "ps" command is used in Linux to display your currently active processes over the Linux based system. It will give you all the detail of the processes which are active on the system.ps aux|grep
The "ps aux|grep" command is used in Linux distributions to find all the process id of particular process like if you wanna know about all the process ids related to telnet process then you just have to type a simple command like "ps aux|grep 'telnet'". This command will give you the details about telnet processes.pmap
The "pmap" command in Linux operating system will display the map of processes running over the memory in Linux based system.top
The "top" command is used in Linux operating system to display all the running processes over the system's background. It will display all the processes with process id (pid) by which you can easily kill/end the process.Kill pid
Basically the kill command is used to kill or end the process or processes by simply giving the process id to the kill command and it will end the process or processes. Just type kill and gave the particular process id or different process ids by putting the space in between all of them. kill 456 567 5673 etc.killall proc
The "killall proc" is the command used in Linux operating system to kill all the processes named proc in the system. Killall command just require a parameter as name which is common in some of the processes in the system.bg
The "bg" is the command used in Linux distributions to resume suspended jobs without bringing them to foreground.fg
The "fg" command is used in Linux operating system to brings the most recent job to foreground. The fg command also requires parameters to do some actions like "fg n" n is as a parameter to fg command that brings job n to the foreground.Related posts
- Hack And Tools
- Hacking Tools 2019
- Hacker Tools 2019
- Hacking Tools Hardware
- Game Hacking
- Pentest Tools For Ubuntu
- Free Pentest Tools For Windows
- Pentest Tools For Ubuntu
- Hacker
- Hack Tools Download
- Pentest Tools Nmap
- Hacker Tool Kit
- Beginner Hacker Tools
- Pentest Tools Website Vulnerability
- Hacking Tools Windows
- Hacker Search Tools
- Hack Tools Github
- Hak5 Tools
- Pentest Tools Github
- Hack Tools Online
- Hacking Tools Mac
- Pentest Tools Apk
- Pentest Reporting Tools
- Hacking Tools 2020
- Hack Tools Pc
- Hacking Apps
- Hack Tools For Ubuntu
- What Is Hacking Tools
- Hack Tool Apk
- Hacking Tools Free Download
- Usb Pentest Tools
- Pentest Tools Download
- Hack Tools For Ubuntu
- Hacker Tools Free Download
- Hack Tool Apk
- Hacking Tools Github
- Pentest Automation Tools
- Hacker Tools Free Download
- Hacker Tools Linux
- Hacker Search Tools
- Hacker Hardware Tools
- Hacking Tools Download
- Hacker Tools Apk Download
- Hacking Tools
- Hacker Tools For Windows
- Hacking Tools 2020
- Hacking Tools For Windows
- New Hack Tools
- Hack Tools For Ubuntu
- Hacker
- Top Pentest Tools
- Hacking Tools For Windows Free Download
- Pentest Tools Subdomain
- Hacker Security Tools
- Hack Tool Apk No Root
- Hack Tools
- Hack Tools Github
- Pentest Tools Subdomain
- Pentest Tools Kali Linux
- Hack Tools Download
- Wifi Hacker Tools For Windows
- Ethical Hacker Tools
- Hacker Search Tools
- Kik Hack Tools
- Best Pentesting Tools 2018
- Pentest Tools List
- Hack App
- Pentest Tools List
- Pentest Reporting Tools
- Termux Hacking Tools 2019
- Hacker
- Hack Website Online Tool
- Hacking Tools Kit
- Pentest Tools
- Hack Tools For Windows
- Hacker Tools Free Download
- Hack Website Online Tool
- Hacking Tools 2020
- Pentest Tools
- Wifi Hacker Tools For Windows
- Hack Tools
- Pentest Tools For Android
- Hacking Tools Hardware
- Hacker Tools Apk Download
- Hacking Tools For Kali Linux
- Nsa Hack Tools Download
- Hack Tools For Mac
- Hacker Tools Windows
- How To Make Hacking Tools
- Hack Tool Apk
- Hackrf Tools
- Hacker
- Hacker Tools For Pc
- Hack And Tools
- Pentest Tools For Mac
- Hacking Tools Free Download
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Windows
- Hacker Tools List
- Hacker Tool Kit
- Hacking Tools Hardware
- Game Hacking
- Hack Tool Apk No Root
- Hacking Tools Download
- Hacking Tools 2019
- Pentest Tools Tcp Port Scanner
- Nsa Hack Tools
- Physical Pentest Tools
- Nsa Hack Tools Download
- Hacker Tools For Pc
- Pentest Tools Download
- Hacker Tools 2020
- Tools 4 Hack
- Hacking Tools Software
- Hacker Tools 2020
- Hacker Tools For Pc
- Hacker Hardware Tools
- Tools For Hacker
- Pentest Tools For Ubuntu
- How To Make Hacking Tools
- What Is Hacking Tools
- Pentest Tools For Android
- Github Hacking Tools
- Pentest Reporting Tools
- Black Hat Hacker Tools
- Hack Tools For Pc
- Hack Tools For Ubuntu
- Hacking Tools Kit
- Pentest Tools Bluekeep
- Hacker Tools 2019
- Pentest Tools Review
- Pentest Tools Kali Linux
- Pentest Tools Url Fuzzer
- Pentest Tools Port Scanner
- Hacker
- Hacking Tools Software
- Hack Tools
- Hacks And Tools
- Hacking Tools For Kali Linux
- Tools 4 Hack
- Hacking Tools For Windows 7
- Hack Tools For Ubuntu
- Pentest Tools Tcp Port Scanner
- Hacker Tools Apk Download
- Hack Tools For Ubuntu
- Hacker Search Tools
- How To Hack
- Hacking Tools Software
- Nsa Hack Tools
- Pentest Tools Github
- Pentest Reporting Tools
- Pentest Tools For Windows
- Pentest Reporting Tools
- Usb Pentest Tools
- Nsa Hack Tools Download
- Hacking Tools For Beginners
- Game Hacking
- Hackrf Tools
- Pentest Tools For Windows
- Hacking Tools For Windows 7
- New Hacker Tools
- What Is Hacking Tools
- Nsa Hacker Tools
- Hack App
- Hacking Tools Name
- Hack Tools
- Black Hat Hacker Tools
- New Hacker Tools
- Hacking Tools Windows 10
- How To Install Pentest Tools In Ubuntu
- Install Pentest Tools Ubuntu
- Hacking Tools Windows
- Hacker Tools Hardware
- Nsa Hacker Tools
- Hacker Tools Free Download
- Hacking Tools For Beginners
訂閱:
意見 (Atom)





