Posts

Showing posts from November, 2017

What is SQL Injection ?

Image
SQL Injection  SQL Injection is an attack wherein attackers can send malicious SQL queries to target web application/Servers. SQL Injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database, the vulnerability is one of the oldest, most prevalent and most dangerous of web application vulnerabilities. How SQL Injection works In order to run malicious SQL queries against a database server, an attacker must first find an input within the web application that is included inside of an SQL query. In order for an SQL Injection attack to take place, the vulnerable website needs to directly include user input within an SQL statement. An attacker can then insert a payload that will be included as part of the SQL query and run against the database server. The following server-side pseudo-code is used to authenticate users to the web application. # Define POST variables uname = request.POST['username'] passwd = r...

What is UDP Protocol ?

Image
UDP (User Datagram Protocol)            UDP is alternative communication protocol used to establish a connection between two Endpoints.It uses IP network layer for communication. Unlikely UDP is not reliable protocol like TCP.It doesnt care about the damage,data lost over the communication. The advantage of UDP is it uses less network resources and fast data transmission.           UDP protocol mainly used for VOIP Communication. ( Ex . Skype ) Below are the some most used UDP Protcols.   FTP - File Transfer Protocol  Port: 20  Telnet - Telnet Port : 23  SMTP -Simple Mail Transfer Protocol Port :25  TFTP -Trivial File Tranfser Protocol Port :69

How TCP 3 way Handshake works ?

Image
 TCP Protocol          TCP  known as Transmission Control Protocol is a  transport layer host-to-host protocol that provides a reliable communication over IP networks between two endpoints. TCP - A Reliable Protocol          TCP provides recovery of segments that get lost , damaged , duplicated over the end to end communication. The most used protocols like HTTP and SMTP uses TCP methodology. TCP Flags ·          SYN  – The SYN, or Synchronisation flag, is used as a first step in establishing a 3-way handshake between two hosts. ·          ACK  – The ACK flag, which stands for “Acknowledgment”, is used to acknowledge the successful receipt of a packet.  ·          FIN  – The FIN flag, which stands for “Finished”, means there is ...