Y A R B A
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Y A R B A

Dahaya Dahek Bir Paylaşım Sitesidir!
 
AnasayfaLatest imagesKayıt OlGiriş yap
Giriş yap
Kullanıcı Adı:
Şifre:
Beni hatırla: 
:: Şifremi unuttum
Kasım 2024
PtsiSalıÇarş.Perş.CumaC.tesiPaz
    123
45678910
11121314151617
18192021222324
252627282930 
TakvimTakvim

 

 Web Hack ( part 2 )

Aşağa gitmek 
YazarMesaj
*-..-* Neruda *-..-*
Admin
Admin
*-..-* Neruda *-..-*


Mesaj Sayısı : 20
Kayıt tarihi : 02/08/09
Yaş : 36
Nerden : SyRiA

Web Hack ( part 2 ) Empty
MesajKonu: Web Hack ( part 2 )   Web Hack ( part 2 ) Icon_minitimeÇarş. Ağus. 26 2009, 17:41

welcome with you again

we 'll be continuo

2.0 Flowchart for a one-way web hack
Consider the example where an attacker finds a vulnerable web application, and is able to exploit it using techniques such as the ones mentioned previously. The attacker has achieved arbitrary command execution, but due to the restrictive firewall, is unable to proceed further into the network. To make an attack effective, two things are essential:

Interactive terminal access - for running commands to pilfer the attacked server or penetrate further into the network.
File transfer access - for transferring attack tools such as port scanners, rootkits, etc.
A tight firewall can make it very difficult to achieve the above objectives, however, it is not impossible. To get around these restrictions, with a little bit of web application programming knowledge, we can create a web based command prompt and a file uploader.
Before proceeding further we shall take a preview of the various stages of the one-way hack, as illustrated by the following diagram:



Created By : *-..-* DaRk EvIl *-..-*
Sayfa başına dön Aşağa gitmek
 
Web Hack ( part 2 )
Sayfa başına dön 
1 sayfadaki 1 sayfası
 Similar topics
-
» Web Hack ( part 1 )
» Web Hack ( part 3 )
» Web Hack ( part 4+5 )

Bu forumun müsaadesi var:Bu forumdaki mesajlara cevap veremezsiniz
Y A R B A  :: HACKİNG :: WEB HACK-
Buraya geçin: