Questions tagged [attack-prevention]

prevention of an attack vector (e.g. XSS, HPP, CSRF)

Prevention of a specific attack vector (e.g. XSS, HPP, CSRF)

In OWASP nomenclature, this would be Breakers.

557 questions
-2
votes
2 answers

Does Microsoft EMET protect against latest Hacking Team Adobe Flash 0-day exploit?

If I were to not update Adobe Flash and instead used the old version (from before the Hacking Team 0-day exploit was published in the internet), in that case, would Microsoft EMET protect me from the latest Hacking Team Adobe Flash 0-day exploit?…
vasili111
  • 207
  • 1
  • 7
-2
votes
1 answer

What anti-DDoS solutions for Windows are there?

I would love to know, If there is a way to mitigate DDos/Dos attacks on Windows. In Linux we can Mitigate using the almighty iptables, but I wonder if there an equivalent for Windows.
Ammar Brohi
  • 69
  • 1
  • 4
-2
votes
1 answer

Commonly used url parameters

I'm working on a project that requires me to tamper with/rewrite url parameters. I'd also like to add in something that finds request parameters such as ?admin=false ?debugging=false ?page=example ?url=example.php or anything else along those lines.…
-2
votes
2 answers

Is this site vulnerable to sql injection?

I have my site build from a company. I read about website vulnerabilities on the internet and i did some test on my site. It throws these errors. QueryString key:TutorialId was expected to be of type System.Int64 but was not. and A…
v0ld3m0rt
  • 159
  • 1
  • 2
  • 8
-2
votes
2 answers

attack on port 80

I have a ubuntu ec2 instance server hosting apache2 site & tomcat7 at back end. According to apache logs I have doubt there malicious attack ! Please can anyone confirm it & what can i do to stop it ? I found that those IP is from xyz so tried…
Ashish Karpe
  • 113
  • 7
-2
votes
1 answer

What is a transient attack?

I just faced a problem of an IP is taking forever to respond, i had been told it might be a transient attack.... I tried googling it, but cant really find more info. Can anyone kindly explain to me what is a transient attack? And if there are…
clark
  • 99
  • 5
-3
votes
1 answer

Attack Vectors an ISP could use

Id like to protect myself as good as possible from my ISP. I am aware of the fact that they could forward my requests to possible fake Websites containing malicious scripts or plug-in content. Usually i am using an encrypted proxy so it would be…
-3
votes
2 answers

What kind of virus attack is this? And what do I do now?

I have just inherited a running wordpress installation from another agency and the theme (twentyeleven) they are using for my client has been corrupted. This is what most of the theme's php files looks like at the beginning of the file: What kind…
-3
votes
1 answer

What do I need to worry about when moving from a compromised system to a clean one?

As a result of a targeted attack, my computer was compromised? What should I be worried about when trying to move to a new system and prevent reinfection? I purchased a new clean computer and am able to move things from the old one to the new one,…
harvardfail
  • 193
  • 8
-3
votes
3 answers

I use an online email provider - how can I test my password strength?

I want to test my password strength, is there a program out there that can crack my password relatively quickly? I am familiar with BackTrack 5, but I usually use it to test WEP password strength. I use a webmail provider and I have my username…
sean
  • 1
-3
votes
1 answer

What hackers do in the darknet?

What do hackers do in the darknet? I know that there are some "hacker services" that they can make some money, but I wonder if there are more interesting things, like forums about specific targets. I'm not a hacker or something, but I wonder if…
Error 404
  • 105
  • 4
-3
votes
2 answers

how to protect a personal computer?

I am Linux user with no knowledge on security , up to now i dont know that is my system was in attack or not . I havent felt anything wrong with my system . but every Computer user must have some knowledge on basic system security . so what are the…
rɑːdʒɑ
  • 109
  • 8
-3
votes
1 answer

How information security/cyber security evolved for a Novice End user in the Last 10 Years

The main point to note is the type of laws that protect the users. Its main focus is My points of discussion include 1) Challenges faced in Cyber-security. 2) Evolution of cyber security over the last 10 years 3) How to stay protected online :…
-4
votes
1 answer

MPR I suppose somehow I found a way to make a super hacker angry with me

I suppose somehow I found a way to make a super hacker angry with me. I've lost three cellphones. It might have all started with the iPhone 4 getting locked then both androids to simlock. And I'm at three laptops to this ignorant Windows mpr…
donny
  • 1
  • 1
-5
votes
1 answer

Can an ip be forced to connect? If so, how is it done, and how can I prevent it?

Can an IP be forced to receive data from another IP (specifically IPv6 for both)? If so how does this work, and how can I prevent this from happening to me? Does that have any way to be broken? If so how can it be improved?
tox123
  • 93
  • 5
1 2 3
37
38