Hacking PDF: util.prinf() Buffer Overflow: Part 1
1. Introduction One of the first things we need to do is to remove the PDF Reader we currently have installed and reinstall the old version of PDF Reader. The old version of PDF Reader can be found on various web pages, but most prominent web page is definitely oldapps ...
Apache JMeter Part 4: Testing the Throughput and Performance of InfoSec Institute
Testing the Throughput of InfoSec Institute Running the JMeter When everything is set-up all that is left for us to do is run the JMeter and observe the results. We can do that by simply pressing the Menu – Run – Start button. Setting-up JMeter Let's present the options that we ...
Apache JMeter Part 3: Testing Website Performance
Summary We've already described most of JMeter in part 1 and part 2, but let's summarize what we've learned so far. We've seen that JMeter consists of the following elements: Thread Group: A mandatory element that specifies the number of concurrent users that will use the ...
Apache JMeter: Part 2
For Part 1 of this series, please click here. Test Plan Elements Up until now we haven't said anything about how to actually do something useful with JMeter, but it's only because we need to cover some boring details of how to configure it before actually running some ...
Apache JMeter: Part 1
Introduction Apache JMeter is a program that can test the performance of various servers. It natively supports the following protocols: HTTP(S) LDAP JMS SOAP JDBC (needs appropriate JDBC driver) SMTP(S) POP3(S) IMAP(S) Besides those, JMeter also has a lot of plug-ins that can be used to ...
DNS Cache Snooping
1. Introduction DNS or name servers are servers that resolve a hostname to their IP representation. There are numerous DNS servers out there, all of which resolve specific domains, but each of them stores specific DNS records. Those records can be the following: A, AAAA, NS, MX, etc. All of ...
Open Source Antivirus: ClamAV
1. Introduction We all know that checking downloaded files for virus signatures should be a mandatory thing to do nowadays because of all the malware existing in the world. ClamAV can be used to scan downloaded files, emails, pdf and rtf documents, etc. We can install ClamAV on all major ...
Honeypots
1. Introduction Honeypots are special programs that are written for a sole purpose: to be exploited. Honeypots can emulate the existence of the vulnerability, so the attackers, viruses and worms are attracted to this system which appears to be poorly secured. The honeypots collect as much information as they can ...
Fuzzing Vulnserver with Sulley: Part 3
Introduction Vulnserver is a vulnerable server written by Stephen Bradshaw whose blog is located here: grey-corner. This server was written intentionally to be vulnerable, so we can learn fuzzing on it. It's kinda hard to learn fuzzing if we don't have any existing vulnerabilities in place to test ...
Fuzzing Vulnserver with Peach: Part 2
Introduction The vulnserver.exe server is a vulnerable server that was written specifically for fuzing purposes. Therefore the software intentionally contains vulnerabilities that we can exploit to gain control over the target operating system. Peach is a fuzzer that is capable of performing both generation and mutation based fuzzing. It ...