• Vulnerabilities

    Vulnerabilities – Know More

    by  • June 27, 2009 • Student Series, Vulnerabilities • 0 Comments

    Vulnerabilities are the tricks-of-the-trade for hackers, giving an intruder the ability to heighten one’s access by exploiting a flawed piece of logic inside the code of a computer. Like the hackers that seek them out, vulnerabilities are usually quite mysterious and hard to prove they even exist. They are confusing or undocumented source code, usually […]

    Read more →

    Reverse Connection for Bypassing The Firewall

    by  • December 3, 2008 • Ethical hacking, Vulnerabilities • 0 Comments

    If you use reverse connection you can also bypass Hardware Firewalls. The reverse connection is nothing more than the target server connect to the client instead of the client connect to the target server: Client:20 <——- Target Server:30 Target Server:30 ——–> Client:20 A bi-directional connection between 2 sides has been established. Normally Hardware firewalls only […]

    Read more →