• Exclusive

    Intrusion Attack Through Port Scanning

    by  • June 16, 2009 • Exclusive, IP, Student Series • 2 Comments

    Port scanning determines which ports are listening to the active connections on the subjected host. These ports represent potential communication channels. With the help of port scanning we get close to the network communication scenario. We get to know more about victim’s network which is useful for further attacks. Internet does not exclusively rely on […]

    Read more →

    Firewall Responses Detection & Breaking The Firewalls

    by  • March 23, 2009 • Exclusive, Firewalls Breaking, Student Series • 1 Comment

    The behavior of packets and its responses explained last post has been noted by a number of firewall vendors. By understanding such enumerations,  the have modified their security system’s for high anonymity by spoofing the source address of the RST/ACK packet to be that of the target host. As such, the response received by an […]

    Read more →

    Bluesnarfing: Type of Bluetooth Hacking

    by  • March 22, 2009 • Black Hat, Bluesnarfing, Bluetooth hacking, Exclusive • 0 Comments

    Bluesnarfing is one type of blue-tooth hacking. While it is similar to the bluejacking and bluebugging. It was discovered by Marcel Holtmann in october 2003. Bluesnarfing is unauthorized access of information or data from wireless device through blue-tooth technology. Connection is often between the desktop’s, LAP’s ,cellphones , PDA’s . Blue-tooth is very high speed […]

    Read more →

    Bluejacking: Type of Bluetooth Hacking

    by  • March 21, 2009 • Black Hat, Bluejacking, Bluetooth hacking, Exclusive • 0 Comments

    Bluejacking is one of the type of Blue-tooth hacking. Bluejacking was first carried by the Malaysian IT consultant. In simple words Bluejacking means tempoarly hijacking someones device. Bluejacking allow the user to send business cards anonymously using Bluetooth wireless technology. Bluejacking is carried only to the Bluetooth enable device that is cell phones, PDA’s , […]

    Read more →

    Bluebugging: Type of Bluetooth Hacking

    by  • March 21, 2009 • Bluebugging, Bluetooth hacking, Exclusive, General • 1 Comment

    Bluebugging is also one form of Bluetooth hacking .It was first discovered German researcher Martin Herfurt . He got the motivation from the Bluesnarf attack. Bluebugging is very much different from the bluesnarfing. In bluebugging allows an individuals to access the mobile phone commands using Bluetooth wireless technology without knowing the phone’s user .The hacker […]

    Read more →

    Firewalk Attack: Beyond The Boundaries of Security.

    by  • March 21, 2009 • Amol Wagh, Black Hat, Ethical hacking, Exclusive, Student Series • 0 Comments

    Firewalk which was developed by two masterminds known as developed by Mike Schiffman and Dave Goldsmith furthers the techniques used both by static port traceroutes and hping. It can be successfully implemented to scan a host downstream from a security gateway to assess what rules relate to the target system, without any packets having to […]

    Read more →

    Nokia Developer Conference 2009 In India

    by  • December 26, 2008 • Amol Wagh, Exclusive, Latest News • 3 Comments

    Nokia is ready to set another benchmark this year for mobile application developers and IT industry by announcing its ‘Nokia Developer Conference 2009’ In Bangalore, India. The basic concept behind this conference is creating a forum where knowledge of developers across the nation will be shared. Presentation on various mobile technologies, developers success stories and […]

    Read more →