Skip to main content

Featured

Honeypot & its Types

Honeypot & its Types: Honeypot is a security mechanism which records all the actions, transactions and interactions with users. They are used to track the attackers and defend the attacks. Based on their deployment types, it is classified into – Production honeypots –  Easy to use but they capture only limited information. They are placed inside production networks to improve security. Research Honeypots -Works better in gathering information about attackers. They research the threats of the organization and tries to prevent the threats. These are complex to deploy and maintain. Based on design criteria, the honeypots are classified into – Pure honeypots – Activities are monitored using the honeypot’s installed link to the network. High interaction – Multiple honeypots in a single system. More secure, difficult to detect, expensive to maintain. Low interaction – Simulate the services of attackers.

Web Hacking techniques

Web Hacking techniques:

There are several web hacking techniques such as-

  • FREAK (Factoring Attack on RSA-Export Keys)  – Attacker makes the user use servers with weaker encryption.
  • LogJam – Man-in-the-middle attack, where the attacker alters the information in the middle.
  • Web Timing Attacks – An attacker analyzes the cryptographic algorithms used and then he performs the attack.
  • Illusory TLS – This attack exploits the security architecture of the system by employing CA certificates.

Popular Posts