« Home « Chủ đề kỹ thuật bảo mật

Chủ đề : kỹ thuật bảo mật


Có 120+ tài liệu thuộc chủ đề "kỹ thuật bảo mật"

Google hacking for penetration tester - part 47

tailieu.vn

Last but not least, check out Figure 11.61, submitted by CP.. Figure 11.61 Hey, Can I Get All Your Web Passwords?. So it doesn’t sur- prise me when I see police reports like the one shown in Figure 11.62.. Figure 11.62 Police Reports Are Public Record. However, when I find a police report like the one shown in Figure 11.63,...

Google hacking for penetration tester - part 48

tailieu.vn

Figure 11.75 shows an extremely large document that contains hundreds of bits of per- sonal information about victims including name, address, phone numbers, credit card infor- mation, CVV codes and expiration dates.. Figure 11.75 Google Hacking Lots of Credit Card Info. However, credit card numbers and expiration dates aren’t the only financially sensitive bits of information on the web, as...

Google hacking for penetration tester - part 49

tailieu.vn

Web Server Safeguards. However, bear in mind that a Web server is designed to store data that is meant for public consumption. If you’re really concerned about keeping your sensitive information private, keep it away from your public Web server. Don’t get in the habit of splitting a public Web server into distinct roles based on access levels. Likewise, consider...

Google hacking for penetration tester - part 50

tailieu.vn

Figure 12.7 Gooscan’s Usage. Gooscan’s most commonly used options are outlined in the included README file.. (required argument) This is the Google appliance or server to scan.. An IP address or host name can be used here. Caution: Entering www.google.com here violates Google’s terms of service and is neither recommended nor condoned by the author.. Gooscan can be used to...

Google hacking for penetration tester - part 51

tailieu.vn

For example, selecting 1st photo with a PENTAX cam and clicking Search will deliver the Google results for that search, as shown in Figure 12.15.. Figure 12.15 Basic Search Results. Athena also allows you to add modifiers to the query using the Refine Search box. Using the previous query, entering inurl:”buddylist.blt” into the Refine Search box and clicking the Search...

Google hacking for penetration tester - part 52

tailieu.vn

Figure 12.24 GSI Options Screen. Simply fill in the name of the target website, and click Start GSI.. The results will be shown in a hierarchical format as shown in Figure 12.25.. Figure 12.25 GSI Output. Alternatively you can right-click within Firefox and select GSI. In this case, GSI will launch with the query filled in based on the selected...

Hacking Firefox - part 1

tailieu.vn

If you understand some basic web programming tools, such as CSS, JavaScript, and XML, you are one step ahead of the game. Conversely, if you are not well versed in these technologies, you will find plenty of exam- ples and references to guide you along your hack training.. First, we cover some of the key tools you should use to...

Hacking Firefox - part 2

tailieu.vn

Now that you have found your user directory, this will now be referred to as %UserPath% and will be used to track down where Firefox has stored your profile.. Express Pass to Your Profile Path. One nice feature that Firefox finally enabled is human-readable settings for the profile.ini file with the direct or relative path to the current profile(s). The...

Hacking Firefox - part 3

tailieu.vn

Hacking the user.js File. The user.js file is very much like the prefs.js file in format and functionality. The key difference is that the user.js file is used to set or reset preferences to a default value. Upon restarting the browser, the user.js settings supersede the stored values of the prefs.js file. The user.js file is static and does not...

Hacking Firefox - part 4

tailieu.vn

From version to version prior to the 1.0 release of Firefox, there were numerous changes to the backend calls that were available, as well as many refinements to how the browser handled, stored, and installed extensions. The following section covers what you might have to do to get an aban- doned or older extension working for you in the latest...

Hacking Firefox - part 5

tailieu.vn

Now all you have to do is find the directory corresponding to that GUID in the extensions directory to find the supporting files for my extension.. When you add a new extension or theme, a temporary copy is placed in the temp folder under the extension directory. When you restart, the extension is installed or reinstalled in its prospective directory.....

Hacking Firefox - part 6

tailieu.vn

These are listed in the forums on my site at http://www.mrtech.com. Live Http Headers Adds HTTP header to page info tab Make Link Builds html or bbcode links in clipboard Mime Type Editor Mozilla’s Mime Type helper application Named Anchors Shows Named Anchors on Page Info window ScrapBook Save and manage web sites and notes easily User Agent Switcher Changes...

Hacking Firefox - part 7

tailieu.vn

You can play with the color, font, and font size of the active tab by adding the following before or after the snippet you just added:. To vary the background tab appearance even more, you can change the opacity, font, and font size with the following code. Remember that most text background style changes that you can make using Cascading...

Hacking Firefox - part 8

tailieu.vn

You can download the Local Install extension at http://www.mrtech.com/extensions/. Hacking via userChrome.css. Earlier in this chapter we introduced the manual steps for creating your own style sheets to change the appearance of the main browser windows and supporting screens. Doing this makes certain features optional and allows the themes themselves to be hacked from the userChrome.css.. A generic example of...

Hacking Firefox - part 9

tailieu.vn

This chapter covers several of the much-touted hacks that you will find on the Internet, as well as some other less popular but very useful hacks. Based on RFC specification numbers and others, the defined and recommended maximum number of simultaneous connections using HTTP/1.0 Internet protocol is four. For HTTP/1.1, the defined and recommended number is two. they also increase...

Hacking Firefox - part 10

tailieu.vn

Windows users should make sure that this value has double slashes, as displayed in the preced- ing code. Viewing, Changing Size, and Cleaning Your Disk Cache. As you can see from Figure 5-2, typing about:cache in your browser’s location bar and pressing Enter brings up the memory and disk cache statistics with the capability of drilling in and inspecting the...

Hacking Firefox - part 11

tailieu.vn

There are six items available in the Privacy section, but the one we’re concerned with right now is the second from the top. (My theme, Neptune, is shown in the screenshot, so your screen may differ slightly depending on the theme you are using.). F IGURE 6-1: Privacy settings for Saved Form Information. To purge any previously saved form data,...

Hacking Firefox - part 12

tailieu.vn

After you click the Check Now button, Firefox checks for any updates and presents a list if any are found, as shown in Figure 6-15.. From here, you can select which updates you wish to install and then click the Install Now but- ton. Update notification service. For updates to themes or extensions, there is a button in the individual...

Hacking Firefox - part 13

tailieu.vn

If you participated in the earlier exercise of blocking images, now you have the opportunity to restore images to the site that you experimented on. The Exceptions dialog allows just that—sites that should always be allowed to display pictures can be listed, as well as sites that you would never want to see pictures from. Think of the “originating web...

Hacking Firefox - part 14

tailieu.vn

Previous examples in this chapter noted that filtering elements that can be very effective are the words ad and ads . With regex, it is possible to express this as a single pattern instead of two.. With Adblock, a regex expression has to be bound by /[regex. The forward slash lets Adblock know that we are indeed intending this to...