Information Leakage

Home/Tag:Information Leakage

What is Footprinting? What is Reconnaissance?

2020-12-11T13:56:30+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

Footprinting (also known as reconnaissance) commonly refers to one of the pre-attack phases; tasks performed before doing the actual attack. In other words, footprinting is the first step in the evaluation of the security posture of the target organization's IT infrastructure. During this phase, a hacker can collect the following information − Domain name IP [...]

Assessing & Mitigating Vulnerabilities of Web Systems

2020-07-15T13:06:11+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Assessing & Mitigating Vulnerabilities of Web Systems Web Servers are the programs that are used for hosting websites. Web servers may be deployed on a separate web server hardware or installed on a host as a program. One of the most important aspects of cyber security is the ability to secure web systems. This [...]

Go to Top