Posts

PPTP vs L2TP vs SSTP vs OpenVPN

PPTP PPTP stands for Point To Point Tunneling Protocol, which is also termed as P2TP, is a protocol designed by Microsoft to provide secure communication and it is a very common protocol being used from windows 95. It has some drawbacks like it is no more secure at all now. Although, it is easy to use and set up but vulnerable with lots of weaknesses. The major advantage of this protocol is that it is built-in with the Windows operating system. It has almost been obsoleted. It's better to go for an advanced and secure feature. OpenVPN OpenVPN is more secure than PPTP and also provides more flexibility like it can be mount on any port, so it is difficult for a firewall to block it properly. OpenVPN uses open technologies like OpenSSL encryption library and SSLV3 and TLS v1 protocols. It is most popular and can be more secure if it uses AES encryption rather than a Blowfish encryption technique. It is required to install a third-party software before configuring OpenVPN bec...

what is LDAP Injection?

Image
LDAP Injection " LDAP(Lightweight Directory Access Protocol) Injection is a way to exploit in LDAP databases, which fails to sanitize or validate user's input at the client-side. This Injection is similar to SQL Injection but prior exploitation than SQL injection though uses the same method to exploit with databases and with LDAP directory structure. " LDAP which stands for Lightweight Directory Access Protocol is a protocol used to access the directory on a server in web browser applications to search, connect, and modify data on a server. It is based on TCP/IP, and It works on client-server technology. The LDAP injection is designed to exploit in databases and directories where LDAP fails to sanitize input given by the user to authorize themselves on the client-side. LDAP injection works in a similar way with SQL injection but SQL injection has some advanced features than LDAP injection. Both are used to inject queries into databases. LDAP injection can authoriz...

what is Biclique Attack?

Biclique Attack "Biclique attack is a publicly well known single key(symmetric key) attack on AES (Advanced Encryption Standard) cryptanalysis. Biclique attack is a MITM (Men In The Middle) attack variant. And uses biclique (complete Bipartite graph a mathematical concept) technique to increase or extend the number of rounds to decrypt AES encryption." Biclique is a well known attack which uses MITM(Men In The Middle Attack) technique by extending the overall attempt or rounds power to decrypt AES .The interesting thing is, it uses a mathematical concept called Biclique or complete Bipartite graph to extend the number of MITM attacks to break into AES cryptanalysis. Biclique attack breaks full AES encryption by using full attempts and ensure to provide computational complexity of the attack is 2^126.1, 2^189.7 and 2^254.4 for AES128, AES192 and AES256, respectively. Becauses this attack uses MITM as a base it has also used to break encryptions and hash functions . It h...

what is Men In The Middle Attack?

Image
Men In The Middle Attack "Men in the middle is a security attack, which is based on eavesdropping , being used to get sensitive information transmitting between user and server by means of getting access or entry in the middle with the help of relay/proxy to eavesdrop in sensitive information." MITM(Men In The Middle) is a very common attack, which is also termed as Meet In The Middle attack is a kind of eavesdropping attack to listen or gain access on private conversation or data being transferred between user and the server without user and server consent. Men In The Middle Attack is used to breach AES(Advanced Encryption Standard) algorithm used in encryption. Because AES works on Symmetric key encryption , so if an intruder takes place in between or middle he can sniff key to decrypt the data. How Does it work Men In The Middle attack works in a very simple manner, a hacker or an intruder gain access in between a private conversation or data transferring sessio...

what is AES (Advanced Encryption Standard)?

Image
AES (Advanced Encryption Standard) "AES (Advanced Encryption Standard) is an algorithm used to encrypt data in a more powerful way. It is a highest degree technique for cryptography , which provides more protection than DES algorithm (Data Encryption Standard) technique." AES (Advanced Encryption Standard) is a successor of DES algorithm , which is basically designed to provide more security as compare to DES technique, because DES was limited to 64-bit encryption which is vulnerable from brute force attack . AES also works on symmetric key encryption technique but ensure more security than DES. AES was adopted by many government agencies to encrypt data and conversation, AES became the highest degree encryption standard in the market and it also overcome old DES technique. AES makes possible to encrypt data upto 3 levels 128-bit, 192-bit, 256-bit. where 128-bit takes 10 rounds, 128-bit 12 rounds and 256-bit takes 14 rounds to encrypt and decrypt the data. A round inv...

what is DES (Data Encryption Standard)?

Image
DES (Data Encryption Standard) "when we speak about security, then it must be clear to us that what sort of algorithms are used to achieve such securities. DES (Data Encryption Standard) algorithm is one of them, which is used to achieve a genuine security level. DES also has a successor named AES (Advanced Encryption Standard)". DES(Data Encryption Standard) is an algorithm which is designed to achieve data security so that confidential data can be protected from hackers or unsolicited use. DES works on symmetric key encryption technique which uses same private key to encrypt or decrypt the data, and the private key is well known by both (sender or receiver). By means of this algorithm we can change or encrypt any data into a different or non readable form so that if hackers or intruders steal that data they could not understand it. Non encrypted data usually refer as plain text while the encrypted data is termed as ciphertext. DES was designed by IBM in early 1970 to...

what is virtualization

Image
what is virtualization? "Virtualization is a technique which uses hypervisor technology to virtualize operating systems, network resources, servers and storage devices in order to save wastage of resources." It is a technique which is used to create virtual environment to utilize resources like CPU, storage, network devices, server utilization etc. This technique uses hypervisor technology. Which enables a user to run two or more operating systems simultaneously. In OS virtualization OS kernel is compromised to create virtual environment. Similarly a server's resources like CPU cycles, storage and RAM space are compromised to create more virtualized servers. So that they can perform as a sub server individually. It saves lots of money and space, just think about it that a client has an organization which may have thousands of server but not all servers are being utilized by the client completely. So he need a big space to keep those servers and resources like a t...