Posts

Showing posts from April, 2022

UDP Flood Attack - The main things in a nutshell

A UDP Flood assault is a shape of DoS assault (Denial of Service assault) wherein a big wide variety of UDP (User Datagram Protocol) are despatched to a particular server. It is finished to overload the gadget and hampers its cappotential to reply and technique requests promptly.  Apart from this it may additionally take advantage of the firewall gadget on your tool and save you you from receiving valid visitors. Here the attackers may use faux IP addresses to hold anonymity and make certain that any of the ICMP packets do now no longer attain the host server.  Unlike TCP and VoIP visitors UDP visitors isn't always a three-manner handshake technique and does now no longer require more than one checking which makes it liable to assaults and virtual abuse.  An preliminary handshake is used to authenticate the relationship but its absence in a User Datagram Protocol consequences in a excessive quantity of visitors despatched to the server with none preliminary test and protection.  A

Which to choose SOAP or REST?

 Exchanging records among programs is a important component in today’s global. Applications are written in one of a kind languages so records trade has come to be a complicated process. Web Services are the standardized medium to propagate conversation among consumer-server programs on the sector extensive net. SOAP protocol SOAP (Simple Object Access Protocol) is an XML-primarily based totally protocol for having access to net offerings over HTTP. It is evolved as an intermediate language in order that programs constructed in diverse programming languages can speak with every different effectively. Web offerings use SOAP for trade of XML records among programs. SOAP helps each stateful and stateless operations. Stateful manner that the server continues the records that it gets from the consumer throughout more than one requests. These requests are chained collectively in order that the server is privy to the preceding requests. Examples are financial institution transactions, flight b

Types of WebSocket Communication Patterns

WebSockets are used for real-time communique among the browser and a server. These communications are bi-directional. Therefore it suits low latency packages inclusive of chat, real-time multiplayer gaming, in-app notifications. If you're new to WebSockets, I propose you examine the beneath article I’ve written to recognize higher the way it works. 1. Sending Messages Directly When a WebSocket connection is open among a patron and a server, it's miles taken into consideration a full-duplex connection. The facts float is bi-directional. Keeping the relationship open and without delay sending messages/records over the hyperlink is traditional while imposing WebSockets. For example, let’s examine a talk utility inclusive of WhatsApp . The second a person sends you a message, you acquire it for your telecellsmartphone or laptop utility. You also can reply to this message instantly, with a view to be despatched and obtained in real-time. Using this sample would require the server t

Buffer overflow attack-What is this?

Buffer overflow definition Buffer overflow is an anomaly that takes place whilst software program writing facts to a buffer overflows the buffer’s capacity, ensuing in adjoining reminiscence places being overwritten. In different words, an excessive amount of records is being surpassed right into a field that doesn't have sufficient area, and that records finally ends up changing facts in adjoining containers. Buffer overflows may be exploited through attackers with a aim of editing a computer’s reminiscence in an effort to undermine or take manage of software execution. Buffer definition A buffer, or facts buffer, is a place of bodily reminiscence garage used to briefly keep facts even as it's far being moved from one region to every other. These buffers normally stay in RAM reminiscence. Computers often use buffers to assist enhance performance; maximum current difficult drives take gain of buffering to efficaciously get entry to facts, and lots of on-line offerings additiona

MQTT vs CoAP - What's the difference?

 What are Communication Protocols? If you haven’t examine the preceding post, here’s a quick rationalization of what protocols imply for IoT solutions. Protocols are sincerely a hard and fast of regulations that assist ship information from one tool to every other or to different systems. This standardizes the information sharing, making it more secure and greater green for IoT systems.  MQTT definition MQTT stands for MQ Telemetry Transport and turned into constructed through IBM particularly for M2M and IoT message switch. It transfers information over TCP. CoAP definition CoAP stands for Constrained Application Protocol and turned into evolved through the IEFT group . CoAP is much like HTTP wherein it's far a file switch protocol, however the distinction is that CoAP turned into designed particularly for limited devices. The architecture of protocols MQTT  MQTT has a writer-subscriber version and helps many to many communication. The sender and receiver of the messages are dec

What is Google Dorking? - Understanding

Understanding Google Dorks Google Dorking is all approximately pushing Google Search to its limits, with the aid of using the use of superior seek operators to inform Google precisely what you need. Many human beings view it as a Hacking Technique to locate unprotected touchy facts approximately a company, however I try and view it as extra of the Hacker Way of Thinking due to the fact I use Google Dorks for some distance extra than safety research.  I first found out the energy of a Google Dork once I become seeking out the Cisco Anyconnect software program used to hook up with Cisco VPNs. However, Cisco didn’t permit for downloading the software program and googling “Cisco Anyconnect” brought about many web sites simply speaking approximately the software program. I checked out the superior seek operators of Google and observed I ought to seek the titles of internet pages. After seeing I ought to seek with the aid of using the HTTP Titles, I had an concept that if I searched for &qu

A simple explanation Slowloris

Definition of Slowloris Developed via way of means of Robert “RSnake” Hansen, Slowloris is DDoS assault software program that allows a unmarried pc to take down an internet server. Due the easy but stylish nature of this assault, it calls for minimum bandwidth to enforce and impacts the goal server’s internet server only, with nearly no aspect results on different offerings and ports. Slowloris has demonstrated highly-powerful in opposition to many famous forms of internet server software program, which includes Apache 1.x and 2.x. Over the years, Slowloris has been credited with some of high-profile server takedowns. Notably, it become used drastically via way of means of Iranian ‘hackivists’ following the 2009 Iranian presidential election to assault Iranian authorities internet sites. How does the attack work? Slowloris works via way of means of establishing a couple of connections to the focused internet server and preserving them open so long as possible. It does this via way of

API security in simple words

Explanation of API Security Application programming interface (API) safety refers back to the exercise of stopping or mitigating assaults on APIs. APIs paintings because the backend framework for cellular and net programs. Therefore, it's miles crucial to defend the touchy information they switch.  An API is an interface that defines how specific software program interacts. It controls the styles of requests that arise among programs, how those requests are made, and the sorts of information codecs which can be used. APIs are utilized in Internet of Things (IoT) programs and on websites. They regularly acquire and manner information or permit the consumer to enter statistics that receives processed withinside the surroundings housing the API.  For example, there's an API that runs Google Maps. A net fashion dressmaker can embed Google Maps right into a web page they may be building. When the consumer makes use of Google Maps, they may be now no longer the use of code the net fa

What is gRPC and its benefits

  gRPC could be a high performance, open supply framework developed by Google to handle remote procedure calls (RPCs). gRPC is Google’s approach to a shopper -server application. It lets client and server applications communicate transparently, simplifying the method for developers to make connected systems. discharged in August 2016, gRPC has been adopted by enterprises, startups and open source comes worldwide. gRPC runs in any environment, connecting services in and across knowledge centers with pluggable support for tracing, health checking, load reconciliation and authentication. gRPC may also be accustomed connect mobile devices, Mobile apps and browsers to backend services. Developers use gRPC within the walk of computing in mobile and internet shoppers as a result of it will generate libraries for automaton and iOS. Additionally, it uses standards-based HTTP/2 as transport therefore it can cross firewalls and proxies easily. What programming languages are