Category Cybersecurity

Slowloris Attack

The Slowloris script opens two connections to the server, each without the final CRLF. After 10 seconds, second connection sends additional header. Both connections then wait for server timeout. If second connection gets a timeout 10 or more seconds after…

IPv4

This post explains briefly the network protocol IPv4 and summarizes the main aspects of it. IPv4 Characteristics IPv4 is based on best effort. It does not guarantee delivery. The datagrams are not delivered in order. It is resilient, and uses…

sqlmap

sqlmap is a command line tool to automatize SQL injections. Examples Retrieve tables on DB (–tables;)] specify database with -D: sqlmap -u “” –cookie=<“cookie value which you have copied in step #5”> -D moviescope –tables Retrieve columns from a table…