Posts

Showing posts from February, 2017

Managing Output with Manipulators in C++

Well, when I started studying C++ or you can say when I was forced to study CPP I was like already I have Maths, Physics and Chemistry to study so why this shitty extra burden on my shoulders. But that subject which I was forced to study or having no other option instead of studying CPP became my passion now. Anyways that's a hell of a story! So, this piece of reading will give you an explanation about what are manipulators and how they are implemented in CPP. Manipulators By the name you might have already thought that this is going to be something related to manipulation of something. Well, you are on a right track So, you already got an idea what it is about I would like to make it clear that what is that "something". That something is nothing but Input and Output operations. Well, in this post we will be focusing mainly on Managing Output with Manipulators. Lets, start the boring thing! The header file iomanip provides a set of functions call

What is SQL injection and Cryptography?

SQL Injection SQL Injection is a technique used to take advantage of non validated input vulnerabilities to pass sql commands through a web application for execution by a back-end database. Although SQL injection is a flaw in web applications and not a database or web server issue. SQL( structural query language ) is a textual language used by a database server. SQL commands used to perform operations on the database that include insert,select,update and delete. Programmers use these commands to manipulate data in the database server. Programmers use sequential sql commands  with client supplied parameters making it easier for attackers to inject commands. attackers attempt to execute random sql querries on a database server through a web application. Cryptography It is the practise of converting plain text message into understandable message and then sentover network to the enduser. Cryptography in networks is used for securing the communication transmission.

Hack this site ?

Hacking website is not a very simple job first you need to find a back-door in the website or you can call it a vulnerability . There are multiple ways to find vulnerabilities. I generalized them in two ways: There are two ways for that Easy way : Buy any Vulnerability scanner and scan with it and find vulnerabilities if you want to know about softwares then this is some softwares which can help you. 1. Nessus VS 2. Saint VS 3. Qualys VS 4. Nexpose VS 5. GFI Languard VS 6. Coreimpact VS 7. Solar winds engineers toolset VS Tough way : Scan your website manually for each of OWASP top 10 vulnerabilities on your website and try to find some bugs. OWASP top 10 vulnerabilities are most preferable for finding the bugs most of the time you can rely on them. every year a company OWASP does an analysis in which they try to find the most common vulnerabilities present in the majority of the websites. OWASP top 10 vulnerabilities are 1. SQL injection. 2. Broken authentic