Channel address:
Categories:
Apps
Language: English
Subscribers:
66
Description from channel
Welcome to Tech Rage Telegram Channel, here you will learn :
• Hacking Tips
• Pen Testing
• Hacking Tutorials
• Tips & Tricks
Paid Promo : @chalpromobot
Keep Learning & Keep Supporting
Ratings & Reviews
Reviews can be left only by registered users. All reviews are moderated by admins.
5 stars
0
4 stars
0
3 stars
1
2 stars
0
1 stars
1
The latest Messages
2021-08-10 10:47:01
Clickjacking MitigationThere are two general ways to defend against clickjacking:
Client-side methods – the most common is called Frame Busting. Client-side methods can be effective in some cases, but are considered not to be a best practice, because they can be easily bypassed.Server-side methods – the most common is X-Frame-Options. Server-side methods are recommended by security experts as an effective way to defend against clickjacking. Mitigating clickjacking with X-Frame-Options response headerThe X-Frame-Options response header is passed as part of the HTTP response of a web page, indicating whether or not a browser should be allowed to render a page inside a or There are three values allowed for the X-Frame-Options header:
DENY – does not allow any domain to display this page within a frameSAMEORIGIN – allows the current page to be displayed in a frame on another page, but only within the current domainALLOW-FROM URI – allows the current page to be displayed in a frame, but only in a specific URI – for example www.example.com/frame-page
Share and Support
@HackingCraze
9.4K views07:47
2021-08-03 08:22:22
Clickjacking Attack Example- The attacker creates an attractive page which promises to give the user a free trip to Tahiti.
- In the background the attacker checks if the user is logged into his banking site and if so, loads the screen that enables transfer of funds, using query parameters to insert the attacker’s bank details into the form.
- The bank transfer page is displayed in an invisible iframe above the free gift page, with the “Confirm Transfer” button exactly aligned over the “Receive Gift” button visible to the user.
- The user visits the page and clicks the “Book My Free Trip” button.
- In reality the user is clicking on the invisible iframe, and has clicked the “Confirm Transfer” button. Funds are transferred to the attacker.
- The user is redirected to a page with information about the free gift (not knowing what happened in the background).Share and Support @HackingCraze
15.2K viewsVPP Official, 05:22
2021-07-29 07:50:12
What is ClickjackingClickjacking is an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element. This can cause users to unwittingly download malware, visit malicious web pages, provide credentials or sensitive information, transfer money, or purchase products online.
Typically, clickjacking is performed by displaying an invisible page or HTML element, inside an iframe, on top of the page the user sees. The user believes they are clicking the visible page but in fact they are clicking an invisible element in the additional page transposed on top of it.
The invisible page could be a malicious page, or a legitimate page the user did not intend to visit – for example, a page on the user’s banking site that authorizes the transfer of money.There are several variations of the clickjacking attack, such as:
•
Likejacking – a technique in which the Facebook “Like” button is manipulated, causing users to “like” a page they actually did not intend to like.•
Cursorjacking – a UI redressing technique that changes the cursor for the position the user perceives to another position. Cursorjacking relies on vulnerabilities in Flash and the Firefox browser, which have now been fixed.Share and Support
@HackingCraze
18.0K viewsVPP Official, 04:50
2021-07-26 16:47:17
DDoS Attack ToolsThere are numerous DDoS attack tools that can create a distributed denial-of-service attack against a target server. The list contains both open source(free) and commercial(paid) DDoS tools.1. SolarWinds DDoS Attack Tool- DDoS Attack is a tool that can be used to perform a Distributed Denial of Service attack. This application can monitor the event log from numerous sources to find and detect DDoS activities2. LOIC (Low Orbit ION cannon)- LOIC (Low Orbit ION cannon) is open-source software use for DDoS attack. This ddos tool is written in C#. This tool sends HTTP, TCP, and UDP requests to the server.3. HOIC (High Orbit ION cannon)- High Orbit Ion Cannon is a free denial-of-service attack tool. It is designed to attack more than one URLs at the same time. This ddos tool helps you to launch DDoS attacks using HTTP (Hypertext Transfer Protocol)4. DDoSIM DDoS attack software- DDoSIM (DDoS Simulator) is a tool that is used to create a distributed denial-of-service attack against a target server. It is written in C++ and can be used on the Linux operating system.5. OWASP HTTP POST Software- The OWASP (Open Web Application Security Project) HTTP Post software enables you to test your web applications for network performance. It helps you to conduct denial of service from a single DDoS machine online.6. Tor's Hammer- Tor's hammer is an application-layer DDoS software program. You can use this ddos online tool to target web applications and a web server. It performs browser-based internet request that is used to load web pages.Credit : VPPOfficial
Share and Support
@HackingCraze
16.9K viewsVPP Official, 13:47
2021-07-24 07:15:03
Top 7 Best Platforms to Learn Python in 2021
If you want to learn Python in 2021 and are looking for some free platforms where you can learn Python for free then this article may help you Link : https://bit.ly/3i3grel
(
Click on first website)
Share and Support @HackingCraze
16.3K viewsVPP Official, 04:15