Skip to main content

Posts

A Case Study On End-to-End Encryption Used In Whatsapp

A Case Study On End-to-End Encryption Used In Whatsapp 1.Introduction to End-to-End Encryption WhatsApp's end-to-end encryption is available when you and the people you message use the latest versions of the app. WhatsApp's end-to-end encryption ensures only you and the person you're communicating with can read what is sent, and nobody in between, not even WhatsApp. This is because your messages are secured with a lock, and only the recipient and you have the special key needed to unlock and read them. For added protection, every message you send has its own unique lock and key. WhatsApp, since its inception six years ago, has quickly grown into a global phenomenon, becoming one of the most popular mobile based communications applications in the world today. With a user base that eclipsed one billion in February, WhatsApp provides a service that potentially endangers the privacy of over 10% of the entire human population. In order to address these security concern

Priority Based Cab Search Engine Using Rest API

I am honored to present my first published technical paper. PAPER TITLE:-Priority Based Cab Search Engine Using Rest API ABSTRACT In last two years, the rapid development of Internet based ride-sharing has brought great changes to travel pattern of residents. By comparing the trip records of OLA and UBER [2][3], two indicators, the distribution characteristics of vehicle volume and the balanced patterns of time, are selected to identify the ride-sharing cars from private cars. REST (Representational State Transfer) which uses Uniform Resource Identifier for web applications and web resources which use HTTP, as it was original which is simpler than SOAP or XML-RPC [4]. This paper in lights the working of comparison of the price, distance and by car selection. Authors :- Prof. Javed Khan Sheikh, Akshay Kharmale, Taha Pipewala, Quid Zohar Morbiwala, Shanawaz Shaikh Volume/Issue:  Volume 2 Issue 8 Published in :- IJISRT DIGITAL LIBRARY :- http://ijisrt.com/priority-based-ca

SQL INJECTION

What is SQL INJECTION SQL INJECTION is getting Unauthorized access to database. After successful authentication by SQL injection attacker tries to harm or dispose or cause any type of harm to a database.   A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system.  SQL injection we try to use SQL comments or using logical Boolean relational algebra i.e (OR & AND clause) to get data from db. How to Perform basic SQL injection Make a basic html form page without providing front end validation. Make a Folder in your local host directory as test HTML FORM AS index.html in your localhost directory(var/WWW/html/test) or in ht docs in XAMPP then add this HTML simple form as index.html <!

DDos attack

DDoS attack - Distributed Denial of Service DISTRIBUTED DENIAL OF SERVICE ATTACK (DDOS) DEFINITION A distributed denial of service (DDoS) attack is a malicious attempt to make an online service unavailable to users, usually by temporarily interrupting or suspending the services of its hosting server. Broadly speaking, DoS and DDoS attacks can be divided into three types: Volume Based Attacks Includes UDP floods, ICMP floods, and other spoofed-packet floods. The attack’s goal is to saturate the bandwidth of the attacked site, and magnitude is measured in bits per second (Bps). Protocol Attacks Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. This type of attack consumes actual server resources, or those of intermediate communication equipment, such as firewalls and load balancers, and is measured in packets per second (Pps). Application Layer Attacks Includes low-and-slow attacks, GET/POST floods, attacks tha