Posts

Steps to Fix Corrupted Files in Windows

Image
Corrupted Files Corrupted files are digital files (like documents, images, videos, system files, etc.) that have been altered from their original structure or data format, either partially or completely. Because of this damage, the file cannot be opened, read, or used properly by the software that created it or by any other application. Cause of File Corruption: Power Failures or Sudden Shutdowns When: While saving or transferring a file, if the computer suddenly loses power or crashes. Why: The file may not have finished being written correctly to the storage disk. Example: You are saving a Word document and the electricity goes out. When you reboot, the file won't open. Faulty Storage Devices When: The hardware (hard drive, SSD, USB stick, SD card) has physical damage or is worn out. Why: Devices develop bad sectors — areas that can no longer reliably hold data. Example: An old USB drive starts giving errors when copying files, and saved photos become broken. Software Errors and ...

What is Clickjacking

Image
 Clickjacking It is a web based vulnerability which allows hacker to embed a webpage of a domain on hacker's fake webpage. Now the fake webpage can works like a legitimate one and become very complex to identify that it is a fake webpage. It is also known as UI Redressing.  It can be achieved by using iframe. Things to Know: X-frame:     It is a http security header that controls iframe. It is used to specify whether a browser is allowed to render a page in iframe. Content Security Policy (CSP):     It is a security standard which allows the developer to add additional security to the website. It helps developer to restrict loading web resource like HTML, CSS, JS into other webpage. iframe:     It is a html element that loads another html element inside a web page. HTML template with Iframe to exploit clickjacking <!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8"> <title>I Frame</title> <style...

Steps to fix the broken base repo in CentOS 7

Image
The error "could not find valid base url for repo: base/7/x86_64" in CentOS usually occurs because the YUM package manager cannot access the repository URLs it needs to download packages. Steps to solve the issue: Check whether the device is connected to internet. Open terminal  ping www.google.com  to test the stability of the internet and to check whether you can reach the web server. If the server is reachable then we can confirm that the problem is with base repo of the operating system. Locate to the path /etc/yum.repos.d using change directory  command. cd /etc/yum.repos.d. Open the file CentOS-Base.repo using vim text editor sudo vim CentOS-Base.repo. Use esc+:%d to clean the entire content present in the file and add the repo given below. # CentOS-Base.repo # # The mirror system uses the connecting IP address of the client and the # update status of each mirror to pick mirrors that are updated to and # geographically close to the client. You should use this f...

Open Redirect Vulnerability

Image
Open Redirect:     An open redirect is a type of web vulnerability where a website has a parameter that can redirect a user to an external URL without proper validation. This can be exploited by attackers to redirect users to malicious sites, phishing pages, or unwanted content. Risks of Open Redirects: Phishing Attacks: Attackers can use open redirects to craft convincing phishing URLs that appear to come from a trusted site. Malware Distribution: Users can be redirected to sites that host malware, increasing the risk of infections. Loss of Trust: Users may lose trust in a website that unknowingly redirects them to malicious or unwanted content. Payloads: Example: https://cyberguardian40.blogspot.com /redirect?url=https://www.google.com ?url=http://{target} ?url=$2f%2f{target} ?next=http://{target} /redirect/{target} ?view=/{target} /login?to={target} Remediation: Remove the redirection function from the application, and replace links to it with direct links to the relev...