<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Anishnath</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Anishnath"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Anishnath"/>
		<updated>2026-04-23T13:16:47Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Anishnath&amp;diff=186125</id>
		<title>User:Anishnath</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Anishnath&amp;diff=186125"/>
				<updated>2014-11-28T17:06:10Z</updated>
		
		<summary type="html">&lt;p&gt;Anishnath: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A self-starter can prioritize, plan and execute in the early stages of new business&lt;br /&gt;
Exyerot in Mitm,arpsoof, port stealing,  black hat techniques, dos,ddos, tools exploration,ssl sniffing,packet analysis, web security –(sql injection,csrf,cross site,log flooding,session hijaking), spoofing, sniffing attacks, proficient using sectools to perform various kind of attacks, like burp,scapy, ethereal&lt;br /&gt;
&lt;br /&gt;
http://youtube.com/zarigatongy&lt;br /&gt;
&lt;br /&gt;
[Application/Hosts and Network Threats][https://www.owasp.org/index.php/User_talk:Anishnath#Threats_on_Applications.2CHosts_and_Networks]&lt;/div&gt;</summary>
		<author><name>Anishnath</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Anishnath&amp;diff=186110</id>
		<title>User:Anishnath</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Anishnath&amp;diff=186110"/>
				<updated>2014-11-28T07:44:20Z</updated>
		
		<summary type="html">&lt;p&gt;Anishnath: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A self-starter can prioritize, plan and execute in the early stages of new business&lt;br /&gt;
Exyerot in Mitm,arpsoof, port stealing,  black hat techniques, dos,ddos, tools exploration,ssl sniffing,packet analysis, web security –(sql injection,csrf,cross site,log flooding,session hijaking), spoofing, sniffing attacks, proficient using sectools to perform various kind of attacks, like burp,scapy, ethereal&lt;br /&gt;
http://8gwifi.org/&lt;br /&gt;
&lt;br /&gt;
[Application/Hosts and Network Threats][https://www.owasp.org/index.php/User_talk:Anishnath#Threats_on_Applications.2CHosts_and_Networks]&lt;/div&gt;</summary>
		<author><name>Anishnath</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Anishnath&amp;diff=186109</id>
		<title>User talk:Anishnath</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Anishnath&amp;diff=186109"/>
				<updated>2014-11-28T07:41:15Z</updated>
		
		<summary type="html">&lt;p&gt;Anishnath: /* Threats on Applications,Hosts and Networks */ new section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''OWASP''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:KateHartmann|KateHartmann]] ([[User talk:KateHartmann|talk]]) 13:48, 19 November 2014 (CST)&lt;br /&gt;
&lt;br /&gt;
== Threats on Applications,Hosts and Networks ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Overview of Threat category on Applications,Hosts and Networks''' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Application Threats''' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.'''''Poor Input/Data Validation''''' can cause the following problems like  Buffer Overflow, Cross-site Scripting,SQL Injections, XPATH.Xquery Injection,Directory Path traversal attack, Canonicalization attacks,Query string manipulation, HTTP header manipulation,Cookie manipulation&lt;br /&gt;
&lt;br /&gt;
2. '''''Poor Authentication'''''  can lead to the following attacks, Network eavesdropping,Brute force attacks,Dictionary attacks,Cookie replay attacks,Credential theft&lt;br /&gt;
&lt;br /&gt;
3. '''Poor Authorization''' can lead to Elevation of privilege, Data tampering,Luring attacks,Token Stealing.&lt;br /&gt;
&lt;br /&gt;
4. '''Poor Session Management'''  can lead to Session hijacking,Session replay,Session fixation,Cross-site request forgery,MITM&lt;br /&gt;
&lt;br /&gt;
5  '''Poor Exception Management'''  can lead to Revealing sensitive system or application details, DoS&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Hosts Threats''' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. '''Virus'''&lt;br /&gt;
&lt;br /&gt;
2. '''Footprinting'''&lt;br /&gt;
&lt;br /&gt;
3. '''Password Cracking'''&lt;br /&gt;
&lt;br /&gt;
4. '''Dos'''&lt;br /&gt;
&lt;br /&gt;
5. '''Unauthorized Access'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Network Threats'''&lt;br /&gt;
&lt;br /&gt;
1. '''Phising'''&lt;br /&gt;
&lt;br /&gt;
2. '''Port scanning'''&lt;br /&gt;
&lt;br /&gt;
3. '''Sniffing'''&lt;br /&gt;
&lt;br /&gt;
4. '''IP spoofing'''&lt;br /&gt;
&lt;br /&gt;
5. '''DNS spoofing'''&lt;br /&gt;
&lt;br /&gt;
6. '''ARP spoofing'''&lt;br /&gt;
&lt;br /&gt;
7. '''MITM'''&lt;br /&gt;
&lt;br /&gt;
8. '''SYn Flood'''&lt;/div&gt;</summary>
		<author><name>Anishnath</name></author>	</entry>

	</feed>