Hacking Articles Part 13

46 3 0
                                        

Important terms and definitions that is about HTTP injector and anything related to it.


[

Disclaimer: The content of this article is for educational purposes only and some of the information in this article was the author's opinions and experiences. It was written to express the opinions and experiences of the author and to share some knowledge about HTTP Injector.]

Http Injector

-is an Android VPN tool to used to set custom HTTP header. It's used to connect your SSH/Proxy with custom header and also it can access blocked websites behind firewall with SSH tunneling support & proxy server. It tunnels all applications and help to inject queries into your network server.

HTTP Injector is a professional tool to set custom HTTP header. It's used to connect your SSH/Proxy with custom header to help you access blocked websites behind firewall with SSH tunneling support & proxy server using build-in Android VPN.

What is an EHI file?

Config file used by HTTP Injector, an Android app used to modify requests and access blocked websites behind firewall with SSH support and proxy server; contains settings that configure HTTP Injector, which includes server login credentials and security/locking information.

The Payload Generator

it enables you to create a properly formatted executable that you can use to deliver shellcode to a target system without the use of an exploit. ... They are useful when you need to quickly generate an executable payload for a single use.

The Request Payload - or to be more precise: payload body of a HTTP Request

- is the data normally send by a POST or PUT Request. It's the part after the headers and the CRLF of a HTTP Request.

Remote Proxy Server.

Intent: Used to hide the communication mechanisms between remote objects. RemoteProxy is a special case of HandleBodyPattern, in which the handle or "stub" resides on a client machine, and the body or "skeleton" (also called "scion") resides on a remote machine.

Cache poisoning is a type of attack in which corrupt data is inserted into the cache database of the Domain Name System (DNS) name server. The Domain Name System is a system that associates domain names with IP addresses. ... DNS cache poisoning attacks are often used to spread computer worms and other malware.

Web Cache Poisoning

The list of conditions is long and hard to accomplish by the attacker. However it's easier to use this technique than Cross-User Defacement. A Cache Poisoning attack is possible because of HTTP Response Splitting and flaws in the web application

CR and LF

-are control characters, respectively coded 0x0D (13 decimal) and 0x0A (10 decimal). They are used to mark a line break in a text file. As you indicated, Windows uses two characters the CR LF sequence; Unix only uses LF and the old MacOS ( pre-OSX MacIntosh) used CR.

Note: Be who you are and what you are :D

Hacking ArticlesWhere stories live. Discover now