ZIP bomb can protect websites from hackers
Website owners can now use a tool called ZIP bomb to damage the port scanner, hacker website vulnerability and prevent him from accessing his website.
The term ZIP bomb relates to nested ZIP files that, when decompressed into large files, cannot be processed by the victim's computer or stored on the drive.
For example, a 4.5 petabyte file contains only zeros (0), which can be easily compressed to 42 kilobytes, because the ZIP compression system can handle iterative data extremely well.
ZIP bomb has been used in the past to prevent antivirus software
ZIP bombs have been used for decades to prevent antivirus software, preventing them from scanning ZIP files by extracting files and viewing content inside.
Although anti-virus software is improved against ZIP bombs, many other software does not yet have this capability, one of which is web browsers or vulnerability scanners like Nikto, SQLMap, etc.
Technology expert Christian Haschek of Austria has put two PHP scripts to scan user-agent strings (the identification string when a browser sends a request to a web server) and sends ZIP bombs to vulnerability or browser scanners. The web tries to access private, protected sites (such as admin pages, backends, or pages with login forms).
These scripts will replace normal pages that hackers expect by ZIP bomb. Once their computers receive ZIP bombs, they will try to process the data and as a result their software will fail.
Most browsers and scanners crash (crash)
Below is the table given by Haschek for details about how the client will react if it encounters a ZIP bomb:
Client Results IE 11 Memory usage increases, IE Chrome errors Memory usage increases, displays error messages Edge Memory usage increases, loads very slowly and then loads forever Nikto Seems to still scan well but no return results about SQLmap Increasing memory usage until Safari fails Memory usage increases, errors, reloads, memory usage increases, then errors, . Chrome (Android) Memory usage increases, displays error messageTwo PHP file templates are needed to set up ZIP bomb for existing vulnerability scanners on Haschek's blog. This is a demo that you can access in your browser, but be careful because it can cause a computer error and lose the current browsing session. See the demo at: https://blog.haschek.at/tools/bomb.php
You should read it
- How to Password Protect a Website
- Anonymous attacked and distributed malicious code on the ISIS website
- What to do when detecting hackers attack websites?
- Many websites were hacked, changing content into gambling advertisements
- Anyone can create a small and simple website with these 10 websites
- Instructions for creating a website for beginners
- 6 leading website design companies in Vietnam
- 4 tools to help build a website for beginners
May be interested
- Hackers take advantage of the Katria disasterhackers have begun sending e-mail messages titled hot katrina disaster in the us to trick users into accessing dangerous websites.
- Download Bomb Error appears on many browsers, Edge does notbut microsoft edge and internet explorer are immune.
- What is left of the Earth if all the nuclear bombs in the world fire at the same time?let's try to find out if all 14,900 nuclear warheads on this planet are firing together, what will happen, is it the end of the world?
- Classify hackers and career opportunities for true hackersmust white hat hackers, black hat hackers, gray-hat hackers have to be all kinds of hackers in the world? let's find out the hacker classification in this article.
- Review the 'bad exploits' of bad Vietnamese hackersfrom the very beginning, vietnamese black hat hackers have shown their 'bravery' in the break-ins, taking account of bee ... and reviewing some of the 'achievements' of vietnamese hackers in 10 years. come here.
- Do you know who white hat hackers are and how their lives are?what do you understand about hackers? on the battlefield now aside from the black hat hacker there are white hat hackers silently protecting people. so what's the life of white hat hackers?
- [Infographic] Things to know about a hackerhave you ever considered a hacker to be a career? the infographic below will help you know if becoming a hacker is right for you.
- More than 1 million computers are infected by hackershackers design fake websites to scare internet users to download and install fake antivirus software.
- Microsoft has a group of 'elite' hackers that specialize in attacking Windows to keep the operating system safetheir mission is to attack to find security holes on windows, report to microsoft to research and release patches before the crook takes advantage of them for bad purposes.
- How to Use a VPNvpn or virtual private network is a way for individuals or businesses to protect personal data and identities. vpns are used to block ip addresses and redirect to other websites. vpns are great for blocking sites from tracking your data and browsing habits, or for viewing websites and services that aren't available in your area. vpns also increase security levels against government organizations or hackers, especially when using public wi-fi services. some vpns allow employees to access company resources while away from the office. there are many vpn services to choose from, both paid and free. using a vpn is as simple as installing the software on your computer, phone or tablet and starting it up.