Secure Socket Layer Sec B
Secure Socket Layer Sec B
.
Handshake Protocol:
Handshake Protocol is used to establish sessions. This protocol allows the
client and server to authenticate each other by sending a series of messages to
each other. Handshake protocol uses four phases to complete its cycle.
Phase-1: In Phase-1 both Client and Server send hello-packets to each
other. In this IP session, cipher suite and protocol version are exchanged
for security purposes.
Phase-2: Server sends his certificate and Server-key-exchange. The
server end phase-2 by sending the Server-hello-end packet.
Phase-3: In this phase, Client replies to the server by sending his
certificate and Client-exchange-key.
Phase-4: In Phase-4 Change-cipher suite occurs and after this the
Handshake Protocol ends.
Alert Protocol:
This protocol is used to convey SSL-related alerts to the peer entity.
Each message in this protocol contains 2 bytes.
The
level is further classified into two parts:
FTP details
File transfer protocol (FTP) is an Internet tool provided by
TCP/IP. The first feature of FTP is developed by Abhay Bhushan
in 1971. It helps to transfer files from one computer to another by
providing access to directories or folders on remote computers and
allows software, data, text file to be transferred between different
kinds of computers. The end-user in the connection is known as
localhost and the server which provides data is known as the
remote host.
The goals of FTP are:
It encourages the direct use of remote computers.
It shields users from system variations (operating system,
directory structures, file structures, etc.)
It promotes sharing of files and other types of data.
Why FTP?
FTP Clients
Anonymous FTP
Some sites can enable anonymous FTP whose files are available
for public access. So, the user can access those files without any
username or password. Instead, the username is set to
anonymous and the password to the guest by default. Here, the
access of the user is very limited. For example, the user can copy
the files but not allowed to navigate through directories.
FTP Commands
Sr.
Command Meaning
no.
Applications of FTP
Disadvantages
Other Operators
Apart from the above-mentioned operator, there are also some
logical operators which can be used to filter the search engine
results according to the need. You will definitely get the stuff on
seeing these operators. Here are these:
OR: This self-explanatory operator searches for a given search
term OR an equivalent term.
site:geeksforgeeks.org | site:www.geeksforgeeks.org
Search Term: This operator only looks for the precise phrase
within speech marks.
"GeeksForGeeks POTD"
Glob Pattern (*): This works best when you don’t know what
goes on in the place of the asterisk(*).
site: *.geeksforgeeks.org
This is all about the operators which can be used apart from the
dorks which doing a google search.
While Google Dorking can be used for legitimate purposes such as
researching a website’s security vulnerabilities, hackers use this
technique maliciously to find sensitive information such as
usernames, passwords, and other potential information. As a
result, it is important for website owners to secure their websites
and avoid exposing sensitive information in publicly accessible
directories.
In addition, internet users should also be careful about the
information they share online and use strong, unique passwords
for each of their online accounts to avoid falling victim to a cyber
attack.
Overall, Google Dorking is a powerful technique that can be used
for both good and bad purposes. Website owners and internet
users should be aware of its potential risks and take steps to
protect themselves from any potential security breaches.