Revert "mkdocs.yml: Add syntax highlighting (#89)"

This reverts commit 7aebfc652c.
This commit is contained in:
Nishant Singh
2021-02-24 21:31:54 +05:30
committed by GitHub
parent 7aebfc652c
commit 94a2c9bbfd
11 changed files with 25 additions and 28 deletions

View File

@@ -42,7 +42,7 @@
- Fail securely
- Applications regularly fail to process transactions for many reasons. How they fail can determine if an application is secure or not.
```java
```
is_admin = true;
try {
@@ -113,7 +113,7 @@
- Ciphers are the cornerstone of cryptography. A cipher is a set of algorithms that performs encryption or decryption on a message. An encryption algorithm (E) takes a secret key (k) and a message (m) and produces a ciphertext (c). Similarly, a Decryption algorithm (D) takes a secret key (K) and the previous resulting Ciphertext (C). They are represented as follows:
```text
```
E(k,m) = c
D(k,c) = m
@@ -122,7 +122,7 @@ D(k,c) = m
- This also means that for it to be a cipher, it must satisfy the consistency equation as follows, making it possible to decrypt.
```text
```
D(k,E(k,m)) = m
```

View File

@@ -142,7 +142,7 @@ Let us see how we keep a check on the perimeter i.e the edges, the first layer o
- Nmap is often used to determine alive hosts in a network, open ports on those hosts, services running on those open ports, and version identification of that service on that port.
- More at http://scanme.nmap.org/
```bash
```
nmap [scan type] [options] [target specification]
```
@@ -417,7 +417,7 @@ TCP Flags
- Abuse of the normal operation or settings of these flags can be used by attackers to launch DoS attacks. This causes network servers or web servers to crash or hang.
```text
```
| SYN | FIN | PSH | RST | Validity|
|------|------|-------|------|---------|
| 1 |1 |0 |0 |Illegal Combination

View File

@@ -100,7 +100,7 @@ BGP Security
- A successful exploit will allow attackers to access, modify, or delete information in the database.
- It permits attackers to steal sensitive information stored within the backend databases of affected websites, which may include such things as user credentials, email addresses, personal information, and credit card numbers
```sql
```
SELECT USERNAME,PASSWORD from USERS where USERNAME='<username>' AND PASSWORD='<password>';
Here the username & password is the input provided by the user. Suppose an attacker gives the input as " OR '1'='1'" in both fields. Therefore the SQL query will look like: