Articles

How to use Netcat – MOHSEN MOSTAFA JOKAR

Netcat is a network utillity for reading and writing network connections that support TCP and UDP protocol. Netcat is a Trojan that opens TCP or UDP ports on a target system and hackers use it with telnet to gain shell…

Cyber State-Bullying

We know offensive cyber tools can be effective, and we’re all unprepared, and all building the capabilities to attack and defend. Will we actually go through with a full-scale conflict, or will we just use these to intimidate each other…

A Brief Analysis of the Cyber Security Threat

A definition of cyber security Cyber security can be broadly described as protecting personal/business or government digital assets from cyber attack from individuals, organised criminals or foreign governments. Cyber security encompasses three threat vectors; cyber warfare; cyber terrorism and cyber…

Search Engine Security and Privacy – Part II

It is always surprising to see how much information is available to anyone with an Internet connection and little tenacity. Author: REBECCA WYNN Source: Hakin9 11/2010 https://hakin9.org What you will learn… Search Engine Wars update How to protect your identity and privacy What…

TDSS botnet – full disclosure. Part II

After breaking into the world’s biggest botnet, which was covered in the previous issue of Hakin9, we performed thorough analysis of the botnet’s undercover logic. Authors: ANDREY RASSOKHIN, DMITRY OLEKSYUK Source: Hakin9 11/2010 https://hakin9.org What you will learn… How to pwn a botnet, starting…

Knowing VoIP Part II – Getting deeper to the settings

Last chapter we had previous talked about what is VoIP, advantages, disadvantages,etc. But this time I will take you inside to the process when people place/receive a call. Author: WINSTON SANTOS Source: Hakin9 11/2010 https://hakin9.org What you will learn… Config File Inserting settings…