Articles

Pentest Labs Using Live CDs

For those individuals interested in learning how to perform penetration testing, they quickly realize there are many tools to learn, but almost no legal targets to practice against – until now. De-ICE.net has developed LiveCDs that simulate fully-functional servers that…

FastProxySwitch

FastProxySwitch is a well-designed, small-footprint utility that allows for rapid manual or automatic switching of proxy settings to adapt to the requirements of different networks. Author: Mike Shafer Source: Hakin9 https://hakin9.org As notebooks have become the ubiquitous tool of professionals who often find…

Elcomsoft

Quick start: Suppose you find out that your administrator passwords for your system or even your server have been changed by a malicious attacker. What options do you have to recover control of your system? One option would be to…

Axence

The feature set of nVision includes network discovery, network visualization through mapping, real-time monitoring of the network structure, individual host monitoring, interoperability, report generation and administration notifications. Author: John Vaughan Source: Hakin9 https://hakin9.org Quick Start The installation of nVision is simple and straight…

Remote Assessment Aanval 3

Quick Start. Installation is quick and straightforward with a webbased wizard checking to ensure the required dependencies (PHP, Perl and MySQL) are installed and then prompting for the MySQL server to use. A few short steps later and you’re greeted…

Jasob 3.5

Jasob JavaScript and CSS obfuscator is a small software solution to protect JavaScript or CSS code that gets put online. Jasob takes code entered and makes it impossible to modify and in some cases even read. Author: Brandon Dixon Source: Hakin9 https://hakin9.org…

AppliCure dotDefender and dotDefender Monitor

Applicure’s freeware tool dotDefender Monitor was highlighted in the latest SANS Top 20 Internet Security Risks as a tool to detect the latest emerging threat of vulnerabilities in web applications. Together with Applicure dotDefender it monitors and protects against internal…

Analyzing Malware Introduction to Advanced Topics (Part 3)

In this final article in our three part series on analyzing malware we will discuss more advanced topics. The topics we are going to include are: polymorphic code, metamorphic code, and alternative data stream. Author: JASON CARPENTER Source: https://hakin9.org WHAT YOU WILL…

Analyzing Malware Packed Executables (Part 2)

In part one of analyzing malware I provided an overview of the process we are going to follow to analyze malware. If you followed the process, depending on the malware, you may have realized that malware developers have plenty of…

Analyzing Malware (Part 1)

This article is an introduction to analyzing malware. I will take you through the basic steps you need to perform in order to understand what malware is doing to your systems. Author: JASON CARPENTER Source: Hakin9 https://hakin9.org WHAT YOU WILL LEARN… Why analyzing…

VoIPER: VoIP Exploit Research Toolkit

With VoIP devices finding their way into the majority of major enterprises and a significant number of residential installations, the possible consequences of a security vulnerability that can be leveraged by malicious hackers are ever increasing. Author: NNP Source: Hakin9 https://hakin9.org  WHAT YOU…

Exploitation and Defense of Flash Applications

Adobe’s Flash technology has become increasingly popular not only to create animations and advertisements, but also to develop complex Internet applications. Flash applications (SWF files) are distributed over web protocols and have the potential to read local or remote files,…