Articles

Simple WiFi Hacking with Eee Pc

In this article we’ll see a simple and efficient method to retrieve a WEP key from a wireless network. The interesting part is that we’ll obtain this key using an Eee Pc, the low cost netbook by Asus. After this…

Client-side Exploits

Client-side exploit are some of the most commonly seen exploits and this is mainly due to the fact that traditional perimeter security (firewalls, router access lists) offer little or no protection against these kinds of exploits. This is due to…

Registry Analysis

A considerable amount of forensic analysis of Windows systems today continues to center around file system analysis; locating files in the active file system, or carving complete or partial files from unallocated space within the disk image. However, a great…

Spam Fighter Professional v6.3.21

If you have been using any spam protection software such as McAfee or Norton you will need to completely uninstall that software before you install Spam Fighter. You should be able to get the McAfee removal tool and/or the Norton…

Ad-Aware 2008 Plus

When I was a Help Desk supervisor, our tech support staff typically used a combination of two Anti-Spyware programs to clean Spyware infected PCs and Ad-Aware was always one of them. It gained a reputation with us as being a…

Kernel Hacking & Anti-forensics: Evading MemoryAnalysis

This article is intended to explain, why a forensic analysis in a live system may not be recommended and why the image of that system can trigger an advanced anti-forensic-capable rootkit. Authors: RODRIGO RUBIRA, BRANCO (BSDAEMON), FILIPE ALCARDE BALESTRA Source: Hakin9 5/2008 https://hakin9.org…

VoIPER

With VoIP devices finding their way into the majority of major enterprises and a significant number of residential installations, the possible consequences of a security vulnerability that can be leveraged by malicious hackers are ever increasing. Author: TERRON WILLIAMS Source: Hakin9 5/2008 https://hakin9.org…

Threats are in the Air!

Di-Dan! Di-Dan! Di-Dan! Aaaargh…it’s 7am again. STFU, Treo; STFU, Binary Clock… – a normal day in the life of the author of this article begins with this age-old ritual. PDA’s and smart phones have become ambiguous; containing hundreds of megabytes…

Diskeeper 2008 Pro Premier

Diskeeper is a small utility that silently runs in the background cleaning the file system and optimizing computer performance all the while remaining unnoticeable to the user. Author: Brandon Dixon Source: Hakin9 5/2008 https://hakin9.org   Overview Often times you begin to notice that…

Cybercrime from Technologically Emergent Countries

Many parts of the world are just beginning to gain access to reliable broadband Internet and affordable computers. With access of course come the possibilities not only to learn and communicate, but also to make an income, legal and illegal….

Vulnerabilities due to Type Conversion of Integers

This is the second part of the article on Vulnerabilities due to Type Conversion of Integers. Part I explained how and when type conversions happen in the C language and provided examples of situations where they lead to vulnerabilities. Author:…