Magazine

cover_HOD_04

Hakin9 OnDemand Network Security 4/12(4)

1. Perimeter Protection By Dusko Pijetlovic. With over half a million apps in the App Store, Apple’s trademark slogan “There’s an app for that” is bordering on reality. We use these apps for online banking, social networking and e-mail without…

Hakin9 07/2012: GreenSQL

Hakin9 07/2012: GreenSQL

IN BRIEF By Armando Romeo, eLearnSecurity and ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. There’s Nothing But Data…

cover backtrack

The Guide to Backtrack – Hakin9 on Demand

Please note that Hakin9 published the issue about the newest version of Backtrack 5 R3. The issue can be found here: https://hakin9.org/how-to-use-backtrack-and-nessus-for-vulnerability-management-hakin9-extra-012013/ Important: active subscribers – to download this issue click at the cover of the magazine on the main…

hakin9 Extra

hakin9 Extra 6/2012

Timing Attacks on AES By Vincent Rijmen In this article, we explain two timing attacks on AES. Firstly, by way of introduction, we show how a naive implementation of the finite field operations used in the MixColumns step of AES…

cover_HES_BIBLE

Exploiting Software Bible

Shellcode: From a Simple Bug to OS Control By Amr Thaber Exploiting Format Strings with Python By Craig Wright DPA Exploitation and GOTs with Python By Craig Wright Starting to Write Your Own Linux Schellcode By Craig Wright Beyond Automated…

Hakin9 06/2012: Biometrics

Hakin9 06/2012: Biometrics

Biometrics: Secure? Hackable? You Decide… By Gary S. Miliefsky The Biometric System used for security is similar to a door lock and a mechanical key. With the right key, you can unlock and open the door. By providing your unique…

hakin9 Bible 1/2012

hakin9 Bible 1/2012

More than 200 pages of the best hakin9 content. Attention! This issue contains very detailed info on: Quantum Cryptography Exploiting Software Network Security Cloud Forensics Data Recovery Forensics Rootkit Botnet Now available for hakin9 subscribers!

Buffer Overflow - Exploiting Software 05/2012

Buffer Overflow – Exploiting Software 05/2012

Extending Control, API Hooking By Craig Wright API hooking the malicious code is used to vary the library function calls and returns by replacing the valid function calls with one of the attackers choosing. The article follows from previous articles…

Hakin9 Extra 5/2012

Hakin9 Extra 5/2012

Why Apple Doesn’t want Flash on its iOS by Keith DeBus Ever since the advent of the iPhone in June of 2007, Apple’s decision to forego Adobe’s ubiquitous Flash software has raised eyebrows and more than a few hackles. Then,…

hak1

Hakin9 On Demand – Trojan-izing USB Sticks

1. Secure memory stick by Amit Mishra Secure USB flash drives protect the data stored on them from access by unauthorized users. USB flash drive products have been on the market since 2000, and their use is increasing exponentially. As both consumers and…

Hakin9 5/2012: Cloud Computing

Hakin9 05/2012: Cloud Computing

IN BRIEF By Armando Romeo, eLearnSecurity and ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Cloud Security by Gurav…

Exploiting Software 04/12

Exploiting Software 04/12

Cisco IOS Rootkits and Malware: A practical guide By Jason Nehrboss Propagating the worm code into a new router can either be quite easy, difficult, or impossible. There are many variations of supported IOS code and hardware platforms. The author…