Magazine

Hakin9 07/2012: GreenSQL

Hakin9 07/2012: GreenSQL

IN BRIEF By Armando Romeo, eLearnSecurity and ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with…

cover backtrack

The Guide to Backtrack – Hakin9 on Demand

Please note that Hakin9 published the issue about the newest version of Backtrack 5 R3. The issue can be found here: https://hakin9.org/how-to-use-backtrack-and-nessus-for-vulnerability-management-hakin9-extra-012013/ Important: active…

hakin9 Extra

hakin9 Extra 6/2012

Timing Attacks on AES By Vincent Rijmen In this article, we explain two timing attacks on AES. Firstly, by way of introduction, we show…

cover_HES_BIBLE

Exploiting Software Bible

Shellcode: From a Simple Bug to OS Control By Amr Thaber Exploiting Format Strings with Python By Craig Wright DPA Exploitation and GOTs with…

Hakin9 06/2012: Biometrics

Hakin9 06/2012: Biometrics

Biometrics: Secure? Hackable? You Decide… By Gary S. Miliefsky The Biometric System used for security is similar to a door lock and a mechanical…

hakin9 Bible 1/2012

hakin9 Bible 1/2012

More than 200 pages of the best hakin9 content. Attention! This issue contains very detailed info on: Quantum Cryptography Exploiting Software Network Security Cloud…

Hakin9 Extra 5/2012

Hakin9 Extra 5/2012

Why Apple Doesn’t want Flash on its iOS by Keith DeBus Ever since the advent of the iPhone in June of 2007, Apple’s decision…

Exploiting Software 04/12

Exploiting Software 04/12

Cisco IOS Rootkits and Malware: A practical guide By Jason Nehrboss Propagating the worm code into a new router can either be quite easy,…