Articles tagged with: hakin 5/2005
A shellcode is an essential part of any exploit. During attack, it is injected into the target application and performs the desired actions within it. However, the basic rules for building shellcodes are not too widely known, even though they don't require advanced skills.
What you will learn...
What you should know...
- how to write a working shellcode,
- how modify and compact it.
- you should be familiar with the Linux operating system,
- the basics of programming in C and assembler.
A shellcode (sometimes also called a bytecode) is a sequence of commands in machine code, constituting a vital element of all buffer overflow
SQL Injection attacks target the core of a web application: its database. Their most significant impact enables an attacker to retrieve, modify, or delete arbitrary data. It is a serious threat to any application with a database back-end and a threat that should be fully understood in order to develop adequate countermeasures.
What you will learn...
- how to conduct attacks on the syntax of the SQL query,
- how the SQL language syntax attacks are performed,
- you will learn attacks on the SQL logic,
- you will learn some additional SQL Injection tricks,
- you will learn general rules of defence against SQL Injection attacks.
Java has taken control of the programming world. It runs on servers, appears as browser applets, increasingly takes over mobile phones – it's even made its way into smartcards. It is usually seen as a highly secure operating environment, but
One of the most common and efficient DDoS attack methods is based on using hundreds of zombie hosts. Zombies are usually controlled and managed via IRC networks, using socalled botnets. Let's take a look at the ways an attacker can
Visiting online banking services and other secured sites is becoming increasingly dangerous. Entering your credit card number on a website which looks deceptively similar to that of your bank might end with a considerable sum disappearing from your account. Unfortunately,
Firestarter is a graphical tool for simplifying the process of managing, analysing, supervising and configuring a firewall based on netfilter/iptables. It uses the GTK2 library.
As an administrator of a Linux server, containing confidential data
If you happen to lose important files on your Linux system – for example after a break-in – do not despair. Though it often requires a lot of time, with the help of a good toolkit you can potentially recover