Articles tagged with: hakin9
A Quick Reference To Metasploit Framework
By Abhinav Singh, the author of “Metasploit penetration testing cookbook,” a contributor of SecurityXploded community
Friday, 19 Apr, 2013
Metasploit is currently the most widely used and recommended penetration testing framework. The reason which makes metasploit so popular is the wide range of tasks that it can perform to ease the work of penetration testing. The article is a quick introduction to the framework and various terminologies related to it.
My First Hack, Basic Introduction To Metasploit Framework
By Guglielmo Scaiola, I.T. Pro since 1987, MCT, MCSA, MCSE, Security +, Lead Auditor ISO 27001, ITIL, eCPPT, CEI, CHFI, CEH
Press Release Secutech
International Exhibition and Conference for Electronic Security, Info Security, Fire and Safety
Taipei Nangang Exhibition Center
Taipei, Taiwan, 24 – 26 April 2013
Secutech 2013 attracts 510 exhibitors from 19 countries and regions
Diverse fringe programmes offer market and product information
Secutech 2013, which will be held from 24 – 26 April 2013 at Taipei Nangang Exhibition Center, Taiwan, is attracting 510 exhibitors from 19 countries and regions.
The show is an annual international event for the electronic security, info security and fire and safety industries organised by Messe Frankfurt New Era Business Media Ltd. It covers everything from components, finished products to integration
Wednesday, 7 Dec, 2011
by Joey Peloquin
The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen
Huge discounts on security books from Feisty Duck!
Feisty Duck is providing all readers of Hakin9 with a special discount for additional 20% off our current prices.
Latest News From IT Security World
By Armando Romeo, eLearnSecurity and ID Theft Protect
Duqu: The Precursor Stuxnet Attack
By Rebecca Wynn
Duqu is essentially the precursor to a future Stuxnet-like attack. The threat was written by the same authors, or those that have
Thursday, 24 Nov, 2011
DOWNLOAD FOR FREE!
Inside this issue you will find articles on anti-spam, email filtering and archiving. You will also get familiar with Roaring Penguin's producs, sources of company creation and its founder itself.
March of the Roaring Penguin
By Sophia Li
Founded about a
Monday, 14 Nov, 2011
Rootkits Hidden in Hardware of PC by Anibal Sacco
Let's think like an attacker for a second. There are multiple applications dedicated to find malicious code both in user and in kernel space. So new places have to be found to
Monday, 17 Oct, 2011
A study of a Botnet creation process and the impact of a DDoS attack against a web server
by Stavros N. Shaeles and Ioannis D. Psaroudakis
Over the following paragraphs we are going to describe in steps, the procedure of setting up
Wednesday, 28 Sep, 2011
By Schuyler Dorsey, eLearnSecurity i ID Theft Protect
As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself.
Hacking Tools on iOS
By Alexandre Lacan
Sunday, 25 Sep, 2011
By Park Foreman
Publisher: CRC Press
50% DISCOUNT for Hakin9 SUBSCRIBERS!!!
To save 50% enter given below discount code, during checkout at www.crcpress.com
As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of
Thursday, 22 Sep, 2011
By Israel Torres, a hacker at large with interests in the hacking realm and an author of crypto challenge: http://hakin9.israeltorres.org
Tools when understood are quite helpful in saving time. This tutorial goes over using a few homebrew tools to
Thursday, 15 Sep, 2011