penetration

Eavesdropping on VoIP

This information could be used in a penetration-testing scenario. This is how I would approach an unsecured VOIP implementation. This test was conducted on…

Hacking Trust Relationships

This article is the first in a series of six, which covers the topic of hacking trust relationships. This first article focuses specifically on…

Eavesdropping on VoIP

This information could be used in a penetration-testing scenario. This is how I would approach an unsecured VOIP implementation. This test was conducted on…

Pentest Labs Using Live CDs

For those individuals interested in learning how to perform penetration testing, they quickly realize there are many tools to learn, but almost no legal…

IPsec Policies

Switch Overview. The Data Link Layer, or Layer 2 of the OSI model is the protocol layer that provides the functional needs for data…

Hacking Through Wild Cards

This paper sheds light on the usage of wild characters that lead to hacking. The wild characters are used effectively in a different sphere….

Ettercap

Ettercap is a multipurpose sniffer, ARP spoofer, and is used for Man in the Middle attacks and much more. Authors:¬†Marco Figueroa and Anthony L….