prevent

Anatomy of Malicious PDF Documents, Part 2

What tools do you need to analyze a malicious PDF document? You could use Acrobat, but then you run the risk of infecting your machine when opening the PDF document with Acrobat. Author: DIDIER STEVENS Source: Hakin9 6/2009 https://hakin9.org WHAT YOU WILL LEARN……

DefenseWall HIPS

Quick Start. Installing DefenseWall HIPS is a very simple and straightforward process. I did not experience any problems at all while installing and configuring the program. Author: Don Iverson Source: Hakin9 6/2009 https://hakin9.org Conventional anti-malware programs rely heavily on regularly updating the program…

Print Your Shell

In every company network, which is based on Microsoft Windows, there are printers connected to print servers that have been shared over the network and thus can be used by many employees at the same time. This article shows how…

N-Stalker

It doesn’t take much investigation to conclude that Web Applications are one of the fastest growing aspects of the new Web 2.0 internet. As a result most organizations have at least one Web Application running which presents a very convenient…

Bootleggers and the Internet

The 1920′s and 1930′s in the United States were a very turbulent time. Prohibition was in place for 13 of those years preventing the consumption of alcohol. Author: MATTHEW JONKMAN Source: Hakin9 3/2009 https://hakin9.org This of course fueled a black market that produced,…

Analyzing Malware Packed Executables

In part one of analyzing malware I provided an overview of the process we are going to follow to analyze malware. If you followed the process, depending on the malware, you may have realized that malware developers have plenty of…

A New Era for Buffer Overflow

This article describes a few modern techniques for buffer overflow exploitation. There are just as many ways to prevent BOF with defensive mechanisms as there are ways to bypass those defenses. Author: JUSTIN SUNWOO KIM Source: Hakin9 3/2009 https://hakin9.org However, my purpose for…

Analyzing Malware

This article is an introduction to analyzing malware. I will take you through the basic steps you need to perform in order to understand what malware is doing to your systems. Author: JASON CARPENTER Source: Hakin9 2/2009 https://hakin9.org WHAT YOU WILL LEARN… Why…

Emerging Threats Episode 14

Crime happens every day on this grand old Internet we call home. Daily, hourly, minute by minute. I’d venture that there are easily several crimes a second involving a user giving up their sensitive information, buying a fake security program,…

HTTP Tunnel

Most of all companies only provide a very restrictive environment. While Network and Security Adminstrators do their job, securing the enterprise network from intruders, users are trying to compromise perimeter security to get more than is allowed. Surfing the www…

BPMTK

Security issues arise from the fact that a limited user has full control over his own processes on the Windows platform. Security mechanisms implemented in the user’s own processes can be bypassed. Author: DIDIER STEVENS Source: Hakin9 1/2009 https://hakin9.org WHAT YOU WILL LEARN……