Security

ZebraCON-01

ZebraCon 2013

Zebracon is not your traditional conference filled with vendor-centric presentations. Zebracon is a forum for sharing of information about key issues that most effectively impact security risk management and compliance trends. The conference will be held at Berjaya Times Square…

Hakin9_04_2013-1

Nmap Guide Revisited – Hakin9 Tutorials

Dear Readers, Welcome to this very special issue of Hakin9. For the second time we will be touching a very controversial subject – scanning with nmap. Last year we published an issue on nmap which made the whole Internet boil…

Hakin9_starter_kit_01_2013-1

Basic Articles on Hacking for Beginners – Free Download

Full version of the issue with 18 complete articles can be found here . EXPLOITING SOFTWARE A Quick Reference To Metasploit Framework By Abhinav Singh, the author of “Metasploit penetration testing cookbook,” a contributor of SecurityXploded community Metasploit is currently…

Google Code Playground XSS vulnerability

Two security researchers have identified an XSS in Google Code. Proof Of Concept: Just go to http://code.google.com/apis/ajax/playground/ and then click on edit HTML after that remove all the codes and type this script : “<img src=”<img src=search”/onerror=alert(“XSS”)//”>” and click on…

Brazilian banking Trojan disguised as Microsoft anti-virus software

A Trojan (identified as Trojan-Downloader.Win32.VB.aoff) is targeting Windows-based systems by removing built-in AV software and clearing a path for cybercriminals to silently steal online banking credentials. The Trojan affects ‘ntldr’ the default boot loader in Windows.The Trojan is propagating as…

Hakin9 Mobile Cover

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen…