+

Archive for / 'Articles'

August 1, 2010


Hacking Trust Relationships – Part II

This is the second article in a series of six that covers the topic of hacking trust relationships. This article focuses specifically on Vulnerability Identification against a target system, in order to identify and exploit potential trust relationships. Author: THOMAS WILHELM Source: Hakin9 8/2010 https://hakin9.org What you will learn… How to recognize trust relationships that can […]

Read more

August 1, 2010


Botnet: The Six Laws And Immerging Command & Control Vectors

New BotNet communication vectors are emerging. The industry is not prepared. For the next 20 years, BotNets will be what viruses were for the last 20. Author: RICHARD C. BATKA Source: Hakin9 8/2010 https://hakin9.org What you will learn… BotNet design elements New BotNet communication vectors (advanced) Programs that can tell you if you are a part […]

Read more

August 1, 2010


USB Stick Security Issue Exemplarily Show with Verbatim Store n Go

Carrying around data is an everyday task for most people in IT or just using acomputer. USB Sticks have been around for quite some time and proved to be a good way of accomplishing that. Author: FLORIAN EICHELBERGER Source: Hakin9 9/2010 https://hakin9.org The advantage of being able to store GB’s of data to a physically small […]

Read more

August 1, 2010


Detecting Debuggers

Know your enemy. The more you know about your enemy, the more effectively you can fight him and protect from him. But this rule works in both directions. Not only do security specialists try to know about malicious code but also bad guys try to protect and hide from them. Author: MICHAEL R. HEINZL Source: […]

Read more

August 1, 2010


Eavesdropping on VoIP

This information could be used in a penetration-testing scenario. This is how I would approach an unsecured VOIP implementation. This test was conducted on 30 phones and the laptop used was able to handle the load since the voice codec used by the phone system was G711@8hz. Author: Marc-Andre Meloche Source: Hakin9 9/2010 https://hakin9.org Every company […]

Read more

August 1, 2010


Behavioral Analysis of Unwise_.exe Malware!

This paper talks about the analysis of a suspicious executable named unwise_exe. The binary exhibits how diversified functional characteristics can transform a victim’s machine into a slave. Author: ADITYA K SOOD Source: Hakin9 9/2010 https://hakin9.org This malware can undertake a lot of network based activities and communicate with the remote servers. The impact is devastative as […]

Read more

August 1, 2010


Mobile Malware – the new cyber threat – An analysis of the potential malware threat to mobiles

Mobile phone malware first appeared in June 2004 and it was called Cabir. The mobile-phone features at most risk are text messaging (using social engineering), contacts list, video and buffer overflows. GSM, GPS, Bluetooth, MMS and SMS will indeed be some of the attack vector to expect this year and beyond. Author: JULIAN EVANS Source: […]

Read more

August 1, 2010


Class on Demand Review

Traditional IT training has always been in the classroom where you spend a week or two with strangers and just follow the instructor through the coursebook, but in recent years more and more courses are becoming available via online learning platforms. Author: Michael Munt Source: Hakin9 8/2010 https://hakin9.org Class on Demand is one such company providing […]

Read more

August 1, 2010


Is Anti-virus Dead – The answer is YES. Here’s why…

There have been billions of dollars in damages caused by exploiters on the Internet. These exploiters are intelligent cyber terrorists, criminals and hackers who have a plethora of tools available in their war chest – ranging from spyware, rootkits, trojans, viruses, worms, zombies and botnets to various other blended threats. From old viruses to these […]

Read more

August 1, 2010


Armoring Malware: Hiding Data within Data

We are receiving malware daily via hundreds of facets that the Internet enables with various services; most common are via e-mail and web surfing. Author: ISRAEL TORRES Source: Hakin9 8/2010 https://hakin9.org What you will learn… You will learn how to armor your malware against simple attacks to build further. What you should know… Basic understanding of […]

Read more

August 1, 2010


Defeating Layer-2

ARP Poisoning and other Layer 2 attacks are present since many decades now and one may think that they are absolute. However, we still see them quite often on the network. The biggest advantage is easy access to sensitive information like passwords, credit card details, phone conversations etc. Author: ABHIJEET HATEKAR Source: Hakin9 8/2010 https://hakin9.org What […]

Read more

August 1, 2010


Web Malwares – Part 2

A three part series about the study of the ever increasing threat of Malwares that uses the Web to propagate. Author: RICHARD C. BATKA Source: Hakin9 8/2010 https://hakin9.org What you will learn… Tricks used by Malware authors to use the Web as a very successful mode for Malware propagation. What you should know… Basics about Malwares, […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa