+

Archive for / 'Articles'

March 1, 2008


Best Practices for Secure Shell

Secure Shell is a wonderful tool that no sysadmin could live without. Those of us who can remember back to the days of telnet and hubs can really appreciate SSH – no longer is it child’s play to sit outside your professor’s office and steal his password (hypothetically speaking, of course.) Author: RYAN W. MAPLE Source: Hakin9 […]

Read more

March 1, 2008


Pentest Labs Using Live CDs

For those individuals interested in learning how to perform penetration testing, they quickly realize there are many tools to learn, but almost no legal targets to practice against – until now. De-ICE.net has developed LiveCDs that simulate fully-functional servers that require ingenuity and a variety of different tools. Author: THOMAS WILHELM Source: Hakin9 3/2008 https://hakin9.org WHAT YOU WILL […]

Read more

February 1, 2008


The Justification for Authentication and Encryption

You will need to understand how to configure and compile Postgres from source code as many of the solutions requires that your Postgres server has the necessary libraries and capabilities installed that the typical Linux Distro may be lacking. Author: Robert Bernier Source: Hakin9 2/2008 https://hakin9.org What you will learn… Confronting the DBA with an unauthorized person […]

Read more

February 1, 2008


Programming with Libpcap – Sniffing the Network From Our Own Application

Since the first message was sent over the ARPANET in 1969, computer networks have changed a great deal. Back then, networks were small and problems were solved using simple diagnostic tools. As these networks got more complex, the need for management and troubleshooting increased. Author: Luis Martin Garcia Source: Hakin9 2/2008 https://hakin9.org What you will learn… The […]

Read more

February 1, 2008


Alternate Data Streams or “Doctor Jekyll and Mr. Hyde” Move to NTFS

Introduced in Windows NT, the NTFS file system brought about a new concept: multiple streams into a single file known as Alternate Data Streams – abbreviated as ADS in this article. Supporting multiple streams of data into a single file within the NTFS file system is known by very few specialists and may prove to […]

Read more

February 1, 2008


Storming SIP Security

VoIP is a hot and steadily gaining market share in the phone business. As people constantly seek to make long distance calls cheaper, they are moving away from relying on the traditional telephone companies and heading more towards Voice over IP (VoIP). Phone calls between two VoIP users are usually free and do not carry […]

Read more

February 1, 2008


One Time Password – New Dimensions in Security

There has been a sharp increase in e-commerce and online banking transactions in recent times. Remote access to the office network has resulted in ease and convenience of work. Due to this, there is increase in online network access usage. The flip side of this is the attempt by parties interested in stealing vulnerable passwords […]

Read more

February 1, 2008


CounterSpy v.2 from Sunbelt

Security is not a static wall to guard our selves from the other side. It is a continuous process of shielding, guarding and improvising the various areas of weaknesses and possible compromise. Unlike the olden days where the castles are only for the kings, security is required for every single individual. Author: Shyaam Sundhar Source: Hakin9 2/2008 […]

Read more

January 1, 2008


Secure Dual-Master Database Replication with MySQL

Due to the more common use of databases as a backend systems of web-applications, the overall importance MySQL increases. This freely available database is used for private web sites as well as small business applications. Such applications will often cross company boundaries. Author: Thomas Hackner Source: Hakin9 1/2008 https://hakin9.org What you will learn… How to configure SSL encrypted […]

Read more

January 1, 2008


Blind Attack Against the Path-MTU Discovery Mechanism

This article describes a blind attack against TCP’s Path-MTU Discovery mechanism that allows an off-path attacker to affect the performance of a TCP connection established between two remote end-points, sometimes to the extent of provoking a Denial of Service (DoS) on the attacked system. Author: Fernando Gont Source: Hakin9 1/2008 https://hakin9.org What you will learn… How the Path-MTU […]

Read more

January 1, 2008


Remote and Local File Inclusion Explained

I have always found RFI and LFI to be one of the most interesting concepts in terms of web exploitation. Although it may normally be interpreted as the most common, script kiddie-esque form of exploitation, I find this to be false. When the term script kiddie is used, most people generally think along the lines […]

Read more

January 1, 2008


Wireless Vulnerabilities and Cracking with the Aircrack Suite

Have you ever wondered just how vulnerable your wireless network was? Ever felt that maybe someone else has access to your wireless network? It is quite possible, and if you would like to know how they did it, read on! Author: Stephen Argent Source: Hakin9 1/2008 https://hakin9.org What you will learn… What WEP/WPA are How the Aircrack program […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa