Archive for / 'Magazine'

May 2, 2012

Hakin9 05/2012: Cloud Computing

IN BRIEF By Armando Romeo, eLearnSecurity and ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Cloud Security by Gurav Shah There are a number of security issues/concerns associated with cloud computing but these issues […]

Read more

April 23, 2012

Exploiting Software 04/12

Cisco IOS Rootkits and Malware: A practical guide By Jason Nehrboss Propagating the worm code into a new router can either be quite easy, difficult, or impossible. There are many variations of supported IOS code and hardware platforms. The author discusses the use of and demonstrates an IOS Embedded Event Manager rootkit and worm. When […]

Read more

April 16, 2012

Hakin9 Extra 4/12

An Overview on Cloud Forensics By Federico Filacchione There’s not a single law. Preserving the chain of custody means that you’ve to comply with specific laws, regarding a specific country. But in a cloud perspective there’s no single country. A huge network of data centers means a huge network of jurisdictions. So could be very […]

Read more

April 9, 2012

Hakin9 SQL Injection 1/12 (1)

SQL Injection Testing for Business Purposes by Michael Thumann, Frank Block, Timo Schmid SQL injection attacks have been well known for a long time and many people think that developers should have fixed these issues years ago, but having conducted web application pentests over a long period, we have a slightly different view. Many SQL […]

Read more

April 2, 2012

Hakin9 04/2012: Cyber Warfare

What is Cyber War? by Keith DeBus In just a brief fifteen years, our communication, commercial and social lives have been dramatically altered by the development and growth of the Internet. With the convenience and bounty of this medium, has also come a dark side. Just as the famous bank robber, Willy Sutton, once said […]

Read more

March 20, 2012

Security Onion – Exploiting Software 03/2012

Understanding conditionals in shellcode By Craig Wright This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process. In this article, we are looking at extending our knowledge of assembly and shellcoding. This is a precursor […]

Read more

March 15, 2012

Hakin9 Extra 3/12

Do It Yourself Data Recovery By Frank Meincke In this article we will cover the basics of what failures one may experience with their hard drives and data, the start-up procedure for the hard drives to better determine what type of failure was experienced, some simple fixes one may do to gain access to their […]

Read more

March 7, 2012

Hakin9 Mobile 03/2012

Mobile Device Security by Prashant Verma A lot of speculations these days are on the mobile devices and the security features they provide. The mobile phone and tablet usage has picked up on account of the numerous benefits, not to mention the comfort at fingertips and that too on the move. The number of free […]

Read more

March 1, 2012

Hakin9 3/2012: DNS Cache Poisoning

DNS Cache Poisoning by Jesus Rivero Computers that are able to communicate with each other, do so by means of a network protocol, generally TCP over IP, or just TCP/IP. The IP protocol establishes that every node in the network must have, at least, one IP address for other machines to know where to send […]

Read more

February 20, 2012

Hardening of Java Applications Against AOP – Exploiting Software 02/12

Beyond Automated Tools and Frameworks: the shellcode injection process By Craig Wright Automated frameworks (including Metasploit) have simplified the testing and exploitation process. This of course comes with a price. Many penetration testers have become tool jockeys with little understanding of just how software functions. This script kiddie approach to code testing does have its […]

Read more

February 15, 2012

Hakin9 Extra 02/12

Honey Pots – the Sitting Duck on the Network By Jeremiah Brott The purpose of this article is to provide details on what honey pots are, the characteristics of the two types down to the mechanics of how each one works. It will also analyze the benefits and pitfalls to explore multiple uses of a […]

Read more

February 8, 2012

Hakin9 Mobile 2/2012

Data Handling on iOS Devices   With over half a million apps in the App Store, Apple’s trademark slogan “There’s an app for that” is bordering on reality. We use these apps for online banking, social networking and e-mail without really knowing if they’re communicating and storing our personal data securely. With Apple controlling over […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa