MOBILE EXPLOITATION

Please login or Register to access downloadables
Download
  • Version
  • Download 247
  • File Size 23.25 MB
  • File Count 1
  • Create Date August 23, 2014
  • Last Updated April 19, 2022

MOBILE EXPLOITATION

    • Data Mining as a Tool for Security
      Jason Andress
      Given the current state of heightened security across the globe today, the ability to sift through data and search for key information and the occurrence of particular patterns is highly desirable.

    • Movement on the Mobile Exploit Front
      Tamin Hanna
      It did not take an industry expert to verify predictions of an everincreasing amount of vulnerabilities in device software: Nokia’s Curse of Silence issue should have convinced even the most stubborn of do-gooders.

    • Assessing Microsoft Office Communication Server R1/R2 with OAT
      Abhijeet Hatekar
      The mantra of any good security engineer is: ‘Security is not a product, but a process.’ It’s more than designing strong cryptography into a system; it’s designing the entire system such that all security measures, including cryptography, work together. – Bruce Schneier

    • Manipulating The Network with PacketFu
      Keith Lee
      PacketFu is a mid level packet manipulation library written in Ruby. The purpose of PacketFu was to make it easier for people for crafting and manipulating network packets in Ruby.

    • Mobile Web: Privacy Keeping and Exploitation Methods
      Mauro Gentile
      Modern technology has produced a rapid spread of so-called mobile devices (i.e. mobile phones and handhelds) with which the use of the Internet and its services has become very easy and affordable.

    • Intelligence Report: Analysis of a Spear Phishing Attack
      Matthew Wollenweber, Adam Pridgen
      A spear phishing attack occurs when an attacker sends targeted emails tailored to a specific user or organization. The execution of the attack can vary by the underlying goals of the attacker.

    • Methods of Secrecy
      Tamin Hanna
      Keeping data secret has been important from the very moment knowledge was able to confer a benefit to others. Ancient Roman ruler Julius Caesar used an encryption scheme called a substitution cipher.

    • Exploiting NULL Pointer Dereferences
      Marcin Jerzak, Tomasz Nowak
      The landscape of kernel exploitation techniques is very wide and evolves all the time. The kernel developers apply more and more protection measures to cover all the attack vectors and (not only) bad guys are inventing new sorts of attacks, exploitation methods and ways to bypass the existing mechanisms. Almost like an arms race.

    • Bypassing Hardware Based Data Execution Prevention (DEP) on Windows 2003 Service Pack 2
      David Kennedy
      A short history on Data Execution Protection (DEP): it was created in order to prevent execution in memory in areas that aren’t executable. Before trying this, I highly suggest reading Skape and Skywing’s Article in UnInformed called Bypassing Windows Hardware-Enforced DEP.

    • We’re losing to the bad guys. But it’ll change, and here’s how…
      Matthew Jonkman

    • A Look at the Malware Trends Expected in 2010
      Julian Evans
      It’s now coming to the end of 2009, so it is now a good time to look at the malware from 2009 and look at the trends expected in 2010. This isn’t a conclusive article, but will highlight the most common threats to PCs and enterprise in 2009 and the potential emerging threats to come in 2010.

Attached Files

File
Hakin9_02_2010_EN.pdf
(1 views)
April 19, 2022
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023