- Version
- Download 247
- File Size 23.25 MB
- File Count 1
- Create Date August 23, 2014
- Last Updated April 19, 2022
MOBILE EXPLOITATION
-
- Data Mining as a Tool for Security
Jason Andress
Given the current state of heightened security across the globe today, the ability to sift through data and search for key information and the occurrence of particular patterns is highly desirable.
- Data Mining as a Tool for Security
-
- Movement on the Mobile Exploit Front
Tamin Hanna
It did not take an industry expert to verify predictions of an everincreasing amount of vulnerabilities in device software: Nokia’s Curse of Silence issue should have convinced even the most stubborn of do-gooders.
- Movement on the Mobile Exploit Front
-
- Assessing Microsoft Office Communication Server R1/R2 with OAT
Abhijeet Hatekar
The mantra of any good security engineer is: ‘Security is not a product, but a process.’ It’s more than designing strong cryptography into a system; it’s designing the entire system such that all security measures, including cryptography, work together. – Bruce Schneier
- Assessing Microsoft Office Communication Server R1/R2 with OAT
-
- Manipulating The Network with PacketFu
Keith Lee
PacketFu is a mid level packet manipulation library written in Ruby. The purpose of PacketFu was to make it easier for people for crafting and manipulating network packets in Ruby.
- Manipulating The Network with PacketFu
-
- Mobile Web: Privacy Keeping and Exploitation Methods
Mauro Gentile
Modern technology has produced a rapid spread of so-called mobile devices (i.e. mobile phones and handhelds) with which the use of the Internet and its services has become very easy and affordable.
- Mobile Web: Privacy Keeping and Exploitation Methods
-
- Intelligence Report: Analysis of a Spear Phishing Attack
Matthew Wollenweber, Adam Pridgen
A spear phishing attack occurs when an attacker sends targeted emails tailored to a specific user or organization. The execution of the attack can vary by the underlying goals of the attacker.
- Intelligence Report: Analysis of a Spear Phishing Attack
-
- Methods of Secrecy
Tamin Hanna
Keeping data secret has been important from the very moment knowledge was able to confer a benefit to others. Ancient Roman ruler Julius Caesar used an encryption scheme called a substitution cipher.
- Methods of Secrecy
-
- Exploiting NULL Pointer Dereferences
Marcin Jerzak, Tomasz Nowak
The landscape of kernel exploitation techniques is very wide and evolves all the time. The kernel developers apply more and more protection measures to cover all the attack vectors and (not only) bad guys are inventing new sorts of attacks, exploitation methods and ways to bypass the existing mechanisms. Almost like an arms race.
- Exploiting NULL Pointer Dereferences
-
- Bypassing Hardware Based Data Execution Prevention (DEP) on Windows 2003 Service Pack 2
David Kennedy
A short history on Data Execution Protection (DEP): it was created in order to prevent execution in memory in areas that aren’t executable. Before trying this, I highly suggest reading Skape and Skywing’s Article in UnInformed called Bypassing Windows Hardware-Enforced DEP.
- Bypassing Hardware Based Data Execution Prevention (DEP) on Windows 2003 Service Pack 2
-
- We’re losing to the bad guys. But it’ll change, and here’s how…
Matthew Jonkman
- We’re losing to the bad guys. But it’ll change, and here’s how…
-
- A Look at the Malware Trends Expected in 2010
Julian Evans
It’s now coming to the end of 2009, so it is now a good time to look at the malware from 2009 and look at the trends expected in 2010. This isn’t a conclusive article, but will highlight the most common threats to PCs and enterprise in 2009 and the potential emerging threats to come in 2010.
- A Look at the Malware Trends Expected in 2010
Attached Files
File | |
---|---|
Hakin9_02_2010_EN.pdf |
(1 views)
Subscribe
0 Comments
Newest