FLASH MEMORY MOBILE FORENSIC

Please login or Register to access downloadables
Download
  • Version
  • Download 241
  • File Size 7.00 MB
  • File Count 1
  • Create Date August 23, 2014
  • Last Updated April 19, 2022

FLASH MEMORY MOBILE FORENSIC

    • Firewalls for Beginners
      Antonio Fanelli
      Firewalls are often overlooked, but are actually one of the best deterrents against unauthorized accesses. Learn how to build a low-cost firewall with iptables. Whenever people ask me how they can be sure no one can have unauthorized remote access to their PC, my first answer is: disconnect your PC!



    • Pwning Embedded ADSL Routers
      Aditya K Sood
      This paper sheds light on the hierarchical approach of pen testing and finding security related issues in the small embedded devices that are used for local area networks. The paper is restricted to not only testing but also discusses the kinds of software and firmware used and incessant vulnerabilities that should be scrutinized while setting up a local network.



    • Writing WIN32 shellcode with a C-compiler 
      Didier Stevens
      Shellcode is hard to write. That is why I worked out the method presented here to generate WIN32 shellcode with a C-compiler. To fully benefit from the content of this article, you should have some experience writing WIN32 programs in C/C++ and WIN32 shellcode, and understand the differences between both approaches.



    • Flash Memory Mobile Forensic
      Salvatore Fiorillo
      This paper is an introduction to flash memory forensic with a special focus on completeness of evidences acquired from mobile phones. Moving through academic papers and industrial documents will be introduced the particular nature of non-volatile memories present in nowadays mobile phones; how they really work and which challenges they pose to forensic investigators.



    • Threat Modeling Basics
      Timothy Kulp
      In the world of software, security is thrown into a system somewhere at the end of the project. For many developers adding security to a system is using a login with SSL/TLS; but sadly, these two are not the security silver bullet developers are led to believe.



    • ID fraud expert says…
      Julian Evans
      Identity Theft Protection Services – a new industry is born



    • Interview
      Hakin9 team
      Interview with Victor Julien, lead coder for the Open Information Security Foundation

Attached Files

File
hakin9_04_2010_EN.pdf
(1 views)
April 19, 2022
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Walcemar
9 years ago

Good

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023