FLASH MEMORY MOBILE FORENSIC

Download
File
hakin9_04_2010_EN.pdf
    • Firewalls for Beginners
      Antonio Fanelli
      Firewalls are often overlooked, but are actually one of the best deterrents against unauthorized accesses. Learn how to build a low-cost firewall with iptables. Whenever people ask me how they can be sure no one can have unauthorized remote access to their PC, my first answer is: disconnect your PC!



    • Pwning Embedded ADSL Routers
      Aditya K Sood
      This paper sheds light on the hierarchical approach of pen testing and finding security related issues in the small embedded devices that are used for local area networks. The paper is restricted to not only testing but also discusses the kinds of software and firmware used and incessant vulnerabilities that should be scrutinized while setting up a local network.



    • Writing WIN32 shellcode with a C-compiler 
      Didier Stevens
      Shellcode is hard to write. That is why I worked out the method presented here to generate WIN32 shellcode with a C-compiler. To fully benefit from the content of this article, you should have some experience writing WIN32 programs in C/C++ and WIN32 shellcode, and understand the differences between both approaches.



    • Flash Memory Mobile Forensic
      Salvatore Fiorillo
      This paper is an introduction to flash memory forensic with a special focus on completeness of evidences acquired from mobile phones. Moving through academic papers and industrial documents will be introduced the particular nature of non-volatile memories present in nowadays mobile phones; how they really work and which challenges they pose to forensic investigators.



    • Threat Modeling Basics
      Timothy Kulp
      In the world of software, security is thrown into a system somewhere at the end of the project. For many developers adding security to a system is using a login with SSL/TLS; but sadly, these two are not the security silver bullet developers are led to believe.



    • ID fraud expert says…
      Julian Evans
      Identity Theft Protection Services – a new industry is born



    • Interview
      Hakin9 team
      Interview with Victor Julien, lead coder for the Open Information Security Foundation


Download
File
hakin9_04_2010_EN.pdf

April 19, 2022
Subscribe
Notify of
guest
1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Walcemar
9 years ago

Good

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.