Mobile Hacking

Download
File
Hakin9_EN_TBO_01_2015 (1).pdf

Dear Readers,

We would like to introduce a special The BEST OF issue made by Hakin9. This time will deal with Mobile Hacking.  Moreover, we added some articles on Digital Forensics.

Enjoy reading, Hakin9 Team

contact us at [email protected]

If you are not a subscriber and want to buy this magazine click here

Download Preview


TABLE OF CONTENTS

    • Digital Forensics With Kali Linux  by V.P.Prabhakaran

 

    • School Security: How to Build and Strengthen a School Safety Program by Paul Timm

 

    • Book Review by Aby Rao

 

    • Acunetix Web Vulnerability Scanner  by Michael Ortega

 

    • The BYOD Mobile Security Spectrum: A Functional Taxonomy for Risk  by Winn Schwartau

 

    • Location Dependent Attacks on Mobile Services by Nitin Goplani

 

    • How to Elevate to Domain Admin the easy way!  by Umair Vayani

 

    • Low Tech Hacking by Navneet Sharma

 

    • Security In Wireless Sensor Networks – Major Attacks, Encryption, Algorithms And Security Protocols 54 by Deivison Pinheiro Franco

 

    • Approaches For Computer Forensics In Virtualized Environments Live And Dead Analysis Techniques  by Deivison Pinheiro Franco

 

    • Forensics On Smartphones – A Technique For Apprehension, Acquisition, Examination and Analysis Of Evidences In Android Operating Systems by Deivison Pinheiro Franco

 

    • Web Application Level Approach against the HTTP Flood Attacks IOSEC HTTP Anti Flood/DoS Security Gateway Module  by Gökhan Muharremoğlu

 

    • How to Set Up Apache Web Server with Secure Configuration  by Davor Guttierrez

 

    • Web Servers Analysis Under DoS Attacks  by Predrag TaSevSki

 

    • Developers’ Challenge Results – ESC India 2012  by Jason Masters Global Product Manager

 

    • Learn and test yourself with Hack Defense  by Estera Godlewska

 

    • jhead  by Mervyn Heng

 

    • Mobile Phone Spying, Detection and Countermeasures by Akinfe Oluwafemi

 

    • SIM Card Hacking by Anupam Sharma

 

    • Windows Phone 8 Application Penetration Testing Essentials  by Wouter Veugelen

 

    • Mobile Network Traffic Analysis  by R. Milad Hosseni

 

    • Mobile Kids Safety What Do You Need To Know When Your Kid Is Using A Mobile Phone  by Dalibor Vlaho

 

    • When is a Tablet Safer Than PC?  by Farzad Ghafourian

 

    • Interview with Akinfe Oluwafemi  by Julia Adamczewska

 

    • Interview with Dalibor Vlaho by Julia Adamczewska

 

    • Mobile Device Security  by Prashant Verma and Sreenarayan

 

    • Virtualization Security  by Amar Wakharkar

 

    • Android Mobile Security  by Vinay Gayakwad

 

    • The Ultimate Hat Trick that Worked over the Last Couple of Thousand Years  by Zsolt Nemeth

 

    • Interview with Scott Gordon  by Aby Rao

 

    • Interview with Arun Sood  by Zsolt Nemeth and Jeffrey Smith

 

    • Android Forensics by Manish Chasta

 

    • Data Handling on iOS Devices  by Dominic Chell

 

    • An overview of Web Application Security Issues by Julian Evans

 

    • Movement on the Mobile Exploit Front  by Tam Hanna

 

    • Mobile Malware – the New Cyber Threat An analysis of the potential malware threat to mobiles  by Julian Evans

 

    • Mobile Web: Privacy Keeping and Exploitation Methods  by Mauro Gentile

 

    • Mobile Malware Analysis  by Cory Adams

 

    • Analysis of ZitMo (Zeus in the Mobile)  by Dhawal Desai

 

    • Android Security – ZITMO Malware  by Prashant Verma

 

    • Android Trojan Geinimi  by Dhawal Desai

 

    • Does your BlackBerry Smartphone have Ears?  by Yury Chemerkin

 

    • Tag: You’re infected! QR Codes as attack vectors  by Tim Kulp

 

    • Smartphones Security and Privacy  by Rebecca Wynn

 

    • Pen testing on Android Setting up a lab  by Thomas Cannon

 

    • Apple iOS Security in the Enterprise  by Oliver Karow

 

    • Lawful Interception on Mobile Telecom Service  by Ted Chao

 

    • When Developers API Simplify User-mode Rootkits Developing  by Yury Chemerkin

 

    • How To Develop In Android?  by Duygu Kahraman

 

    • Bluetooth Hacking Tools  by Dennis Browning

 

    • A Bits’ Life  by Tomasz Bolesław CEDRO and Marcin Armand Kuzia

 

    • Android Security  by Bhadreshsinh Gohil

 

    • Android Hacking Made Easy – What You Can Do To Limit Your Exposure  by John Lear

 

    • Weak Wi-Fi Security, Evil Hotspots and Pentesting with Android  by Daniel Dieterle

 

    • Build Secure Android Applications with ITTIA DB SQL  by Sasan Montaseri

 

    • Decompiling Android Workshop  by Godfrey Nolan

 

    • Android OS Getting Started with Customizing Your Own Rom  by Kellen Razzano and Ed Sweetman

 

    • How to Research an APK by Nathan Collie

 

    • AppUse Android Pentest Platform Unified Standalone Environment  by Erez Metula

 

    • How to Provide Strong Authentication for Your Users by Roman Yudkin

 

    • Quantum IQ How the Worlds Military’s Intend to Capitalize on the Future of Mobile and Neuroscience Technologies  by Jere Simpson

 

    • Mobile Antivirus Is a Myth  by Ken Westin

 

    • An interview with Omar Khan the Co-CEO of NQ Mobile  by Marek Majewski

If you are not a subscriber and want to buy this magazine click here


Download
File
Hakin9_EN_TBO_01_2015 (1).pdf

Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

4 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
pitoyalatortrix
5 years ago

Hola me gustaría un articulo sobre tools kali linux, para realizar un ataque a redes wifi

Kiu Chong
6 years ago

hi

Branyovagree
6 years ago

Post Comment

Samrai Network
6 years ago
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013