HAKIN9 EXTRA 1/2011 – EXPLOITING SOFTWARE

Download
File
Hakin9_EXTRA_01_2011.pdf
    • Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow
      by Chris Hadnagy
      Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure to malicious attacks. Obtaining code execution is the easiest and most direct way to reach this goal. Social Engineering professionals are no different.



    • From Fuzz To Sploit
      by Israel Torres
      By now everyone has heard of buffer overflows and a lot have been hearing about it for the last 15+ years. Through this time period there have been many techniques evolved both to combat vulnerabilities as well as persist attack and exploitation. As security is most often most thought of as an afterthought it is of no surprise that systems of all flavors (and their users of all sizes) can still be dropped to its knees by such a fundamental attack.



    • Exploit Kits – Cybercrime Made Easy
      by Rebecca Wynn
      The playing field for cybercrime has changed. It has become wide open. Many of the top attack exploit toolkits are now free! Symantec released its 2010 Symantec Internet Security Threat Report the first week in April 2011. Their executive summary states that Symantec recorded over 3 billion malware attacks in 2010 and yet one stands out more than the rest – Stuxnet.



    • Software Exploitation: Development Flaw or Malicious Intent
      by Rich Hoggan
      It’s been said that lazy programmers make good programmers. Yet, it’s hard to understand why laziness would be considered one of the virtues of a good programmer let alone a virtue at all. By this point – however – I’m sure you’re probably already asking why I’m bringing up laziness in relation to programming.



    • Exploiting Software: The Top 25 Software Vulnerabilities and How to Avoid Them
      by Gary Miliefsky
      Top 25 Most Dangerous Software Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.



    • Why Is Password Protection a Fallacy – a Point of View?
      by Yury Chemerkin
      Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it – never write it down. And, oh yes, change it every few months. These instructions are supposed to protect us. But they don’t. A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The use of passwords is known to be ancient…


Download
File
Hakin9_EXTRA_01_2011.pdf

(1 views)
April 19, 2022
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.