
- Version
- Download 1006
- File Size 22.34 MB
- File Count 1
- Create Date July 2, 2014
- Last Updated August 20, 2021
THE BEST OF HAKIN9 IN 2014 – TEASER
Dear Readers,
We are glad to present our first THE BEST OF HAKIN9 in 2014. This time we wanted to sum up last 3 years of our work and thus, we prepared a special collection of 48 top Hakin9 articles. Inside you will find more than 400 pages of “how-to” and step-by-step” tutorials that will surely contribute to your development as a professional pentester, exploiter or ethical hacker.
TABLE OF CONTENTS:
Using Amazon AMI for Cracking the WPA2 WiFi Hack
by Bruno Rodrigues
VoIP Hacking Techniques
by Mirko Raimondi
A Crash Course in Pentesting with Backtrack
by Nick Hensley
Using Hydra To Crack The Door Open
by Nikolaos Mitropoulos
NMAP and Metasploit for MS-SQL Auditing
by Jose Ruiz
Nmap: a “Hacker Tool” for Security Professionals
by Justin Hutchens
How To Reverse Engineer .NET files
by Jaromir Horejsi
Digital Forensics on the Apple OSX Platform
by David Lister
Passwords Cracking: Theory and Practice
by Theodosis Mourouzis
How to Use OpenVAS (Vulnerability Assessment System)?
by Willie Pritchett
How Do I phish? Advanced Email Phishing Tactics
by Brandon McCann
How to Brute-force Drupal6 Login Pages?
by Kevin Simons
How to Conduct VPN Pivoting?
by Ayman Hammoudeh
Cracking WPA/WPA2 Key Using Reavar
by Badrish Dubey
How to use Socat and Wireshark for Practical SSL Protocol Reverse Engineering?
by Shane R. Spencer
How to Identify and Bypass Anti-reversing Techniques?
by Eoin Ward
Capturing WiFi traffic with Wireshark
by Steve Williams
Wireshark/LUA
by Jörg Kalsbach
Tracing ContikiOs Based IoT communications over Cooja simulations
with Wireshark Using Wireshark with Cooja simulator
by Pedro Moreno-Sanchez and Rogelio Martinez-Perez
Digital Security and Risk Analysis Side Channel Attack
with Brain Leading to Data and ID Theft
by Massimiliano Sembiante
Raspberry Pi Hacking Loving your pi and hacking it too…
by Jeremiah Brott
Bluetooth Hacking Tools
by Dennis Browning
Create a Basic Web Application Scan Policy
by Johan Loos
Create a Basic Scan Policy in Nessus 5
by Johan Loos
Cross-Site Scripting (XSS)
by Badrish Dubey
Implementing Rsylog to forward log messages on an IP network
by Lara Sanz
Weak Wi-Fi Security, Evil Hotspots and Pentesting with Android
by Dan Dieterle3
Pentesting with BackTrack distribution
by Jan Hrach, Miroslav Ludvik, Michal Srnec
Use Metasploit in Backtrack 5
by Johan Loos
Using REMnux to analyze PE files
by Glenn P. Edwards Jr
Recovering Passwords and Encrypted Data Remotely in Plain Text
by Daniel Dieterle
Trojan-izing USB Sticks
by Gerasimos Kassaras
Deceiving Networks Defenses with Nmap Camouflaged Scanning
by Roberto Saia
Cross Site Request Forgery – Session Riding
by Miroslav Ludvik and Michal Srnec
Data Logging with Syslog A Troubleshooting and Auditing Mechanism
by Abdy Martinez
Caffe Latte Attack
by David Jardin
Reverse Engineering C++, a case study with the Win32/Kelihos Malware Family
by Benjamin Vanheuverzwijn, Pierre-Marc Bureau
Cyber Warfare Network Attacks
by Daniel Dieterle
Understanding conditionals in shellcode
by Craig Wright
Creating a Fake Wi-Fi Hotspot to Capture Connected Users Information
by Roberto Saia
Accurate Time Synchronization with NTP Hardening your Cisco IOS Device
by Abdy Martinez
DNS Cache Poisoning
by Jesus Rivero
Beyond Automated Tools and Frameworks: the ShellCode Injection Process
by Craig Wright
Tabnapping Attack Hijacking Browser Tabs
by Abdy Martinez
Using the Social Engineering Toolkit to Test Network Security
by Daniel Dieterle
Starting to Write Your Own Linux Shellcode
by Craig Wright
How to Recover Passwords from a Memory Dump
by Daniel Dieterle
Tag: You’re Infected! QR Codes as Attack Vectors
by Tim Klup
Attached Files
File | |
---|---|
Hakin9_EN_TBO_01_2014_Teaser.pdf |
i like thakfull for the colaborations for me
It´s very cool your site and contribution. Thanks a lot.