This month’s issue supplies you with the articles that are yet to be published in the forthcoming magazines. We would like to draw your attention to the best quality content of these publications and grant you with a couple of articles representing all the topics covered in February.
Hakin9 Extra with its Backtrack 5 r3 Guide can surely be regarded as this month’s hit. You can seize the opportunity of reading two articles about Backtrack by Alex Kah (Backtrack Linux – How to Ditch the Menu and Ball from the Command Line?) and Kevin Simons (How to Brute-force Drupal6 Login Pages?). The complete issue on Backtrack will be published this week.
Next week’s publication will be devoted to yet another facet of Cyber Security in the articles of William F. Slater, III. You surely noted that this year’s Hakin9 OnDemand is being published as a series of issues focused on Cyber Security. This month, you can read about The Rise and Fall of Megaupload.com and Kim Dotcom. You can also learn a lot about our leading Cyber Security expert, William F. Slater, from the interview with him.
Last week of February is booked for Exploiting Software and this month’s topic How to Penetrate with Metasploit?We decided to address the topic as we noted your interest in the Metasploit In A Nuttshel issue https://hakin9.org/metasploit-with-nessus-and-backtrack-in-exploiting-software-0912/, published last October. We would like to remind you about the best articles from that publication. These are How to use Sqlploit? by George Karpouzas and How to Explore the IPv6 Attack Surface with Metasploit? by Mike Sheward. This month, we would like to focus on specific methods of penetration using Metasploit.
We hope we managed to meet your expectations as far as the content of February’s issues is concerned . Please, feel free to share your views about that, you are free to send us a message to email@example.com
Tagged with: backtrack • Backtrack 5 • Backtrack 5 r3 • Backtrack Linux • Brute-Force • cyber security • DDos • Drupal • Hakin9 Open • IPv6 • IPv6 Attack • IPv6 Attack Surface • Megaupload.com • Metasploit • Metasploit Framework • nessus • Nuttshel • penetration • William F. Slater
Comments are closed.