• LOGIN
    • No products in the cart.

Login

Retrieve Password
Back to login/register

hacking

19

Aug'15

THE HACKER TALES – eForensics Magazine Open Issue

Hi Folks, Today we would like to share with you a free magazine issue by eForensics Magazine. Thanks to Security …

Read More

14

Aug'15

11

Aug'15

Cybercrime and Cybersecurity – The Legal and Regulatory Environment by Colin Renouf

In this article we will look at the environment in which eForensics exists; the legal and regulatory regimes in which systems and cyber criminals operate. We perform forensic analysis on systems to investigate a crime and hopefully prosecute a criminal; but to do that we need to understand which laws and regulations have been broken. There are pitfalls in working out what laws and regulations are in operation for a particular context; as what is illegal in one regime may not be in another, and is it the law in the location of the system or the criminal that applies? The information here forms the underlying legal knowledge in the CISSP certification and underpins the International Information Systems Security Certification Consortium (ISC)2 body of knowledge.

Read More

07

Aug'15

Hacker Profile by PC Magazine UK

Source: http://uk.pcmag.com/opinion/35346/what-are-hackers-thinking

Read More

17

May'15

Backend Database Hacking – Workshop eBook

We will be extremely focused on talking about tricks and techniques used for hacking into databases and underlying operating system. We will also lay down the general and core concepts for understanding the databases, like how they work, why they are used and what are the known vulnerabilities or weaknesses to exploit and gain illegitimate access. Microsoft SQL Server and MYSQL server are the two main database servers we will be discussing.

Read More

10

Mar'15

Advanced Exploitation Techniques – Workshop eBook

You will be presented with core concepts of hacking by means of exploiting buffer overflows with end-to-end walkthrough of exploitation for a known vulnerability.

Read More

22

Feb'15

Mobile Hacking

Dear Readers, We would like to introduce a special The BEST OF issue made by Hakin9. This time will deal …

Read More

13

Nov'14

Blueprinting the Target – Workshop eBook

Blueprinting the Target 90/10 way Workshop by Raheel Ahmad. You will learn how to perform the blueprinting of your target network and how to perform active and passive information gathering. You will learn how to use Nessus and NeXpose Scanners for vulnerability scanning and how to utilize best of nmap scans and running script bases scans with NSE.

Read More

13

Nov'14

Exploit Development/Wintel Platform – Workshop eBook

Exploit Dev WINTEL Platform by Raheel Ahmad. You will learn how to exploit them to own the windows machine, how to write an exploit from scratch to a working exploit and how to discover vulnerabilities in the windows based applications.

Read More

13

Nov'14

Web Application Hacking Techniques – Workshop eBook

Web Application Hacking Techniques Workshop by Raheel Ahmad. You will learn how to discover vulnerabilities in the Web based applications, how to hack into any web application which is vulnerable to SQL injection attacks.

Read More