+

Tagged With / 'hakin 5/2005'

May 1, 2005

Articles Redaction No Comments

Linux shellcode optimisation

A shellcode is an essential part of any exploit. During attack, it is injected into the target application and performs the desired actions within it. However, the basic rules for building shellcodes are not too widely known, even though they don’t require advanced skills. Author: Michał Piotrowski Source: https://hakin9.org Hakin9 5/2005 What you will learn… how to write […]

Read more

May 1, 2005

Articles Redaction No Comments

Advanced SQL Injection techniques

SQL Injection attacks target the core of a web application: its database. Their most significant impact enables an attacker to retrieve, modify, or delete arbitrary data. It is a serious threat to any application with a database back-end and a threat that should be fully understood in order to develop adequate countermeasures. Author: Mike Shema Source: https://hakin9.org Hakin9 […]

Read more

May 1, 2005

Articles Redaction 1 Comment

Exploiting Java VM security vulnerabilities

Java has taken control of the programming world. It runs on servers, appears as browser applets, increasingly takes over mobile phones – it’s even made its way into smartcards. It is usually seen as a highly secure operating environment, but sadly the truth is slightly different. Java security measures can be overcome. Author: Tomasz Rybicki Source: https://hakin9.org Hakin9 […]

Read more

May 1, 2005

Articles Redaction No Comments

Robot wars – how botnets work

One of the most common and efficient DDoS attack methods is based on using hundreds of zombie hosts. Zombies are usually controlled and managed via IRC networks, using socalled botnets. Let’s take a look at the ways an attacker can use to infect and take control of a target computer, and let’s see how we […]

Read more

May 1, 2005

Articles Redaction No Comments

Pharming – DNS cache poisoning attacks

Visiting online banking services and other secured sites is becoming increasingly dangerous. Entering your credit card number on a website which looks deceptively similar to that of your bank might end with a considerable sum disappearing from your account. Unfortunately, such attacks are increasingly commonplace nowadays and make use of a new method called pharming. […]

Read more

May 1, 2005

Articles Redaction No Comments

Firestarter 1.0.3

Firestarter is a graphical tool for simplifying the process of managing, analysing, supervising and configuring a firewall based on netfilter/iptables. It uses the GTK2 library. Author: Tomasz Nowak Source: https://hakin9.org Hakin9 4/2005 Quick start: As an administrator of a Linux server, containing confidential data in an InterBase-based (gds_db) database system, we have been given a task of granting […]

Read more

April 1, 2005

Articles Redaction No Comments

Recovering Data from Linux File Systems

If you happen to lose important files on your Linux system – for example after a break-in – do not despair. Though it often requires a lot of time, with the help of a good toolkit you can potentially recover even the entire contents of a damaged file system. Author: Bartosz Przybylski Source: https://hakin9.org Hakin9 4/2005 What You […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa