+

Tagged With / 'malicious attack'



October 29, 2013

Magazine News NOTICE BOARD Redaction Comments Off

Read Hakin9′s Tutorials and Become Network Security & SQL Injection Master

Dear Readers, Our latest issue focuses on Network Security and SQL Injection. The broad term of Network Security is discussed through the issue and presented also with regard to one of the popular threats – SQL injection attacks. THE TECHNIQUES: Hey there, I’m not Dead Yet “Port Knocking” !!! By Ali Hadi, Information Security Researcher […]

Read more


August 23, 2013

Magazine News Redaction Comments Off

Get Expert Skills on QR Code Hacking with Hakin9 Tutorials

Dear Readers, We are pleased to welcome you at the end of the summer period with a brand new issue. The issue that is supposed to be just a start in the area of QR code research. This is still a new topic and many people wouldn’t like to share their research and discoveries on […]

Read more

September 21, 2011


The Facebook friend request data mining plug-in

A new cross platform Java Facebook proof of concept (PoC) hacking plug-in data mining tool could turn your closest friends into your worst enemies – social engineering anyone? The plug-in tool (created by a team at RISST), called “Facebook Pwn“, lets Facebook criminals (and normal users like us) — steal personal profile information from any […]

Read more


July 1, 2011

EBOOKS Redaction No Comments

Cyber Warfare

Cyber Warfare By Jason Andress, Steve Winterfeld Publisher: Syngress June U.S. 2011,  July EMEA www.syngress.com Description Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts […]

Read more

June 15, 2011

Articles Redaction No Comments

Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow

Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure to malicious attacks. Obtaining code execution is the easiest and most direct way to reach this goal. Social Engineering professionals are no different. by Chris Hadnagy Comments

Read more

June 15, 2011

Articles Redaction No Comments

Software Exploitation: Development Flaw or Malicious Intent

It’s been said that lazy programmers make good programmers. Yet, it’s hard to understand why laziness would be considered one of the virtues of a good programmer let alone a virtue at all. By this point – however – I’m sure you’re probably already asking why I’m bringing up laziness in relation to programming. by […]

Read more


June 15, 2011

Magazine Redaction 3 Comments

Hakin9 Extra 1/2011 – Exploiting Software

Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow by Chris Hadnagy Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure to malicious attacks. Obtaining code execution is the easiest and most direct way to reach […]

Read more


June 15, 2011

EBOOKS Redaction No Comments

Ninja Hacking

Ninja Hacking By Thomas Wilhelm, Jason Andress Publisher: Syngress October 2010 U.S., November 2011 EMEA www.syngress.com Description Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today’s ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your […]

Read more

August 1, 2010

Articles Redaction No Comments

Hacking Trust Relationships – Part II

This is the second article in a series of six that covers the topic of hacking trust relationships. This article focuses specifically on Vulnerability Identification against a target system, in order to identify and exploit potential trust relationships. Author: THOMAS WILHELM Source: Hakin9 8/2010 https://hakin9.org What you will learn… How to recognize trust relationships that can […]

Read more

December 1, 2009

Articles Redaction No Comments

Elcomsoft

Quick start: Suppose you find out that your administrator passwords for your system or even your server have been changed by a malicious attacker. What options do you have to recover control of your system? One option would be to reformat the system and reload everything from backups, or you can use Elcomsoft System Recovery […]

Read more

April 1, 2009

Articles Redaction No Comments

Behavioral Technology Can Deliver Proactive Defense

Neural (Term comes from the word neurons in the human brain) and heuristic (Term comes from the word heuriskein, meaning to discover) technology is now being talked about as the next generation development within AV (Antivirus) and endpoint security circles. Author: JULIAN EVANS Source: Hakin9 4/2009 https://hakin9.org That said many of the security vendors have already started to […]

Read more

February 1, 2008

Articles Redaction No Comments

Storming SIP Security

VoIP is a hot and steadily gaining market share in the phone business. As people constantly seek to make long distance calls cheaper, they are moving away from relying on the traditional telephone companies and heading more towards Voice over IP (VoIP). Phone calls between two VoIP users are usually free and do not carry […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa