+

Tagged With / 'penetration'

January 1, 2009

Articles Redaction No Comments

Training – the Security Minefield

Learning something new is a wonderful thing. However, with all the security training on offer right now, how do you know what’s right for you ? Author: CHRIS RILEY Source: Hakin9 1/2009 https://hakin9.org Over the past few years, I’ve been slowly re-inventing my career in an attempt to be more involved in security. Like many people, I fell […]

Read more

January 1, 2009

Articles Redaction No Comments

Defeating AntiVirus Software

Penetration testers are frequently called upon to upload netcat to compromised computers to gain a command line.Security professionals work with many tools that AV vendors have labeled “hacker tools.” In the interest of enforcing common corporate policy, AV vendors rigorously quarantine and delete these tools. Author: JIM KELLY Source: Hakin9 1/2009 https://hakin9.org WHAT YOU WILL LEARN… You will […]

Read more

January 1, 2009

Articles Redaction No Comments

Cisco Torch

Brief Summary: One of the challenges when conducting a successful penetration test of vulnerability assessment is quickly locating and exploiting Cisco devices within the network fabric. Cisco-Torch uses several methods we will detail to execute scanning, fingerprinting and exploitation duties admirably. Authors: Marco Figueroa and Anthony L. Williams Source: Hakin9  1/2009 https://hakin9.org Quick Start: While writing the Hacking […]

Read more

June 1, 2008

Articles Redaction No Comments

Auditing Oracle in a Production Environment

This paper is based on real penetration testing of Oracle servers on HP-UX systems and the way the auditor has to follow to combat the stringencies that come in a way. We will dissect the errors and the way to bypass them to conduct the tests. Authors: ADITYA K SOOD, A.K.A. OKNOCK Source:  https://hakin9.org Hakin9 6/2008 WHAT YOU […]

Read more

June 1, 2008

Articles Redaction No Comments

Simple WiFi Hacking with Eee Pc

In this article we’ll see a simple and efficient method to retrieve a WEP key from a wireless network. The interesting part is that we’ll obtain this key using an Eee Pc, the low cost netbook by Asus. After this article you will see that an Eee Pc with BackTrack is a must-have tool for […]

Read more

April 1, 2008

Articles Redaction No Comments

Hacking RSS Feeds: Insecurities in Implementing RSS Feeds

This paper sheds light on the insecure coding practices that affect RSS based web applications and also on their flexibility. The advent of Web 2.0 has enhanced the mobility of content. The inclusion of content has become the sole basis for the interworking of websites. Author: ADITYA K. SOOD Source: Hakin9 4/2008 https://hakin9.org WHAT YOU WILL LEARN… Peripheral […]

Read more

March 1, 2008

Articles Redaction No Comments

Pentest Labs Using Live CDs

For those individuals interested in learning how to perform penetration testing, they quickly realize there are many tools to learn, but almost no legal targets to practice against – until now. De-ICE.net has developed LiveCDs that simulate fully-functional servers that require ingenuity and a variety of different tools. Author: THOMAS WILHELM Source: Hakin9 3/2008 https://hakin9.org WHAT YOU WILL […]

Read more

December 1, 2007

Articles Redaction No Comments

Internal penetration tests

Penetration tests are one of the techniques used to expose holes in the security of an IT system. They are carried out by simulating the actions of a potential intruder. Since they are supposed to resemble what could happen in case of a real attack, they should encompass as many known system penetration methods as […]

Read more

April 1, 2007

Articles Redaction No Comments

Episode 5

There are many ways to make money as a Security Professional. You can do good things, protecting companies, users, grandmothers and customers. You can do bad things, exploiting the proverbial weak and trusting. Which way you choose to go depends greatly on how loudly your conscience speaks to you, and how long you want to […]

Read more

March 1, 2007

Articles Redaction No Comments

Analysing and Mapping Wireless Networks

Wireless technologies are getting into our daily lives more and more each day. For one it’s a craze of convenience or the decision of the different technological problems, and for others – fighting the jumping-off place where real cyberfights are unwrapped. Author: Andrej Komarov (ITdefence Ltd/Russia) Source: https://hakin9.org Hakin9 3/2007 What you will learn… Wi -fi positioning, how […]

Read more

February 1, 2007

Articles Redaction No Comments

Metasploit – exploiting framework

Do you want to know if your systems are really vulnerable? Do you want to use an easy mechanism to find out? Do you want to write your own exploits using high-quality framework? Do you want to save your money for better stuff than commercial vulnerability tools? If so, keep reading. Author: Michal Merta Source: https://hakin9.org Hakin9 1/2007 […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa