+

Tagged With / 'prevent'

June 1, 2009


Anatomy of Malicious PDF Documents, Part 2

What tools do you need to analyze a malicious PDF document? You could use Acrobat, but then you run the risk of infecting your machine when opening the PDF document with Acrobat. Author: DIDIER STEVENS Source: Hakin9 6/2009 https://hakin9.org WHAT YOU WILL LEARN… Analyzing malicious PDF documents with custom tools WHAT SHOULD YOU KNOW… The structure of PDF […]

Read more

June 1, 2009


DefenseWall HIPS

Quick Start. Installing DefenseWall HIPS is a very simple and straightforward process. I did not experience any problems at all while installing and configuring the program. Author: Don Iverson Source: Hakin9 6/2009 https://hakin9.org Conventional anti-malware programs rely heavily on regularly updating the program definitions. This is necessary in order to cope with the ever-changing landscape of threats. DefenseWall […]

Read more

May 1, 2009


The Underworld of CVV Dumping Carding and the Effects on Individuals and Business and Ways to Prevent it

What is a CVV Number? CVV stands for CARD VERIFICATION VALUE CODE (CVV). CVV is an authentication procedure which was established by credit card companies to further efforts towards reducing fraud over the Internet. The procedure is in fact very simple indeed. It requires the card holder to enter the CVV number whenever a transaction […]

Read more

April 1, 2009


Print Your Shell

In every company network, which is based on Microsoft Windows, there are printers connected to print servers that have been shared over the network and thus can be used by many employees at the same time. This article shows how this functionality can be misused for local privilege escalation or for attacks on print servers […]

Read more

April 1, 2009


N-Stalker

It doesn’t take much investigation to conclude that Web Applications are one of the fastest growing aspects of the new Web 2.0 internet. As a result most organizations have at least one Web Application running which presents a very convenient entry point for the potentially damaging exploitation of their internal network resources. Author: Don Iverson Source: Hakin9 […]

Read more

March 1, 2009


Bootleggers and the Internet

The 1920′s and 1930′s in the United States were a very turbulent time. Prohibition was in place for 13 of those years preventing the consumption of alcohol. Author: MATTHEW JONKMAN Source: Hakin9 3/2009 https://hakin9.org This of course fueled a black market that produced, transported and sold incredible amounts of alcohol and raked in massive profits. What was remained […]

Read more

March 1, 2009


Analyzing Malware Packed Executables

In part one of analyzing malware I provided an overview of the process we are going to follow to analyze malware. If you followed the process, depending on the malware, you may have realized that malware developers have plenty of tricks to prevent you from analyzing their malware. Author: JASON CARPENTER Source: Hakin9 3/2009 https://hakin9.org WHAT YOU WILL […]

Read more

March 1, 2009


A New Era for Buffer Overflow

This article describes a few modern techniques for buffer overflow exploitation. There are just as many ways to prevent BOF with defensive mechanisms as there are ways to bypass those defenses. Author: JUSTIN SUNWOO KIM Source: Hakin9 3/2009 https://hakin9.org However, my purpose for writing this article is to the awareness of security and in the hopes of better […]

Read more

February 1, 2009


Analyzing Malware

This article is an introduction to analyzing malware. I will take you through the basic steps you need to perform in order to understand what malware is doing to your systems. Author: JASON CARPENTER Source: Hakin9 2/2009 https://hakin9.org WHAT YOU WILL LEARN… Why analyzing malware is important How you should get started WHAT YOU SHOULD KNOW… The Basics […]

Read more

January 1, 2009


Emerging Threats Episode 14

Crime happens every day on this grand old Internet we call home. Daily, hourly, minute by minute. I’d venture that there are easily several crimes a second involving a user giving up their sensitive information, buying a fake security program, or installing the bot of the week. Author: MATTHEW JONKMAN Source: Hakin9 1/2009 https://hakin9.org We’re talking hundreds of […]

Read more

January 1, 2009


HTTP Tunnel

Most of all companies only provide a very restrictive environment. While Network and Security Adminstrators do their job, securing the enterprise network from intruders, users are trying to compromise perimeter security to get more than is allowed. Surfing the www and googling provides a huge knowledge on how to greak firewalls, proxies, anti-virus appliances and […]

Read more

January 1, 2009


BPMTK

Security issues arise from the fact that a limited user has full control over his own processes on the Windows platform. Security mechanisms implemented in the user’s own processes can be bypassed. Author: DIDIER STEVENS Source: Hakin9 1/2009 https://hakin9.org WHAT YOU WILL LEARN… Why your applications running in a limited user context are still vulnerable to attacks and […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa