+

Tagged With / 'Security'

April 19, 2013

Magazine News admin Comments Off
Hakin9_starter_kit_01_2013-1

Hacking for Beginners – 18 Articles on the Basics of Hacking and Exploiting

Dear Readers, I am happy to present you with this very first issue of our new project – Hakin9 Starter Kit. This issue will address various topics connected with IT Security. Although the line is mainly devoted to those of you who would like to start they journey with hacking, we strongly believe that each […]

Read more

April 18, 2013

Magazine News admin Comments Off
Hakin9_starter_kit_01_2013-1

Basic Articles on Hacking for Beginners – Free Download

Full version of the issue with 18 complete articles can be found here . EXPLOITING SOFTWARE A Quick Reference To Metasploit Framework By Abhinav Singh, the author of “Metasploit penetration testing cookbook,” a contributor of SecurityXploded community Metasploit is currently the most widely used and recommended penetration testing framework. The reason which makes metasploit so […]

Read more

April 8, 2013

Events News NOTICE BOARD Ewa Duranc Comments Off
http://www.secutech.com

International Exhibition and Conference for Electronic Security

Press Release Secutech International Exhibition and Conference for Electronic Security, Info Security, Fire and Safety Taipei Nangang Exhibition Center Taipei, Taiwan, 24 – 26 April 2013 Secutech 2013 attracts 510 exhibitors from 19 countries and regions   Diverse fringe programmes offer market and product information   Secutech 2013, which will be held from 24 – […]

Read more

March 21, 2013

Magazine News admin Comments Off
Metasploit Tutorials - Hacking Exploiting Software Compedium

Metasploit Tutorials – Hacking Exploiting Software Compedium

Dear Readers, You are going to read Metasploit Tutorials – Hakin9 Compendium. This compendium consists of the articles we collected through a couple of years plus the ones that are still fresh, waiting to be published for the first time. We hope that Metasploit, so often quoted and asked for in your messages to en@hakin9.org, […]

Read more

February 21, 2013

Magazine News Ewa Duranc Comments Off
Internet-Based World Security Explored in Hakin9 OnDemand 02/2013

Internet-Based World Security Explored in Hakin9 OnDemand 02/2013

  Dear Readers, In the second issue of Hakin9 OnDemand in 2013 we will provide you with plenty of information on Cybersecurity and the safety of the Interned-Based World. The newest issue of Hakin9 OnDemand is divided into few sections. The first one, Burning issue – megaupload.com, is devoted to Kim Dotcom. In this section one can find two articles, […]

Read more

January 20, 2012


Conference: 2nd Annual Cyber Security Summit, 11th – 12th April 2012, Prague, Czech Republic

Conference name: 2nd Annual Enterprise Cyber Security Summit From: 11.4.2012 To: 12.4.2012 Location: Prague, Czech Republic Venue: TBA Conference email: css@ebcg.biz Telephone: +421 2 3220 2200 Description (section events): Join the premium security event of the year! 15 top speakers and over 100 CISOs as delegates! Ask for an early bird now! 2nd Annual Enterprise Cyber […]

Read more

December 8, 2011


Google Code Playground XSS vulnerability

Two security researchers have identified an XSS in Google Code. Proof Of Concept: Just go to http://code.google.com/apis/ajax/playground/ and then click on edit HTML after that remove all the codes and type this script : “<img src=”<img src=search”/onerror=alert(“XSS”)//”>” and click on DEBUG CODE, and then first it will show you “Sample must have <head> element” click […]

Read more

December 8, 2011


Brazilian banking Trojan disguised as Microsoft anti-virus software

A Trojan (identified as Trojan-Downloader.Win32.VB.aoff) is targeting Windows-based systems by removing built-in AV software and clearing a path for cybercriminals to silently steal online banking credentials. The Trojan affects ‘ntldr’ the default boot loader in Windows.The Trojan is propagating as an attachment on an email. This attack vector relies on the victim clicking on the […]

Read more

December 7, 2011

Hakin9 Mobile Cover

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen device. Readers will notice some stark differences between iOS and Android analysis. Next, the author […]

Read more

December 7, 2011

Raytheon Logo

Ready to Break Some Code? Raytheon Recruiting!

Ready to break some code? Visit our enhanced gaming site, and take the new cyber warrior challenge! View our website HERE At Raytheon, our cyber warriors play offense and defense. They know how the adversary thinks and can adopt their perspective. They understand the real engineering beneath the interfaces. They also can design and create […]

Read more

December 5, 2011

hc

Get 20 % discount NOW!

Huge discounts on security books from Feisty Duck! Feisty Duck is providing all readers of Hakin9 with a special discount for additional 20% off our current prices. Use code HAKIN9MS for 45% off list price for ModSecurity Handbook Use code HAKIN9AS for 60% off list price for Apache Security Feisty Duck (https://www.feistyduck.com) is an independent […]

Read more

December 5, 2011


Reverse proxy flaw in Apache patch CVE-2011-3368

A security researcher has found that an old patch CVE-2011-3368 can still be exploited by a crafted request that could exploit a fully pateched Apache Web Server (even if Apache 2.2.21 with CVE-2011-3368 patch is applied) which would allow access to internal systems if the reverse proxy rules were configures incorrectly. Threads on line suggest […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa