Tagged With / 'sploit'

August 25, 2011

penetration tester's open source cover

Review of Penetration Tester’s Open Source Toolkit

Review of Penetration Tester’s Open Source Toolkit 3rd Edition By Michael Munt www.syngress.com   There are so many different varieties of penetration testing tools available, and the commercial versions of these can be very expensive and not always that easy to use, this book will aid you in choosing certain types of tools for certain […]

Read more

July 28, 2011


Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It

Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It By Jesse Varsalone and Matthew McFadden September 2011 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439821190 50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description As technology has developed, computer hackers have become increasingly sophisticated, […]

Read more

July 27, 2011

cover_basics Hacking

The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing By Patrick Engebretson Publisher: Syngress July 2011 U.S., September 2011 EMEA www.syngress.com Description The Basics of Hacking and Penetration Testingserves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of […]

Read more

June 15, 2011

From Fuzz To Sploit

By now everyone has heard of buffer overflows and a lot have been hearing about it for the last 15+ years. Through this time period there have been many techniques evolved both to combat vulnerabilities as well as persist attack and exploitation. As security is most often most thought of as an afterthought it is […]

Read more

June 15, 2011

Exploiting Software

Hakin9 Extra 1/2011 – Exploiting Software

Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow by Chris Hadnagy Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure to malicious attacks. Obtaining code execution is the easiest and most direct way to reach […]

Read more

June 6, 2011

Tutorials admin Comments Off

CEHv7 Monthly – Practical Study Guide: Reconnaissance 101

By: Wayne Burke, Master EC-Council Trainer and CAST Author for Digital Mobile Forensics Welcome to the monthly Hakin9 CAST Tutorial Series. Last month we looked at installing Metasploit and SET on your Apple iDevice. This month we will begin to dive into the CEH exam objectives for the newly released CEHv7 exam, and more specifically […]

Read more

May 11, 2011

Tutorials admin Comments Off

Installing Metasploit and SET (Social-Engineer Toolkit) on your Apple iDevice

By: Wayne Burke, Master EC-Council Trainer and CAST Author for Digital Mobile Forensics Welcome to the monthly CAST Tutorial Series. We will kick this first tutorial off with installing Metasploit and SET on your Apple iDevice, two very powerful open source Hacking tools that every Security Professional loves. The sheer growth and popularity of iPads, […]

Read more

February 1, 2010

Articles admin Comments Off

Manipulating The Network with PacketFu

PacketFu is a mid level packet manipulation library written in Ruby. The purpose of PacketFu was to make it easier for people for crafting and manipulating network packets in Ruby. Author: KEITH LEE Source: Hakin9 2/2010 https://hakin9.org The PacketFu project was started in August 2008 by Tod Breadsley from BreakingPoint Systems. The reason for this project […]

Read more

February 1, 2009

Metasploit Alternate Uses for a Penetration Test

The Metasploit Framework is a program and subproject developed by Metasploit LLC. It was initially created in 2003 in the Perl programming language, but was later completely re-written in the Ruby Programming Language. Author: STEPHEN ARGENT Source: Hakin9 2/2009 https://hakin9.org WHAT YOU WILL LEARN… Basics of how to use Metasploit How to generate payloads into executables Basic & […]

Read more

February 1, 2007

Metasploit – exploiting framework

Do you want to know if your systems are really vulnerable? Do you want to use an easy mechanism to find out? Do you want to write your own exploits using high-quality framework? Do you want to save your money for better stuff than commercial vulnerability tools? If so, keep reading. Author: Michal Merta Source: https://hakin9.org Hakin9 1/2007 […]

Read more

January 1, 2006

Intrusion Detection in the Wild

Network intrusion detection requires a suite of tools, including traditional, signature-based NIDS such as snort. In this article we examine how to use common tools together to provide multilayered protection in case one measure should fail, and to provide maximum information to a handler during incident response. Author: Carlos García Prado Source: https://hakin9.org Hakin9 1/2006 Quick start. Suppose […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa