Tagged With / 'wifi'

September 20, 2013

Magazine News NOTICE BOARD admin Comments Off

KALI LINUX – See What’s New and Get Advanced Skills with Hakin9′s Tutorials!

BASICS: Kali Linux – What’s new? By Steven McLaughlin, Security Researcher Kali Linux released earlier in the year is dubbed the most advanced penetration testing distribution, ever. How does it compare to BackTrack?, and: What’s the difference? Kali Linux for Enterprises By Navneet Sharma, Information Security Analyst Whenever we think of Penetration Testing (PT) the […]

Read more

July 23, 2013

Magazine News admin Comments Off

Advanced Windows Exploitation – Read Hakin9′s Tutorials and Get Professional IT Security Skills!

Dear Readers, We are happy to introduce our new issue of Hakin9 on Demand. We are still in exploitation area, but this time we explore Advanced Windows Exploitation. Windows is the most known operation system in the world. First version of Windows was developed in 1985 by Microsoft Corporation, and until today new version appear. […]

Read more

May 8, 2013

Magazine News admin Comments Off

Wireshark Compendium – 180 pages on Wi-fi Hacking

Dear Readers, I would like to introduce a new issue of The Best of Hakin9. This compendium is a huge load of knowledge on Hacking Wi-Fi. It is the guidebook for those who would like to know the basics, and dive into deep waters of Wi-Fi hacking techniques. The main part is focused on the […]

Read more

May 8, 2013

Magazine News admin Comments Off

Wi-fi Hacking with Wireshark – Hakin9′s Compendium – Free Download

Full version of the issue with 29 complete articles can be found here HACKING WIRELESS NETWORKS Hacking Wireless in 2013 By Terrance Stachowski, CISSP, L|PT This article is a simple how-to guide for hacking wireless networks using BackTrack 5 R3, or Kali – Linux Penetration Testing Distributions offered by Offensive Security. The information provided in […]

Read more

April 5, 2013

Articles Free Articles News reviews admin Comments Off

Overview of mobile platforms (March 2013)

This article describes hardware and software division on the mobile platform market. “Mobile platform” means mass handheld devices with an autonomous power source designated for solving a large variety of general tasks: entertainment, communications and business. This article does not examine personal desktop computers and their portable versions (notebooks/netbooks/etc.)

Read more

January 1, 2011

Magazine admin Comments Off
Cybercrime and Cyberwar Predictions for 2011 - Hakin9 01/2011

Cybercrime and Cyberwar Predictions for 2011 – Hakin9 01/2011

Pros and cons of partial passwords in web applicationsDarek ŁysyszynAlmost every web application requires some kind of authorization. Most of them use user password authorization. And most of time one is forced to type full password. Is this solution convenient Probably yes. Is it secure? Not quite. There are few solutions of authorization by password. […]

Read more

March 1, 2010

Articles admin Comments Off

Study of MITM Attacks Against Smartphone Devices

Let us consider a scenario, where a smartphone user connects to the Internet to determine if the bank transaction is successful or not. Authors: MAYANK AGGARWAL, SMOBILE GLOBAL THREAT CENTER RESEARCH ENGINEER Source: Hakin9 3/2010 https://hakin9.org The user is having a cup of coffee in a cafe, which happens to provide a free Wi-Fi hotspot. The […]

Read more

March 1, 2009

Exporting Nonexportable Certificates

Digital Certificates in Microsoft Windows can be set to have a non-exportable private key so that they cannot be copied from the key store and installed on another device. This is common practice in corporate WiFi installations with certificate based authentication. Author: THOMAS CANNON Source: Hakin9 3/2009 https://hakin9.org Demonstrating how to bypass this control provides us with a […]

Read more

February 1, 2009

iPhone Forensics

Gangsters, hoodlums, and a variety of nightlife users love iPhones. If you want to be a successful street user owning an iPhone is an absolute necessity. While this is bad for all who are robbed of their iPhones, law enforcement benefits greatly due to the iPhone’s vulnerability to forensics. Author: TAM HANNA Source: Hakin9 2/2009 https://hakin9.org WHAT YOU […]

Read more

June 1, 2008

Simple WiFi Hacking with Eee Pc

In this article we’ll see a simple and efficient method to retrieve a WEP key from a wireless network. The interesting part is that we’ll obtain this key using an Eee Pc, the low cost netbook by Asus. After this article you will see that an Eee Pc with BackTrack is a must-have tool for […]

Read more

March 1, 2007

Analysing and Mapping Wireless Networks

Wireless technologies are getting into our daily lives more and more each day. For one it’s a craze of convenience or the decision of the different technological problems, and for others – fighting the jumping-off place where real cyberfights are unwrapped. Author: Andrej Komarov (ITdefence Ltd/Russia) Source: https://hakin9.org Hakin9 3/2007 What you will learn… Wi -fi positioning, how […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa