a b c d e f g h i j k l m n o p q r s t u v w x y z    0 1 2 3 4 5 6 7 8 9 
а б в г д е ж з и й к л м н о п р с т у ф х ц ч ш щ ъ ы ь э ю я 

Скачать «HAKIN9 2007 ISSUE 2 English Language» бесплатно

«HAKIN9 2007 ISSUE 2 English Language»
Publisher: Hakin9 | Issue 02/2007 | ISBN: n/a | Pages: 84 | PDF | 9.8 MB


Jon Oberheide
The author presents a tool which facilitates man-in-the-middle attacks against AOL instant Messenger's OSCAR protocol via a simple GTK interface. Learn more on this useful device.


Diman Todorov
It is probably one of the most famous free, open source utilities. The author describes Network Mapper developed by Fiodor enabling user to explore the network and audit the security level. Nmap's design focuses on rapid, large-scale scans. For more info read this short report.

»Metasploit – exploring framework

Michal Merta
Thanks to his article you will acquire a general knowledge on how exploiting works as well as some more detailed information on The Metasploit Project – an interesting security initiative. Moreover – the author explains how to exploit services by the means of Metasploit.

»Fuzzing technique

Paul Sebastian Ziegler
Fuzzing is one of the latest techniques employed when looking for the bugs. Having read this article you will know what fuzzing exactly is; what are its theoretical basics and what makes it so efficient. Last but not least you will learn how to write and use your own fuzzer.

»In remembrance of timing attacks

This text sheds the light on performing timing analysis over the execution path of a program, leading to valid usernames identification on Unix and other services.

»Testing Intrusion Detection Systems

Rodrigo Rubira
Thanks to this article you will get to know shellcode polymorphism techniques and how polymorphic shellcode works. The authors illustrate the difficulties behind shellcode generation tool and many more of the technique's features.

»Firewall leak testing

David Matousek
In this section we present our readers' opinions on advantages & disadvantages of firewalls they have used. You can find out if the prizes are adequate to the quality, what are the main problems that the users experienced and finally you will see the rating.

»An interview with Matt Jonkman

This month, hakin9 talks to Matt Jonkman known to our readers as hakin9 columnist. Matt has been into IT for a long time now and the network engeneering and security as well as intrusion detection have always belonged to his main interests. He took part in launching an open-source research community for intrusion detection.

»John Viega's IT career

Magdalena Baszczyk
It is a section presenting to our readers how interesting and complex working in the IT security field might be, and how much satisfaction being IT security community activist can bring.


Посетители, находящиеся в группе Гости, не могут оставлять комментарии в данной новости.