Blog Posts Tagged with "Hacking"

03b2ceb73723f8b53cd533e4fba898ee

Governments and Gaming Platforms: It's Time for Warfare

April 10, 2012 Added by:Pierluigi Paganini

The U.S. Navy has reported that scope of the project is to hack into consoles to access to sensitive information exchanged through their messaging services. They have offered guarantees that the spying technology will be used only on nations overseas...

Comments  (11)

69dafe8b58066478aea48f3d0f384820

OWASP Releases Zed Attack Proxy (ZAP) 1.4.0

April 09, 2012 Added by:Headlines

"The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications... ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EU: Possession of Hacking Tools to Become a Criminal Offense

April 04, 2012 Added by:Headlines

Cyber attacks on IT systems would become a criminal offense punishable by at least two years in prison throughout the EU under a draft law backed by the Civil Liberties Committee. Possessing or distributing hacking software and tools would also be an offense...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

CyberPatriot Announces National Championship Winners

March 27, 2012 Added by:Headlines

“CyberPatriot has introduced the area of cyber defense to tens of thousands of students across the country, and they’ve embraced the opportunity to learn and develop the skills to be successful in a field critical to America,” said Bernie Skoch, CyberPatriot Commissioner...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks are Fastest Growing National Security Threat

March 22, 2012 Added by:Bill Gerneglia

Cybercrime is a relatively new phenomenon but because of its recent scale and game-changing implications for both government and industry it is rapidly becoming the dominant risk theme of the 21st century. The opportunity for cyber attacks grows daily...

Comments  (0)

Ae27d21943468124221937d59167fff8

Location, Location, Location: It Works in Risk Management

March 21, 2012 Added by:Edwin Covert

With the increase in cybercrime costs, organizations need to be able to ensure they are maximizing their return on risk management investment. An effective way of doing this is making sure the information security or risk management team is properly aligned within their organization...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Developing the LNK Metasploit Post Module with Mona

March 20, 2012 Added by:Rob Fuller

One of Mona’s many and least well known functions is ‘header’, which outputs a ruby version of a file broken into ASCII and binary parts. The problem: I need to recreate a file in a way I can manipulate it in a post module without using the spec or Railgun to assist...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Security Tips When Providing Free Wi-Fi at Your Business

March 08, 2012 Added by:Robert Siciliano

Wi-Fi is great for bringing in customers and as a promotional tool that creates customer loyalty. Merchants such as hotels, coffee shops, burger joints and anyplace with a store front, chairs and tables is offering free Wi-Fi. But what about all the Wi-Fi security threats?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Successfully Hacked Online Voting System

March 07, 2012 Added by:Headlines

"Within 48 hours of the system going live, we had gained nearcomplete control of the election server. We successfully changed every vote and revealed almost every secret ballot. Election officials did not detect our intrusion for nearly two business days..."

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

On Hacking Humans at the RSA Conference

March 06, 2012 Added by:

RSA was a veritable cornucopia of data collection. There were no firewalls, human IDS/IPS or content filtering at this show. People openly discussed strategic plans, engineering specs and tactical activities whether over morning coffee or late night shots of Patron...

Comments  (2)

D8853ae281be8cfdfa18ab73608e8c3f

MS08_068 + MS10_046 = FUN UNTIL 2018

March 06, 2012 Added by:Rob Fuller

If you are on an internal penetration test and either exploit a machine or find an open share, you can create an LNK file with an icon that points at a nonexistent share on your attacking machine's IP...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

LM Hash Flaw: Windows Passwords Easy to Crack

March 01, 2012 Added by:Dan Dieterle

The thing is that the lower security hashes are not present on the SAM stored on the hard drive. When the security accounts are loaded into active RAM, Windows re-creates the LM hashes. The LM Hash can be pulled from active RAM using the Windows Credential Editor (WCE)...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Jihadi Information Warfare: The Next Wave

February 14, 2012 Added by:Infosec Island Admin

There have been tutorials on SQLi and Metasploit online for a long time, but only recently have we seen them translated into Arabic and placed on the technical forums. This means that even the low end of the technically capable Jihadist's can now boot up these tools hack a site…

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

User Assisted Compromise (UAC)

February 09, 2012 Added by:Rob Fuller

You have to wait for the user to use UAC (this does not work if someone else does, it's only for the current user HKCU). But, as a side benefit, it's a very real form of sneaky persistence as well, as it will execute our evil binary every single time they use UAC...

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

Gaining Access to a Check Point Appliance

February 07, 2012 Added by:Bill Mathews

On any Linux-based system with an unencrypted hard drive, it is possible to completely overtake a system once you have gained physical access. Often this is easily accomplished with a live CD distribution, such as Backtrack or Ubuntu and some command line tools...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Hacking Satellite Communications

February 06, 2012 Added by:Pierluigi Paganini

We must consider that compromised satellites are a serious risk, that the exposure could affect communications in the business and military sectors, and could also cause the loss of sensitive and strategic technological information...

Comments  (4)

Page « < 3 - 4 - 5 - 6 - 7 > »