Items Tagged with "Hacking"


99edc1997453f90eb5ac1430fd9a7c61

Using Interface Devices for Network Penetration Testing

April 26, 2012

Javvad Malik caught up with Nikhil Mittal at Black Hat Europe 2012 to talk about some human interface technology and their use in network penetration testing. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Recovering Windows Passwords Remotely in Plain Text

April 26, 2012 Added by:Dan Dieterle

There has been a lot of buzz across the web the last few months about a program called “Mimikatz”. It is an interesting program that allows you to recover Windows passwords from a system in clear text. The passwords for anyone who has logged into a machine can be displayed...

Comments  (0)

E973b16363b3de77b360563237df7e32

Observations on Lack of Research in Social Engineering

April 19, 2012 Added by:Bozidar Spirovski

The attack was performed by multiple phone calls which created contact with multiple targets. Each call was a probing attempt to collect as much information possible. The first and second stage of the attack was aimed at the same targets but with several days delay between stages...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

Security BSides Chicago 2012 Presentation Lineup

April 19, 2012 Added by:Security BSides

Each BSides is a community-driven framework for building events for and by information security community members. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. You don’t want to miss it...

Comments  (0)

09dae715e355968a0e90ebddf038ad56

Hacking-Kung Fu: Aims and Objectives

April 15, 2012 Added by:Quintius Walker

Understanding Kung Fu-Hacking enables you to realize that there is more to it than merely learning form or exploits. Understanding will lead you, if you are still not able to defend yourself in real world situations or compromise systems outside lab environments, to ask why...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Steve Lord at Black Hat EU 2012

April 10, 2012

Steve Lord, penetration tester extraordinaire and co-founder of 44Con, was at Black Hat Europe 2012 to talk about compromising MiFi (portable WiFi) devices to use for nefarious and not so nefarious purposes. But mainly for nefarious purposes (insert manic laughter)...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Governments and Gaming Platforms: It's Time for Warfare

April 10, 2012 Added by:Pierluigi Paganini

The U.S. Navy has reported that scope of the project is to hack into consoles to access to sensitive information exchanged through their messaging services. They have offered guarantees that the spying technology will be used only on nations overseas...

Comments  (11)

69dafe8b58066478aea48f3d0f384820

OWASP Releases Zed Attack Proxy (ZAP) 1.4.0

April 09, 2012 Added by:Headlines

"The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications... ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EU: Possession of Hacking Tools to Become a Criminal Offense

April 04, 2012 Added by:Headlines

Cyber attacks on IT systems would become a criminal offense punishable by at least two years in prison throughout the EU under a draft law backed by the Civil Liberties Committee. Possessing or distributing hacking software and tools would also be an offense...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

CyberPatriot Announces National Championship Winners

March 27, 2012 Added by:Headlines

“CyberPatriot has introduced the area of cyber defense to tens of thousands of students across the country, and they’ve embraced the opportunity to learn and develop the skills to be successful in a field critical to America,” said Bernie Skoch, CyberPatriot Commissioner...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks are Fastest Growing National Security Threat

March 22, 2012 Added by:Bill Gerneglia

Cybercrime is a relatively new phenomenon but because of its recent scale and game-changing implications for both government and industry it is rapidly becoming the dominant risk theme of the 21st century. The opportunity for cyber attacks grows daily...

Comments  (0)

1a490136c27502563c62267354024cd5

Network Footprinting: Finding Your Target

March 21, 2012

Network footprinting is perhaps the first active step in the recognizance phase of an external network security engagement. This phase is often highly automated and the techniques can be easily applied in a general fashion across a broad range of targets...

Comments  (0)

Ae27d21943468124221937d59167fff8

Location, Location, Location: It Works in Risk Management

March 21, 2012 Added by:Edwin Covert

With the increase in cybercrime costs, organizations need to be able to ensure they are maximizing their return on risk management investment. An effective way of doing this is making sure the information security or risk management team is properly aligned within their organization...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Developing the LNK Metasploit Post Module with Mona

March 20, 2012 Added by:Rob Fuller

One of Mona’s many and least well known functions is ‘header’, which outputs a ruby version of a file broken into ASCII and binary parts. The problem: I need to recreate a file in a way I can manipulate it in a post module without using the spec or Railgun to assist...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Security Tips When Providing Free Wi-Fi at Your Business

March 08, 2012 Added by:Robert Siciliano

Wi-Fi is great for bringing in customers and as a promotional tool that creates customer loyalty. Merchants such as hotels, coffee shops, burger joints and anyplace with a store front, chairs and tables is offering free Wi-Fi. But what about all the Wi-Fi security threats?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Successfully Hacked Online Voting System

March 07, 2012 Added by:Headlines

"Within 48 hours of the system going live, we had gained nearcomplete control of the election server. We successfully changed every vote and revealed almost every secret ballot. Election officials did not detect our intrusion for nearly two business days..."

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »