Network Security
mobi | | | Author:Chey Cobb

( Category: Encryption January 6,2015 )
mobi | | | Author:Nitesh Dhanjani

( Category: Software Development January 6,2015 )
epub, mobi, pdf |eng | 2014-12-04 | Author:Justin Seitz [Seitz, Justin]

Kicking the Tires Click the Extender tab in Burp, click the Add button, and use the same procedure we used for our previous extensions to get the Wordlist extension working. ...
( Category: Viruses December 27,2014 )
epub |eng | 2015-01-09 | Author:Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel]

Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category: Encryption December 15,2014 )
epub, azw3, mobi, pdf |eng | 2014-12-15 | Author:Tyler Wrightson [Wrightson, Tyler]

Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category: Hacking December 15,2014 )
epub, azw3 |eng | | Author:Shane Harris

Some of the FBI’s most important intelligence targets today are Chinese cyber spies stealing intellectual property. “We do a lot of collection on China’s victimizing US companies,” says a former ...
( Category: Privacy & Online Safety November 18,2014 )
epub |eng | 2013-09-10 | Author:Derrick Rountree & Ileana Castrillo

Attaching an EBS Volume Since the HTML pages to be served from the Web portal need to be persistent, it is required to create an EBS volume for holding the ...
( Category: Network Security October 27,2014 )
mobi |eng | 2005-01-02 | Author:Kevin Mitnick [Mitnick, Kevin]

They discovered a live network jack, presumably for the convenience of company personnel who wanted to be able to access the corporate network during meetings. Plugging in an Ethernet cable ...
( Category: Hacking October 13,2014 )
epub, pdf |eng | 2013-12-25 | Author:Mike Shema

Usually, services only respond to a particular protocol handshake. So, the trigger for SSL shouldn’t elicit a response from a DNS service, and the DNS trigger shouldn’t elicit a response ...
( Category: Hacking August 28,2014 )
mobi, epub |eng | 2008-01-28 | Author:Jon Erickson

Example Internet Datagram Header Each element in the structure corresponds to the fields shown in the RFC header diagram. Since the first two fields, Version and IHL (Internet Header Length) ...
( Category: Privacy & Online Safety May 26,2014 )
mobi |eng | 2007-01-22 | Author:Pfleeger, Charles P. & Pfleeger, Shari Lawrence [Pfleeger, Charles P.]

Protocol Failures and Implementation Flaws Each protocol is a specification of a service to be provided; the service is then implemented in software, which, as discussed in Chapter 3, may ...
( Category: Network Security May 26,2014 )
azw3 |eng | 2005-04-14 | Author:Zalewski, Michal [Zalewski, Michal]

Customer Profiling and Privacy Invasion Many companies go to great lengths to gather and sell valuable information about people’s habits, preferences, and behavior. Although this information is usually used for ...
( Category: LAN May 26,2014 )
epub, pdf |eng | 2014-03-19 | Author:Kim, Peter [Kim, Peter]

Figure 66 - Mimikatz Again, it doesn’t matter how long their password is and you don’t have to even worry about the hashes. You can now take these usernames/passwords and ...
( Category: Testing April 29,2014 )
epub |eng | 2009-02-08 | Author:Chandra, Pravir, Messier, Matt, Viega, John & Matt Messier & Pravir Chandra [John Viega]

type The operation to perform, which can be one of the following constants: EVP_CTRL_GET_RC2_KEY_BITS EVP_CTRL_SET_RC2_KEY_BITS EVP_CTRL_GET_RC5_ROUNDS EVP_CTRL_SET_RC5_ROUNDS arg The numerical value to set, if appropriate. If not appropriate, its value ...
( Category: Network Security April 6,2014 )
epub, pdf |eng | 2012-02-26 | Author:Michael Sikorski & Andrew Honig [Michael Sikorski]

Using Hashed Exported Names The algorithm just discussed has a weakness: It performs a strcmp against each export name until it finds the correct one. This requires that the full ...
( Category: Hacking April 5,2014 )

Categories