Security & Encryption
pdf | | 2024-10-15 | Author:Qian Han & Salvador Mandujano & Sebastian Porst & V.S. Subrahmanian & Sai Deep Tetali & Yanhai Xiong
( Category:
Viruses
December 4,2023 )
epub |eng | | Author:Meel, Ummed;
Figure 6.7: List of all possible SQL injection types Analyze the target URL for SQL injection vulnerabilities and generate a list of available databases by using the command sqlmap -u ...
( Category:
Encryption
November 30,2023 )
epub |eng | 2022-11-15 | Author:John Paul Mueller
Exploit: An exploit is a special piece of code or carefully crafted data that takes advantage of a bug, error, or behavior (intended or not) of an application, operating system, ...
( Category:
Viruses
November 30,2023 )
epub |eng | 2022-11-15 | Author:Gianluca Tiepolo
Figure 6.1 â Geographic locations are expressed using latitude and longitude In the following part of the chapter, we will learn how Location Services works to determine the device's position. ...
( Category:
Privacy & Online Safety
November 29,2023 )
epub |eng | 2023-11-15 | Author:Ankush Chowdhary & Prashant Kulkarni
Step 3: Setting a key rotation period and starting time Once the key is created, you can set a rotation period with a starting time. Here is the command that ...
( Category:
Encryption
November 28,2023 )
epub |eng | 2023-11-15 | Author:Paul Huijbregts & Joe Anich & Justen Graves
Email notifications Here, you can create email notifications for alerts or vulnerabilities. This is best used selectively; use cases can be for VIP machines or other high-value assets that you ...
( Category:
Viruses
November 27,2023 )
epub |eng | 2023-11-15 | Author:Imran Bashir
In order to participate in the Beacon Chain, a Beacon Chain client (or node) is required. Beacon nodes The beacon node is the primary link in the Beacon Chain that ...
( Category:
Cryptography
November 26,2023 )
epub |eng | 2022-11-15 | Author:Mark Birch
Objdump This is a similar tool to Readelf in that it can display the contents of operating system files on Unix-like operating systems. Strace Strace is a tool for tracing ...
( Category:
Viruses
November 25,2023 )
epub |eng | 2023-11-15 | Author:Peter Rising
Figure 10.10: Automatic log upload Enter the name for your data source and choose your source and receiver settings in the Add data source section, shown here: Figure 10.11: Adding ...
( Category:
Privacy & Online Safety
November 21,2023 )
epub, pdf |eng | 2024-11-15 | Author:Qian Han & Salvador Mandujano & Sebastian Porst & V.S. Subrahmanian & Sai Deep Tetali & Yanhai Xiong
Decrypting the Command-and-Control Communications As in the previous chapter, one of the most important properties of the malware weâll want to reverse engineer is its encrypted communication with the command-and-control ...
( Category:
Viruses
November 13,2023 )
epub |eng | 2023-11-15 | Author:Mihir Shah
Pod/container name similarity: Attackers may create Pods or containers with names similar to legitimate ones, making it difficult to identify malicious activity. To mitigate this risk during threat modeling, security ...
( Category:
Encryption
November 12,2023 )
epub |eng | 2023-01-17 | Author:Philliip J. Windley
<saml:Issuer> contains the unique identifier of the IdP issuing the assertion, https://idp.example.org/SAML2. <ds:Signature> contains a digital signature (redacted in the example) for the entire <saml:Assertion> element. <saml:Subject> identifies the authenticated ...
( Category:
Privacy & Online Safety
November 4,2023 )
epub |eng | 2023-11-15 | Author:Megan Roddie & Jason Deyalsingh & Gary J. Katz
Message Pipe Created: RuleName: Named Pipes EventType: CreatePipe UtcTime: 2023-01-14 03:29:21.683 ProcessGuid: {71ccf5f5-2191-63c2-7303-000000001e00} ProcessId: 12852 PipeName: \RemCom_stdinCQHe2366530 Image: C:\Windows\HRrcwYpJ.exe User: NT AUTHORITY\SYSTEM Pipe Created: RuleName: Named Pipes EventType: CreatePipe UtcTime: ...
( Category:
Viruses
November 3,2023 )
epub |eng | 2023-09-14 | Author:Joshua Arvin Lat
( Category:
Viruses
October 30,2023 )
epub |eng | 2023-10-15 | Author:Simone Onofri & Donato Onofri
Starting the dynamic analysis process According to Olivier Laflammeâs article, the vulnerable page is the one that provides network reachability tests. This page can be accessed via http://192.168.8.1/#/ping. The vulnerable ...
( Category:
Privacy & Online Safety
October 28,2023 )
Categories
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(5489)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(5362)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5072)
Machine Learning Security Principles by John Paul Mueller(5045)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(4735)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(4710)
Solidity Programming Essentials by Ritesh Modi(3382)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3200)
Future Crimes by Marc Goodman(3195)
Mastering Python for Networking and Security by José Manuel Ortega(3184)
Blockchain Basics by Daniel Drescher(3144)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3018)
Mobile App Reverse Engineering by Abhinav Mishra(2767)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(2728)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2707)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2660)
The Code Book by Simon Singh(2556)
Learn Computer Forensics - Second Edition by William Oettinger(2530)
The Art Of Deception by Kevin Mitnick(2479)
Incident Response with Threat Intelligence by Roberto Martínez(2242)
