Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    «HAKIN9 2007 ISSUE 2 English Language»

    Posted By: Spymaker
    «HAKIN9 2007 ISSUE 2 English Language»

    «HAKIN9 2007 ISSUE 2 English Language»
    Publisher: Hakin9 | Issue 02/2007 | ISBN: n/a | Pages: 84 | PDF | 9.8 MB


    »Aimject

    Jon Oberheide
    The author presents a tool which facilitates man-in-the-middle attacks against AOL instant Messenger's OSCAR protocol via a simple GTK interface. Learn more on this useful device.

    »Nmap

    Diman Todorov
    It is probably one of the most famous free, open source utilities. The author describes Network Mapper developed by Fiodor enabling user to explore the network and audit the security level. Nmap's design focuses on rapid, large-scale scans. For more info read this short report.

    »Metasploit – exploring framework

    Michal Merta
    Thanks to his article you will acquire a general knowledge on how exploiting works as well as some more detailed information on The Metasploit Project – an interesting security initiative. Moreover – the author explains how to exploit services by the means of Metasploit.

    »Fuzzing technique

    Paul Sebastian Ziegler
    Fuzzing is one of the latest techniques employed when looking for the bugs. Having read this article you will know what fuzzing exactly is; what are its theoretical basics and what makes it so efficient. Last but not least you will learn how to write and use your own fuzzer.

    »In remembrance of timing attacks


    This text sheds the light on performing timing analysis over the execution path of a program, leading to valid usernames identification on Unix and other services.

    »Testing Intrusion Detection Systems

    Rodrigo Rubira
    Thanks to this article you will get to know shellcode polymorphism techniques and how polymorphic shellcode works. The authors illustrate the difficulties behind shellcode generation tool and many more of the technique's features.

    »Firewall leak testing

    David Matousek
    In this section we present our readers' opinions on advantages & disadvantages of firewalls they have used. You can find out if the prizes are adequate to the quality, what are the main problems that the users experienced and finally you will see the rating.

    »An interview with Matt Jonkman


    This month, hakin9 talks to Matt Jonkman known to our readers as hakin9 columnist. Matt has been into IT for a long time now and the network engeneering and security as well as intrusion detection have always belonged to his main interests. He took part in launching an open-source research community for intrusion detection.

    »John Viega's IT career

    Magdalena Błaszczyk
    It is a section presenting to our readers how interesting and complex working in the IT security field might be, and how much satisfaction being IT security community activist can bring.