HAKIN9 2006 ISSUE 1 English
Publisher: Hakin9 | Issue 01/2006 | ISBN: n/a | Pages: 84 | PDF | 7.9 MB
Publisher: Hakin9 | Issue 01/2006 | ISBN: n/a | Pages: 84 | PDF | 7.9 MB
»Metasploit Framework
The author presents Metasploit, a development environment designed to ease the work of penetration testers and network security analysts.
»GFI LANguard Network Security Scanner
Tomasz Nidecki
The author describes how GFI LANguard NSS works and what kind of advantages you can have thanks to the security scanner.
»Rootkits under Windows platforms
Nzeka Gilbert
We present the link between kernel hackers and corporations having webmarketing businesses which develop spywares or adwares to profile websurfers and corporations like Sony. Find out what the guiding principles of rookits are and what kind of techniques and tools can be used by rootkits developers.
»Simple Event Correlator for real-time security log monitoring
Risto Vaarandi
Over the past decade, event correlation has become a prominent event process in technique in many domains. However, existing open-source log monitoring tools don't support it well. We present what correlation is, what was the motivation for its developing and how to employ SEC for monitoring and correlating events from security logs.
»Writing advanced Linux backdoors – packet sniffing
Brandon Edwards
As people create new defenses for backdoors, intruders are forced to innovate new techniques to keep pace with the rapidly progressing security industry. One of them is packet sniffing backdoors. We show you how it works and how to use it in practice.
»Cryptography for Mail and Data
Lars Packschies
Should we put our confidencial information in an e-mail and send it around the world? What is the cryptography role in more secure communication? We present how to set up and use keys GnuPG and how encrypt data on the filesystem level.
»Network Defense Applications using Sinkholes
Victor Oppleman
A little-talk-about network security technique has proven one of the most effective means of defense against denial-of-service attacks. In this article we describe sinkoholing usage techniques and present methods of protection.
»How to cook a covert channel
Simon Castro
Before starting to cook your covert channel, you first have to think about the receipt: how your cover channel will look like, what it will be used for and when you'll have your dinner. We make the menu, and teach you how to prepare a stealth control communication channel. Are you ready for cooking?
»There is no absolute security
We talk to a research associate worker at the local electronic data processing centre of the University of Cologne. How to use cryptographic solutions? Find out in this article.
»Column – Beware the monitor-crashing worm
Konstantin Klyagin
Would you like to get a hammer and smash the monitor in front of you? Take it easy, Konstantin Klyagin proves that you can love e-mail worms.