«HAKIN9 2007 ISSUE 2 English Language»
Publisher: Hakin9 | Issue 02/2007 | ISBN: n/a | Pages: 84 | PDF | 9.8 MB
Publisher: Hakin9 | Issue 02/2007 | ISBN: n/a | Pages: 84 | PDF | 9.8 MB
»Aimject
Jon Oberheide
The author presents a tool which facilitates man-in-the-middle attacks against AOL instant Messenger's OSCAR protocol via a simple GTK interface. Learn more on this useful device.
»Nmap
Diman Todorov
It is probably one of the most famous free, open source utilities. The author describes Network Mapper developed by Fiodor enabling user to explore the network and audit the security level. Nmap's design focuses on rapid, large-scale scans. For more info read this short report.
»Metasploit – exploring framework
Michal Merta
Thanks to his article you will acquire a general knowledge on how exploiting works as well as some more detailed information on The Metasploit Project – an interesting security initiative. Moreover – the author explains how to exploit services by the means of Metasploit.
»Fuzzing technique
Paul Sebastian Ziegler
Fuzzing is one of the latest techniques employed when looking for the bugs. Having read this article you will know what fuzzing exactly is; what are its theoretical basics and what makes it so efficient. Last but not least you will learn how to write and use your own fuzzer.
»In remembrance of timing attacks
This text sheds the light on performing timing analysis over the execution path of a program, leading to valid usernames identification on Unix and other services.
»Testing Intrusion Detection Systems
Rodrigo Rubira
Thanks to this article you will get to know shellcode polymorphism techniques and how polymorphic shellcode works. The authors illustrate the difficulties behind shellcode generation tool and many more of the technique's features.
»Firewall leak testing
David Matousek
In this section we present our readers' opinions on advantages & disadvantages of firewalls they have used. You can find out if the prizes are adequate to the quality, what are the main problems that the users experienced and finally you will see the rating.
»An interview with Matt Jonkman
This month, hakin9 talks to Matt Jonkman known to our readers as hakin9 columnist. Matt has been into IT for a long time now and the network engeneering and security as well as intrusion detection have always belonged to his main interests. He took part in launching an open-source research community for intrusion detection.
»John Viega's IT career
Magdalena Błaszczyk
It is a section presenting to our readers how interesting and complex working in the IT security field might be, and how much satisfaction being IT security community activist can bring.