Categories
Hacking Tutorial

PS3 Cracker – Crackstation

Tutorial By nick breese Preview: I’m Nick Breese From Wellington, New Zealand (are there any other kiwis here?) Have been doing this research for 9 months now “Security consultant” for Security-Assessment.com We break things for a living Due to security being a small market in a small country, we need to be “jack of all […]

Categories
Hacking Tutorial

iPhone Forensics

Tutorial By Andrew Hoog Preview: Introduction The iPhone was introduced on January, 2007 and has now surpassed the Blackberry as the second largest supplier of smart phones. Regardless if this is sustainable, the Apple iPhone already has a significant footprint and will appear more frequently in computer forensic cases. The iPhone has an active hacking […]

Categories
Hacking Tutorial

Reversing with Ida Pro and CollabREate

Tutorial By Eagle Preview: 1 Introduction Reverse engineering of binary programs is a very time consuming task, often performed in a very serialized manner. Analysts are forced to operate in this serial fashion in large part because of the nature of the tools they choose to use. When several analysts do attempt to coordinate their […]

Categories
Hacking Tutorial

Browser Vulnerabilities

Tutorial By ETHz Preview: In recent years the Web browser has increasingly become targeted as an infection vector for vulnerable hosts. Classic scan for and remotely connect to vulnerable hosts (typically servers) in order to exploit them. Unlike these, Web browser vulnerabilities are commonly exploited when the user of the vulnerable host visits a malicious […]

Categories
Hacking Tutorial

Tracking Ghostnet

Tutorial by SecDevGroup Preview: This investigation was prepared by a dedicated team of professionals. Greg Walton conducted and coordinated the primary field-based research in India, Tibetan Missions abroad, and Europe. Greg is a SecDev Group associate and editor of the Information Warfare Monitor website. He is currently a SecDev Fellow at the Citizen Lab. The […]

Categories
Hacking Tutorial

Attacking Social Networks

Tutorial By hamiel-moyer Preview: Like most folks of a security bent (and if you’re reading this, that probably means you), we’ve spent a lot of time watching Web 2.0 with bemusement. Promiscuous sharing of information, client-side Javascript goop, blogging, mini-blogging, micro-blogging, vlogging, social nets and social media have all given the web much of what […]

Categories
Hacking Tutorial

Cryptanalytic Time-Memory Trade Off

Tutorial by LASEC Preview: Cryptanalytic attacks based on exhaustive search need a lot of computing power or a lot of time to complete. When the same attack has to be carried out multiple times, it may be possible to execute the exhaustive search in advance and store all results in memory. Once this precomputation is […]

Categories
Hacking Tutorial

Programmazione multithread su Linux

Tutorial by BlackLight Preview: Pre­requisiti per questo tutorial: Basi del linguaggio C Familiarità con i sistemi Unix Obiettivi di questo tutorial:Multiprogrammazione in ambiente Unix Differenza tra thread e processo Gestione dei processi a basso livello da parte del kernel Unix (algoritmi di scheduling) Introduzione ai sistemi multiprogrammati Ciò che ha fatto la fortuna dei sistemi Unix già negli anni ’80 è la propensione di questi ultimi nei confronti della programmazione multiprocesso e, in seguito, anche della programmazione multithread. Download Link: https://www.ihteam.net/papers/multi_3d_unix.pdf

Categories
Hacking Tutorial

Come ti frego il filtro su YouTube

YouTube ha deciso di usare la mannaia con i contenuti musicali infilati sui suoi server senza l’autorizzazione degli aventi diritto. Ma quella stessa mannaia che silenzia le canzoni famosesi presta a qualche controindicazione che un intraprendente uploader del portale ha scovato dopo aver condotto un po’ di esperimenti, modificando di volta in volta le caratteristiche […]

Categories
Hacking Tutorial

Buffer Overflow Sotto Linux

Tutorial By Preview: Il   buffer   overflow è   uno   degli   errori   di   programmazione   più   comuni   in   linguaggi   di programmazione a buffer statici, come C, C++ e tutti i linguaggi da essi derivati. Nonostante sia   uno   degli   errori   più   pericolosi   per   la   sicurezza   di   un’applicazione   e   di […]