Tutorial By nick breese Preview: I’m Nick Breese From Wellington, New Zealand (are there any other kiwis here?) Have been doing this research for 9 months now “Security consultant” for Security-Assessment.com We break things for a living Due to security being a small market in a small country, we need to be “jack of all […]
Category: Hacking Tutorial
Hacking Tutorial
iPhone Forensics
Tutorial By Andrew Hoog Preview: Introduction The iPhone was introduced on January, 2007 and has now surpassed the Blackberry as the second largest supplier of smart phones. Regardless if this is sustainable, the Apple iPhone already has a significant footprint and will appear more frequently in computer forensic cases. The iPhone has an active hacking […]
Tutorial By Eagle Preview: 1 Introduction Reverse engineering of binary programs is a very time consuming task, often performed in a very serialized manner. Analysts are forced to operate in this serial fashion in large part because of the nature of the tools they choose to use. When several analysts do attempt to coordinate their […]
Browser Vulnerabilities
Tutorial By ETHz Preview: In recent years the Web browser has increasingly become targeted as an infection vector for vulnerable hosts. Classic scan for and remotely connect to vulnerable hosts (typically servers) in order to exploit them. Unlike these, Web browser vulnerabilities are commonly exploited when the user of the vulnerable host visits a malicious […]
Tracking Ghostnet
Tutorial by SecDevGroup Preview: This investigation was prepared by a dedicated team of professionals. Greg Walton conducted and coordinated the primary field-based research in India, Tibetan Missions abroad, and Europe. Greg is a SecDev Group associate and editor of the Information Warfare Monitor website. He is currently a SecDev Fellow at the Citizen Lab. The […]
Attacking Social Networks
Tutorial By hamiel-moyer Preview: Like most folks of a security bent (and if you’re reading this, that probably means you), we’ve spent a lot of time watching Web 2.0 with bemusement. Promiscuous sharing of information, client-side Javascript goop, blogging, mini-blogging, micro-blogging, vlogging, social nets and social media have all given the web much of what […]
Tutorial by LASEC Preview: Cryptanalytic attacks based on exhaustive search need a lot of computing power or a lot of time to complete. When the same attack has to be carried out multiple times, it may be possible to execute the exhaustive search in advance and store all results in memory. Once this precomputation is […]
Tutorial by BlackLight Preview: Prerequisiti per questo tutorial: Basi del linguaggio C Familiarità con i sistemi Unix Obiettivi di questo tutorial:Multiprogrammazione in ambiente Unix Differenza tra thread e processo Gestione dei processi a basso livello da parte del kernel Unix (algoritmi di scheduling) Introduzione ai sistemi multiprogrammati Ciò che ha fatto la fortuna dei sistemi Unix già negli anni ’80 è la propensione di questi ultimi nei confronti della programmazione multiprocesso e, in seguito, anche della programmazione multithread. Download Link: https://www.ihteam.net/papers/multi_3d_unix.pdf
YouTube ha deciso di usare la mannaia con i contenuti musicali infilati sui suoi server senza l’autorizzazione degli aventi diritto. Ma quella stessa mannaia che silenzia le canzoni famosesi presta a qualche controindicazione che un intraprendente uploader del portale ha scovato dopo aver condotto un po’ di esperimenti, modificando di volta in volta le caratteristiche […]
Buffer Overflow Sotto Linux
Tutorial By Preview: Il buffer overflow è uno degli errori di programmazione più comuni in linguaggi di programmazione a buffer statici, come C, C++ e tutti i linguaggi da essi derivati. Nonostante sia uno degli errori più pericolosi per la sicurezza di un’applicazione e di […]