Exploitation

Fri
02
Oct

Cookie Dethroning: DEMYSTIFIED (Part 2 of 2)

Contributed by Zer()Kn()ck

This Paper Is Extensively Designed For Digging deep into cookies. It jolts the cookie analysing and exploitation of cookies at the extremity. This is undertaken to have an eye on the cookie manipulation ,hacks and exploits that can be processed by an attacker for extracting information from the system on the fly.

This document is in PDF format. To view it click here.

Fri
02
Oct

Cookie Dethroning: DEMYSTIFIED (Part 1 of 2)

Contributed by Zer()Kn()ck

This Paper Is Extensively Designed For Digging deep into cookies. It jolts the cookie analysing and exploitation of cookies at the extremity. This is undertaken to have an eye on the cookie manipulation ,hacks and exploits that can be processed by an attacker for extracting information from the system on the fly.

This document is in PDF format. To view it click here.

Wed
23
Sep

What is TEMPEST?

Contributed by

Ok prepare to strap that tinfoil hat on two notches below excruciating; we’re going to talk about TEMPEST. What is TEMPEST? It’s defined in NSTISSI-7000 as:
Electronic and electromechanical information-processing equipment can produce unintentional intelligence-bearing emanations, commonly known as TEMPEST. If intercepted and analyzed, these emanations may disclose information transmitted, received, handled, or otherwise processed by the equipment.

This document is in PDF format. To view it click here.

Fri
04
Sep

Anti-Virus Evasion Techniques and Countermeasures

Contributed by Debasis Mohanty

The objective of this article is to demonstrate different possible ways that viruses and worms coders use to evade any Anti-Virus products while coding malicious programs and at the same time I shall also be discussing about the countermeasures techniques to prevent against such attacks. Before I go in depth I assume that the readers of this article are well aware of the difference between worms and viruses.

This document is in PDF format. To view it click here.

Thu
03
Sep

Sniffing in a Switched Network

Contributed by Manu Garg

An overivew of sniffing in a switched network with a recipe to hack a switch using Ettercap and Ethereal.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Exploitation