Exploitation

Wed
23
Sep

What is TEMPEST?

Contributed by

Ok prepare to strap that tinfoil hat on two notches below excruciating; we’re going to talk about TEMPEST. What is TEMPEST? It’s defined in NSTISSI-7000 as:
Electronic and electromechanical information-processing equipment can produce unintentional intelligence-bearing emanations, commonly known as TEMPEST. If intercepted and analyzed, these emanations may disclose information transmitted, received, handled, or otherwise processed by the equipment.

This document is in PDF format. To view it click here.

Fri
04
Sep

Anti-Virus Evasion Techniques and Countermeasures

Contributed by Debasis Mohanty

The objective of this article is to demonstrate different possible ways that viruses and worms coders use to evade any Anti-Virus products while coding malicious programs and at the same time I shall also be discussing about the countermeasures techniques to prevent against such attacks. Before I go in depth I assume that the readers of this article are well aware of the difference between worms and viruses.

This document is in PDF format. To view it click here.

Thu
03
Sep

Sniffing in a Switched Network

Contributed by Manu Garg

An overivew of sniffing in a switched network with a recipe to hack a switch using Ettercap and Ethereal.

This document is in PDF format. To view it click here.

Tue
01
Sep

Paradox of Web Leeching

Contributed by Aditya K Sood

Tue
01
Sep

Security Issues With Address Resolution Protocol

Contributed by Akash Shrivastava

Any computer which is connected to the Network (LAN or WAN) has two addresses. One is the IP Address (An IP Address is a 32-bit number included of a host number and a network prefix, both of which are used to uniquely identify each node within a network), and the second is Physical or Ethernet Address called MAC Address (An Ethernet address or MAC Address is a 48-bit six-part hexadecimal number in which a colon separates each part, for example, 8:0:20:1:2f:0. This number identifies the Ethernet board installed in a PC and is used to identify the PC as a member of the network).
The foremost intention of present study is to understand and deal with the subject of ARP Spoofing.

The issue that how ARP spoofing can be used for different kind of attacks to Network Structure and Operating Systems and how to provide countermeasures to protect them has been reviewed and discussed in this article.

Pages

Subscribe to RSS - Exploitation