Et Cetera

Tue
08
Sep

The Emerging Trend of Wearable Technological Devices

Contributed by Brian Kyle Marek

Wearable Technology is a growing trend in the fitness market. The technology used in this emerging field has led to the wearable technology industry expanding into multiple sectors. While the current market of such devices is focused primarily around fitness, there is potential for significant growth and development in other areas, including the medical and business world.

This document is in PDF format. To view it click here.

Tue
08
Sep

Assessing Java Clients with the BeanShell

Contributed by Stephen de Vries

Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and repeat. This becomes even more difficult when the source code to the application is not available. What we require is an easy means of interacting with the internals of an application during execution without recompiling the code.

Enter the BeanShell (http://www.beanshell.org), which provides an interpreted, scripting environment that can plug in to any Java application or applet and allows users to inspect and manipulate objects dynamically. This paper demonstrates a technique for using the BeanShell to assess the security of a typical Java client-server application.

This document is in PDF format. To view it click here.

Fri
04
Sep

The Hitchhiker's World Issue #9

Contributed by Hitch

Hitchhiker's world is an old blog created by an old ISW founding partner and friend. He sought out the most intriguing topics, and revealed them here every month. While these are old topics and articles, they are still a top hit on ISW today. Contents from this blog included An Introduction to Linux Kernel Backdoors, Receive-only UTP cables and Network Taps, Observable Elections, LMCrack - Cracked in 60 seconds (still a very popular read on our site).

This 2003 blog can be found here. To view it click here

Thu
03
Sep

The Hitchhiker's World Issue #8

Contributed by Hitch

Hitchhiker's world is an old blog created by an old ISW founding partner and friend. He sought out the most intriguing topics, and revealed them here every month. While these are old topics and articles, they are still a top hit on ISW today. Contents from this blog included Exploitation of Buffer Overflow Vulnerabilities Under Windows XP, A lightweight virtual machine for running user-level operating systems, The Anatomy of Cross Site Scripting, ISEAGE, Alert Verification : Determining the success of intrusion attempts, and an interview with Robert Mears, who designed our logo and the original site over a decade ago!

This 2003 blog can be found here. To view it click here

Thu
03
Sep

Securing The Enterprise Network

Contributed by Mark Wollerman

The following research topic looks at different approaches to securing the enterprise network. In this topic we will discuss the best practices that can bring additional security to the enterprise network. In today’s network enterprise attacks can be more sophisticated that what the modern security engineer can expect. The modern enterprise network has changed allot since the late 90’s and early 2000’s. Today’s biggest concerns include, user brought devices, Virtualization, Account Schema’s, Emails and Network security.

This document is in PDF format. To view it click here

Pages

Subscribe to RSS - Et Cetera