Et Cetera

Fri
04
Sep

The Hitchhiker's World Issue #9

Contributed by Hitch

Hitchhiker's world is an old blog created by an old ISW founding partner and friend. He sought out the most intriguing topics, and revealed them here every month. While these are old topics and articles, they are still a top hit on ISW today. Contents from this blog included An Introduction to Linux Kernel Backdoors, Receive-only UTP cables and Network Taps, Observable Elections, LMCrack - Cracked in 60 seconds (still a very popular read on our site).

This 2003 blog can be found here. To view it click here

Thu
03
Sep

The Hitchhiker's World Issue #8

Contributed by Hitch

Hitchhiker's world is an old blog created by an old ISW founding partner and friend. He sought out the most intriguing topics, and revealed them here every month. While these are old topics and articles, they are still a top hit on ISW today. Contents from this blog included Exploitation of Buffer Overflow Vulnerabilities Under Windows XP, A lightweight virtual machine for running user-level operating systems, The Anatomy of Cross Site Scripting, ISEAGE, Alert Verification : Determining the success of intrusion attempts, and an interview with Robert Mears, who designed our logo and the original site over a decade ago!

This 2003 blog can be found here. To view it click here

Thu
03
Sep

Securing The Enterprise Network

Contributed by Mark Wollerman

The following research topic looks at different approaches to securing the enterprise network. In this topic we will discuss the best practices that can bring additional security to the enterprise network. In today’s network enterprise attacks can be more sophisticated that what the modern security engineer can expect. The modern enterprise network has changed allot since the late 90’s and early 2000’s. Today’s biggest concerns include, user brought devices, Virtualization, Account Schema’s, Emails and Network security.

This document is in PDF format. To view it click here

Tue
01
Sep

Hospitality IT Security

Contributed by Charles Hornat

This paper outlines some of the many IT security issues I have witnessed when taking over hotel/resort IT and security. These security lapses often times leave guest information free and open for the taking, usually requiring little to no effort to obtain. In my company’s experience (over a decade) of supporting some of the most prestigious hotels in the world, we see many of the same issues time and time again and I outline some of the more common issues we have come across.

This document is in PDF format. To view it click here.

Tue
01
Sep

Reverse Honey Trap - Striking Deep inside Online Web Antivirus Engines and Analyzers

Contributed by Aditya K Sood

Web based online anti viruses are used heavily for scanning malware files and providing the resultant output. There are number of online service providers which perform inline scanning of uploaded malware executables by the normal user or the victims. This process is based on the hierarchical functions and different steps opted to analyze the viruses and other worm activities. The infections occur dynamically when the executable becomes active in the environment. Everything is automated in this process as servers residing at the backend scan the executable and sent the information to other third party servers for secondary analysis or updating their record directly. That’s how the normal functioning of free online malware scanner works.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera