Penetration testing January 9, 2012 Mike Sheward The art of writing penetration test reports You close the lid of your laptop; it's been a productive couple of days. There are a few things that could be tightened up, but overall the place isn't doing...
Digital forensics January 7, 2012 Satish B. iPhone Forensics [highlight color="blue"]Interested in formal iPhone forensics training? Check out our 3 day iPhone and iOS forensics course now available. [/highlight] iPhone...
Digital forensics January 5, 2012 Mike Sheward Rock Solid: Will Digital Forensics Crack SSDs? Digital forensics is one of the most interesting and exciting fields of information security that you can ever be fortunate enough to work in, but not for the...
Application security January 4, 2012 Parul Garg Fuzzing – Application and File Fuzzing In our first article, we reviewed the basics of fuzzing as well as the mutation and generation technique. We have also introduced the PeachFuzzer, which we...
Hacking January 4, 2012 Parul Garg Fuzzing: Mutation vs. generation Many of you have undoubtedly come across the word "Fuzzing" and wondered about it. But if you have ever tried modifying some parameter; some sort of input/arguments;...
Hacking December 21, 2011 Deepanker Verma LOIC (low orbit ion cannon) – DOS attacking tool The DOS (Denial of service) attack is one of the more powerful hacks, capable of completely taking a server down. In this way, the server will not be able to...
Hacking December 20, 2011 Prateek Gianchandani KARMETASPLOIT, Pwning the Air! Wireless networks have become very common in today's world, people are used to be connected to wireless networks in office, home, coffee shops etc. In order...
Hacking December 16, 2011 Hari Krishnan Web Analysis, Vulnerability Assessment and Exploitation using Backtrack5 Web application analysis plays a major role while doing a vulnerability assessment/penetration test. Proper information about the web application (for example...
Digital forensics December 16, 2011 Arvind Doraiswamy Rootkit Detector Features: Malicious System Threads and Debug Registers In my last article, we'd discussed the most important ways in which a rootkit enters a system and subsequently masks its presence so it isn't detected. We'd...
Reverse engineering December 16, 2011 Darren Dalasta Writing Self-Modifying Code Part 2: Using extended assembly – Practice Part 1 is here: /writing-self-modifying-code-part-1/ All the code for this tutorial is on github. Links for particular components are interspersed, or you...