ISACA CISA July 2, 2011 Kenneth Magee IT auditing and controls – Database technology and controls PORTIONS OF THIS ARTICLE INCLUDING MANY OF THE DEFINITIONS AND TERMINOLOGY HAVE BEEN SOURCED AND SUMMARIZED FROM ISACA.ORG and COURSE MANUALS PUBLISHED BY ISACA. A...
ISACA CISA July 1, 2011 Kenneth Magee IT auditing and controls – Infrastructure general controls PORTIONS OF THIS ARTICLE INCLUDING MANY OF THE DEFINITIONS AND TERMINOLOGY HAVE BEEN SOURCED AND SUMMARIZED FROM ISACA.ORG and COURSE MANUALS PUBLISHED BY ISACA. Infrastructure...
Hacking June 28, 2011 Keatron Evans Advanced Rootkit Exploit – Demonstrated This is mainly post-expoitation demonstration, that first starts with a walk-through of exploiting a windows machine. Next, we walk through getting a copy...
Hacking June 27, 2011 Darren Dalasta Dave Aitel Reveals His Process for Security Research In our ongoing series of interviews, this week Dave Aitel answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for...
General security June 23, 2011 Brian Greenberg Are your backup systems secure? All seemed well with backup operations at my company, until I got a visit from an operations center engineer. The lock already hanging open, he was holding...
Application security June 22, 2011 Skyler Onken Securing Software with the Application and Front Controller Patterns Securing software has always been an issue. Whether it be web, desktop or server applications, insecure coding practices can result in substantial data loss...
Application security June 17, 2011 Thomas Mackenzie Malicious SOAP Requests as Web Service Attacks The recent Application Security Europe conference (www.appseceu.org) was one of the better conferences I have had the pleasure to attend. The talks were interesting...
Hacking June 17, 2011 Andrew Whitaker Writing SEH Exploits In these two videos, we will demonstrate how to write an exploit of the Structured Exception Handler. The video assumes you already understand how SEH and exploits...
Hacking June 17, 2011 Andrew Whitaker Cracking WPA2 Tutorial In this video we will demonstrate how to crack WPA2 using the Airmon-ng suite. We will do it by: Identifying an access point Capturing traffic from that...
Hacking June 16, 2011 Andrew Whitaker Adobe Vulnerability Tutorial In this video, we will demonstrate the adobe_utilprintf exploit. We will show how to set up a PDF within Metasploit that will deliver an exploit via an HTML...