Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security

Submission + - Video:Client-Sides, Social Eng & Metasploit, O (ethicalhacker.net)

ddonzal writes: "It's obvious that the bad guys are moving away from network level attacks and moving toward social engineering coupled with tools like Metasploit. So, here's a little client-side exploitation for your viewing pleasure from Chris Gates, EH-Net Columnist. Chris will also be at ChicagoCon 2009s May 8 — 9 presenting an extended version of this article and video. http://www.ethicalhacker.net/content/view/219/24/"
Books

Submission + - Daemon - A Contest Revealed (ethicalhacker.net)

ddonzal writes: "Daemon, A Novel has been universally praised by the hacker community and recently hit the NY Times Bestseller List for Hardcover Fiction. With the official blessing of author, Daniel Suarez, The Ethical Hacker Network hosted a crypto and programming contest that is fun and educational while at the same time spreading the word of this truly unique book. In addition to announcing the winners, we posted complete tutorials using all free tools and sample code. Enjoy & Learn! http://www.ethicalhacker.net/content/view/225/8/"
Security

Submission + - Plug-N-Play Network Hacking (ethicalhacker.net)

ddonzal writes: "Universal Plug-N-Play (UPnP) is a protocol that allows network devices to auto-configure themselves. Allowing legitimate programs to alter your router settings as they need makes Joe User's life much easier — unfortunately, it also makes Joe Hacker's life easier, too. In order for UPnP to be truly "plug-n-play", there is no authentication built into the protocol; any program can use UPnP to alter a router's (or other UPnP device's) settings. This article by will address some of the security issues related to UPnP, briefly describe the inner workings of the protocol, and show how to identify and analyze UPnP devices on a network using open source tools. While we will be specifically focusing on IGDs (Internet Gateway Devices, aka, routers), it is important to remember that there are many other devices and systems that support UPnP as well, and they may be vulnerable to similar attacks. http://www.ethicalhacker.net/content/view/220/24/"
Linux Business

Submission + - Review: EnGarde Secure Linux (ethicalhacker.net)

ddonzal writes: "A secure, easy-to-install Linux distro with efficient management capabilities and SELinux? Now that would be a welcome addition to anyone's arsenal of free software. Those of you who have followed my column know that I am a big fan of Linux. In addition to that, my column focuses on the trials and tribulations of getting my employers computing environment out of the Stone Age and rebuilt with security in mind from the get go. All of this while being hamstrung by an almost nonexistent budget. Read the full review. http://www.ethicalhacker.net/content/view/172/24/"
Security

Submission + - Frosty the Snow Crash (ethicalhacker.net)

ddonzal writes: "Like it or not, it's that time of year again. At least we have the continuing tradition of an Ed Skoudis Holiday Hacking Challenge to get you through those days of brain freeze. Dive into the head of Mr. Skoudis as he takes you into the cyberpunk world of author Neal Stephenson with a little twist as only Ed can deliver. http://www.ethicalhacker.net/content/view/170/2/"
Security

Submission + - ChicagoCon Diary: Day 1 - I Can't Believe It (ethicalhacker.net)

ddonzal writes: "I am the founder and organizer of a new security event that took place just this past September. This is the first part of a series of articles chronicling my ChicagoCon experience. I use these words specifically, because this is meant to give you a view of ChicagoCon from my perspective. So I will readily admit that it is a biased opinion. But I also wanted to give you a behind the scenes look into running a complex event — the good and the bad. http://www.ethicalhacker.net/content/view/163/24/"
Programming

Submission + - Intro to Reverse Engineering - Part 2 (ethicalhacker.net)

ddonzal writes: "In Part 1, Intro to Reverse Engineering — No Assembly Required, we extended the series of coding articles for non-programmers with an area of high interest in the infosec community. We're proud to be able to bring you the highly anticipated follow-up complete with screen shots, sample code and applications. This one is long and detailed, so strap yourselves in for some great educational content. This paper is designed to outline some essential reverse engineering concepts, tools and techniques — primarily, debuggers and using the debugging process to reverse engineer application functions and algorithms. It is assumed you have knowledge of basic assembly and C programming. This tutorial does not necessarily have to be read in order (although it is strongly advised), as some sections do not contain information that directly relates to subsequent sections. http://www.ethicalhacker.net/content/view/165/2/"
Security

Submission + - Worst. Ethical. Hacker. Challenge. Ever. - Do'h! (ethicalhacker.net)

ddonzal writes: "Ed Skoudis here, and I'm delighted to announce that we have a brand-new ethical hacker challenge for you. This Simpsons-themed hacking challenge is awesome from its self-deprecating title to its comic book format. Kevin Bong AKA K-Bo doesn't disappoint with this very whacked view of Jeff "Comic Book Guy" Albertson getting hacked. Sheer genius! http://www.ethicalhacker.net/content/view/164/2/"
Networking

Submission + - Nmap from an Ethical Hacker's View Part 1 (ethicalhacker.net) 1

ddonzal writes: "What, another Nmap tutorial? Yes that's true, but I am hoping to approach it a little differently than what I have seen available. I want to describe Nmap from the viewpoint of an ethical hacker and at the same time give a clear, step-by-step method of attaining a good level of proficiency. After completing this 2 Part Series and having practiced the techniques described, one should not only be able to sit at a "roundtable" with advanced security professionals and "hold their own" in a discussion concerning Nmap, but also utilize this great tool in protecting their own network. http://www.ethicalhacker.net/content/view/155/1/"
Programming

Submission + - Intro to Reverse Engineering, No Assembly Required (ethicalhacker.net)

ddonzal writes: "Great intro to reverse engineering for someone with no experience whatsoever on the subject. In this continuing series on coding essentials for those programmatically-challenged InfoSec Pros (ethical hackers), we build on the knowledge learned in the first article, "Intro to C." No prior knowledge of Assembly is Required! http://www.ethicalhacker.net/content/view/152/2/"
Education

Submission + - "Linux for Dummies" Author to Teach at Chi (chicagocon.com)

ddonzal writes: "Learn from the master at ChicagoCon 2007 with Evan Blomquist, the worlds first Certified Linux Trainer (SAIR Linux Cert). He will be instructing the Accelerated Linux Certification Program. We're excited to have him not only because Linux is important for ethical hacking and pen testing, but also because he literally wrote the book on the subject. http://www.chicagocon.com/content/view/26/8/"
Education

Submission + - Win Free Seat to ChicagoCon 2007 (ethicalhacker.net)

ddonzal writes: "Ethical Hacking, Expert Pen Testing, Web App Hacking, Cisco, Forensics, CISSP, Linux+ and more. ChicagoCon is a pro. security conference, certification training and a hacker con rolled into a single, unique event from Sept 17 — 23. Keynotes include John C. Dvorak, Steve Hunt, Lance Spitzner, DoD & Symantec. Hacking Presentations and prizes, too. http://www.ethicalhacker.net/content/view/151/8/"
Security

Submission + - ChicagoCon 2007 (chicagocon.com)

ddonzal writes: "ChicagoCon 2007 is where "White Hats Come Together in Defense of the Digital Frontier" for a professional security conference, certification training and hacker con all rolled into a single, unique event on September 17 — 23, 2007. We're bringing together the biggest security names under one roof for a week of training like no other. Not just another boot camp or hacker con, ChicagoCon adds value to your training dollars by also providing top instructors (most of whom are published), well known certifications, keynotes, evening presentations, hacking demos & contests as well as gift bags for all. 11 courses including CISSP, CEH, CHFI, Advanced Hacking, Cisco, SOX/COBIT, Security+, Linux+ and more. From the novice, to the ultimate techie, to the CISO chair... everyone interested in a career in security will find something at ChicagoCon, your one-stop shop for security training and certification. Keynotes: John C. Dvorak, Steve Hunt, Lance Spitzner, Symantec, DoD. http://www.chicagocon.com/"

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...