Social engineering reloaded
The purpose of this article is to go beyond the basics and explore how social engineering, employed as technology, has evolved over the past few years. A case study of a typical Fortune 1000 company will be discussed, putting emphasis on the importance of education about social engineering for every corporate security program. 2006-03-14 http://www.securityfocus.com/infocus/1860 Zero to IPSec in 4 minutes This short article looks at how to get a fully functional IPSec VPN up and running between two fresh OpenBSD installations in about four minutes flat. 2006-02-28 http://www.securityfocus.com/infocus/1859 Sebek 3: tracking the attackers, part two The second article in this honeypot series discusses best practices for deploying Sebek 3 inside a GenIII honepot, and shows how to patch Sebek to watch all the attacker's activities in real-time. 2006-02-13 http://www.securityfocus.com/infocus/1858 Malicious Malware: attacking the attackers, part 2 This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part two of two. 2006-02-02 http://www.securityfocus.com/infocus/1857 Malicious Malware: attacking the attackers, part 1 This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part one of two. 2006-01-31 http://www.securityfocus.com/infocus/1856 Sebek 3: tracking the attackers, part one The first of this two-part series will discuss what Sebek is and what makes it so interesting, first by looking at the new capabilities of version 3 and how it integrates with GenIII Honeynet infrastructures. 2006-01-16 http://www.securityfocus.com/infocus/1855 Windows rootkits of 2005, part three The third and final article in this series explores five different rootkit detection techniques used to discover Windows rootkit deployments. Additionally, nine different tools designed for administrators are discussed. 2006-01-05 http://www.securityfocus.com/infocus/1854 Demystifying Denial-Of-Service attacks, part one This paper provides an introduction to Denial of Service (DoS) attacks, their methodologies, common prevention techniques, and how they differ from Distributed Denial of Service (DDoS) Attacks. This article is intended to be a broad overview for the beginner or intermediate-level administrator on the different types of DoS attacks. 2005-12-14 http://www.securityfocus.com/infocus/1853 Evading NIDS, revisited This article looks at some of the most popular IDS evasion attack techniques, based on fragmentation or using the TTL field. Snort's configuration and response to these attacks will also be discussed. 2005-12-06 http://www.securityfocus.com/infocus/1852 Windows rootkits of 2005, part two This three-part article series looks at Windows rootkits indepth. Part two focuses on the latest cutting edge rootkit technologies that are used to hide malicious code from security scanners. 2005-11-17 http://www.securityfocus.com/infocus/1851 |
|
Privacy Statement |