Malicious Malware: attacking the attackers, part 2
This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part two of two. 2006-02-02 http://www.securityfocus.com/infocus/1857 Malicious Malware: attacking the attackers, part 1 This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part one of two. 2006-01-31 http://www.securityfocus.com/infocus/1856 Evading NIDS, revisited This article looks at some of the most popular IDS evasion attack techniques, based on fragmentation or using the TTL field. Snort's configuration and response to these attacks will also be discussed. 2005-12-06 http://www.securityfocus.com/infocus/1852 Cisco SNMP configuration attack with a GRE tunnel 2005-09-16 http://www.securityfocus.com/infocus/1847 WEP: Dead Again, Part 2 Part two of the WEP cracking series shows how active attacks can dramatically increase the rate of packet collection and speed up statistical attacks. 2005-03-08 http://www.securityfocus.com/infocus/1824 Penetration Testing IPsec VPNs This article discusses a methodology to assess the security posture of an organization's IPsec based VPN architecture. 2005-02-09 http://www.securityfocus.com/infocus/1821 Blind Buffer Overflows In ISAPI Extensions This paper will outline the risks ISAPI Extensions pose and how they can be exploited by third parties without any binary exposure or knowledge using blind stack overflows. This method can enable remote code execution in proprietary and third party applications. 2005-01-25 http://www.securityfocus.com/infocus/1819 WEP: Dead Again, Part 1 This article is the first of a two-part series that looks at the new generation of WEP cracking tools for WiFi networks, which offer dramatically faster speeds for penetration testers over the previous generation of tools. In many cases, a WEP key can be determined in seconds or minutes. 2004-12-14 http://www.securityfocus.com/infocus/1814 Metasploit Framework, Part 3 This third and final article in the Metasploit series covers the msfcli scripting interface as well as the intuitive web interface to the Framework. The article also discusses what's new with version 2.2, and then introduces the exploit development process through an example. 2004-09-14 http://www.securityfocus.com/infocus/1800 Using Libwhisker This article discusses the use of Libwhisker, a PERL module which allows for the creation of custom HTTP packets and can be used for penetration testing various web applications. 2004-08-24 http://www.securityfocus.com/infocus/1798 |
|
Privacy Statement |