hakin9_4_2008_EN
- Type:
- Other > Other
- Files:
- 1
- Size:
- 8.67 MB
- Tag(s):
- hakin9 magazine
- Quality:
- +0 / -0 (0)
- Uploaded:
- Mar 11, 2009
- By:
- d(-_-)b
BASICS 12 File Inclusion Attacks ALI RECAI YEKTA, ERHAN YEKTA After reading this article, you will come to know about File Inclusion Attacks' methods and defense techniques against them. ATTACK 20 Hacking RSS Feeds: Insecurities in Implementing RSS Feeds ADITYA K. SOOD This paper discusses the infection vectors that occur due to insecure coding by developers and includes other related security issues. It provides a detailed analysis of the errors and efficient measures to correct those errors, while keeping in mind the original security concerns. 30 Alternate Data Streams or “Doctor Jekyll and Mr. Hyde†Move to NTFS (Part II) LAIC AURELIAN The second part of the ADS series. This article reveals everything you should know about ADS, focusing on its practical use. You will learn how to create, use and delete ADS. 36 All in Memory Execution under Linux ANTHONY DESNOS, FRÉDÉRIC GUIHÉRY, MICKAËL SALAÜN A very useful paper on all in memory execution under Linux. The authors show its rules, all in memory's tools and protection methods against the execution. 46 The Real Dangers of Wireless Networks STEPHEN ARGENT The paper explains how to break into Wireless Networks and use Ettercap, Driftnet and Wireshark for sniffing. While reading this article, you will learn how to manipulate packets and view MSN conversations over the network. DEFENSE 56 How to Deploy Robustness Testing MIKKO VARPIOLA, ARI TAKANEN In this article the authors explore various means of testing for the security mistakes, with the focus on deploying robustness testing into the software development lifecycle. 60 Protecting Data in a Postgres Database ROBERT BERNIER Part III of the three-part series on Postgres. This article addresses the issue of restricting access to data via the use of data encryption. After reading this paper, you will manage to use cryptographic functions obtained from two contributions modules.