background preloader

The Ethical Hacker Network

The Ethical Hacker Network
Related:  Digital ForensicForensic tools

Hacker Highschool - Security Awareness for Teens ZMap · The Internet Scanner - Vimperator Top 10 Web hacking techniques of 2010 revealed Network World - A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open voting. Called the Padding Oracle Crypto Attack, the hack takes advantage of how Microsoft's Web framework ASP.NET protects AES encryption cookies. FROM THE SECURITY WORLD: Quirky moments at Black Hat DC 2011 If encryption data in the cookie has been changed, the way ASP.NET handles it results in the application leaking some information about how to decrypt the traffic. With enough repeated changes and leaked information, the hacker can deduce which possible bytes can be eliminated from the encryption key. That reduces the number of unknown bytes to a small enough number to be guessed. The developers of the hack -- Juliano Rizzo and Thai Duong -- have developed a tool for executing the hack. Here are the rest of the top 10 Web hacks voted in the competition: 2. 3. 4. 5. 6.

hackergames.net Book Review: Digital Forensics with Open Source Tools | Forensic Methods With more forensic books hitting the shelves, I find myself prioritizing those by authors I know and trust. I have worked with Cory Altheide and he is an extremely talented forensic professional with a passion for open source tools. Not surprisingly, I would not categorize this as a beginner book. Open source tools require a higher level of interaction than their commercial counterparts, but are a great way to take your forensic skills to the next level. While teaching, I often see students frustrated that there is no one tool that can do it all. Such a tool does not exist, no matter how much you are able to pay for it. The book begins with an excellent section on setting up your forensic workstation, using either Linux or Windows as a host. Of course the coverage of open source tools is why many will buy this book. Overall, I found DFWOST to be a tremendous asset in an area with few published resources.

Forensics Wiki The Hacker News - Security in a Serious way DARKSIDE RG 2600: The Hacker Quarterly

Related:  BlogsrakeilenSécuritéForumskrunal2