Home Tags Security

Tag: Security

Rootkits: The Enemy Within

1
While it was assumed in the past that viruses only targeted Windows, hackers targeting the FOSS world proved this wrong. A rootkit on a...

Modify-function-return-value Hack! — Part 1

2
Sometimes it's helpful to think from a hacker's perspective. The information obtained can be used to write better code and a secure application. An...

Securing Apache, Part 9: Attacks that Target PHP-based Instances

3
Beginning with Part 1 of this series, we have covered all major attacks on Web applications and servers, with examples of vulnerable PHP code....

Advanced Nmap: A Recap

0
This final article in the series consolidates information from the previous articles, looks at NMap's future possibilities, and at the new tools from the...

Securing Apache, Part 8: DoS & DDoS Attacks

6
In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning...

Nessus with Metasploit — Track and Hack

1
Networks play an important role in a sysadmin's life. But have you ever wondered about the security of your network, or tried to find...

Advanced Nmap: NMap Script Scanning

0
In previous articles, we have studied NMap in great detail, including live scanning a firewall and verifying the recommendations. Now, it's time to study...

Securing Apache, Part 7: Fool-proofing the Server OS

5
Moving deeper into Web application and Apache security, let's now focus on OS commanding attacks, and those that lead to the disclosure of crucial...

Digital Forensic Analysis Using BackTrack, Part 1

7
Digital forensics, the art of recovering and analysing the contents found on digital devices such as desktops, notebooks/netbooks, tablets, smartphones, etc., was little-known a...

Advanced Nmap: Scanning Firewalls Continued

2
The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead...