ISSUE 35 (December 2012)
Scripting with Nmap
ISSUE 35
Issue 35 Contributors
Paul Anderson
West Point graduate
Steven Billington
Senior at West Point
Gregory Conti
Director of West Point’s Cyber Research Center
Alex Farmer
West Point graduate
Carlos Garcia Prado
IT security consultant
Péter Gyöngyösi
Product Manager at BalaBit IT Security
Cory Kirk
Senior at West Point
Jacob Kitchel
Senior Manager of Security and Compliance at Industrial Defender
Patrick Shaffer
West Point graduate
Edward Sobiesk
Director of West Point’s Information Technology Program
Kyle Stammer
West Point graduate
Didier Stevens
IT Security Consultant at Contraste Europe NV
Darren Suprina
IT Systems Designer at Stonesoft
Gavin Watson
Senior Security Engineer and Head of the Social Engineering Team at RandomStorm

Scripting with Nmap

PDF download
Read issue 35 now
Share

Table of contents

  • Administrative scripting with Nmap
  • Information security in Europe with ENISA Executive Director Prof. Udo Helmbrecht
  • Unintended, malicious and evil applications of augmented reality
  • The enemy at the gate
  • Top five hurdles to security and compliance in industrial control systems
  • How to monitor the blind spots in your IT system: Logging versus auditing
  • DBI aid reverse engineering: Pinpointing interesting code
  • The importance of data normalization in IPS

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue