ISSUE 35 (December 2012)
Scripting with Nmap
ISSUE 35
Issue 35 Contributors
Paul Anderson
West Point graduate
Steven Billington
Senior at West Point
Gregory Conti
Director of West Point’s Cyber Research Center
Alex Farmer
West Point graduate
Carlos Garcia Prado
IT security consultant
Péter Gyöngyösi
Product Manager at BalaBit IT Security
Cory Kirk
Senior at West Point
Jacob Kitchel
Senior Manager of Security and Compliance at Industrial Defender
Patrick Shaffer
West Point graduate
Edward Sobiesk
Director of West Point’s Information Technology Program
Kyle Stammer
West Point graduate
Didier Stevens
IT Security Consultant at Contraste Europe NV
Darren Suprina
IT Systems Designer at Stonesoft
Gavin Watson
Senior Security Engineer and Head of the Social Engineering Team at RandomStorm

Scripting with Nmap

PDF download
Read issue 35 now
Share

Table of contents

  • Administrative scripting with Nmap
  • Information security in Europe with ENISA Executive Director Prof. Udo Helmbrecht
  • Unintended, malicious and evil applications of augmented reality
  • The enemy at the gate
  • Top five hurdles to security and compliance in industrial control systems
  • How to monitor the blind spots in your IT system: Logging versus auditing
  • DBI aid reverse engineering: Pinpointing interesting code
  • The importance of data normalization in IPS

(IN)SECURE Magazine archive

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue

ISSUE 67(November, 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue