Know Your Enemy: II

How to determine what the enemy is doing by analyzing your system log files. Includes examples based on two commonly used scanning tools, sscan and nmap. Read the paper in …

Know Your Enemy

The tools and methodology of the most common black-hat threat on the Internet, the Script Kiddie. By understanding how they attack and what they are looking for, you can …

A guide to System V Init

So here we go again. After you have exorcised all of the daemons that were haunting your system, you might be interested in all of the boring processes that occur when booting …

CGI Vulnerabilities

Everybody and their mom uses cgi-bin’s in some way or another on their web pages, or on their web server, aware or not of that fact. Today’s not so hot topic is …

The First Step of Exploring a System

The first step to exploring a system is not just another point and click. It is the part that suprisingly, no one really talks about; gathering information on the subject. In …

Is YOUR Network Secure?

Scenario As the Senior Executive of a major business, you know one thing that has to be accomplished now; your company needs to get on the Internet. You do not know why, but …

lkm: Kernel hacking made easy

The following applies to the Linux i86 2.0.x kernel series. It may also be accurate for previous releases, but has not been tested. 2.1.x kernels introduced a bunch of …