Social Engineering
The purpose of this text is to introduce or better explain the art of social engineering. This is one of the most difficult things to explain but I found a rather easy method …
The purpose of this text is to introduce or better explain the art of social engineering. This is one of the most difficult things to explain but I found a rather easy method …
THE REGULATION OF INVESTIGATORY POWERS BILL, 2000 “Government is too secretive. Too many decisions are taken behind closed doors without proper consultation with the …
It’s Saturday morning and you hop on the Net looking for some info on smoking related illnesses ‘cuz your best friend’s been thinking of quitting lately and …
We all get junk mail at home. It’s an accepted fact of life, at least in the U.S. So why is Unsolicited Commercial Email (UCE) – a/k/a “spam” or …
Most buffer overflow exploits for Windows have relied on getting code on the stack and somehow jumping process execution to there, but as more products arrive in the market to …
This document will look at the relatively unsung skill of assessing the in-depth configuration of a Microsoft IIS web server remotely, showing how to “read” server …
What is security? Process, procedures, and tools that assure data can be stored reliability and retrieved by those authorised users… Download the paper in PPT format here.
This paper describes how some HTML browsers can be tricked through the use of HTML forms into sending more or less arbitrary data to any TCP port. This can be used to send …
Apart from firewalls, which aim at protecting internal networks against attacks from the internet, web servers are the second important field requiring a high degree of …
This is the presentation that the Attrition staff presented at the BlackHat Briefings 2001. It shows how they managed their defacement mirror as well as the problems related …
This is the presentation from the BlackHat Briefings by Ivan Arce and Maximiliano Caceres. Download the presentation in PDF format here.
The article describes an attack on OpenPGP format, which leads to disclosure of the private signature keys of the DSA and RSA algorithms. The OpenPGP format is used in a …