Sunday, September 10, 2006

Weekend Reads

Session Hijacking Explained

'Session Hijacking' is a high level attack vector which many systems are completely open to. Most systems are vulnerable to this type of attack as most systems use Transmission Control Protocol (TCP), the standard communication protocol used on the Internet and internal Local Area Networks (LANs). This paper assumes a level of network competency by the reader to being equivalent to that of a network engineer or experienced administrator.


Visit the website HERE.

==================================================================
[IN]SECURE Magazine

Issue 8 - September 2006 is now online with 10 interesting topics.

Read the magazine HERE.

Warning : This 84 page document is 6Mb in size

==================================================================

Norton AntiVirus detects itself!

I don't know if this is for real or not. But I don't care.
I hate this programme with a passion.
A resource hog that barely delivers on its promises.
This is definately the funniest thing I've seen for some time.

Take a look HERE.

==================================================================

MSN Hacking part 4

Part of the continuing series on using MSN as a hacking tool. This morning boingboing put out a note on their web site about searching for the phrase confidential "do not distribute" which was highly amusing, so decided to try it in MSN. The search string [ link ] returned around 15,000 results or a lot less than the 68,000 results from Google, but amusing none the same.


Looking up private or confidential information in the web search engines is today's lessons. This is purely an academic exercise and should be used to determine if you have any private or confidential information in the search engines.

Read the article HERE.

==================================================================

Banking Trojan Captures User's Screen in Video Clip

"Keylogger" trojans are hidden programs that collect and store the keys pressed by the user to forward them to a third party. This way, the attacker receives a file containing the information the affected user has written (passwords, messages, etc.).

Many banking institutions have introduced the so-called "virtual keyboard", in an attempt to mitigate the activity of this type of trojans. It is an on-screen graphical representation of a keyboard, that the user can use to enter his data by pressing the virtual keys with his mouse instead of using his traditional keyboard.

Read more HERE.

0 Comments:

Post a Comment

<< Home