Twenty Year Anniversary
Showing 1 - 6 of 6 RSS Feed

InfoSec Writers

www.infosecwriters.com

InfoSec Writers is focused on publishing quality papers and developing original and creative projects in an effort to promote IT security and simultaneously establish its own security oriented community.

hh7.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 7: Covert Channel and Tunneling over the HTTP protocol, Generic attacks against a honeypot, Innovative Mailbombs, New Beginnings, Technology without policy.

tags | web, protocol
MD5 | 649c4dd3b9d2eb73ab2726944e1cb4a3
hh6.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 6: Shellcode : The assembly cocktail, Interview - Dan Verton, Applying steganography.

tags | shellcode
MD5 | e5192c97ad6e1eba19aac3e63fe6f76d
hh5.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 5: An unwired Universe, Tales from the Void - assorted topics including race conditions and algorithms, safe security practises etc.

MD5 | ce3984d8f681cccb3b8362b60d0cf233
hh4.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 4: Reviewing buffer overflow issues/concepts covered in Aleph One's seminal paper, Conclusion of "Advanced Meal - A keylogger in an API", Report on the forensics experiment.

tags | overflow
MD5 | e4ded22f55f66588bde7e142169deee0
hh3.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 3: Keylogger in an API (Continued from #2), H/P/V - The Inc. story, Welcome to my world.

MD5 | 5c79dc57431041137694ed331d71b05b
hh2.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 2: Notes on Win32 programming, Keylogger in an API (Part #1).

systems | windows
MD5 | 68f7827ce093b7856c287b5a4bcc81d8
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Appliance Botnet Could Bring Power Grid To Its Knees
Posted Aug 17, 2018

tags | headline, flaw, scada
Chinese Hackers Target Alaska
Posted Aug 17, 2018

tags | headline, hacker, government, usa, china, cyberwar
Necurs Botnet Launches Fresh Assault Against Banks
Posted Aug 17, 2018

tags | headline, malware, bank, cybercrime, botnet, fraud
Apple Hack Teen Pleads Guilty
Posted Aug 17, 2018

tags | headline, hacker, data loss, apple
Google Expands Bug Bounty To Include Fraud Protection Bypass
Posted Aug 16, 2018

tags | headline, fraud, flaw, google
Credit Card Skimmers Now Need To Fear The Reaper
Posted Aug 16, 2018

tags | headline, hacker, bank, cybercrime, fraud, conference
The Hackers Hunting Down Missing People
Posted Aug 16, 2018

tags | headline, hacker, privacy, conference
President Trump Relaxes US Cyber-Attack Rules
Posted Aug 16, 2018

tags | headline, government, usa, cyberwar, fbi, nsa, cia
Mystery Russian Satellite's Behavior Raises Alarm In US
Posted Aug 15, 2018

tags | headline, usa, russia, space, cyberwar, spyware
Adobe Fixes Critical Code Execution Flaws In Latest Patch Update
Posted Aug 15, 2018

tags | headline, flaw, adobe, patch
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close