exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files

HITB Magazine Volume 4 Issue 10
Posted Jan 7, 2014
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 4 Issue 10 - Topics include TCP Idle Scans in IPv6, You Can Be Anything You Want To Be, and more.

tags | tcp, magazine
SHA-256 | 50cfbbcf7deacef2c4378690b5e16d7bfaaee94a8a5e0d5c9d30a98824a75c6e
HITB Magazine Volume 1 Issue 8
Posted Apr 23, 2012
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 8 - Topics include Online Security At The Crossroads, Reverse Shell Traffic Obfuscation, and more.

tags | shell, magazine
SHA-256 | ce9505a07999c10f769a572fc687092df7190d5051db686f1aac5f5692f848c0
HITB Magazine Volume 1 Issue 7
Posted Oct 19, 2011
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 7 - Topics include What Would We Do Without Enemies, Extending SQL Injection Attacks Using Buffer Overflows, Windows Security Hardening, and more.

tags | overflow, sql injection, magazine
systems | windows
SHA-256 | e50b7e046d890e1a621a0b6036fbe9a6bbd09f45dedad72d1e4e39172a6cd5e8
HITB Magazine Volume 1 Issue 6
Posted Jun 13, 2011
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 6 - Topics include Social Security, Botnet-Resistant Coding, Hardening Java Applications with Custom Security Policies, Windows Numeric Handle Allocation In-Depth, and more.

tags | java, magazine
systems | windows
SHA-256 | 9eacfcbf4858146cc29b89cbcae803908973204a08ad6d2a0b48070b2ac8a2f8
HITB Magazine Volume 1 Issue 5
Posted Feb 9, 2011
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 5 - Topics include Investigating Kernel Return Codes with the Linux Audit System, Secure Shell Attack Measurement and Mitigation, Windows CSRSS Tips and Tricks, and more.

tags | shell, kernel, magazine
systems | linux, windows
SHA-256 | 7ba5cb3722469cf801f9eddceff6990948a8d5aeb5df0946b116b433a6a37127
HITB Magazine Volume 1 Issue 4
Posted Oct 10, 2010
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 4 - Topics include Decrypting TrueCrypt Volumes with a Physical Memory Dump, Reconstructing Dalvik applications using UNDX, Custom console hosts on Windows 7, and more.

tags | magazine
systems | windows
SHA-256 | 1c01348faa7304f0285e3229b00b8176c537f7a5c058d4764bbb0f6b98e747eb
HITB Magazine Volume 1 Issue 3
Posted Jul 6, 2010
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 3 - Articles include Using Kojonet Open Source Low Interaction Honeypot, Chinese Malware Factory, Reserve Objects in Windows 7, Javascrpt exploits with Forced Timeouts and more.

tags | magazine
systems | windows
SHA-256 | a99ce15d38f48c00126ef86fd1b8ced026841da89d947e4d9ae958d3127c5e96
HITB Magazine Volume 1 Issue 2
Posted Apr 23, 2010
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 2 -This issue covers automated malware analysis, windows objects in kernel vulnerability exploitation, and more.

tags | kernel, magazine
systems | windows
SHA-256 | cb042ca8cc507a8da1acaca874a404d0fbf87e51a6ecd8278a00ca363740fad3
HITB Magazine Volume 1 Issue 1
Posted Jan 12, 2010
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 1 -This issue covers LDAP injection, DLL injection, malware obfuscation, and more.

tags | magazine
SHA-256 | 319e8e5f21288a3ea68e38d69615dda7eee252b5dab391cc4f315b76b4c5dfe2
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Charges Russian Military Officers For Unleashing Wiper Malware On Ukraine
Posted Sep 6, 2024

tags | headline, government, russia, data loss, cyberwar, military, ukraine
Microsoft Tackling Windows Logfile Flaws With New HMAC-Based Security Mitigation
Posted Sep 6, 2024

tags | headline, microsoft, flaw, cryptography
Russian Doppelganger Campaign Exposed
Posted Sep 6, 2024

tags | headline, hacker, government, russia, cybercrime, fraud, cyberwar
North Korean Hackers Target Job Seekers With Fake App
Posted Sep 5, 2024

tags | headline, hacker, government, malware, conference, north korea
Cisco Patches Critical Vulns In Smart Licensing Utility
Posted Sep 5, 2024

tags | headline, flaw, patch, cisco
US Targets Election Influence Operation With Charges, Sanctions, Domain Seizures
Posted Sep 5, 2024

tags | headline, government, usa, russia, fraud, cyberwar
Colorado Tops List Of Cyberattacks Per Capita In The US
Posted Sep 5, 2024

tags | headline, hacker, government, privacy, usa, data loss
Ukrainian Drones Now Spray Thermite Streams Right Into Russian Trenches
Posted Sep 5, 2024

tags | headline, government, russia, military, ukraine
Security Boom Is Over, With Over 1/3 Of CISOs Reporting Flat Or Falling Budgets
Posted Sep 5, 2024

tags | headline
VMware Fusion13.x Code Execution Bug Patched
Posted Sep 4, 2024

tags | headline, flaw, patch, vmware
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close