[ Guides & Tutorials ]

Guide on setting up a GPS capable Android for use with GPSd & Kismet, utilizing 
Giskismet to create a KML file from NETXML exports to be viewed within google 
maps/earth o see locations of detected wireless networks.

Another paper detailing the setup and configuration of a penetration testing 
lab. 

This time the lab is geared towards people of a intermediate skill levels, 
looking to test out skills from an external attackers perspective on a 
corprorate environment. 
	
This lab will put you or your tools up against a basic stateful inspection 
firewall, performing NAT for devices living behind. 
	
As well as load balanced web servers protected by a WAF.

NOTE: This guide assumes you have already read and setup the basic 
version of the penetration testing LAB. 
	
More lab setups to come!

Paper detailing the setup and configuration of a penetration testing lab. 
	
This guide and lab is geared towards begineers, looking to test out 
skills from an internal attackers perspective of a corprorate 
environment setting. 

This guide use of the following kick ass open source projects: 
VirtualBox, PfSense
BackTrack, Metasploitable 2 
and Kioptrix - Level 1

After setting up this LAB environment, you will have the ability 
to exploit issues from the following categories:

1.Mis-configured Services and Applications
2.Backdoors planted into software
3.Un Intentional Backdoors
4.Weak Passwords
5.Web Applications 
6.Plus lots more..

Paper explaining some SSH Gymanstics tricks and how to setup a tunnel with ssh's 
-D option to setup a tunnel that is capable of bypassing filtering, ips/ids or a 
firewall / appliance.

The final copy was printed in a featured article of Hakin9

An old draft copy of an article I was writing up on analyzing malware. The final 
copy was featured in the last printed Hakin9 edition 

Ploymorphic Code Example - MASM - 06.2007
Quick intro to writing self modifying 'polymorphic' code using VirtualProtect 
API and MASM.

Master the power of netcat and become a true network ninja warrior, then hack 
with your cat.

This paper covers some XSS/cross site scripting hacking techniques along with 
filtering techniques to protect your servers against these types of attacks.. 

Quick paper write up explaining tcpdump basics and some of the advanced 
features.
Published Articles - (Featured Articles)
Hakin9 - Best of Hakin9 2012-2014 - Top 48
Hakin9 - Analyzing Malware and Malicious Content
Hakin9 - Honeypots - The Sitting Duck on The Network
Hakin9 - Penetration testing LAB Setup Guide
Hakin9 - Raspberry Pi Hacking