[ Guides & Tutorials ]
Guide on setting up a GPS capable Android for use with GPSd & Kismet, utilizing
Giskismet to create a KML file from NETXML exports to be viewed within google
maps/earth o see locations of detected wireless networks.
Another paper detailing the setup and configuration of a penetration testing
lab.
This time the lab is geared towards people of a intermediate skill levels,
looking to test out skills from an external attackers perspective on a
corprorate environment.
This lab will put you or your tools up against a basic stateful inspection
firewall, performing NAT for devices living behind.
As well as load balanced web servers protected by a WAF.
NOTE: This guide assumes you have already read and setup the basic
version of the penetration testing LAB.
More lab setups to come!
Paper detailing the setup and configuration of a penetration testing lab.
This guide and lab is geared towards begineers, looking to test out
skills from an internal attackers perspective of a corprorate
environment setting.
This guide use of the following kick ass open source projects:
VirtualBox, PfSense
BackTrack, Metasploitable 2
and Kioptrix - Level 1
After setting up this LAB environment, you will have the ability
to exploit issues from the following categories:
1.Mis-configured Services and Applications
2.Backdoors planted into software
3.Un Intentional Backdoors
4.Weak Passwords
5.Web Applications
6.Plus lots more..
Paper explaining some SSH Gymanstics tricks and how to setup a tunnel with ssh's
-D option to setup a tunnel that is capable of bypassing filtering, ips/ids or a
firewall / appliance.
The final copy was printed in a featured article of Hakin9
An old draft copy of an article I was writing up on analyzing malware. The final
copy was featured in the last printed Hakin9 edition
Quick intro to writing self modifying 'polymorphic' code using VirtualProtect
API and MASM.
Master the power of netcat and become a true network ninja warrior, then hack
with your cat.
This paper covers some XSS/cross site scripting hacking techniques along with
filtering techniques to protect your servers against these types of attacks..
Quick paper write up explaining tcpdump basics and some of the advanced
features.
Hakin9 - Best of Hakin9 2012-2014 - Top 48
Hakin9 - Analyzing Malware and Malicious Content
Hakin9 - Honeypots - The Sitting Duck on The Network
Hakin9 - Penetration testing LAB Setup Guide
Hakin9 - Raspberry Pi Hacking