Categories
Hacking Tutorial

Guida alla sopravvivenza della propria privacy

Tutorial By Alessio Pennasilico Preview: I nostri computer, le nostre comunicazioni, traboccano di informazioni che vorremmo non diventassero di pubblico dominio, o fossero conosciute da persone che non hanno alcun diritto di conoscerle. Vogliamo proteggerci? Quali strumenti abbiamo a disposizione per proteggere cosa? Che garanzie ci offrono questi strumenti? Download Link: https://www.ihteam.net/papers/privacy_360.pdf

Categories
Hacking Tutorial

Comprendere e gestire i RAID

Tutorial by Alessio Pennasilico Preview: Finalità del corso  Capire i meccanismi di fault-tolerance delle unita’ di memoria di massa.  Imparare a conoscere i meccanismi che permettono di accedere ai dischi. Download Link: https://www.ihteam.net/papers/raid.pdf

Categories
Hacking Tutorial

Cisco IOS Forensics

Tutorial By Felix FX Lindner Preview: [ad] IP Routing Infrastructure and Cisco IOS Cisco IOS Internals Debugging and Post Mortem Analysis Today A New Analysis Approach Proposal Features Challenges Public Offer Future Work Download Link: http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-fx.pdf

Categories
Hacking Tutorial

PS3 Cracker – Crackstation

Tutorial By nick breese Preview: I’m Nick Breese From Wellington, New Zealand (are there any other kiwis here?) Have been doing this research for 9 months now “Security consultant” for Security-Assessment.com We break things for a living Due to security being a small market in a small country, we need to be “jack of all […]

Categories
Hacking Tutorial

iPhone Forensics

Tutorial By Andrew Hoog Preview: Introduction The iPhone was introduced on January, 2007 and has now surpassed the Blackberry as the second largest supplier of smart phones. Regardless if this is sustainable, the Apple iPhone already has a significant footprint and will appear more frequently in computer forensic cases. The iPhone has an active hacking […]

Categories
Hacking Tutorial

Reversing with Ida Pro and CollabREate

Tutorial By Eagle Preview: 1 Introduction Reverse engineering of binary programs is a very time consuming task, often performed in a very serialized manner. Analysts are forced to operate in this serial fashion in large part because of the nature of the tools they choose to use. When several analysts do attempt to coordinate their […]

Categories
Hacking Tutorial

Browser Vulnerabilities

Tutorial By ETHz Preview: In recent years the Web browser has increasingly become targeted as an infection vector for vulnerable hosts. Classic scan for and remotely connect to vulnerable hosts (typically servers) in order to exploit them. Unlike these, Web browser vulnerabilities are commonly exploited when the user of the vulnerable host visits a malicious […]

Categories
Hacking Tutorial

Tracking Ghostnet

Tutorial by SecDevGroup Preview: This investigation was prepared by a dedicated team of professionals. Greg Walton conducted and coordinated the primary field-based research in India, Tibetan Missions abroad, and Europe. Greg is a SecDev Group associate and editor of the Information Warfare Monitor website. He is currently a SecDev Fellow at the Citizen Lab. The […]

Categories
Hacking Tutorial

Attacking Social Networks

Tutorial By hamiel-moyer Preview: Like most folks of a security bent (and if you’re reading this, that probably means you), we’ve spent a lot of time watching Web 2.0 with bemusement. Promiscuous sharing of information, client-side Javascript goop, blogging, mini-blogging, micro-blogging, vlogging, social nets and social media have all given the web much of what […]

Categories
Hacking Tutorial

Cryptanalytic Time-Memory Trade Off

Tutorial by LASEC Preview: Cryptanalytic attacks based on exhaustive search need a lot of computing power or a lot of time to complete. When the same attack has to be carried out multiple times, it may be possible to execute the exhaustive search in advance and store all results in memory. Once this precomputation is […]