InfoSec Institute
brings the heat five days a week with new free content on Security, Forensics,
Networking, Project Management, Reverse Engineering, and many others.
With over 252
articles, interviews, and videos so far in 2013. It's hard to highlight all the
free resources they’re making available for us each month. Many great additions
don't even crack the top 10 they’ve listed below.
Top 10 Most Popular Articles for the month
Autumn 2013
This edition: Botnets
& cybercrime, an anonymous submission, more mobile, and many other topics
you or your peers have singled out!
1. Anti-Forensics - Learn the weaknesses at each
phase of the forensics process.
2. Botnets & Cybercrime - Part 1 of a 3-part
series that includes botnet hunting and case studies
3. pcAnywhere Leaked Source Code - An anonymous
code review & analysis of the leak was emailed to us; we're sharing it with
you.
4. Attacking the Phishers - An autopsy on
compromised phishing websites
5. RootSmart: New Android Malware - Learn about
new malware that is quickly gaining root access to your phone
6. Hacking VMware using VASTO - Virtualization
security - this has been a hot topic for our readers.
7. Writing Self-Modifying Code - The 3-part
series wraps up with an in-depth tutorial on antivirus evasion
8. De-anonymizing users through timing analysis attacks - You didn't really think you were anonymous, right?
9. How to Penetration Test iPhone Apps - We
cover the entire application penetration testing methodology on a physical
device
10. Which Certification should I get? and
which translate to the highest pay premiums?
July 2013
This edition: How
Edward Snowden Protected Information, 19 Extensions for turning Google Chrome
into a Pentesting Tool, an IPV6 Overview, ZeroAccess Botnet and much more!
August 2013
This edition: The
convenience of Google Chrome Extensions, Android Forensics, Handy Devices
Revolution, Steganography and much more topics that will blow your mind!
1. Android Forensics:
Cracking the Pattern Lock Protection- Need to bypass the gatekeeper on a locked
Android? We'll show you how.
2. Cybercrime as a Service - In the digital age, this hacker's for hire.
3. Steganography: What
Your Eyes Don't See - Data hidden in plain site, explained.
4. Hacker Proofing Apache & PHP Configuration- Do you use Apache? Here's how to stay secure.
5. Dictionary Attack Using Burp Suite - By definition, a method of cracking password codes by the
book.
6. Keyloggers: How They Work and More - The what and why of a popular device for tracking a user's every
move.
7. Malicious Firefox Add-Ons: Keylogger - This tool of the cyber spy's trade, examined further.
8. Geocoding Router Log Data - So where does all your secret information end up when malware arrives?
9. Handy Devices Revolution: Another Set of Embedded Devices & Dev Boards - Some cool
embedded gadgets that you can really use.
10. Owned by Chrome Extensions - The convenience of Google Chrome Extensions; what could go wrong?
Plenty!
September 2013
This edition: Hacking
Satellites, PsyOps and Socialbots, NSA's Surveillance Program, Security and
Hacking Apps for Android, and much more free training!
1. Security and Hacking Apps for Android Devices
- With mobile gadgets fast overtaking desktop computers in popularity, how can
a hacker launch an attack from their hand-held device?
2. Penetration Testing of an FTP Service -
Testing and protecting your FTP service against vulnerabilities.
3. NSA Surveillance is Changing User's Internet Experience - Think you're safeguarded against undue government surveillance? Guess
again!
4. OSINT (Open-Source Intelligence) - Interested
in conducting some due diligence? Here are the free go-to resources.
5. Social Engineering: A Hacking Story - The
best defence in a world where cyber-dangers lurk around every corner is
vigilance. Here are some simple ways to minimize the dangers.
6. Hacking Satellites...Look Up to the Sky -
Satellites perform an array of vital functions in our lives: how vulnerable are
they?
7. XKeyscore: NSA's Surveillance Program - More
on what the NSA is doing in the name of safeguarding against terrorists - and
how.
8. The Hunt for Memory Malware - Analyse your
computer's memory to uncover the behaviours of hidden malware.
9. Phishing with Data URI - Online scamming
takes a leap forward by drawing victims to unhosted sites.
10. PsyOps and Socialbots - How social
media is manipulated for mind control - swell!
October 2013
This edition: Phishing
Counter Measures, Port Scanning Using Scapy, Hardware Attacks & Backdoors, File
Carving, more malware, and many other resources that will expand your
knowledge!
1. Port Scanning Using Scapy - Instead of Nmap,
try Scapy to simplify the job of port scanning.
2. Some Cool DIY Raspberry Pi Projects - Hardware
hackers: for those of you with a DIY bent, here’s some fun stuff to play with
on your $35 mini-computer.
3. Portable Malware Lab for Beginners - A
follow-up to our popular article from May; this one shows how to more fully
develop our own Malware Lab with reversing tools.
4. File Carving - Uncover data from corrupt or
missing files with this great forensics process.
5. Hesperbot: An Atrocious Banking Trojan - As
uncovered by the researchers at ESET, Hesperbot is a dangerous trojan used
against banking customers.
6. Hardware Attacks & Backdoors - Common
hardware contains backdoor vulnerabilities: presented here are strategies to
safeguard yourself.
7. BEAST vs. CRIME Attack - Protect yourself
against these two widely publicized SSL attacks.
8. Layer Seven DDoS Attacks - The bad news is
that these are hard to prevent entirely. The good news: here are some measures
you can take.
9. Phishing Counter Measures Unleashed! - Forewarned
is forearmed: stay a step ahead of the hackers with these easy-to-understand
strategies.
10. How to Prevent Cross-Site ScriptingAttacks - Discover ways to protect your site from XSS attack and keep your
customer’s data safe; open source libraries provided, too.
These articles are
just a few of their recently posted resources, but there are many more posted
daily here.
0 comments:
Post a Comment