what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

InfoSec Writers

www.infosecwriters.com

InfoSec Writers is focused on publishing quality papers and developing original and creative projects in an effort to promote IT security and simultaneously establish its own security oriented community.

hh7.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 7: Covert Channel and Tunneling over the HTTP protocol, Generic attacks against a honeypot, Innovative Mailbombs, New Beginnings, Technology without policy.

tags | web, protocol
SHA-256 | 3c4bb0c48243e32d61174cb50c3253882eb3d7f5615d6df939802de15c17ffec
hh6.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 6: Shellcode : The assembly cocktail, Interview - Dan Verton, Applying steganography.

tags | shellcode
SHA-256 | 44ca03ac7c42be247785655fd267025aa6dc41cc553ed8ee8b21b1eb53504f38
hh5.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 5: An unwired Universe, Tales from the Void - assorted topics including race conditions and algorithms, safe security practises etc.

SHA-256 | 8a72b9c0133b4795344bc8556a4982a0030c31d4decd4b2bc3c5f5ca601dd4ab
hh4.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 4: Reviewing buffer overflow issues/concepts covered in Aleph One's seminal paper, Conclusion of "Advanced Meal - A keylogger in an API", Report on the forensics experiment.

tags | overflow
SHA-256 | 394cc60c5406a5c4298bef738a6be77237f8f0304d005f15e31e248a1a992ee9
hh3.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 3: Keylogger in an API (Continued from #2), H/P/V - The Inc. story, Welcome to my world.

SHA-256 | 222901ce3fa1ea6d8a67ff80dfe02f2562101f68532a36aa9e0c978e5e4e1b80
hh2.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 2: Notes on Win32 programming, Keylogger in an API (Part #1).

systems | windows
SHA-256 | b14b00ecbe106388135e2485324abe441bf8fb645734512698128c6f86ff1040
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Power Pages Misconfigurations Exposing Sensitive Data
Posted Nov 15, 2024

tags | headline, privacy, microsoft, data loss
Man Gets 5 Years For Laundering Crypto From Bitfinex Hack
Posted Nov 15, 2024

tags | headline, hacker, data loss, fraud, cryptography
Five Eyes Infosec Agencies List 2024's Most Exploited Software Flaws
Posted Nov 14, 2024

tags | headline, government, usa, canada, britain, australia, flaw, new zealand
CISA, FBI Confirm China Hacked Telecoms To Spy
Posted Nov 14, 2024

tags | headline, government, privacy, usa, phone, china, data loss, cyberwar, spyware, backdoor
Two Men Charged For Hacking US Tax Preparation Firms
Posted Nov 14, 2024

tags | headline, hacker, privacy, usa, fraud, identity theft
Iranian Threat Group Targets Aerospace Workers With Fake Job Lures
Posted Nov 14, 2024

tags | headline, hacker, fraud, phish, iran
Air National Guardsman Gets 15 Years For Leaking Docs On Discord
Posted Nov 13, 2024

tags | headline, government, usa, data loss, military
Citrix, Cisco, Fortinet Zero-Days Among 2023's Most Exploited Vulnerabilities
Posted Nov 13, 2024

tags | headline, hacker, flaw, cisco, zero day
Ivanti Patches 50 Vulnerabilities Across Several Products
Posted Nov 13, 2024

tags | headline, flaw, patch
Intel And AMD Have Released Many Advisories
Posted Nov 13, 2024

tags | headline, flaw, patch, intel
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close