InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by Infosec
Aktualizace: 15 min 36 sek zpět

Logical Instructions

31 Březen, 2020 - 16:53

Introduction This article defines logical instructions as executed by x86 processors. It goes on to describe four key classifications of logical instructions in brief. This article is designed for students and professionals who want to gain a detailed understanding of logical instructions, their classifications and how they’re used. Through the use of an 8086 emulator, […]

The post Logical Instructions appeared first on Infosec Resources.

Logical Instructions was first posted on March 31, 2020 at 9:53 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Networking Basics for Reverse Engineers

31 Březen, 2020 - 15:25

Introduction This article will define network reverse engineering, list tools used by reverse engineers for reverse engineering and then highlight the network basics required by such engineers. The article will illustrate, through the lens of an attacker, how to expose the vulnerability of a network protocol and exploit the vulnerability, and then discuss how to […]

The post Networking Basics for Reverse Engineers appeared first on Infosec Resources.

Networking Basics for Reverse Engineers was first posted on March 31, 2020 at 8:25 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

AI and machine learning and their uses in cybersecurity

31 Březen, 2020 - 15:01

Artificial intelligence and machine learning trends Although artificial intelligence and its subfield of machine learning have been applied in cybersecurity for some time, the speed of adoption is now accelerating. As threats evolve and IT environments get more complicated, AI-driven technology shows the potential of addressing new threats and risks that require machine speed rather […]

The post AI and machine learning and their uses in cybersecurity appeared first on Infosec Resources.

AI and machine learning and their uses in cybersecurity was first posted on March 31, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Ethical hacking: SNMP recon

31 Březen, 2020 - 15:00

Introduction In this article, we will discuss the various methods one could take to perform reconnaissance on the SNMP protocol. As you may know, SNMP reveals too much information about targets that might result in attackers compromising a target network. Today, we’ll explore the available tools that one can use to query information on targets. […]

The post Ethical hacking: SNMP recon appeared first on Infosec Resources.

Ethical hacking: SNMP recon was first posted on March 31, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Integer Overflow and Underflow Vulnerabilities

31 Březen, 2020 - 13:47

Introduction to integer overflows and underflows Integer overflow and underflow vulnerabilities are considered the eighth most dangerous vulnerability in the Common Weakness Enumeration (CWE) Top 25 List of 2019. These types of vulnerabilities are created by misuse of variable types and can be exploited to bypass protections against other types of vulnerabilities, like buffer overflows. […]

The post Integer Overflow and Underflow Vulnerabilities appeared first on Infosec Resources.

Integer Overflow and Underflow Vulnerabilities was first posted on March 31, 2020 at 6:47 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Stack Instructions

31 Březen, 2020 - 13:34

Introduction This article will introduce readers to the assembly concepts in relation to the stack. We will discuss basic concepts related to stack and various registers, and the instructions used when working with a stack. We will also see practical examples of how common instructions like PUSH and POP work by using a debugger. What […]

The post Stack Instructions appeared first on Infosec Resources.

Stack Instructions was first posted on March 31, 2020 at 6:34 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to use Protected Folders in Windows 10

30 Březen, 2020 - 17:58

Introduction Ransomware is one of the biggest threats faced by organizations today. After encrypting all files on servers and desktops, ransomware perpetrators demand payment before decrypting what are often business-critical systems and data.  Application whitelisting and the removal of local administrator access from day-to-day user accounts are two of the best ways to prevent the […]

The post How to use Protected Folders in Windows 10 appeared first on Infosec Resources.

How to use Protected Folders in Windows 10 was first posted on March 30, 2020 at 10:58 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Stepping

30 Březen, 2020 - 17:47

Introduction Single-stepping is one of the most powerful features of a debugger, as it allows a reverse engineer to execute a single instruction at a time before returning control to the debugger. This feature comes in handy when one needs to analyze a binary by executing a single instruction or a section of instructions of […]

The post Stepping appeared first on Infosec Resources.

Stepping was first posted on March 30, 2020 at 10:47 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Loops

30 Březen, 2020 - 17:31

Introduction In the previous article, we discussed how if statements can be spotted in the disassembly of a binary. We learned that if conditions are translated to conditional jumps when exploring the disassembly.  In this article, we will explore how for and while loops are translated in assembly. For loops Let us begin by taking […]

The post Loops appeared first on Infosec Resources.

Loops was first posted on March 30, 2020 at 10:31 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How hackers check to see if your website is hackable

30 Březen, 2020 - 15:01

Introduction “Memento mori” is Latin for “Remember that you are mortal.” According to tradition, this phrase was whispered to triumphant Roman military commanders on parades, to remind them they remained fallible humans.  In these times, perhaps the tradition should be updated to whispering “you will be hacked” into the ears of website administrators. This may […]

The post How hackers check to see if your website is hackable appeared first on Infosec Resources.

How hackers check to see if your website is hackable was first posted on March 30, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Ethical hacking: Stealthy network recon techniques

30 Březen, 2020 - 15:00

Introduction In this article, we shall discuss some stealthy reconnaissance techniques that should be employed during a hacking exercise. It’s important to know which scan to use, especially when you are getting blacklisted or having your scan results filtered out.  Many hackers use tools such as nmap without properly understanding what certain switches mean and […]

The post Ethical hacking: Stealthy network recon techniques appeared first on Infosec Resources.

Ethical hacking: Stealthy network recon techniques was first posted on March 30, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to configure VPN in Windows 10

30 Březen, 2020 - 14:20

Introduction This article defines Virtual Private Network (VPN) and the three basic connection types of VPN: remote user, third-party to mask source IP and user activities, and site-to-site-VPN. It also illustrates how remote user VPN is established using in-built Windows 10 VPN client. This article is designed for professionals and self-starters who want to understand […]

The post How to configure VPN in Windows 10 appeared first on Infosec Resources.

How to configure VPN in Windows 10 was first posted on March 30, 2020 at 7:20 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Race Condition Vulnerabilities

27 Březen, 2020 - 14:52

Introduction to race conditions Race condition vulnerabilities are an artifact of parallel processing. The ability to run multiple different execution threads in parallel can create vulnerabilities that would not exist in single-threaded programs. The impact of these vulnerabilities range from exploitable errors to leakage of sensitive information via side effects, like in the Meltdown vulnerability. […]

The post Race Condition Vulnerabilities appeared first on Infosec Resources.

Race Condition Vulnerabilities was first posted on March 27, 2020 at 7:52 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Buffer Overflow Vulnerabilities

27 Březen, 2020 - 14:19

Introduction to buffer overflows Buffer overflows are considered the most dangerous vulnerability according to the CWE Top 25 list in 2019. They received a score of 75.56, almost 30 full points higher than the second-ranking vulnerability (cross-site scripting). The reason for this high score is that a buffer overflow vulnerability, if exploited, grants an attacker […]

The post Buffer Overflow Vulnerabilities appeared first on Infosec Resources.

Buffer Overflow Vulnerabilities was first posted on March 27, 2020 at 7:19 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

DLL Load Order Hijacking

26 Březen, 2020 - 16:06

Introduction DLL load order hijacking is a popular technique used to force a legitimate program to load a malicious DLL file in Windows by abusing Windows’ DLL load order feature. In this article, we will discuss how DLL load order hijacking works and how it can be used by malware authors when writing malware programs. […]

The post DLL Load Order Hijacking appeared first on Infosec Resources.

DLL Load Order Hijacking was first posted on March 26, 2020 at 9:06 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Arithmetic Instructions

26 Březen, 2020 - 15:52

Introduction This article defines arithmetic instructions as executed by x86 processors. It goes on to describe in brief, four key classifications of arithmetic instructions: addition, subtraction, multiplication and division. This article is designed for students and professionals who want to gain detailed understanding of arithmetic instructions, their classifications and how they’re used. Through the use […]

The post Arithmetic Instructions appeared first on Infosec Resources.

Arithmetic Instructions was first posted on March 26, 2020 at 8:52 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Malware spotlight: Nemty

26 Březen, 2020 - 15:01

Introduction If the last five years or so have proven anything, it is that ransomware is here to stay as a threat in the cybersecurity wild. This should not be used as rationale to simply ignore the deluge of new types of malware that are discovered weekly, as the recently discovered malware family Nemty has […]

The post Malware spotlight: Nemty appeared first on Infosec Resources.

Malware spotlight: Nemty was first posted on March 26, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Phishing technique: Message from a friend/relative

26 Březen, 2020 - 15:00

Introduction Like many other phishing scams featured on this site, friends-and-family imposter scams are common. These scams usually begin with a phone call impersonating a friend or relative, or often a grandchild in trouble. That is the reason this scam is also known as a “grandchild scam.” Other attack avenues may include email, SMS, or […]

The post Phishing technique: Message from a friend/relative appeared first on Infosec Resources.

Phishing technique: Message from a friend/relative was first posted on March 26, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

What Are Packed Executables?

26 Březen, 2020 - 14:46

Introduction The battle between cybersecurity and malicious files is ever-changing, as the goalposts are always being moved. Whenever analysts figure out a way to reverse-engineer a particular type of malware, hackers undermine their efforts with more complex encryption and new obfuscation techniques. This means that your computer and data security measures should be up to […]

The post What Are Packed Executables? appeared first on Infosec Resources.

What Are Packed Executables? was first posted on March 26, 2020 at 7:46 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 13 Popular Packers Used in Malware

26 Březen, 2020 - 14:33

Introduction Malware can wreak havoc on just about any system, and packers help malware stay one step ahead of security software. But what exactly do packers do? How can they be detected? And finally, what are some of the most popular packers used in malware today?  We will answer these questions and more in this […]

The post Top 13 Popular Packers Used in Malware appeared first on Infosec Resources.

Top 13 Popular Packers Used in Malware was first posted on March 26, 2020 at 7:33 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security