Mail Anyone?

Sunday, March 30th, 2008

When you are doing a Business Impact Analysis or a Risk Assessment, you will often find that email, be it internal or external, is one of the systems that people think they cannot live without. They might even be right. Email systems are being used as communications tool, storage system, ...

Session Hijacking in Windows Networks

Saturday, March 29th, 2008

I found a great write-up over at SANS that goes over session hijacking in amazing detail.  Click the link below to read the full 49-page white paper. Session Hijacking in Windows Networks

Massive IFRAME SEO Poisoning Attack Continuing

Friday, March 28th, 2008

Last week's massive IFRAME injection attack is slowly turning into a what looks like a large scale web application vulnerabilities audit of high profile sites. Following the timely news coverage, Symantec's rating for the attack as medium risk, StopBadware commenting on XP Antivirus 2008, and US-CERT issuing a warning about ...

SQL query injection for dummies

Friday, March 28th, 2008

The purpose of this article is to help people without advanced computer knowledge to start white hacking and learn how to write more secure login web pages. When I started to learn about security, even though I searched really hard, I did not manage to find articles that would tell ...

Free Honeypot Client Could Sting Malware

Thursday, March 27th, 2008

The Honeynet Project has released a new freebie honeypot client tool that lets security pros and researchers automatically detect and dissect bot infections and other malware attacks on client machines. Capture-HPC v2.1 is an updated and enhanced version of the Honeynet Project’s high-interaction Capture-HPC client honeypot, which the organization last year ...