Often, the manufacturers of routers do not particularly care about the quality of their code. As a result, the vulnerabilities are not uncommon. Today, the routers are a priority target of network attacks that allows to steal…
CONTINUE READING 🡒 Hackbook #197. Set up Cisco as server, SOP bypass for…
Set up Cisco as server, SOP bypass for Flash and other
CONTINUE READING 🡒 Oracle DB vulnerabilities: the missing pentester handbook
Today, I would like to discuss the attack vectors used at various stages against the Oracle databases: how to probe the database weaknesses from outside, how to gain a foothold inside and how to automate all this…
CONTINUE READING 🡒 7 non-trivial ways to hack your MySQL Database
MySQL is one of the most common database systems. Found everywhere, it is most likely to be used by numerous websites. Hence the reason why the security of this database is a very important issue. An attacker…
CONTINUE READING 🡒 Dive into exceptions: caution, this may be hard
Modern versions of OS impose security-based restrictions on executable code. In this context, the use of exception-handling mechanism in injected code or, say, in the manually projected image may become a non-trivial task, that is, if you…
CONTINUE READING 🡒 Building kernel modules and native Linux applications for Android
Android devices are good by any definition, but sometimes they extremely lack features and utilities available in desktop Linux. Separate instruments, such as Terminal IDE, partly help, but anyway they do not have some of the desired…
CONTINUE READING 🡒 Welcome, Sails.js! The Missing Rails for Node.js
Let me tell you the truth. There is a true secret lodge of JavaScript fans in our magazine. As soon as we, including the chief editor, the managing editor, and yours truly, catch the sight of one…
CONTINUE READING 🡒 Full kit of a Security Officer for $100
Our goal is the carry-on gadgets that justly could be included in the usual of a hacker, a young-gun detective or an info security officer. Today we are going to talk about usage and modify of different…
CONTINUE READING 🡒 Complete guide for *nix backup solutions
Do you often make backups? Meanwhile, *nix systems have a lot of different backup tools, ranging from the smallest to huge packages for the enterprise sector. Each of these tools has its own features, each one has…
CONTINUE READING 🡒 Review of ROSA Fresh Desktop 4
The idea of NSP (National Software Platform) is debated on the government level in Russia. Among other things, such NNP would include ROSA Linux distribution, formerly known as Mandriva. Recently, a new version was released for one…
CONTINUE READING 🡒 Building weather station with STM32F3DISCOVERY and WizFi220 Wi-Fi module
Recently people have been using Arduino in their projects with increasing frequency, since it contains e.g. Ethernet or Wi-Fi shield. An entire computer is usually altogether superfluous in this context. In this article I will show how…
CONTINUE READING 🡒 Mobile backend for mobile hacker
Modern cloud services offer hackers potentially unlimited resources. For example, Amazon often uses WPA-brute-force for hacking. In 2011, a German expert Thomas Roth could already search half a million passwords per second paying 28 cents per minute.…
CONTINUE READING 🡒 Let’s learn the basics of build automation with the help…
Any software development project is always associated with the automation of related routine tasks. Initially, IDE and a pair of manual operations will be enough for you. Then, the number of body movements begins to grow: you…
CONTINUE READING 🡒 Why we need Google Chromecast and what it can do
Recently, media set-top boxes and HDMI-dongles are gaining popularity. This article is about the most well-known device of this series — Google Chromecast, which has a huge amount of various compatible applications and an open SDK. It…
CONTINUE READING 🡒 TOP–10 ways to boost your privileges in Windows systems
The processes of privileges elevation in Windows and Linux are a bit different. Despite the fact that both systems has the same number of vulnerabilities, according to researchers it is more likely to see the fully patched…
CONTINUE READING 🡒 BDFProxy
I guess you have heard about Evilgrade framework that allows to “fix” the update mechanism of the most popular programs (Windows update, Apple update and so on and so forth) by replacing valid files with malicious ones.…
CONTINUE READING 🡒 A small injection for memcached
Memcached is a distributed caching system, which has become very popular in loaded Internet projects. And as you know, with the growth of product popularity, the interest in its safety is also increasing. Therefore, we will study…
CONTINUE READING 🡒 Usage of Amazon Auto Scaling to reduce costs of the…
It often happens that the costs of the project's hosting service are higher than its other living expenses. It specifically refers to those projects using Amazon AWS extensively. But far from everyone knows that Amazon delivers various…
CONTINUE READING 🡒 Forged together with one chain
I believe that at present one of the most valuable things is time. Curiously enough, the modern devices destined to accelerate our life take, in fact, still more time. Fortunately, many of the problems to be solved…
CONTINUE READING 🡒 High Load Theory
In the past couple of years, the term "high load" has become very popular in the "big IT". The high loads are used to scare people during interviews and for all sorts of comparisons at various specialized…
CONTINUE READING 🡒