Buffer Overflows

July 28, 2008 0 Comments 0 tags

Buffer Overflow Overview Buffer overflows are the classic security vulnerability that have been around since the beginning of programming, and are still occurring everywhere today. Buffer overflows are very prevalent

Directory Traversal

July 20, 2008 0 Comments 0 tags

Directory Traversal Overview Directory Traversal vulnerabilities occur once again when the user supplied input is not validated. You think we would get tired of saying this, but it appears this

Nessus Vulnerability Scanner

June 21, 2008 0 Comments 0 tags

Are you Vulnerable? If you don’t have the luxury of building secure software from the start and your business uses off the shelf software to get your work done you

Error Messages

June 19, 2008 0 Comments 0 tags

Error Messages Overview Think about these questions. * Why are Error Conditions and Error Messages a security problem? * What’s wrong with error conditions? * Wouldn’t an administrator want the

Tracking Down A BotNet

June 8, 2008 0 Comments 0 tags

This will not be very long, nor will I go into excessive amounts of detail into the tools and steps required. The purpose of this paper is simply to help

Hacking SOHO Routers

May 18, 2008 0 Comments 0 tags

The purpose of this paper is to outline the security measures being taken by vendors to prevent such attacks in their home routing products, what those security measures accomplish, and

Understanding /etc/passwd and /etc/shadow

May 13, 2008 0 Comments 0 tags

Q. Can you explain /etc/passwd file format for Linux and UNIX operating systems? A. /etc/passwd file stores essential information, which is required during login i.e. user account information. /etc/passwd is