Hacking Exposed: Hacking SQL Server

Internet Security Whitepapers Hacking Database Servers

Hacking into web servers and replacing home pages with pictures of scantily clad females and clever, self-ingratiating quips is all fine and dandy, but what can we do about hackers intent on doing more than defacing a few pages? Sooner or later you’ll be up against an opponent intent on taking your most valuable assets either for spite or profit. What could be more valuable than the information locked deep in the bowels of your database? Employee records, customer accounts, passwords, credit card information-it's all there for the taking.

Phishing Threats and Countermeasures

Internet Security Whitepapers Phishing

Phishing is one of the fastest growing scams on the Internet, compromising the personal details of millions of users worldwide. Typically instigated by professional hackers and criminal organizations, Phishing attacks use spoofed emails and fraudulent websites to deceive recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. As a result of these scams, an increasing number of consumers have suffered credit card fraud, identity theft, and financial loss. The exclusive motivation of phishers is financial gain.

Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns

Internet Security Whitepapers Exploit Writing Techniques

This article describes three powerful general-purpose families of exploits for buffer overruns: arc injection, pointer subterfuge, and heap smashing. These new techniques go beyond the traditional "stack smashing" attack and invalidate traditional assumptions about buffer overruns. Security vulnerabilities related to buffer overruns account for the largest share of CERT advisories, as well as high-profile worms—from the original Internet Worm in 1987 through Blaster’s appearance in 2003. When malicious crackers discover a vulnerability, they devise exploits that take advantage of the vulnerability to attack a system.

Session Hijacking in Wireless Networks

Internet Security Whitepapers Session Hijacking

The term session hijacking refers to the exploitation of a valid computer session - sometimes also called a session key or Id - to attain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of the magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer.

Email Virus Propagation Modeling and Analysis

Internet Security Whitepapers Hacking Email Accounts

Email viruses constitute one of the major Internet security problems. In this paper we present an email virus model that accounts for the behaviors of email users, such as email checking frequency and the probability of opening an email attachment. Email viruses spread over a logical network defined by email address books. The topology of email network plays an important role in determining the behavior of an email virus spreading. Our observations suggest that the node degrees in an email network are heavy-tailed distributed and we model it as a power law network. We compare email virus propagation on three topologies: power law, small world and random graph topologies. The impact of the power law topology on the spread of email viruses is mixed: email viruses spread more quickly than on a small world or a random graph topology but immunization defense against viruses is more effective on a power law topology.

Bypassing Firewalls: Tools and Techniques

Internet Security Whitepapers Evading IDS Firewall and Honeypot

This paper highlights a very important problem with network perimeter firewalls. The threat discussed is not exactly new, but neither is it widely recognised- even amongst network security professionals. Most commercial firewalls claim to be application layer devices, but they derive very little useful information about the context of the application traffic that passes through them. Malicious applications can misuse even the simplest protocols in a way that totally bypasses the firewall’s controls. This paper describes the methods of simple protocol tunnels, and shows how they can be applied. It also considers ways to counter this threat, and suggests that architectures based on military security principles and IPSec can improve security dramatically.

Key Replay Attack on Improved Bluetooth Encryption

Internet Security Whitepapers Bluetooth Hacking

The Bluetooth encryption algorithm E0 is considered weak, and there are plans to extend the specification so that it would support several algorithms. However, this does not improve the overall security because an active attacker can set up a previously used encryption key by a replay attack. In this paper, we show how this vulnerability can be exploited to thwart any improvement in the encryption method. We also investigate alternative modifications to the Bluetooth security architecture to overcome this problem.

TeleSweep Secure - Distributed Dial-Up Vulnerability Scanner

Internet Security Whitepapers Scanning

The TeleSweep Secure® system is a telecommunications scanning tool that performs advanced dialing and vulnerability assessments of an organization's telephone network. In the TeleSweep Secure system, a Dialer performs a scan by calling a list of user-defined phone numbers. Each specified telephone line is characterized as fax, modem, or voice. A scan can be configured to identify the operating system or software controlling a remote modem, and can also attempt to penetrate the computer to which the modem is attached by using default and system-specific username/password combinations.

Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks

Internet Security Whitepapers Session Hijacking

Session hijacking is a common and serious threat to wireless local area network (WLAN) security (Schmoyer, Lim & Owen 2004). This attack exploits deficiencies in the WLAN state machine, namely unauthenticated management frames and the loose coupling of the IEEE 802.11i and IEEE 802.1X state machines (Mishra & Arbaugh 2003), and can be launched using off-the-shelf hardware and software. Session hijacking combines denial of service (DoS) and identity spoofing attacks. Typically an adversary forces a legitimate mobile station (STA) to terminate its connection to an access point (AP) by sending it a disassociation/deauthentication management frame with the source MAC address spoofed to be that of the AP. This results in the STA disconnecting from the network. The adversary can now associate with the AP, by masquerading the MAC address of the STA, and hence taking over its session. Neither the original IEEE 802.11 standards, nor the recent IEEE 802.11i standard specify mechanisms for protecting the integrity of the management frames, leaving IEEE 802.11 based WLANs vulnerable to management frame spoofing and the associated denial of service attacks that such spoofing permits (Bellardo & Savage 2003). In this paper the terms Wireless and Wireless Local Area Networks refer to IEEE 802.11 infrastructure networks (IEEE 1999).

FoxHole Manual

Internet Security Whitepapers Hacking Mobile Phones, PDA & Handheld Devices System Hacking

The FoxHole is designed for the advanced users who want full control over the filesystem of their phone. They can also use it to store their files in a secure manner. The FoxHole is not an encrypting software. It creates a virtual drive from multimedia files and can store the user’s sensitive files in these multimedia files. It works with the so-called steganography methods (data hiding techniques). While the traditional data-hiding techniques can store only very little data (they use only one store-file) it was time to develop a technology that enables the user to handle more files together. Thus came the idea of a virtual drive that can be seen as a newly created drive under the name Hole. This data-storing methods only modify, but not demage the original files. For example an audio file remains seemingly untouched. But many rewriting can seriously degrade the quality of multimedia files.

Explore What's Inside Security Science

Global Internet Security News Global Internet Security News
Elevates people's awareness level by providing the most informative security related news and events, which includes, but is not limited to, financial and business security, information and technology security, as well as corporate and individual security worldwide.
Information Security Information Security
Security Policy Resource page, a compiled research project of the SECURITY-SCIENCE team. The ultimate goal of this project is to offer everything you need for swift development and implementation of information security policies. You'll find a great set of policies posted here, including, but is not limited to, procedures and guidelines, that you can easily align to your company’s security requirements.
Internet Security Tools Internet Security Tools
State of the art security technology solutions (software, hardware, appliances and gadgets--including HOWTOs and guidelines) for computer and network defense, perimeter protection and environment security and safety.
Learn Internet Security Science Learn Internet Security Science
Provides superior security education on how to counter attack security risks, threats and vulnerabilities by using the most advanced techniques practiced and put into application by professional hackers, forensics, investigators and penetration testers.
Grokker - Technology Encyclopedia Hackopedia
A free security encyclopedia for computer, Internet and security terms and definitions created, researched, reviewed and maintained by Security-Science.
Internet Security Experts - Knowledge Exchange Internet Security Experts
An avenue for exchanging knowledge and KNOW-HOWs which allows users to interact with each other for mutual assistance and support by collaborating, asking, answering and sharing information about security related issues and concerns that benefit everyone.