-
April 29th, 2004, 03:11 PM
#1
email I received: new magazine, Hackademy Journal
I received the following email, and thought you all might like to see it:
The Hackademy starts an international hacker magazine
Paris, France - April 29, 2004 -- Created in France two years ago by a
group of hackers, The Hackademy Journal, first printed magazine for
French-speaking "White Hat" hackers, is now available in English
language.
With a high technical level (full contents below), this international
publication is intended for a professional audience of computer users,
programmers, system and network administrators, security specialists,
etc. who wish to know, from a hacker viewpoint, what are the latest
attacks and protection techniques.
"The Hackademy Journal [International Premium Edition]" is published
quarterly and is available by subscription worldwide.
Contact: olivier@dmpfrance.com
or +33 1.53.66.95.28
More information on the Hackademy Journal international web site:
http://premium.thehackademy.net
About The Hackademy
This magazine is published by DMP Editions. DMP already publishes
the French edition of the Hackademy Journal in France, Switzerland,
Belgium and Canada. But DMP is best known because they started the
Hackademy, the first IT security training center where classes are
given by members of the hacker community.
Contents of The Hackademy Journal issue #1
* Honeypots
Honeypot Detection
To be really efficient, honeypots and honeynets must look exactly
like regular systems and networks. However, current honeypot
technologies can be detected, thus allowing a skilled hacker to avoid
the trap and retreat early.
Setting up a fake socks proxy
Who uses anonymous public proxies and for what purpose? In most cases
it is spam. Next come denial of service attacks, and to a lesser
extent certain legitimate uses for anonymous purposes. This article
will give you the technical means to supervise these schemes and at
the same time complicate life for spammers and flooders.
Who are the Spammers ?
Here are a few interesting facts that we discovered using the
honeypot described on the previous page. You will see that spammers
are the primary users of public proxies, and that you can easily fool
them with a fake server. And maybe even learn more about who they are
and how they work...
Spammers' Software Arsenal
This test helped us better understand some of the methods used for
generating spam. Here are the most interesting.
* Web security
(My)SQL Injection with PHP
SQL injection is a very widespread security flaw on the Web and is
very easy to exploit even without extensive technical knowledge. Yet
it is extremely dangerous because it allows to directly manipulate
site databases. This leads to numerous possibilities: data theft,
display of passwords, illegitimate authentication to a service, etc.
This article explains the risks generated by interactions between PHP
and a MySQL database.
Eliminating SQL Injection
This article discusses how to write secure PHP programs in order to
avoid the numerous attack possibilities of "SQL injection" breaches.
* Penetration Testing
Foiling anti-buffer overflow protections
By setting up a realistic, concrete case within an online challenge
open to all, we wanted to show that it was possible to exploit a
security flaw to remotely enter a server protected by PaX and
grsecurity. Let us see how the combination of a few techniques, well
known or developed for the occasion, enable this attack. This article
will be useful not only to intrusion test professionals, who will
find effective, fairly universal techniques, but also to system
administrators and decision-makers asking themselves the following
questions: is it advantageous to use kernel security add-ins such as
PaX ? What are the limitations? How can I complement them to make
them even more effective?
Interview with the PaX team
* Newbie Area
Remotely cracking passwords
Automated software allows kiddy-programs to easily crack
poorly-protected accounts, be they for FTP access, e-mail, or a Web
service? It is better to test for yourself the robustness of your
passwords before a malicious hacker does it for you.
Forensic analysis with Autopsy
Erasing a file does not remove all traces of its existence. Autopsy
is a complex tool for analyzing disks that have been attacked. We
will use it to recover a deleted file. Windows users can also benefit
from it without having to install Linux thanks to the Knoppix
distribution.
* Windows userland subversion
PE header
A thorough understanding of the PE format helps you analyze and
modify programs in depth. Be it for patching memory, unpacking a
virus, or modifying the sections of a program - such as the one
containing the imported functions table.
Injecting and executing code in another process
Injecting code in an application allows to acquire its privileges and
alter its operation. Under Windows, this makes it possible to work
around personal firewalls, or to intercept sensitive data such as
passwords stored in memory. Injecting code is also among the first
steps required to hijack an API.
Redirecting API calls
The interception of calls to Windows system functions to change the
behavior of an external application is more and more widespread. Very
useful for debugging, it also opens the way to other, less innocent
uses: spying on communications, inserting hidden accesses in existing
processes, camouflaging abnormal system activities ("userland
rootkit").
Practical demonstration of API hooking
The methods for injecting code and hijacking APIs could be put into
practice to create Trojan horses. Our sample code shows how it is
possible to hijack network traffic in order to retrieve a user's ID
data from his mail server, while hiding the registry keys required to
launch it automatically. The dangers represented by these innovative
techniques (spying, hidden access, camouflage) are all too real.
Olivier Spinelli
Publisher
--
|--- 100 % White Hat Hacking ---
| The Hackademy Journal
| 26 bis, rue Jeanne d'Arc
| 94160 Saint Mande - France
| Phone : +33 1.53.66.95.28
| Fax : +33 1.43.98.23.50
|--------------------------------
| international@dmpfrance.com
| http://premium.thehackademy.net
-
April 29th, 2004, 06:09 PM
#2
Sounds like ikt might be a decent magazine.
I think I wouild like to only get one or two issues though before committing to a full year, just in case its a bunch of BS.
It sounds pretty cool though.
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|