Jump to content
Nytro

Contents of ClubHACK Magazine August 2012:

Recommended Posts

Posted

[h=2]Contents of ClubHACK Magazine August 2012:[/h]August 14, 2012 - 3:09 pm By Mayuresh

ClubHACK has released the August 2012 version of their magazine. It is the first Indian “Hacking” Magazine. The 31st issue though available now, will be officially released at c0c0n 2012 – International Cyber Security Conference. This ClubHACK magazine edition focuses on Malware Memory Forensics in TechGyan, Apple iOS vulnerablities in Mom’s Guide, Tamper Data in ToolGyan and Matriux Ec-Centric which too will be released at c0c0n.

[h=2]Contents of ClubHACK Magazine August 2012:[/h]

  • Tech Gyan: Malware Memory Forensics
    Memory Forensics is the analysis of the memory image taken from the running computer. In this ClubHACK article, we will learn how to use Memory Forensic Toolkits such as Volatility to analyze the memory artifacts with practical real life forensics scenario. Why Memory Forensics? Memory forensics can help in extracting forensics artifacts from a computer’s memory like running process, network connections, loaded modules etc etc. It can also help in unpacking, rootkit detection and reverse engineering.
  • Legal Gyan: VARIOUS AUTHORITIES UNDER THE IT ACT
    CCA is appointed by the Central Government under section 17 of the IT Act. Some of the functions of CCA are – To exercise supervision over the activities of Certifying Authorities; To supervise public keys of the Certifying Authorities; To lay down the standards to be maintained by the Certifying Authorities; To specify the qualifications and experience which employees of the Certifying Authorities should possess; To specify the conditions subject to which the Certifying Authorities shall conduct their business;
  • Tool Gyan: Tamper Data
    What is Tamper Data? Tamper data, an add-on (extension) for Mozilla Firefox, is a fast, simple yet effective tool which can used to do penetration testing. Tamper Data basically gives us the power to view, record and even modify outgoing HTTP requests. Since Tamper data is integrated into the browser, so it has no problems with the HTTPS connections, client authentication certificates or other features that the browser supports. We can trace and time the http/https connections, responses and parameters being sent.
  • Matriux Vibhag: Matriux Ec-Centric
    Matriux has been successfully running and getting a big support over the past 2 years and we have been working hard to provide the best security solutions and quality tools for all the penetration testing and forensic needs. On occasion this issue is to be released at c0c0n 2012, we are also proud to announce our upcoming release Matriux version 2.0 K0d3 name “Ec-Centric”. We have been working hard over the release of the new version, so this month the ClubHACK Matriux Vibhag will feature the Matriux Ec-Centric edition.
  • Mom’s Guide: Apple iOS vulnerabilities
    Apple iOS has successfully emerged as one of the most widely used Operating System today. It runs on Apple devices such as iPhone, iPad, iPod touch and Apple TV. Apple AppStore has the highest number of applications (500,000) with 25 billion apps downloaded till date. However, the iOS developers aren’t bothered about the secure aspect of the applications before they launch it on the AppStore. This huge number of apps and carelessness of developers has lured the hackers to steal data from the applications.
  • Code Gyan: Basics of Android Secure Coding
    Android is an OS designed for Smart phones. The phones are meant for office productivity apps, games, social networks etc. The phone comes pre-installed with a selection of system applications, e.g., phone dialer, address book, but the platform gives ample opportunities for the developers to create their own applications and publish into the huge android market, so called the “Play Store”.
  • Special Feature: Impact of Cybercrime on Businesses
    IT security is more important for businesses than ever. A study that was carried out by the Ponemon Institute has revealed that businesses lacking in IT security could be losing over £200,000. The study, entitled “Impact of Cybercrime on Businesses”, surveyed 2,618 C-level IT security and executive personnel with the aim of finding out what everyone has in common. The survey spanned the United States, United Kingdom, Hong Kong, Brazil and Germany. It was found that in the latter country, cyber-attacks cost businesses more than anywhere else, with the average cost being around $298,359. The average cost that cyber-attacks will have on companies in the United States is $276,671, if they are successfully carried out.

[h=3]Download ClubHACK Magazine:[/h] ClubHACK Magazine Issue 31, August 2012aug2012.pdf

Sursa: ClubHACK Magazine August 2012! — PenTestIT

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...