|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Passive Network AnalysisDefenders know their networks better than their adversaries possibly can. It's time to use this home-field advantage against the attackers, says Stephen Barish. 2007-09-28 http://www.securityfocus.com/infocus/1894
VoIP Hopping: A Method of Testing VoIP security or Voice VLANsConvergence - the integration of voice and data into a single network. It promises to reduce costs, improve quality, and simplify management. But as voice should exist on the network as yet another application, it poses new challenges to the enterprise and new potential security risks arise. 2007-09-10 http://www.securityfocus.com/infocus/1892
Testing Fault Injection in Local ApplicationsThis article is a book excerpt that looks at the approach and techniques used to test the security of local applications. It describes local resources and interprocess communication, how to enumerate the local resources an application depends on, and then discusses methods of testing several of those types of resources. It also describes how to test ActiveX objects, command-line programs, and applications' use of local files and shared memory. 2007-01-23 http://www.securityfocus.com/infocus/1886
Vulnerability Scanning Web 2.0 Client-Side ComponentsThis article discusses the challenges faced when vulnerability scanning Web 2.0 applications, and then provides a methodology to detect vulnerabilities in Web 2.0 client-side application components. 2006-11-27 http://www.securityfocus.com/infocus/1881
Hacking Web 2.0 Applications with FirefoxThis article looks at some of the methods, tools and tricks to dissect web 2.0 applications (including Ajax) and discover security holes using Firefox and its plugins. 2006-10-11 http://www.securityfocus.com/infocus/1879
Beginner's Guide to Wireless AuditingThis article is designed as a beginner's guide to fuzzing wireless device drivers, starting with how to build an auditing environment, how to construct fuzzing tools and finally, how to interpret the results. This auditing environment can be used for WiFi as well as Bluetooth and infrared devices. 2006-09-19 http://www.securityfocus.com/infocus/1877
Five common Web application vulnerabilitiesThis article looks at five common Web application attacks, primarily for PHP applications, and then presents a short case study of a vulnerable Website that was found using Google and easily exploited. 2006-04-28 http://www.securityfocus.com/infocus/1864
Two attacks against VoIPThis purpose of this article is to discuss two of the most well known attacks that can be carried out in current VoIP deployments. The first attack demonstrates the ability to hijack a user's VoIP Subscription and subsequent communications. The second attack looks at the ability to eavesdrop in to VoIP communications. 2006-04-04 http://www.securityfocus.com/infocus/1862
Malicious Malware: attacking the attackers, part 2This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part two of two. 2006-02-02 http://www.securityfocus.com/infocus/1857
Malicious Malware: attacking the attackers, part 1This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part one of two. 2006-01-31 http://www.securityfocus.com/infocus/1856 |
|
Privacy Statement |