Contexts in source publication

Context 1
... even if you are an honest person, you can have fun doing some hacking as long as you are not engaging in illegal activity. My recommendation is for you to set up a test lab at home where you can practice these concepts and skills (see Figure 1.1). You can then use these skills 1 when you have the legal and written permission of the person or organization you are assisting. ...
Context 2
... are several ways that hackers, or computer technicians for that matter, can reset the BIOS password. Sometimes there is a small jumper on the motherboard located close to the CMOS battery, as seen in Figure 1.2. If the jumper is pulled the password will be reset. ...
Context 3
... is an example command: /pentest# nmap -v -sS -D 192.168.1.3, 192.68.1.43 192 This command sends three packets per scan mixed in with two decoy addresses. This equates to one packet per decoy plus our scanning host. Why would a hacker want to do this? Well, he can designate as many decoys as he wants, and basically this will throw off the ability to really pin­ point where the scanning is really originating ...
Context 4
... of a command using Timing and Performance options: /pentest# nmap -v -T5 -sS -D 192.168.1.3, 192.68.1.43 192.168.22.132 Summary: -v -PN 192.168.1.1 -v -sS -D 192.168.1.3, 192.68.1.43 192.168.22.132 ← Randomize scans ◾ # nmap -v -sS -T5 ...
Context 5
... Summary: -v -PN 192.168.1.1 -v -sS -D 192.168.1.3, ...
Context 6
... of a command using Timing and Performance options: /pentest# nmap -v -T5 -sS -D 192.168.1.3, 192.68.1.43 192.168.22.132 Summary: -v -PN 192.168.1.1 -v -sS -D 192.168.1.3, 192.68.1.43 192.168.22.132 ← Randomize scans ◾ # nmap -v -sS -T5 ...
Context 7
... and DNS server. The IP address, default gate­ way, and DNS server you use will depend on your network's environment. My environment is a typical one for a home environment, using a Linksys router. The DNS address used is from www. opendns.com, and should work for you regardless of your situation. To manually set your address, type the following: eth0 192.168.1.100 netmask 255.255.255.0 up ◾ route add default gw ...
Context 8
... prefer the command line and Mac OS 9 was basically all graphical user interface (GUI). Figure 13.1 is not a picture of an changed simply by booting to the install CD. However, that will not work effectively if the Mac has FileVault enabled for that user. ...

Similar publications

Article
Full-text available
Este artigo busca, através da análise de alguns artistas que tiveram a sua formação na matriz da arte urbana, identificar como se operou sua aceitação entre um público mais amplo e mais especificamente, sua inserção no mundo das artes contemporâneas. Sua educação não-formal ao mesmo tempo que os destaca pela novidade, pelo exotismo da alteridade, t...
Article
Full-text available
A conjuntura que temos vindo a viver nos últimos meses produziu também consequências ao nível das instituições culturais, aumentando a sua presença na esfera do online. Enquanto historiadora de arte, mas também interessada no mercado de arte e consumidora deste, tenho vindo a seguir de perto essa reinvenção, não só dos museus, mas também das leiloe...
Article
Full-text available
ÍNDICE Parte I, (RE-6) 1.- La ordenación del espacio. 2.- El pudor de lo útil. 3.- La luz y las luces. Parte II. (RE-7) 4.- Función de los muebles. 5.- Distribución de los muebles. 6.- La vejez provocada y la cochambre decorativa. 7.- Los adornos. 8.- Obras de arte. 9.- El estilo y los estilos decorativos.

Citations

... Another interesting example of this is the very well known windows privilege escalation bug, in which a user could get system permissions easily by switching the programs Utilman.exe and cmd.exe, without even requiring a guest account. There are many possibilities of executing this exploit as outlined by Varsalone and McFadden (2011), and most of these still remain unchanged to this day on Windows XP through Windows 10, despite the bug being known for over a decade. This strongly indicates that Microsoft does not consider this a vulnerability, as it requires the attacker to have physical access to the target machine. ...
Research
Full-text available
On January 14, 2020, Microsoft's extended support for Windows 7 ended and users were urged to upgrade to Windows 10, which Microsoft claims to be more secure. However, despite being more than a decade old and with the end of its support imminent, Windows 7 is still used by more than 25% of Windows users. But does newer automatically mean safer, or do the new features added in Windows 10 instead introduce new weaknesses? This paper analyses data from NIST's National Vulnerability Database to determine how Windows 7 and Windows 10 compare in terms of security, while taking a variety of potential intervening factors into account, such as the ever-increasing amount of internet users and the popularity of the operating system. The results show that Windows 10 consistently has a significantly higher amount of vulnerabilities reported for it and a higher sum of CVSS scores. Even during the period when Windows 7 was significantly more popular than Windows 10 and when controlling for various other factors. Windows 10 has also been proportionally more vulnerable than Windows 7 in regard to input validation and access control, two of the three most common vulnerability types for both operating systems. However, the average severity of vulnerabilities reported for Windows 7 is 19% higher compared to those reported for Windows 10.
... Another property the hash function should have is collision resistance where it is rare to get equal hash values for two different messages [14]. The use of graphic processing units (GPUs) where tremendous number of hashes is created per second [15], and the rainbow table [16] where pre-computed hash values of plaintext patterns are stored in a database, allow adversaries to get the plaintext if they know its hash value, for example the hashed passwords might be compared with the hash values of the rainbow table to get the password plaintext and hence hashing algorithms should be strengthened. One way to strengthen hashing algorithms is using pepper and salt. ...
Conference Paper
When a software implementation of a security system is considered, side channel attacks are on the spot threat. Side-channel attacks, considered in this work, are a class of physical attacks in which an adversary tries to exploit physical information leakages such as timing information, power consumption, or electromagnetic radiation to estimate security system parameters during performing security algorithms. New system architecture features, such as larger cache sizes and multicore processors, have increased the prevalence of side channels, in addition to, the availability of measurement apparatuses to an attacker. Thus, software developers must be aware of the potential for side-channel attacks and plan appropriately. In this paper, we propose a software implementation of a hashing method based on SHA3-512 hashing algorithm that can counteract the side-channel attacks. To achieve our goal, we use three techniques, first, we shuffle the dataset, salt, and process selector arrays using "Fisher Yates" algorithm. Second, we use volatile memory objects to hold critical data. Finally, we apply the thread locking technique where at most one thread can access the critical objects at a time. Experimental results show that our proposed hashing method is more secure than other related methods. Although there is a trade-off between hashing security and hashing processing time, the processing time of the proposed hashing method is still acceptable.
... In addition to the monitors, the Vulnerability scanner searches on the network for vulnerable IoT devices and sends the gathered information to the SIEM server, who correlates such alerts with security events reported by other modules (e.g., Ethernet and WiFi monitors). The implementation used to scan for vulnerabilities is OpenVAS [26], a well-known framework composed of several services and tools offering a vulnerability scanning and vulnerability management solution [27]. ...
Article
Full-text available
The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in several daily appliances. Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems. On the downside, the great benefit carried by the IoT paradigm in our life brings simultaneously severe security issues, since the information exchanged among the objects frequently remains unprotected from malicious attackers. The paper at hand proposes COSMOS (Collaborative, Seamless and Adaptive Sentinel for the Internet of Things), a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. Additionally, we discuss the current deployment of the sentinel on a commodity device (i.e., Raspberry Pi). Exhaustive experiments are conducted on the sentinel, demonstrating that it performs meticulously even in heavily stressing conditions. Each defensive layer is tested, reaching a remarkable performance, thus proving the applicability of COSMOS in a distributed and dynamic scenario such as IoT. With the aim of easing the enjoyment of the proposed sentinel, we further developed a friendly and ease-to-use COSMOS App, so that end-users can manage sentinel(s) directly using their own devices (e.g., smartphone).
... The Suricata engine is capable of perform real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing [11]. The implementation used to scan for vulnerabilities is OpenVAS 3 , a framework of several services and tools offering a vulnerability scanning and vulnerability management solution [12]. ...
... The classificatory model implemented in this paper use the Random Forest algorithm, because of its generally fast convergence toward optimum results. The machine learning model was trained using 100 goodware and 100 malware samples collected from Koodous 11 , apkmirror 12 and Drebin dataset [20]. This model was tested using 20-fold cross-validation. ...
Conference Paper
Full-text available
The Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily appliances able to communicate autonomously through already existing network infrastructures. On the downside, the great advance carried by IoT in our life brings at the same time serious security issues, since the information flow among the objects remains mainly unprotected from malicious attackers. The paper at hand proposes TRIS, a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using three defense rings, resulting in a more accurate protection. Additionally, we discuss the actual deployment of the sentinel using open-source tools. Exhaustive experiments are conducted on the sentinel, showing that the deployed sentinel performs meticulously even in heavily stressing conditions, thus demonstrating the applicability of TRIS in a distributed and dynamic scenario such as IoT.
... Accessing disk system and getting SYSTEM privileges on a standard domain computer is one of the first steps in Microsoft domain environment penetration testing. To bypass physical security a Linux live image that has NTFS module can be used [22,23]. This step can be analyzed under in two different headings: accessing disk system and accessing session. ...
Article
Full-text available
Today, with the advancement of information technology, companies need to use many technologies, platforms, systems and applications to effectively maintain their daily operations. This technology dependence has created a serious complexity in the business network which increases the attack surface and attracts cyber criminal's attention. As a result, the number of cyber-attacks targeting corporate environment is dramatically increased. To identify security holes in a network, penetration tests are performed by internal sources (employees) and external sources (outsource companies or third parties). Microsoft domain penetration testing,is one of the most important scopes of penetration testing, which aims to expose the weaknesses in Microsoft domain environment. If the domain environment is not structured securely, it can be abused by attackers and causes serious damage to the organization. In this study, we present a penetration methodology for Windows domain environment called MSDEPTM providing key metrics for Microsoft domain penetration testing. More specifically, the fundamental steps of the attack vectors from the hacker point of view, root causes of these attacks, and countermeasures against the attacks are discussed.
Thesis
Full-text available
El presente proyecto consiste en desarrollar una página web para promover el aprendizaje autónomo en los estudiantes de Algoritmos y Programación. Se analizaron varias prácticas didácticas, creando una arquitectura capaz de ofrecer las mismas. Utilizar Scrum como marco de trabajo permitió descomponer las tareas estructuradamente. Fue posible incluir múltiples técnicas de aprendizaje innovadoras y una amplia variedad de contenido. Se considera la propuesta como una mejora para el aprendizaje del estudiante.