Active subscribers – to download this issue click on the cover of the magazine on the main website or scroll down this page and click the Download button
Single issue buyers – after paying for this issue click “PenTest Extra 02/2012″ (which will show just above that text)to download your copy of the magazine
A Formal Approach to Exploit Human Intelligence
by Shakeel Ali
There is no formal procedure or process for social engineering attack till date. It all depends on the given situation and how would you draw the steps to initiate an attack against your target. Some of the most common steps taken are intelligence gathering, identifying vulnerable points, planning the attack, and execution. Each of these steps should remain consistent in the definite order and data collected upon their successive completion.
Finding Your Target
by Willem Mouton
Dumpster diving, if you are up for it and have physical access to the target, means sifting through trash to get useful information, but in recent times social media can provide us with even more. Sites like LinkedIn, Facebook and Twitter can provide you with lists of employees, projects that the organization is involved with and perhaps even information about third party products and suppliers that are in use.
by Nikhil Srivastava
Session hijacking, also known as TCP session hijacking, allows a user to take control over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. Once the user’s session ID has been accessed (through session prediction), the attacker can masquerade as that user and do anything the user is authorized to do on the network.
NTO SQL Invader
by Sow Ching Shiong
NTO SQL Invader is a SQL injection exploitation tool. It gives the ability to quickly and easily exploit or demonstrate SQL injection vulnerabilities in Web applications. With a few simple clicks, a penetration tester will be able to exploit a vulnerability to view the list of records, tables and user accounts of the back-end database.
CSRF Attacks on Network Devices
by Eugene Dokukin
The first attack it’s to turn on the remote access to the admin panel (it’s off by default), to allow remote attacker to access the admin panel from the Internet and change all required settings (and this attack can be conducted in one request). Network devices which have an option to allow remote access and have CSRF vulnerabilities can be attacked in such way.
Web Application Security Vulnerabilities Have Been Prevalent The Last Decade
by Matt Parsons
The main issue with SQL injection is that the programmer is dynamically generating SQL queries and not validating the input. The best way to prevent this attack is to validate all input with white list validation, use least privilege and use prepared statements or stored procedures. In Java EE it is best to use preparedstatement() or in .NET use SQLCommand().
Interview with Marsel Nizamutdinov
by PenTest Team
Marsel Nizamutdinov is a Head of Research & Development Department at High-Tech Bridge SA, web application security expert and the author of “Hacker Web Exploitation Uncovered” (2005).
Qualys Virtual Scanner
by Scott Christie
The setup of a new Virtual Scanner is not difficult. For existing Qualys customers, a change must be made to the service account to allow for the Virtual Scanners. During the change and previously owned physical scanner appliances must be online or else the physical devices can be irreparably dropped from the service account and will have to be returned to Qualys. After the account change, users will notice new menu options for the provision and download of Virtual Scanner appliances.
Comments are closed.