Hackin9 Vol.16 No.12 | Brute Forcing & Supply Chain Attacks
Our November edition is finally here and it’s entirely dedicated to brute forcing and supply chain attacks. We prepared a handful of articles, tutorials, and case studies, and we hope it will be a great read for you! Let’s take a look at what’s inside.
First things first, we have a tutorial about BruteX — a great, but not so popular tool for brute forcing. The author will guide you through the installation and performing an attack simulation. BruteX is an interest-ing tool that can expand your virtual toolbox.
Next, Daniel Garcia Baameiro will teach you how to build your own brute force tool in Bash. How cool is that? In the next article, you will learn about performing brute force attacks with Hydra — we recommend this article for beginners, as it is a great introduction to usage of this tool.
In the following articles you’ll get a chance to read about some very useful techniques, i.e. configuring
OSSEC to mitigate brute force attacks, or about dictionary attacks and machine learning. We also talk
about side-channel attacks and fault injection.
Don’t think we forgot about the supply chain part! If you’d like to read more about this topic, we have
three great articles for you. You'll learn about the nature of supply chain attacks, how they are per-
formed, and how to defend against them. Also, you'll read about supply chain exploitation with the us-age of password spraying attacks.
Last but not least, if you still haven’t had enough of Wi-Fi hacking, you’ll learn about how the pattern of creating wireless network access passwords makes it easier for hackers to crack the password.
First things first, we have a tutorial about BruteX — a great, but not so popular tool for brute forcing. The author will guide you through the installation and performing an attack simulation. BruteX is an interest-ing tool that can expand your virtual toolbox.
Next, Daniel Garcia Baameiro will teach you how to build your own brute force tool in Bash. How cool is that? In the next article, you will learn about performing brute force attacks with Hydra — we recommend this article for beginners, as it is a great introduction to usage of this tool.
In the following articles you’ll get a chance to read about some very useful techniques, i.e. configuring
OSSEC to mitigate brute force attacks, or about dictionary attacks and machine learning. We also talk
about side-channel attacks and fault injection.
Don’t think we forgot about the supply chain part! If you’d like to read more about this topic, we have
three great articles for you. You'll learn about the nature of supply chain attacks, how they are per-
formed, and how to defend against them. Also, you'll read about supply chain exploitation with the us-age of password spraying attacks.
Last but not least, if you still haven’t had enough of Wi-Fi hacking, you’ll learn about how the pattern of creating wireless network access passwords makes it easier for hackers to crack the password.
Format: PDF
Language: ENG
Medicine: No needs
Size: 47,51 MB.
Download (Links for Users)
Spoilers are only visible for VIP users.
No comments