Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 1 to 10
Logical Instructions
31st Mar 2020 [18 hours ago] from InfoSec
Introduction This article defines logical instructions as executed by x86 processors. It goes on to describe four key classifications of logical instructions in brief. This article is designed for...Go on to the site to read the full...
Networking Basics For Reverse Engineers
31st Mar 2020 [20 hours ago] from InfoSec
Introduction This article will define network reverse engineering, list tools used by reverse engineers for reverse engineering and then highlight the network basics required by such engineers. The...Go on to the site to read the full...
AI And Machine Learning And Their Uses In Cybersecurity
31st Mar 2020 [20 hours ago] from InfoSec
Artificial intelligence and machine learning trends Although artificial intelligence and its subfield of machine learning have been applied in cybersecurity for some time, the speed of adoption is...Go on to the site to read the full...
Ethical Hacking: SNMP Recon
31st Mar 2020 [20 hours ago] from InfoSec
Introduction In this article, we will discuss the various methods one could take to perform reconnaissance on the SNMP protocol. As you may know, SNMP reveals too much information about targets that...Go on to the site to read the full...
Integer Overflow And Underflow Vulnerabilities
31st Mar 2020 [21 hours ago] from InfoSec
Introduction to integer overflows and underflows Integer overflow and underflow vulnerabilities are considered the eighth most dangerous vulnerability in the Common Weakness Enumeration (CWE) Top 25...Go on to the site to read the full...
Stack Instructions
31st Mar 2020 [22 hours ago] from InfoSec
Introduction This article will introduce readers to the assembly concepts in relation to the stack. We will discuss basic concepts related to stack and various registers, and the instructions used...Go on to the site to read the full...
How To Use Protected Folders In Windows 10
30th Mar 2020 [42 hours ago] from InfoSec
Introduction Ransomware is one of the biggest threats faced by organizations today. After encrypting all files on servers and desktops, ransomware perpetrators demand payment before decrypting what...Go on to the site to read the full...
Stepping
30th Mar 2020 [42 hours ago] from InfoSec
Introduction Single-stepping is one of the most powerful features of a debugger, as it allows a reverse engineer to execute a single instruction at a time before returning control to the debugger....Go on to the site to read the full...
How Hackers Check To See If Your Website Is Hackable
30th Mar 2020 [44 hours ago] from InfoSec
Introduction “Memento mori” is Latin for “Remember that you are mortal.” According to tradition, this phrase was whispered to triumphant Roman military commanders on parades, to remind them they...Go on to the site to read the full...
Ethical Hacking: Stealthy Network Recon Techniques
30th Mar 2020 [44 hours ago] from InfoSec
Introduction In this article, we shall discuss some stealthy reconnaissance techniques that should be employed during a hacking exercise. It’s important to know which scan to use, especially when you...Go on to the site to read the full...
1 2 3 4 5 6 7 8 9 10 Older »