03 January 2014 ~ 0 Comments

Designing Secure Information and Communication Infrastructure of Faculty of Transport and Traffic Sciences

With the development of information and communication systems various methods and tools to attack them are being developed. Initially the attacks where performed for individual proof and the desire to learn, but the rise in popularity of Internet and the value of information that this medium transmit target attacks become financial benefit or even war activities. The purpose of this study is to determine the current state of information and communication systems of the Faculty of Transport and Traffic Sciences, define its security vulnerabilities or weaknesses, and based on its findings recommended solutions that will improve the level of safety and reliability of the system by applying the known methods and means of protection.

Continue Reading

30 January 2010 ~ 1 Comment

Hacking websites: The Series

Hacking websites: The Series

This is the beginning of the “Hacking websites” series which will try to explain why sites are hacked, how they are hacked and how to protect your website(s) from being hacked and broken. Motivated with rather discouraging results form Breach and WhiteHat security statistics reports I decided to start these series which will, hopefully, educate readers enough to protect their websites from top 10 vulnerability classes.

Continue Reading

Tags: ,

05 January 2010 ~ 0 Comments

Classification of Information System Hacking Tools

Classification of Information System Hacking Tools

In a process of hacking information system the attacker will be using one or more hacking tools to accomplish his objective. The hacking tools can be divided into two main categories: procedural classification and functional classification. Procedural classification describes which tools are use during seven steps of hacking attacker is going through. Functional classification is describing the main four categories based on the tools functionalities.

Continue Reading

12 December 2009 ~ 1 Comment

Hacking Information Systems: Tools of the trade

Hacking Information Systems: Tools of the trade

For every step of the hacking process one or more tools could be required for the attacker to complete his objective. Although there are thousand of hacking tools variations all of them can be categorized to 14 basic categories.

Although, when talking about “tools” many will think about software solutions. But in a broader sense, hackers toolkit is much more than just software and it can be anything from piece of paper and a pen to human activities for collection of sensitive information and the penetration into the target system.

Continue Reading

05 December 2009 ~ 3 Comments

Hacking Information Systems: The Seven Steps

Hacking Information Systems: The Seven Steps

Hacking an information system which can be a computer network, server or a web site collection can be, and it is, very complex procedure and different procedure for every information system. But in it’s essence follows the basic seven steps of hacking into some kind of information system. From basic scouting to full takeover these seven steps […]

Continue Reading