Home / IT Security / Black Hat (page 3)

Black Hat

Location and Geography

Location and Geography

Location and Geography: Not to be overlooked or underestimated in value is any information pertaining to the physical location of offices and personnel. You should seek this information during the Footprinting process because it can yield other key details that you may find useful in later stages, including physical penetrations. …

Read More »

Understanding the Steps of Ethical Hacking

Understanding the Steps of Ethical Hacking

Understanding the Steps of Ethical Hacking: For an overview of the process, let’s look at the steps of ethical hacking to see where Footprinting fits in as well as what future phases hold. Phase 1: Footprinting Footprinting is the first phase of the ethical hacking process and is the subject …

Read More »

Hacking: Current Developments

Hacking: Current Developments

Current Developments: In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In the first few years of the new millennium, the aggressiveness of attacks increased, with many attacks criminally motivated. Malicious attacks that have occurred include the following (although there are many …

Read More »

Bluetooth Threats

Bluetooth Threats

Bluetooth Threats: Much like Wi-Fi, Bluetooth has a bevy of threats facing it that you must take into account. Bluetooth suffers from many shortcomings that have been slowly addressed with each successive version, but many flaws remain and can be exploited. The technology has already seen many attacks take their …

Read More »

Hacking Bluetooth

Hacking Bluetooth

Hacking Bluetooth: Another wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to a short-range wireless technology commonly used to connect devices such as headsets, media players, and other types of technologies. Bluetooth operates in the 2.4 GHz frequency range and …

Read More »

Working with Email

Working with Email

Working with Email: Email is one of the tools that a business relies on today to get its mission done. Without email many businesses would have serious trouble functioning in anything approaching a normal manner. The contents of email are staggering and can be extremely valuable to an attacker looking …

Read More »

The Value of Job Sites

The Value of Job Sites

The Value of Job Sites: An oft-overlooked but valuable method of gathering information about a target is through job sites and job postings. If you have every looked at a job posting, as many of us have, you will notice that they can take a lot of forms, but something …

Read More »

Malicious Add-Ons

Malicious Add-Ons

Malicious Add-Ons: There are any numbers of add-ons that have the potential to harm a system. Some do so unintentionally through poor programming, and some are truly malicious add-ons; the difference between them is intent. Consider a Java applet, for example. This is a small, self-contained Java Script that is …

Read More »

The Patriot Act

The Patriot Act

The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 was passed largely because of the World Trade Center attack on September 11, 2001. This law gives the U.S government extreme latitude in pursuing criminals who commit terrorist acts. The …

Read More »

The Computer Security Act of 1987

The Computer Security Act requires federal agencies to identify and protect computer systems that contain sensitive information. This law requires agencies that keep sensitive information to conduct regular training and audits and to implement procedures to protect privacy. All federal agencies must comply with this act. Note: For more information …

Read More »