Preview - Reverse Engineering and Password Breaking.pdf

(12581 KB) Pobierz
TEAM
Editor-in-Chief

Joanna Kretowicz 

joanna.kretowicz@eforensicsmag.com
Editors:
Marta Sienicka

sienicka.marta@hakin9.com
Marta Strzelec

marta.strzelec@eforensicsmag.com
Anna Kondzierska

anna.kondzierska@hakin9.org
Proofreader:
Lee McKenzie
Senior Consultant/Publisher:
Paweł Marciniak 
CEO:
Joanna Kretowicz 

joanna.kretowicz@eforensicsmag.com 
Marketing Director:
Joanna Kretowicz 

joanna.kretowicz@eforensicsmag.com
DTP
Marta Sienicka

sienicka.marta@hakin9.com
Cover Design
Hiep Nguyen Duc
Publisher
Hakin9 Media Sp. z o.o.

02-676 Warszawa

ul. Postępu 17D 

Phone: 1 917 338 3631 
www.hakin9.org
Proofreaders
&
Betatesters:
Lee McKenzie
Al Alkoraishi
Avi Benchimol
Bernhard Waldecker
Hammad Arshed
Da Co
David Kosorok
Gregory Chrysanthou
Gilles Lami
Matthew Sabin
Sunny Wear
Sushil Verma
Robert Fling
Paul Mellen
Wayne Kearns
Samrat Das
Arthur Tumanyan
Jarvis Simpson
Jonus Gerrits
Tom Updegrove
All trademarks, trade names, or logos mentioned or used are the
property of their respective owners.
The techniques described in our articles may only be used in private,
local networks. The editors hold no responsibility for misuse of the
presented techniques or consequent data loss.
Dear Readers!
The summer is almost over, but to make those last moments of freedom more bearable we present you
a new issue of Hakin9!
 This
time we don’t have a main theme but various articles about different top-
ics. We start with Reverse Engineering and Password Breaking. In this tutorial prepared by Jan Kopia
you will learn how to bypass a password protection using common and easily available tools. If you
need more basic information or to refresh your knowledge about Reverse Engineering start with Mat-
thew Miller’s article. If you prefer something more hands-on, don’t forget to check Reverse Engineer-
ing IoT Devices. by talented author Ayan Pahwa. In his hands-on tutorial you will learn how to manipu-
late smart LED RGB light bulb with reverse engineering techniques.
If you wish to read more practical article, you must check out Build Your own NIDS with Scapy made by
Hadi Assalem. This article will present a Lightweight Network Intrusion Detection system based on the
Scapy library to detect the common Data Link layer attacks like (ARP - DNS) spoofing and also some
web app attacks. OSSIM Deploying, Configuring and Administering Part 1 by our author Luis Borralho
is divided into two parts, and the second part will be presented in next edition of Hakin9.
Jacob Bell once again reminds us why Ransomware is the biggest cyber threat. His article will give you
the most important information about preventing this attack. Samrat Das also returns with another arti-
cle, this time focused on
 Java
Deserialization Exploit: Remote Code Execution. For those of you that
look for more information about Burp Macros, I recommend article by Prashant Kumar Khare and Sa-
rang Dabadghao. It’s a must read for all security specialists.
 
If you want to become more familiar with Tshark, the article written by Felipe Durate will give you a
great overview of this tool. Finally, Why More Businesses Should Hire Hackers by Kayla Matthews pre-
sents some very important points about the role that hackers have in securing your systems.
We hope you find something for yourself in the issue. As always, huge thanks to all the authors, review-
ers, to our amazing proofreader, and of course you, our readers - without you this wouldn’t be possi-
ble!
Hakin9 Team
Table of Contents
Reverse Engineering: Basics
by Matthew Miller
7
The Pervasive Effects of Ransomware and What
Organizations Can Do To Prevent and Mitigate Them
by Jacob Bell
18
Reverse Engineering and password breaking
by Jan Kopia
31
50
Why More Businesses Should Hire Hackers
by Kayla Matthews
Reverse Engineering IoT Devices
by Ayan Pahwa
56
Build Your own NIDS with Scapy
by Hadi Assalem
73
112
Java Deserialization Exploit: Remote Code Execution
by Samrat Das
Mailbox Overflow by Triggering Python Application
Using Virtual Environment
by Sumanta Kumar Deb and Rohan Dutta
123
5
Tshark, Wireshark in command line
by Felipe Duarte
134
Automating Manual Security Testing Using Burp
Macros to Accelerate Manual Security testing
by Prashant Kumar Khare and Sarang Dabadghao
142
OSSIM Deploying, Configuring And Administering
Part 1
by Luis Borralho
155
6
Zgłoś jeśli naruszono regulamin