Metasploit mailing list archives

hack technics


From: omid.zs at gmail.com (Omid Tavakoli)
Date: Mon, 12 Feb 2007 11:37:11 +0330

Dear mailing list members ,



This is a Network Security specialist (Penetration Testing Asset) who has
been working on the latest methods of the penetration testing; as part of my
research I have some questions and I would be very thankful if you would
help me find the answers.

I believe in order to provide the required level of security for any
application, network or operating system, we need to look at it from the
hacker's point of view because they have been always one step ahead of us. I
need to know what the hacker's main focuses are. For example, "Subverting
Windows 2003 SP1 Kernel Integrity protection"? or "defeating stack based
overflow prevention mechanism". What are the latest phishing methods? and
...

And in general, what is the direction of the hacking methods in the near
future?



Sincerely,

Omid Tavakolli
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070212/0703fa04/attachment.htm>


Current thread: