feed2list
Search and browse in Computer · Security
   search hits: 33
website The Ethical Hacker Network
Free Online Magazine and Community for Security Professionals

Phishing attacks have become a common factor in our daily routines for businesses and in our personal lives. There are many different types of phishing attacks, each of which requires a slightly different defense while having some commonalities as well. This article covers a specific type of attack called credential phishing and ways to protect against it. While you may […]

The post Credential Phishing – Easy Steps to Stymie Hackers appeared first on The Ethical Hacker Network.


text Book Review: Investigating Cryptocurrencies
Mon, 02 Jul 2018 17:15:51 +0000

As the saying goes, "Follow the money." Regardless of one’s philosophical argument on the merits of a decentralized currency controlled by the masses and not a single government entity, criminals are utilizing the technology to their own ends specifically because of the lack of a paper trail. "Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence" was written for cyber and […]

The post Book Review: Investigating Cryptocurrencies appeared first on The Ethical Hacker Network.


My expertise is not necessarily laden in the land of career counseling, hiring standards, and education recommendations. However, anecdotally, coming into a cybersecurity career in an unorthodox manner and blossoming through passion and perseverance, this is the best advice I can offer. First and foremost, we are past the days of the common refrain that "cybersecurity is not an IT […]

The post Cybersecurity Career Path – A Fresh Perspective appeared first on The Ethical Hacker Network.


The cloud is everything. Organizations have either moved completely to the cloud, have a hybrid approach, or are actively planning a cloud strategy. Penetration testers have always had to provide their services anywhere the client’s environment takes them. This often leads to finding vital information and credentials for their cloud provider of choice. With Amazon Web Services (AWS) being the […]

The post WeirdAAL (AWS Attack Library) Basics from the Authors appeared first on The Ethical Hacker Network.


Join us as we discuss Bug Hunting in general and how to generate income from it. Our guest Jason Haddix, VP at Bugcrowd, will give us an insider’s view of how it’s done. Register now for this free EH-Net Live! webinar on 11th of July 2018, 1 PM ET: First Name* Last Name* Email* I agree to the privacy policy and […]

The post Webinar: Bug Hunting as a Second Income – July 11 2018 appeared first on The Ethical Hacker Network.


text Video: Time’s up! GDPR is here – Now what?
Tue, 12 Jun 2018 19:29:12 +0000

Video and Slide Deck from EH-Net Live! June 2018 As promised, here is the video of the webinar we did earlier this month on GDPR. First find the description and agenda. Then the video from the EH-Net YouTube Channel is embedded. Lastly, we offer the slide deck. The world has gone GDPR crazy. Now that the deadline has passed, let’s […]

The post Video: Time’s up! GDPR is here – Now what? appeared first on The Ethical Hacker Network.


text The L0pht Legacy
Mon, 04 Jun 2018 13:40:07 +0000

20 Years Ago, Some Hackers Visited Congress… May 19th, 1998. I was just wrapping up my first year of college. My grades were terrible. Instead of going to classes, I had been huddled in my tiny dorm room with the computer my parents bought me. I grew up with a computer in the house from an early age, but having […]

The post The L0pht Legacy appeared first on The Ethical Hacker Network.


43 years ago, a small team led by Chuck Peddle changed the way society computes today. In 1975, encased in plastic, this 40-pin DIP 8-bit microprocessor, known as the MOS Technology 6502, made its debut. Why should you care? Not only was this the cheapest microprocessor on the shelf, but I believe, without this OG beauty queen of tech, our […]

The post Poisonous Pi – The Execution of a Raspberry Pi Hacking Workshop appeared first on The Ethical Hacker Network.


Join us for EH-Net Live! Video and Slide Deck from EH-Net Live! in June featuring Adrian Sanabria on GDPR is now available. The world has gone GDPR crazy. Now that the deadline has passed, let’s take a quick look back at what happened, what to do next, the real world implications and its effect (if any) on the hacker community. […]

The post Webinar: Time’s up! GDPR is here – Now what? appeared first on The Ethical Hacker Network.


text The Modern Day Hacker – A Cautionary Tale
Wed, 23 May 2018 03:01:51 +0000

J0hn_D0ugh$ – So there I was once again enjoying my victory. I wasn’t technically done yet, however all of the hard stuff had already been done. I’m not a hacker just for the money. I’ve made enough of that already. Such is the life for a modern day hacker. It’s really more about the challenge. Sadly however, many of these […]

The post The Modern Day Hacker – A Cautionary Tale appeared first on The Ethical Hacker Network.


Video and Slide Deck from EH-Net Live! April 2018 As promised, here is the video of the webinar we did last month. First find the description and agenda. Then the video from our YouTube Channel is embedded. Lastly, we offer the slide deck. Don Donzal, Editor-in-Chief of EH-Net, will give you a personally guided tour of those features and how […]

The post Video: The New EH-Net & Advancing Your InfoSec Career with Rafal Los appeared first on The Ethical Hacker Network.


text Hacking Retro
Tue, 15 May 2018 03:43:00 +0000

Bring out your disco ball, your leg warmers, and your VHS tapes!  While a lot of us watch the VH1 hit "I Love the 80s" for pop culture, I’m always drawn to the old tech. As such, let’s focus on bringing old hacking tricks to a new audience of pen testers.  I’m reminded of a quote from George Santayana, "Progress, […]

The post Hacking Retro appeared first on The Ethical Hacker Network.


text Failure without Consequences after Breach
Thu, 10 May 2018 15:03:09 +0000

What we learned this week from the news is that, even after that catastrophic breach that Equifax had where the credit histories and records of over 145 million Americans were exposed to attackers, the entire board was re-elected. Let’s sharpen that a bit – they were re-elected by shareholders after recommendations against that course of action by two different proxy […]

The post Failure without Consequences after Breach appeared first on The Ethical Hacker Network.


An anonymous report claims that a ton of your company’s customer data has been exposed. A sense of calm is in the air as you enact your vulnerability disclosure policy. You save the day, get a promotion and rainbows and unicorns fill the sky. Then you wake up!! You don’t have a vulnerability disclosure policy. Panic quickly washes away the […]

The post Every Business Needs a Vulnerability Disclosure Policy. Every. Single. Business. appeared first on The Ethical Hacker Network.


So, you’ve popped a user shell on a windows box and now you’re looking to escalate those privileges. Great! In this article we’ll look at one method of elevating your privileges by exploiting unquoted system services. A Windows service is a program that runs in the background similar to a *nix daemon. Often they are automatically started when Windows loads […]

The post Windows Privilege Escalation – Unquoted Services appeared first on The Ethical Hacker Network.


Join us for EH-Net Live! Free Webinar on April 26 The Ethical Hacker Network (EH-Net) is a free online magazine and community for security professionals. After being acquired by eLearnSecurity at the end of 2017, we’re thrilled to make it official that we’re back… and back in a big way. Ever since our inception over a decade ago, we have […]

The post Webinar: The New EH-Net & Advancing Your InfoSec Career with Rafal Los appeared first on The Ethical Hacker Network.


text Book Review: Cracking Codes with Python
Tue, 03 Apr 2018 13:01:06 +0000

With one last code modification, you’re in, and the contents of the vault are yours! Cracking Codes with Python is not quite about breaking into banks or pulling off elaborate heists, but it’s always fun to dream. Cracking Codes with Python by Al Sweigart is a newly published (January 2018), 424-page book from No Starch Press that bills itself as […]

The post Book Review: Cracking Codes with Python appeared first on The Ethical Hacker Network.


Needing to get quickly up to speed with containers, Kubernetes and security for work but have been putting it off for a while? Why do today what you can put off until tomorrow? You’re not alone. Being a security manager, my day-to-day responsibilities sometimes take me away from the need to plan for the future as well as keep up […]

The post Quick Dive into Containers, Kubernetes and Security appeared first on The Ethical Hacker Network.


text Welcome to the EH-Net Relaunch
Thu, 15 Mar 2018 15:38:27 +0000

Welcome to the EH-Net Relaunch The Ethical Hacker Network was always designed as an online magazine combined with community forums. Although a magazine without a print edition was considered lunacy over a decade ago, so was the idea of a community dedicated to advancing hacking as a legitimate career. You couldn’t even say ‘hacking’ in professional circles and be taken […]

The post Welcome to the EH-Net Relaunch appeared first on The Ethical Hacker Network.


Can I really get published on EH-Net? Welcome to The Ethical Hacker Network and our extended family, the EH-Net Community Members. Although EH-Net is an online magazine with all of our content free and freely available, being an EH-Netter has it’s rewards. In addition to many social features like activity streams, profiles, groups, friends, messages, notifications and, of course, forums… […]

The post Hello world! – Get Published in the EH-Net Community appeared first on The Ethical Hacker Network.