From hakin9.org
Dear Readers,
We would like to present you our newest issue, Exploitation Techniques and Tools. We hope that you will find many interesting articles inside the magazine and that you will have time to read them all.
First, we will start with the main article about Exploitation Techniques and tools. Later you will read about malware injection techniques in user mode only. Sumanta Kumar Deb and Rohan Dutta have also prepared an article about data mining with Python. If you want to learn about shadow-IT you can’t skip How to deal with Shadow-IT Applications by Klaus Haller. Moreover you will be shown how to how to take full control of a server by exploiting vulnerabilities inside it with Brahimi Zakaria. Rodolpho Concurde will present you a way to write your own exploits. Luis Borralho create a tutorial about FiercPhish, it’s a first part! So make sure to check next issue for more hands-on experience with this tool! This and more you will find in our newest issue.
Again special thanks to the Beta testers and Proofreaders who helped with this issue. Without your assistance there would not be a Hakin9 Magazine!
Enjoy your reading,
Hakin9 Magazine