RSSHoffman

Blackjacking

| January 17, 2007

Active Image
Active Image del.icio.us

Discuss in Forums {mos_smf_discuss:Hoffman}

New book NOW AVAILABLE from our own wireless guru, Dan Hoffman!

New Radio Interview on Monday June 18.

Catch Dan and EH-Net Editor, Donald C. Donzal, live from 5:00 – 6:00 PM PST on the Computer Outlook Radio Program discussing Dan's book and ChicagoCon. If you miss it, find it in the Archives.

"Blackjacking: Security Threats to Blackberry, PDAs, and Cell Phones in the Enterprise" By Daniel Hoffman, published by Wiley. ISBN: 0470127546; Published: April 30, 2007; Pages: 336; Edition: 1st.

Continue Reading

Step by Step Guide to the Advanced Mobile Hacks Video

| October 24, 2006

Active Image
Active Image del.icio.us

Discuss in Forums {mos_smf_discuss:Hoffman}

By Daniel V. Hoffman, CISSP, CWNA, CEH

Last year, Dan Hoffman created a highly successful hacking video of a laptop with an unpatched version of Windows 2000. Even the Department of Defense included a link to it in their security newsletter. This year Dan not only has 4 hacking scenarios for you, but each can victimize a laptop running Windows XP with SP2. The Hacking the Mobile Workforce Video on Fiberlink.com shows live hacks that illustrate why fundamental changes in security strategy are necessary. This video shows the exact steps a hacker would utilize to exploit mobile systems lacking the appropriate security protection.

This article in 2 parts is designed to be a compliment to the in-depth, step-by-step hacking video tutorial. Part 1, Step by Step Guide to the Advanced Mobile Hacks Video, will outline in detail the steps organizations and users need to take to prevent each of these hacks from taking place. Part 2, Engineering Guide for the Enterprise, details the fundamental changes in security strategy that enterprises and individuals need to implement in order to protect ongoing threats to mobile devices.

Continue Reading

Cool and Illegal Wireless Hotspot Hacks

| July 19, 2006

So, why write an article called “Cool and Illegal Wireless Hotspot Hacks” that details how to perform hotspot hacks?  Some would say it is irresponsible and enables those with ill intent to hack unsuspecting victim’s machines.  It really depends which way you look at it.  Would you rather be left in the dark on what types of attacks can occur, how they are performed and not know how to protect yourself against them?  Doing so would not make the threats go away; in part, you would simply be denying that they exist.  Surely, it is safer to be open and honest about the threats, understand how they can occur then become educated on and implement the appropriate countermeasures.  In large part, that is why my articles always detail not only how to perform the hacks, but really focus on how to protect against them.  The purpose is not to teach people how to hack, but rather to educate on how to prevent systems from being exploited.

Now, on with the hacks/cracks/techniques that you will hopefully find to be “cool,” informative and which are most certainly illegal.

Continue Reading

Review: CEH Via Self Study

| April 15, 2006

Active Image
Active Image del.icio.us

Discuss in Forums {mos_smf_discuss:Hoffman}

By Daniel V. Hoffman, CISSP, CWNA, CEH

I remember the first time I heard about the Certified Ethical Hacker certification. It was around the time that I was studying for my CISSP, and I was quite intrigued simply by the name of the certification. Upon first visiting the EC-Council website to find out more about the certification, I must admit that my initial impression was that of being rather unimpressed. This was mainly due to the fact that the EC-Council website looks rather unprofessional, and I almost dismissed the CEH certification as really being rather hokey. That notwithstanding, there is a buzz around CEH, and, in looking at the actual topics that were covered, I began getting quite interested in achieving this certification. Personally, I couldn’t find very much worthwhile, objective or first-hand information regarding the CEH and its Self Study program when looking online. I hope that this article is helpful to those seeking to achieve the CEH via self study. I also hope this information is useful for anyone considering the CEH vs. other security certifications.

Continue Reading

Hacking Online Banking and Credit Card Transactions – And How to Prevent It

| February 13, 2006

Active Image
Active Image del.icio.us

Discuss in Forums {mos_smf_discuss:Hoffman}

By Daniel V. Hoffman, CISSP, CWNA, CEH

Dan is at it again. His very popular column on wireless hacking and how to prevent it is generating a lot of interest with over 125,000 page views and counting. Paraphrased comments on digg.com have ranged from 'Fantastic' and 'Awesome' to 'That's not really hacking' and 'Where's the beef.' Well… just remember that you asked for it!

The Scenario

You go to a coffee shop for a cup of coffee and to utilize the shop’s Wi-Fi HotSpot to surf the web. You connect to the hotspot network and decide to perform some online banking or to purchase something online. By the way, this could happen to you at home, as well. As an end-user, you feel quite secure, as you see the lock in the bottom corner of your Internet browser, symbolizing that the online banking or online credit card transaction is safe from prying eyes. Your data, including username, password, credit card info, etc. will be encrypted with 128-bit encryption. So it's secure, right?

Continue Reading

Step-By-Step Hacking Video

| January 8, 2006

Everyone talks about the ability to hack computers via wireless technology, but have you ever actually SEEN someone do it? Well you’re about to. The Step-By-Step Hacking Video will show exactly how a laptop without the proper security protection can be attacked and exploited. In a manner of mere minutes, we can own an unprotected or out-of-date system. The video actually shows the exact procedures that a hacker could utilize to gain access to a mobile system and eventually a corporate network. Steps and technologies to prevent such an attack are presented throughout the video and are the focus of this article. NOTE: While it may seem that the first few minutes of the video are unexciting – just wait – you are being setup!

 

Continue Reading

Essential Wireless Hacking Tools

| November 14, 2005

Essential Wireless Hacking Tools 3D WiFiBy Daniel V. Hoffman, CISSP, CWNA, CEH

Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. This list is not meant to be comprehensive in nature but rather to provide some general guidance on recommended tools to build your toolkit. Please put these essential wireless hacking tools to safe, legal and ethical use. The rest is up to you.

Continue Reading