Core Security Technologies

Displaying 1-5 of 5 results

  • White Papers // Jul 2010

    WPA Migration Mode: WEP Is Back to Haunt You..

    Cisco access points support WPA Migration Mode, which enables both WPA and WEP clients to associate to an access point using the same Service Set Identifier (SSID). Cisco warns (inside a Q&A document) about the dangers by stating "That security will operate at the least-secure level common to all devices"...

    Provided By Core Security Technologies

  • White Papers // Jul 2009

    Systematic XSS Exploitation

    The CROSS-Site Scripting (XSS) vulnerabilities are usually overlooked and their impact is typically underestimated because its analysis requires security skills that are often absent in testers and developers. In this paper, the author introduces a tool that enables the decoupling of the exploitation and post-exploitation. The tool provides the means...

    Provided By Core Security Technologies

  • White Papers // Feb 2009

    Smarter Security Spending: Driving ROI Via Proactive Testing

    This paper examines how comprehensive security testing allows organizations to better understand the return on investment of defensive solutions and where their most significant vulnerabilities exist to help target security spending in a challenging economic environment. It is meant to illustrate how actively testing the exploitability of vulnerabilities enables organizations...

    Provided By Core Security Technologies

  • White Papers // Feb 2009

    Simulating Cyber-Attacks for Fun and Profit

    The authors introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware...

    Provided By Core Security Technologies

  • White Papers // Jan 2009

    Faceted Ranking in Collaborative Tagging Systems

    Multimedia content is uploaded, tagged and recommended by users of collaborative systems such as YouTube and Flickr. These systems can be represented as tagged-graphs, where nodes correspond to users and tagged-links to recommendations. In this paper, the authors analyze the online computation of user-rankings associated to a set of tags,...

    Provided By Core Security Technologies

  • White Papers // Feb 2009

    Simulating Cyber-Attacks for Fun and Profit

    The authors introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware...

    Provided By Core Security Technologies

  • White Papers // Jan 2009

    Faceted Ranking in Collaborative Tagging Systems

    Multimedia content is uploaded, tagged and recommended by users of collaborative systems such as YouTube and Flickr. These systems can be represented as tagged-graphs, where nodes correspond to users and tagged-links to recommendations. In this paper, the authors analyze the online computation of user-rankings associated to a set of tags,...

    Provided By Core Security Technologies

  • White Papers // Feb 2009

    Smarter Security Spending: Driving ROI Via Proactive Testing

    This paper examines how comprehensive security testing allows organizations to better understand the return on investment of defensive solutions and where their most significant vulnerabilities exist to help target security spending in a challenging economic environment. It is meant to illustrate how actively testing the exploitability of vulnerabilities enables organizations...

    Provided By Core Security Technologies

  • White Papers // Jul 2010

    WPA Migration Mode: WEP Is Back to Haunt You..

    Cisco access points support WPA Migration Mode, which enables both WPA and WEP clients to associate to an access point using the same Service Set Identifier (SSID). Cisco warns (inside a Q&A document) about the dangers by stating "That security will operate at the least-secure level common to all devices"...

    Provided By Core Security Technologies

  • White Papers // Jul 2009

    Systematic XSS Exploitation

    The CROSS-Site Scripting (XSS) vulnerabilities are usually overlooked and their impact is typically underestimated because its analysis requires security skills that are often absent in testers and developers. In this paper, the author introduces a tool that enables the decoupling of the exploitation and post-exploitation. The tool provides the means...

    Provided By Core Security Technologies