ttern - Free Web Hosting with PHP, MySQL and cPanel
ttern - Free Web Hosting with PHP, MySQL and cPanel
ttern - Free Web Hosting with PHP, MySQL and cPanel
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CONTENTS<br />
REVERSE ENGINEERING<br />
28 A Quick „H<strong>and</strong>s On” Introduction to Packing<br />
By Alain Schneider<br />
On Windows systems, programs are usually available in the PE file format<br />
<strong>with</strong> the EXE extension. Although this file format is quite complex, it is now<br />
well documented, so underst<strong>and</strong>ing how it is globally supposed to work is<br />
pretty easy <strong>and</strong> you can find a lot of programs designed to open/analyze/<br />
modify PE executables.<br />
Those which are designed to modify PE files are often called packers. In<br />
this article we will learn how to write one of them.<br />
INTERVIEW<br />
36 Interview <strong>with</strong> Jan van Bon<br />
By Exploiting Software Team<br />
Traditional security projects show a high degree of falling back specifically<br />
because they are not embedded in a well-functioning management system<br />
– says Jan van Bon. Creating a solid <strong>and</strong> practical architecture under your<br />
IT management approach can greatly reduce the cost of improving quality,<br />
<strong>and</strong> it can speed up your projects. An integrated approach requires a<br />
simple <strong>and</strong> straightforward method that is easy to underst<strong>and</strong>, supported<br />
by available tools in the market, <strong>and</strong> accepted by many providers. This<br />
kind of approach requires thorough knowledge <strong>and</strong> sincere dedication.<br />
As <strong>with</strong> many other initiatives in the field of IT Service Management,<br />
the Netherl<strong>and</strong>s have again produced a fascinating new approach, <strong>with</strong><br />
promising results for IT Security projects. Jan will share his thoughts on<br />
risk managment <strong>and</strong> IT Security development.<br />
www.hakin9.org/en 7