Espionage - Utilizing Web 2.0, SSH Tunneling and a Trusted Insider

This technical report was written to fulfill the requirements of the GIAC Certified Incident Handler (GCIH) certification. It will address recent trends in the Information Security field such as: exploiting client side vulnerabilities [SANS 2007], increased commercial espionage and lack of security...
By
Ahmed Abdel-Aziz
February 11, 2008

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg