Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    prev next

Autumn2007 cover image
Volume 24
Number 3
68 pages
Autumn2007 back cover image
Quote: "The price good men pay for indifference to public affairs is to be ruled by evil men." - Plato

Author
Nom de plume Anonymous
Name
Email
Notes I've assumed anonymous and Anonymous are the same author.

Aritcle
Synopsis Discusses the lack of network security at Target stores and details a method of obtaining register transaction logs.
Notes
Code In article text
Page 23
Pages 1
In Best of 2600 book? Yes, page 708, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 17 (Retail Hacking)

Links

Addendum

Keywords
Exploit A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.    (more..)