摘要:
http://xforce.iss.net/xforce/xfdb/60003Cisco ASA IKE buffer overflowciscoasa-ike-bo (60003)High RiskDescription:Cisco ASA is vulnerable to a buffer overflow. By using overly long IKE attributes, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the applicati 阅读全文
摘要:
==Phrack Inc.== Volume 0x0e, Issue 0x44, Phile #0x02 of 0x13|=-----------------------------------------------------------------------=||=------------------------=[ PHRACK PROPHILE ON ]=-----------------------=||=-----------------------------------------------------------------------=|... 阅读全文
摘要:
==Phrack Inc.== Volume 0x0b, Issue 0x3e, Phile #0x08 of 0x10|=-----=[ FIST! FIST! FIST! Its all in the wrist: Remote Exec ]=---------=||=-----------------------------------------------------------------------=||=--------------------------=[ by grugq ]=------------------------------=| 1... 阅读全文
摘要:
Questa opera � coperta dallaCreative commons Attribution-NonCommercial-ShareAlike LicenseE' possibile ottenere una copia di questa licenza visitandohttp://creativecommons.org/licenses/by-nc-sa/2.0/od inviando una lettera aCreative Commons, 559 Nathan Abbott WayStanford, California 94305, USAATTE 阅读全文
摘要:
phrack 附件处理方法wget -O - 'http://www.phrack.org/issues.html?issue=61&id=9&mode=txt' | head -n 4640 | tail -n 3239 | uudecode -o - | tar xzf -If you have wget and uudecode installed, you'll find yourself with a directory named 'clet.v1.0.0-sid'. Otherwise, install wget and u 阅读全文
摘要:
==Phrack Inc.== Volume 0x0b, Issue 0x3f, Phile #0x0a of 0x14|=-----------------=[ Hacking Grub for fun and profit ]=-----------------=||=-----------------------------------------------------------------------=||=---------------=[ CoolQ <qufuping@ercist.iscas.ac.cn> ]=---------------=||... 阅读全文
摘要:
Schneier on SecurityA blog covering security and security technology.« James Bamford on the NSA|Main|Friday Squid Blogging: Draw-a-Squid Contest »October 23, 2009"Evil Maid" Attacks on Encrypted Hard DrivesEarlier this month, Joanna Rutkowskaimplementedthe "evil maid" a 阅读全文
摘要:
'Evil Maid' USB stick attack keylogs TrueCrypt passphrasesSummary:Security researcher Joanna Rutkowska has released a PoC (proof of concept) of a keylogger that is capable of logging TrueCrypt's disk encryption passphrase enabling the attacker to successfully decrypt the hard drive's 阅读全文
摘要:
基于虚拟机、虚拟化技术的rootkit 阅读全文
摘要:
http://bbs.51cto.com/thread-917576-1.html 阅读全文