摘要:
/* * Mempodipper * by zx2c4 * * Linux Local Root Exploit * * Rather than put my write up here, per usual, this time I've put it * in a rather lengthy blog post: http://blog.zx2c4.com/749 * * Enjoy. * * - zx2c4 * Jan 21, 2012 * * CVE-2012-0056 */#define _LARGEFILE64_SOURCE#define _GNU_SOURCE#inc. 阅读全文
摘要:
http://www.cs.dartmouth.edu/~sergey/cs108/Dan-Rosenberg-lecture.pdf 阅读全文
摘要:
我看APT攻防对抗(2):APT攻击的案例FlashSky of code audit labs of vulnhunt.com翰海源:立志于让安全成为IT系统基础属性;帮助客户改进自身系统的安全,以及实现对APT攻击的检测与防御.目前APT攻击发布细节出来的案例,基本都是以美国公布的。但是不代表APT攻击只针对欧美,主要原因在于,美国由于IT技术的发达成为APT攻击 的首要目标,而且很多高科技公司也是民营的,而美国公司把针对安全事件发生后的调查和公布看作一种公司的诚信行为,而其他很多国家因为被攻击后更习惯捂盖 子的做法公开的很少。另一个原因是我猜测,美国在APT检测和防御技术上具备一定的先进 阅读全文
摘要:
我看APT攻防对抗(1):APT攻击的特性FlashSky of code audit labs of vulnhunt.comurl:http://blog.vulnhunt.com/index.php/2012/03/26/flash_sky_apt_attack_spec/翰海源:立志于让安全成为IT系统基础属性;帮助客户改进自身系统的安全,以及实现对APT攻击的检测与防御.APT(高级持续性威胁)攻击是指近年来,专业甚至是有组织和国家背景支持的黑客,针对重要目标和系统发起的一种攻击手段,主要特征有1)持续性:攻击者为了重要的目标长时间持续攻击直到攻破为止。攻击成功用上一年到三年,攻击成 阅读全文
摘要:
http://xforce.iss.net/xforce/xfdb/60003Cisco ASA IKE buffer overflowciscoasa-ike-bo (60003)High RiskDescription:Cisco ASA is vulnerable to a buffer overflow. By using overly long IKE attributes, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the applicati 阅读全文
摘要:
==Phrack Inc.== Volume 0x0e, Issue 0x44, Phile #0x02 of 0x13|=-----------------------------------------------------------------------=||=------------------------=[ PHRACK PROPHILE ON ]=-----------------------=||=-----------------------------------------------------------------------=|... 阅读全文
摘要:
==Phrack Inc.== Volume 0x0b, Issue 0x3e, Phile #0x08 of 0x10|=-----=[ FIST! FIST! FIST! Its all in the wrist: Remote Exec ]=---------=||=-----------------------------------------------------------------------=||=--------------------------=[ by grugq ]=------------------------------=| 1... 阅读全文
摘要:
Questa opera � coperta dallaCreative commons Attribution-NonCommercial-ShareAlike LicenseE' possibile ottenere una copia di questa licenza visitandohttp://creativecommons.org/licenses/by-nc-sa/2.0/od inviando una lettera aCreative Commons, 559 Nathan Abbott WayStanford, California 94305, USAATTE 阅读全文
摘要:
phrack 附件处理方法wget -O - 'http://www.phrack.org/issues.html?issue=61&id=9&mode=txt' | head -n 4640 | tail -n 3239 | uudecode -o - | tar xzf -If you have wget and uudecode installed, you'll find yourself with a directory named 'clet.v1.0.0-sid'. Otherwise, install wget and u 阅读全文
摘要:
==Phrack Inc.== Volume 0x0b, Issue 0x3f, Phile #0x0a of 0x14|=-----------------=[ Hacking Grub for fun and profit ]=-----------------=||=-----------------------------------------------------------------------=||=---------------=[ CoolQ <qufuping@ercist.iscas.ac.cn> ]=---------------=||... 阅读全文