This is a presentation called Discussing Secure Input Solutions for Web Applications.
c4939f36d6f4d8e6061dbda224069e6698567e7333535e7f2608dc1ed0c7d2f0
Anti-Phishing Security Strategy - A lecture presented at BlackHat 2008.
8f1e3d61a767523a1c71c153736d8ce06f404313b5babf7871ef36575d630b2e
RFID: Security Briefings. A set of slides from a talk that discusses how RFID works and security menaces related to RFID.
07412007c5d562cfc46e5c3f10554ca1402ee1f8f1a9c0675dc2d12fe5752881
Slides from a lecture discussing Next Generation Viruses.
6cfbaacb1ce17979d011060139f0ba7bfe18bf60ee51ae17acf2c0723f1c8117
Slides from a lecture discussing Shadow Software Attacks.
9d3f365a840d4fe79ac57428f939eee876ade4b85c65af44212870259fb87bd6
Slides from a lecture given by the Technical University of Vienna Politecnico di Milano regarding AntiPhish: An Anti-Phishing Browser Plug-in based Solution.
11fdb1fd6cf3504814e13cee83b573ad2c17c0fd9b5ca17d7c6ea7217edc9c3e
Slides from a lecture discussing Writing Behind A Buffer.
67417f7ee79d3f522c2a4e3d577097a0fbf2a4fb4b71b2b080564f565d937cd5
rhj will let you exploit the ptrace() syscall to monitor and hijack some syscalls run-time. At the moment few syscalls are supported (i.e. send(), recv(), read(), write()) since the program is still a proof of concept.
78500617a093757ebda076945a9af0c3247aa61eb535d942a83eb186890be48a
Eterm LibAST exploit for Ubuntu. Yields utmp GID.
368fbf62bd1bd1c27f952c1154970ef9c400e0b7dae8aa841163e6e10ef4ebb6
Eterm when built links to LibAST. A stack overflow vulnerability exists in LibAST that allows an attacker to execute commands with user group utmp.
67f1218054724b40978a0903b78af822039d90aea5acfefee5b94f09deafab4c
iDefense Security Advisory 01.10.06 - There exists a buffer overflow vulnerability in the /usr/bin/uustat binary in Sun Solaris 5.8 and 5.9.
49ed4cd16c62267d57bd9dc507c06068d971296757e966175096d0499de903c7
Kryptor is a graphical tool to encrypt files using the algorithm ARCS-256 bits. It is also possible to erase files by overwriting data with a pseudo-random sequence of bytes iterated three times, which will make data recovery a very complex operation.
a3705619eead095f15725a9ff0cc415932e6aad1a65535e4764adf693624bfa2
GNU Mailutils version 0.6 imap4d 'search' format string exploit. Written to be used against FreeBSD.
c56f13dd3e34ba53a2979730289d6e02fa4353b3feb9e642b5f3252d13dfd18a
Whitepaper written to demonstrate that a shadow software attack is still possible. Winner of the ISW contest.
ac162a8e79af20c3b9196fab6fd12f64ea40f0f7fb57bedb4d9b9efa8d383bce
Local exploit for sudo version 1.6.8p1 that makes use of a flaw in sudoedit.
ab1bfd7ddab1b1c6b89d7c8e3bdb7bc786b3bad054180fc0cc417bc68c3ca04f
Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below.
b3f0b66d1a60d4c9240101ef4ba5d43d95ea2a43380950cc08bf1b9ed846a35c
Proxy Scanner is a tool that tells you whether or not a proxy server can bounce your connection.
fabe21aa1f3980a895c2d11bb0db9e397210a048532f9c75d549c855484e7445
Paper discussing the caveats of port assignments above 1024 and how users should have blocks of ports assigned to them.
98b106f520298d4b1409ec2597c5001842dc8da75de5cd665c577160a99ee686
RPM Finder Project version 1.2 is a utility that works much like the rpmfind.net site. It supports RedHat and Mandrake Linux.
1b21c1e4fe44c14c6699021a8dfb60258df84ba160eb73d9c370d35decd0d8d2
White paper discussing the basics of shellcoding, a quick overview of assembly, and usage of shellcodes.
91df4a2a5aa6a6b5d59ad6bb47315c025fe3c9ede801c8998cd641028cfa2e6a
Proxy Scanner for Windows that tells you whether or not a proxy server can bounce your connection.
b98f049ce072acfc5b48e1d338c10c202e80c660110b64e8c5ff8782eb8a0569
Local exploit for the Crafty game versions 19.3 and below that makes use of a buffer overflow vulnerability. Tested on Red Hat 9.0 and Slackware 8.0.
82dbacb90891acc5cb1caec18b225e003314199535445fa71cd2de41626faf7d
Remote exploit for MDaemon Mail Server versions 6.52 to 6.85 that makes use of a buffer overflow in its raw message handler. This exploit has only been tested on Windows XP Home and Pro Edition (Dutch) SP1.
f2ad6f0382c6310f3658254e54ad15974683f2ce8e29ff239c7888bb1e7b02fd
This utility demonstrates a simple UDP backdoor which allows for remote program execution on a Microsoft Windows server.
c34c5916d37b909dd4fd198b6d67fe34a15940e596f4143358bfd4ac8da48619
Find file routine for Windows, in asm.
0b7f4f98ac3878c2534bdee8d0045cfa8a21c3084b6b3c175293850771857d70