Archive for the 'exploit' Category

CRIME (security exploit) – Wikipedia, the free encyclopedia

Sunday, July 14th, 2013

from http://tech.slashdot.org/story/13/07/09/1455200/ It works like this. You visit a site that has malicious JavaScript which sends a HTTPS request to some site (like your bank). This request will include whatever known plain-text that the JavaScript …

CRIME (security exploit) – Wikipedia, the free encyclopedia

Sunday, July 14th, 2013

from http://tech.slashdot.org/story/13/07/09/1455200/ It works like this. You visit a site that has malicious JavaScript which sends a HTTPS request to some site (like your bank). This request will include whatever known plain-text that the JavaScript …

[Perl] part of the Gootkit ddos system – Pastebin.com

Monday, February 27th, 2012

Example of perl exploit script that runs on a compromised web server and provides remote shell, http proxy and DDoS agent. Works on *nix and windows

[Perl] part of the Gootkit ddos system – Pastebin.com

Monday, February 27th, 2012

Example of perl exploit script that runs on a compromised web server and provides remote shell, http proxy and DDoS agent. Works on *nix and windows

Just Another Geek: Linux Security, one year later…

Tuesday, January 4th, 2011

review of the security related things that happened in the linux kernel circles in 2010.

IMMUNITY : Knowing You’re Secure

Monday, October 11th, 2010

Immunity Debugger, vulns, sploits, and other good stuff

Understanding the TLS Renegotiation Attack – Educated Guesswork

Tuesday, November 10th, 2009

explains Marsh Ray’s attack in details, pls patch to fix the TLS protocol

Matasano Chargen » This New Vulnerability: Dowd’s Inhuman Flash Exploit

Wednesday, April 16th, 2008

detalied description about Flash vuln that was used to vin a recent hack contest (where vista and mac were hacked )