what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 3 of 3 RSS Feed

Files

hert.0003.freebsd.isn
Posted Oct 7, 2000
Authored by Hacker Emergency Response Team | Site hert.org

HERT Advisory #3 - The way FreeBSD handles random sequence number incrementing is weak. With 3 consecutive random increments captured from the responses of 4 SYN packets sent to the target, an attacker can rebuild the random state of the remote machine, and predict the next sequence number. Includes proof of concept code.

tags | remote, proof of concept
systems | freebsd
SHA-256 | 4fdde88e38ec9b6ff465d28188c0d4ae5779697d0340aa76bb684473eced5ca5
hert.00001.solaris.lpstat
Posted Sep 23, 1999

hert.00001.solaris.lpstat

systems | solaris
SHA-256 | 2cfab1b1f789659cbf067e4780b7de241682262d9494756d82b9b08045af3166
hert.0002.lsof.4-40
Posted Sep 23, 1999

hert.0002.lsof.4-40

SHA-256 | 357f196aeafa985917c80f440fee72f7701107924999e647b113d2b33b7e955d
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close