exploit the possibilities
Showing 1 - 25 of 40 RSS Feed

Files from Angelo Rosiello

Email addressangelo at rosiello.org
First Active2003-02-14
Last Active2008-11-10
secure_input_solutions-webapps.pdf
Posted Nov 10, 2008
Authored by Angelo Rosiello | Site rosiello.org

This is a presentation called Discussing Secure Input Solutions for Web Applications.

tags | paper, web
MD5 | f4d2fceacfef398b533e15fd513c0039
AntiPhishing.pdf
Posted Jul 17, 2008
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Anti-Phishing Security Strategy - A lecture presented at BlackHat 2008.

MD5 | 02b0ce244ae22a137a30a54990265547
rfid-angelo-rosiello.pdf
Posted Nov 13, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

RFID: Security Briefings. A set of slides from a talk that discusses how RFID works and security menaces related to RFID.

MD5 | 74026e4fae989c7dfbc023caf422b9de
viruses_next_generation-ITUNDERGROUND.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Next Generation Viruses.

MD5 | c5385efbbbd3804016bd7ea911e3a8b9
Shadow_Software_Attacks.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Shadow Software Attacks.

MD5 | 42e96d3332d988ea630d77b16aa30074
Antiphish-ITUNDERGROUND.pdf
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello, Engin Kirda, Christopher Kruegel

Slides from a lecture given by the Technical University of Vienna Politecnico di Milano regarding AntiPhish: An Anti-Phishing Browser Plug-in based Solution.

MD5 | 969fed894882fcb169e7da7678f61b3b
writing-behind-a-buffer.pdf
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Writing Behind A Buffer.

MD5 | 6ea635b5085b5a66e1df73f9e2195101
rhj.tar
Posted Aug 3, 2006
Authored by Angelo Rosiello | Site rosiello.org

rhj will let you exploit the ptrace() syscall to monitor and hijack some syscalls run-time. At the moment few syscalls are supported (i.e. send(), recv(), read(), write()) since the program is still a proof of concept.

tags | proof of concept
systems | unix
MD5 | 8985c9e8108fdae75debbb6eb55bd9b6
eterm-exploit.c
Posted Jan 27, 2006
Authored by Angelo Rosiello | Site rosiello.org

Eterm LibAST exploit for Ubuntu. Yields utmp GID.

tags | exploit
systems | linux, ubuntu
MD5 | 571f6213c9d31ebb23dbc929ba9f1c3c
Eterm-LibAST.txt
Posted Jan 27, 2006
Authored by Angelo Rosiello | Site rosiello.org

Eterm when built links to LibAST. A stack overflow vulnerability exists in LibAST that allows an attacker to execute commands with user group utmp.

tags | advisory, overflow
MD5 | 327f9688d3ffa5011b444bc14ca0724d
iDEFENSE Security Advisory 2006-01-10.t
Posted Jan 11, 2006
Authored by iDefense Labs, Angelo Rosiello | Site idefense.com

iDefense Security Advisory 01.10.06 - There exists a buffer overflow vulnerability in the /usr/bin/uustat binary in Sun Solaris 5.8 and 5.9.

tags | advisory, overflow
systems | solaris
advisories | CVE-2004-0780
MD5 | 4ad39c0ada22f985e083afceb290c183
kryptor-0.1.tar.gz
Posted Nov 20, 2005
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Kryptor is a graphical tool to encrypt files using the algorithm ARCS-256 bits. It is also possible to erase files by overwriting data with a pseudo-random sequence of bytes iterated three times, which will make data recovery a very complex operation.

MD5 | e0a1e0ce76d01f2c946575b6cdb43192
imap4d_FreeBSD_exploit.c
Posted Sep 29, 2005
Authored by Angelo Rosiello, Johnny Mast | Site rosiello.org

GNU Mailutils version 0.6 imap4d 'search' format string exploit. Written to be used against FreeBSD.

tags | exploit
systems | freebsd
MD5 | 642b5fb9f407325048f6e9666e719172
Shadow_Software_Attack.pdf
Posted Nov 13, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Whitepaper written to demonstrate that a shadow software attack is still possible. Winner of the ISW contest.

MD5 | b9638032cc022c840195bf33a6574741
sudoedit.txt
Posted Sep 21, 2004
Authored by Angelo Rosiello | Site rosiello.org

Local exploit for sudo version 1.6.8p1 that makes use of a flaw in sudoedit.

tags | exploit, local
MD5 | fdc1b829ba7147a4d81881f9024a77e2
soxWAVFileBufferOverflowExploit.c
Posted Aug 4, 2004
Authored by Angelo Rosiello, rosiello, Johnny Mast | Site rosiello.org

Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below.

tags | exploit, local
advisories | CVE-2004-0557
MD5 | 21705b0d1b4c588532f4cde4b2dd90b4
proxyscanner-2.0.tar.gz
Posted Jul 21, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Proxy Scanner is a tool that tells you whether or not a proxy server can bounce your connection.

Changes: Can now be compiled on any Unix platform.
MD5 | 0229a95f6cf053d778a3a8963fc51ad9
rosiello_ports.html
Posted Jun 23, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Paper discussing the caveats of port assignments above 1024 and how users should have blocks of ports assigned to them.

MD5 | afc4864c189a9823b9088e8af8dbf8a9
rpf-1.2.1.tar.gz
Posted Jun 22, 2004
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

RPM Finder Project version 1.2 is a utility that works much like the rpmfind.net site. It supports RedHat and Mandrake Linux.

Changes: Fedora support added.
systems | linux, redhat, mandrake
MD5 | 213d6ddbd2928c88009976aaabcff72e
The_Basics_of_Shellcoding.pdf
Posted May 25, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

White paper discussing the basics of shellcoding, a quick overview of assembly, and usage of shellcodes.

tags | shellcode
MD5 | 031e3f6436729d7dc26876fe8c86b548
proxyscanner.zip
Posted Apr 16, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Proxy Scanner for Windows that tells you whether or not a proxy server can bounce your connection.

systems | windows
MD5 | dc04376fbc54e5847d8d297fb53c4ecf
crafty.zip
Posted Mar 17, 2004
Authored by Angelo Rosiello | Site rosiello.org

Local exploit for the Crafty game versions 19.3 and below that makes use of a buffer overflow vulnerability. Tested on Red Hat 9.0 and Slackware 8.0.

tags | exploit, overflow, local
systems | linux, redhat, slackware
MD5 | 7f2d5cf53e82ee02aedd5cd104c2625b
mdaemon-exploit.c
Posted Mar 16, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Remote exploit for MDaemon Mail Server versions 6.52 to 6.85 that makes use of a buffer overflow in its raw message handler. This exploit has only been tested on Windows XP Home and Pro Edition (Dutch) SP1.

tags | exploit, remote, overflow
systems | windows, xp
MD5 | fff65d681162d5d7b7043edf21a4173e
urc.zip
Posted Jan 7, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

This utility demonstrates a simple UDP backdoor which allows for remote program execution on a Microsoft Windows server.

tags | remote, udp
systems | windows
MD5 | 86d9079c78155ad855cdeca267f5a020
find.asm
Posted Dec 15, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Find file routine for Windows, in asm.

systems | windows
MD5 | ba5d9eb7bc0e1ca5b7a2eb5d6d824d35
Page 1 of 2
Back12Next

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close