Anti-Phishing Security Strategy - A lecture presented at BlackHat 2008.
8f1e3d61a767523a1c71c153736d8ce06f404313b5babf7871ef36575d630b2e
RFID: Security Briefings. A set of slides from a talk that discusses how RFID works and security menaces related to RFID.
07412007c5d562cfc46e5c3f10554ca1402ee1f8f1a9c0675dc2d12fe5752881
Slides from a lecture discussing Next Generation Viruses.
6cfbaacb1ce17979d011060139f0ba7bfe18bf60ee51ae17acf2c0723f1c8117
Slides from a lecture discussing Shadow Software Attacks.
9d3f365a840d4fe79ac57428f939eee876ade4b85c65af44212870259fb87bd6
Slides from a lecture given by the Technical University of Vienna Politecnico di Milano regarding AntiPhish: An Anti-Phishing Browser Plug-in based Solution.
11fdb1fd6cf3504814e13cee83b573ad2c17c0fd9b5ca17d7c6ea7217edc9c3e
Slides from a lecture discussing Writing Behind A Buffer.
67417f7ee79d3f522c2a4e3d577097a0fbf2a4fb4b71b2b080564f565d937cd5
Kryptor is a graphical tool to encrypt files using the algorithm ARCS-256 bits. It is also possible to erase files by overwriting data with a pseudo-random sequence of bytes iterated three times, which will make data recovery a very complex operation.
a3705619eead095f15725a9ff0cc415932e6aad1a65535e4764adf693624bfa2
Whitepaper written to demonstrate that a shadow software attack is still possible. Winner of the ISW contest.
ac162a8e79af20c3b9196fab6fd12f64ea40f0f7fb57bedb4d9b9efa8d383bce
Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below.
b3f0b66d1a60d4c9240101ef4ba5d43d95ea2a43380950cc08bf1b9ed846a35c
Proxy Scanner is a tool that tells you whether or not a proxy server can bounce your connection.
fabe21aa1f3980a895c2d11bb0db9e397210a048532f9c75d549c855484e7445
Paper discussing the caveats of port assignments above 1024 and how users should have blocks of ports assigned to them.
98b106f520298d4b1409ec2597c5001842dc8da75de5cd665c577160a99ee686
RPM Finder Project version 1.2 is a utility that works much like the rpmfind.net site. It supports RedHat and Mandrake Linux.
1b21c1e4fe44c14c6699021a8dfb60258df84ba160eb73d9c370d35decd0d8d2
White paper discussing the basics of shellcoding, a quick overview of assembly, and usage of shellcodes.
91df4a2a5aa6a6b5d59ad6bb47315c025fe3c9ede801c8998cd641028cfa2e6a
Proxy Scanner for Windows that tells you whether or not a proxy server can bounce your connection.
b98f049ce072acfc5b48e1d338c10c202e80c660110b64e8c5ff8782eb8a0569
Remote exploit for MDaemon Mail Server versions 6.52 to 6.85 that makes use of a buffer overflow in its raw message handler. This exploit has only been tested on Windows XP Home and Pro Edition (Dutch) SP1.
f2ad6f0382c6310f3658254e54ad15974683f2ce8e29ff239c7888bb1e7b02fd
This utility demonstrates a simple UDP backdoor which allows for remote program execution on a Microsoft Windows server.
c34c5916d37b909dd4fd198b6d67fe34a15940e596f4143358bfd4ac8da48619
Local buffer overflow exploit for Winamp version 5.1.
f182b48d2c437582583fc964c2c81d32cd54caef71e771fcff223fcbabf8a6c4
Find file routine for Windows, in asm.
0b7f4f98ac3878c2534bdee8d0045cfa8a21c3084b6b3c175293850771857d70
Contest Windows binary of arcs.
5ee44ad0ae249826411eb70fae8ebd129dd9892e9c0eea2169267c0e5938b19b
WU-FTPD 2.6.2 Freezer exploit that causes a denial of service condition when a valid login can be supplied.
d57268686dfb20a4d79703d2f4cddddcc0beb590b3039fcef7b38a2089a03dad
A.R.C.S., or the Angelo Rosiello and Roberto Carrrozzo Stream 256 bit cipher, is an algorithm registered with the S.I.A.E. that the authors have allowed this site sole rights to host and distribute. The algorithm's theory utilizes Vernam's cipher, respecting Shannon's principles, and is based on MD5. The authors hope that someone will try to break this cipher and welcome all attempts and added research. Be forewarned, commercial use of this algorithm is forbidden without the Authors' consent. If you successfully crack this file that was encrypted with A.R.C.S., Packet Storm will send you a free t-shirt with the classic shellcode on the front of it. Supplies are limited, but we are not extremely worried. Thanks to all that help further the research and development of strong crypto.
6436c9950463b20a49248c7880067dabc09f043214835d7de2a41f3a947cb7ec
Contest ELF binary of arcs
615dc4fcd40c7f7d4123ecb43350ad08345f65e8de32e8c7d92f91c1ee49e6d3
Contest file that has been encrypted with A.R.C.S. This file has a special message inside. Once cracked, utilize the instructions to redeem a free t-shirt.
e0d5eaeef711c7ec0bdbf227d50ccdb48fc4279a59d6e1743828a9699da2285a
Liquidwar 5.4.5 local exploit that has been tested on Slackware Linux 9.0.0 and Gentoo Linux 1.4.
6038ccaf0089d0c6b1b982024c5d6232813a117568c7c20900bb183dcfc26458
White paper discussing stack overflows, ways to exploit them, and SIMPLESEM.
85ddc994e6b7cdd09d72c7e1a271c91908d9ccbd87b5a1ba218dbac260ff56ed