exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files from rosiello

First Active2003-04-06
Last Active2008-07-17
AntiPhishing.pdf
Posted Jul 17, 2008
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Anti-Phishing Security Strategy - A lecture presented at BlackHat 2008.

SHA-256 | 8f1e3d61a767523a1c71c153736d8ce06f404313b5babf7871ef36575d630b2e
rfid-angelo-rosiello.pdf
Posted Nov 13, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

RFID: Security Briefings. A set of slides from a talk that discusses how RFID works and security menaces related to RFID.

SHA-256 | 07412007c5d562cfc46e5c3f10554ca1402ee1f8f1a9c0675dc2d12fe5752881
viruses_next_generation-ITUNDERGROUND.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Next Generation Viruses.

SHA-256 | 6cfbaacb1ce17979d011060139f0ba7bfe18bf60ee51ae17acf2c0723f1c8117
Shadow_Software_Attacks.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Shadow Software Attacks.

SHA-256 | 9d3f365a840d4fe79ac57428f939eee876ade4b85c65af44212870259fb87bd6
Antiphish-ITUNDERGROUND.pdf
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello, Engin Kirda, Christopher Kruegel

Slides from a lecture given by the Technical University of Vienna Politecnico di Milano regarding AntiPhish: An Anti-Phishing Browser Plug-in based Solution.

SHA-256 | 11fdb1fd6cf3504814e13cee83b573ad2c17c0fd9b5ca17d7c6ea7217edc9c3e
writing-behind-a-buffer.pdf
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Writing Behind A Buffer.

SHA-256 | 67417f7ee79d3f522c2a4e3d577097a0fbf2a4fb4b71b2b080564f565d937cd5
kryptor-0.1.tar.gz
Posted Nov 20, 2005
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Kryptor is a graphical tool to encrypt files using the algorithm ARCS-256 bits. It is also possible to erase files by overwriting data with a pseudo-random sequence of bytes iterated three times, which will make data recovery a very complex operation.

SHA-256 | a3705619eead095f15725a9ff0cc415932e6aad1a65535e4764adf693624bfa2
Shadow_Software_Attack.pdf
Posted Nov 13, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Whitepaper written to demonstrate that a shadow software attack is still possible. Winner of the ISW contest.

SHA-256 | ac162a8e79af20c3b9196fab6fd12f64ea40f0f7fb57bedb4d9b9efa8d383bce
soxWAVFileBufferOverflowExploit.c
Posted Aug 4, 2004
Authored by Angelo Rosiello, rosiello, Johnny Mast | Site rosiello.org

Local exploit that makes use of the WAV header handling vulnerability in SoX versions 12.17.4-r1 and below.

tags | exploit, local
advisories | CVE-2004-0557
SHA-256 | b3f0b66d1a60d4c9240101ef4ba5d43d95ea2a43380950cc08bf1b9ed846a35c
proxyscanner-2.0.tar.gz
Posted Jul 21, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Proxy Scanner is a tool that tells you whether or not a proxy server can bounce your connection.

Changes: Can now be compiled on any Unix platform.
SHA-256 | fabe21aa1f3980a895c2d11bb0db9e397210a048532f9c75d549c855484e7445
rosiello_ports.html
Posted Jun 23, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Paper discussing the caveats of port assignments above 1024 and how users should have blocks of ports assigned to them.

SHA-256 | 98b106f520298d4b1409ec2597c5001842dc8da75de5cd665c577160a99ee686
rpf-1.2.1.tar.gz
Posted Jun 22, 2004
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

RPM Finder Project version 1.2 is a utility that works much like the rpmfind.net site. It supports RedHat and Mandrake Linux.

Changes: Fedora support added.
systems | linux, redhat, mandrake
SHA-256 | 1b21c1e4fe44c14c6699021a8dfb60258df84ba160eb73d9c370d35decd0d8d2
The_Basics_of_Shellcoding.pdf
Posted May 25, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

White paper discussing the basics of shellcoding, a quick overview of assembly, and usage of shellcodes.

tags | shellcode
SHA-256 | 91df4a2a5aa6a6b5d59ad6bb47315c025fe3c9ede801c8998cd641028cfa2e6a
proxyscanner.zip
Posted Apr 16, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Proxy Scanner for Windows that tells you whether or not a proxy server can bounce your connection.

systems | windows
SHA-256 | b98f049ce072acfc5b48e1d338c10c202e80c660110b64e8c5ff8782eb8a0569
mdaemon-exploit.c
Posted Mar 16, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Remote exploit for MDaemon Mail Server versions 6.52 to 6.85 that makes use of a buffer overflow in its raw message handler. This exploit has only been tested on Windows XP Home and Pro Edition (Dutch) SP1.

tags | exploit, remote, overflow
systems | windows
SHA-256 | f2ad6f0382c6310f3658254e54ad15974683f2ce8e29ff239c7888bb1e7b02fd
urc.zip
Posted Jan 7, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

This utility demonstrates a simple UDP backdoor which allows for remote program execution on a Microsoft Windows server.

tags | remote, udp
systems | windows
SHA-256 | c34c5916d37b909dd4fd198b6d67fe34a15940e596f4143358bfd4ac8da48619
winamp-exploit.c
Posted Dec 31, 2003
Authored by rosiello, Johnny Mast | Site rosiello.org

Local buffer overflow exploit for Winamp version 5.1.

tags | exploit, overflow, local
SHA-256 | f182b48d2c437582583fc964c2c81d32cd54caef71e771fcff223fcbabf8a6c4
find.asm
Posted Dec 15, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Find file routine for Windows, in asm.

systems | windows
SHA-256 | 0b7f4f98ac3878c2534bdee8d0045cfa8a21c3084b6b3c175293850771857d70
arcs.exe
Posted Nov 9, 2003
Authored by Angelo Rosiello, rosiello, Roberto Carrozzo | Site rosiello.org

Contest Windows binary of arcs.

systems | windows
SHA-256 | 5ee44ad0ae249826411eb70fae8ebd129dd9892e9c0eea2169267c0e5938b19b
wuftpFreeze.c
Posted Nov 4, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

WU-FTPD 2.6.2 Freezer exploit that causes a denial of service condition when a valid login can be supplied.

tags | denial of service
SHA-256 | d57268686dfb20a4d79703d2f4cddddcc0beb590b3039fcef7b38a2089a03dad
ARCS.tar.gz
Posted Oct 3, 2003
Authored by Angelo Rosiello, rosiello, Roberto Carrozzo | Site rosiello.org

A.R.C.S., or the Angelo Rosiello and Roberto Carrrozzo Stream 256 bit cipher, is an algorithm registered with the S.I.A.E. that the authors have allowed this site sole rights to host and distribute. The algorithm's theory utilizes Vernam's cipher, respecting Shannon's principles, and is based on MD5. The authors hope that someone will try to break this cipher and welcome all attempts and added research. Be forewarned, commercial use of this algorithm is forbidden without the Authors' consent. If you successfully crack this file that was encrypted with A.R.C.S., Packet Storm will send you a free t-shirt with the classic shellcode on the front of it. Supplies are limited, but we are not extremely worried. Thanks to all that help further the research and development of strong crypto.

tags | cryptography, shellcode
SHA-256 | 6436c9950463b20a49248c7880067dabc09f043214835d7de2a41f3a947cb7ec
arcs
Posted Sep 29, 2003
Authored by rosiello

Contest ELF binary of arcs

SHA-256 | 615dc4fcd40c7f7d4123ecb43350ad08345f65e8de32e8c7d92f91c1ee49e6d3
CrackMe.ARCS
Posted Sep 29, 2003
Authored by rosiello

Contest file that has been encrypted with A.R.C.S. This file has a special message inside. Once cracked, utilize the instructions to redeem a free t-shirt.

SHA-256 | e0d5eaeef711c7ec0bdbf227d50ccdb48fc4279a59d6e1743828a9699da2285a
liquidwar-exploit.c
Posted Sep 18, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Liquidwar 5.4.5 local exploit that has been tested on Slackware Linux 9.0.0 and Gentoo Linux 1.4.

tags | exploit, local
systems | linux, slackware, gentoo
SHA-256 | 6038ccaf0089d0c6b1b982024c5d6232813a117568c7c20900bb183dcfc26458
StackOverflow-en.pdf
Posted Sep 10, 2003
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

White paper discussing stack overflows, ways to exploit them, and SIMPLESEM.

tags | overflow
SHA-256 | 85ddc994e6b7cdd09d72c7e1a271c91908d9ccbd87b5a1ba218dbac260ff56ed
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close