exploit the possibilities
Showing 1 - 6 of 6 RSS Feed

Files from Gunter Ollmann

Email addressgunter at ngssoftware.com
First Active2004-09-29
Last Active2009-05-03
Anti-Fraud Image Solutions
Posted May 3, 2009
Authored by Gunter Ollmann | Site technicalinfo.net

Whitepaper called Anti-Fraud Image Solutions - The Use Of Distribution Tracing Within Web Content To Identify Counterfeiting Sources.

tags | paper, web
MD5 | 2e82b07b0701dbb15cc07e4182ae23a6
browser_insecurity_iceberg_2008.pdf
Posted Jul 1, 2008
Authored by Gunter Ollmann, Stefan Frei, Thomas Duebendorfer, Martin May

Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the "insecurity iceberg".

tags | paper, web
MD5 | af684f84277d52eb31988b9ac44515b2
NISR-AntiBruteForce.pdf
Posted Mar 22, 2005
Authored by Gunter Ollmann | Site nextgenss.com

Authentication processes in web-based applications are frequently vulnerable to automated brute force guessing attacks. Whilst commonly proposed solutions make use of escalating time delays and minimum lockout threshold strategies, these tend to prove ineffectual in real attacks and may actually promote additional attack vectors. Resource metering through client-side computationally intensive "electronic payments" can provide an alternative strategy in defending against brute force guessing attacks. This whitepaper discusses how such a solution works and the security advantages it can bring.

tags | paper, web, cracker
MD5 | 0b4494791f61ecd4804eee34f97360b8
NISR-BestPracticesInHostURLNaming.pdf
Posted Feb 1, 2005
Authored by Gunter Ollmann | Site ngssoftware.com

Whitepaper discussing the best security practices for host naming and URL conventions.

tags | paper
MD5 | 0000dd8371446ec478b9ed46ca6cca8e
SecondOrderCodeInjection.pdf
Posted Nov 2, 2004
Authored by Gunter Ollmann | Site nextgenss.com

Whitepaper discussing how injection of data can later be used to carry out an attack at a different point in time.

tags | paper
MD5 | 8cbf0fd18613252b922c97f1cc41450a
NISR-WP-Phishing.pdf
Posted Sep 29, 2004
Authored by Gunter Ollmann | Site ngssoftware.com

White paper from NGS Software that covers the technologies and security flaws Phishers exploit to conduct their attacks, and provides detailed vendor-neutral advice on what organizations can do to prevent future attacks. Security professionals and customers can use this comprehensive analysis to arm themselves against the next phishing scam to reach their in-tray.

tags | paper
MD5 | a3c1e7f414792b50d74d556ad87b3d53
Page 1 of 1
Back1Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    10 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close