what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Gunter Ollmann

Email addressgunter at ngssoftware.com
First Active2004-09-29
Last Active2009-05-03
Anti-Fraud Image Solutions
Posted May 3, 2009
Authored by Gunter Ollmann | Site technicalinfo.net

Whitepaper called Anti-Fraud Image Solutions - The Use Of Distribution Tracing Within Web Content To Identify Counterfeiting Sources.

tags | paper, web
SHA-256 | b9fe2c5926e1fdc309e98785e517a3dfb8ccf9d52c4c01eab58053100d2be83e
browser_insecurity_iceberg_2008.pdf
Posted Jul 1, 2008
Authored by Gunter Ollmann, Stefan Frei, Thomas Duebendorfer, Martin May

Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the "insecurity iceberg".

tags | paper, web
SHA-256 | ce547d6e607ecd39cfd126ab4728d62ffb1f7731c73fcc2dafca170a94c6e6fd
NISR-AntiBruteForce.pdf
Posted Mar 22, 2005
Authored by Gunter Ollmann | Site nextgenss.com

Authentication processes in web-based applications are frequently vulnerable to automated brute force guessing attacks. Whilst commonly proposed solutions make use of escalating time delays and minimum lockout threshold strategies, these tend to prove ineffectual in real attacks and may actually promote additional attack vectors. Resource metering through client-side computationally intensive "electronic payments" can provide an alternative strategy in defending against brute force guessing attacks. This whitepaper discusses how such a solution works and the security advantages it can bring.

tags | paper, web, cracker
SHA-256 | 15245aa7f4bb6184fef5aa8d48258f1200f40a2d9cf75e582ce17ce1140f0645
NISR-BestPracticesInHostURLNaming.pdf
Posted Feb 1, 2005
Authored by Gunter Ollmann | Site ngssoftware.com

Whitepaper discussing the best security practices for host naming and URL conventions.

tags | paper
SHA-256 | e9a5dc480f6839ca756e12580e639976fae0181c72d56978a013e4263afab1cb
SecondOrderCodeInjection.pdf
Posted Nov 2, 2004
Authored by Gunter Ollmann | Site nextgenss.com

Whitepaper discussing how injection of data can later be used to carry out an attack at a different point in time.

tags | paper
SHA-256 | 382baf0d9e247ca98e6e8644e2f15a095fb8b043e6c0d2995b5f0c01175b6c68
NISR-WP-Phishing.pdf
Posted Sep 29, 2004
Authored by Gunter Ollmann | Site ngssoftware.com

White paper from NGS Software that covers the technologies and security flaws Phishers exploit to conduct their attacks, and provides detailed vendor-neutral advice on what organizations can do to prevent future attacks. Security professionals and customers can use this comprehensive analysis to arm themselves against the next phishing scam to reach their in-tray.

tags | paper
SHA-256 | 6a8bb1037838fd20da9753a4b17817d78de7a39a7eb9c8bab70ab301084599f3
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close