Exploit the possiblities
Showing 1 - 6 of 6 RSS Feed

Operating System: Windows CE

Windows Mobile 6.5 MessageBox Shellcode
Posted Sep 28, 2010
Authored by Celil Unuver

Windows Mobile version 6.5 TR (WinCE 5.2) MessageBox shellcode for ARM.

tags | shellcode
systems | windows, ce
MD5 | cdf301f18b6cb4745c96e63bb19ca67a
Secunia Security Advisory 30197
Posted May 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Windows CE, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | windows, ce
MD5 | 6cdadd4e23236ac20e329952f5a51aa4
SYMSA-2007-012.txt
Posted Oct 23, 2007
Authored by Ollie Whitehouse | Site symantec.com

Symantec Vulnerability Research SYMSA-2007-012 - Microsoft Windows CE suffers from a IGMP related denial of service vulnerability.

tags | advisory, denial of service
systems | windows, ce
advisories | CVE-2006-0021
MD5 | 8c03277610cc3ba821430e6f9531aea9
TT-San-Hacking-Windows-CE.ppt
Posted Oct 12, 2005
Authored by San (XFocus)

Hacking Windows CE - This paper shows a buffer overflow exploitation example in Windows CE. It covers knowledge about the ARM architecture, memory management and the features of processes and threads of Windows CE. It also shows how to write a shellcode in Windows CE including knowledge about decoding shellcode of Windows CE.

tags | overflow, shellcode
systems | windows, ce
MD5 | 6c73f84fe23ec9bb3d1ac4c919629d96
Xcon2005_San.pdf
Posted Aug 31, 2005
Authored by san | Site xcon.xfocus.org

Xcon 2005: Hacking Windows CE

systems | windows, ce
MD5 | 0882af59c4c0328fea721ed7e740ca9c
phrack63.tar.gz
Posted Aug 5, 2005
Authored by phrack | Site phrack.org

Phrack Magazine Issue 63 - The last issue of Phrack! In this issue: Phrack Prophile on Tiago, OSX heap exploitation techniques, Hacking Windows CE, Games with kernel Memory...FreeBSD Style, Raising The Bar For Windows Rootkit Detection, Embedded ELF Debugging, Hacking Grub for Fun and Profit, Advanced antiforensics : SELF, Process Dump and Binary Reconstruction, Next-Gen. Runtime Binary Encryption, Shifting the Stack Pointer, NT Shellcode Prevention Demystified, PowerPC Cracking on OSX with GDB, Hacking with Embedded Systems, Process Hiding and The Linux Scheduler, Breaking Through a Firewall, Phrack World News.

tags | kernel, shellcode, magazine
systems | linux, windows, freebsd, apple, ce
MD5 | 0c81abdbc5caaebef6219c4871ed1012
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    11 Files
  • 21
    Feb 21st
    3 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close