This document document provides advice on the filtering of IPv4 packets based on the IPv4 options they contain. Additionally, it discusses the operational and interoperability implications of dropping packets based on the IP options they contain.
f955987c95afee36773fb986f0bf5b02f89c6d9a9973c325dcbc1e926676ad9a
This document describes how to compromise Solaris systems prior to version 9 by using a telnet client only.
ba05ee6ac0393c5d63a2046f794f28c1c85e51bfa90d2ea02db8150c95501fd7
Using a Compromised Router to Capture Network Traffic - This document details the approach, methodology and results of a recent experiment using GRE tunnels to sniff all traffic passing through a Cisco router.
cde9ed24f2abf6cc7625477e61b850179dd4e9a0d79c528f6d47e6637dddad12
This document describes buffer overrun vulnerabilities on Sun Microsystems SPARC machines. We will begin by examining the SPARC architecture, looking at the registers and the stack. We will then go on to see exact how buffer overrun vulnerabilities occur and how control over the processes execution is gained under SPARC and then detail how, from here, the vulnerability can be exploited to gain control over the computer by looking at exploit code that spawns a shell under Solaris.
ea2827088b20a431d2ee4be68183cd2ee8cf525ff70d198af4b747cffecabe5c
NT Blackhat paper is a beginner's document about NT-security. This document describes pretty well what malicious hackers exactly do when they attempt to hack your NT servers. Although it was meant for beginners, it is still suitable for novices, and maybe even experts who wants to read and maybe learn something that they didn't know.
9bc5d341b00d97d30115a560879c0f9fc3e6fb8f23278feb1eb19a1b0910fd73
CERT Advisory CA-2000-12 - HHCtrl ActiveX Control allows local files to be executed. The HHCtrl ActiveX control has a serious vulnerability that allows remote intruders to execute arbitrary code, if the intruder can cause a compiled help file (CHM) to be stored "locally." Microsoft has released a security bulletin and a patch for this vulnerability, but the patch does not address all circumstances under which the vulnerability can be exploited. This document discusses additional ways in which this vulnerability can be exploited.
8d64072fcd1d5225daf75a8d9412a0172ca99075fdfc8c2e678d6a8c2ef122e3
Benchmarking Terminology for Firewall Performance - This document defines terms used in measuring the performance of firewalls. It extends the terminology already used for benchmarking routers and switches with definitions specific to firewalls.
1cfc1222f7893059f65761a05327b55cd6dcf9da670c0a6f2191bca669e20d84
This document answers the question: I've seen <something> on my firewall; what does it mean? Firewall administrators regularly see strange behaviour showing up in their logfiles. This document describes some of the common things seen on these firewalls, and what they mean. Note that this document is intended both for owners of personal firewalls as well as corporate firewalls. Version 0.3.0. (Jan 15, 2000)
0f9d506725f5715da96a427909935e2c9a22e31de26dddb943b9b3da64e90b49
draft-ietf-wu-srp-auth-02.txt
7113e64c9fddb12aa6e31f9d02683748a0b8f4ac6bf43ec19f5e8f8ad4580a1c
draft-wu-telnet-auth-srp-02.txt
7c48a7a88e70860064927ebd52e8edd1e572b59232dad92a61fbede13d3f19cf
draft-simpson-photuris-current.txt
ad065eafe567d5cf222d927bbdcfe1ba9902e8cee6751eeca5e3e27cb2eebbb4