exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 66 RSS Feed

Files

Xcon2005_Sowhat.pdf
Posted Aug 31, 2005
Authored by Sowhat | Site xcon.xfocus.org

Xcon 2005: Talking About 0day

SHA-256 | e4d859a8ae5ae21d8225ae5961d59c20dbcc3a791da1b98ee61f8c0a40955b69

Related Files

xcon2008-cfp.txt
Posted Sep 5, 2008
Site xcon.xfocus.net

Call For Papers for XCon 2008. This conference will take place from November 18th through the 19th in Beijing, China.

tags | paper, conference
SHA-256 | 37d32745f16cb135b3389fb3bbdf4504869f5816645f0bd19ea0e38bf42c63d7
RuxCon2008CFP.txt
Posted Feb 18, 2008
Site ruxcon.org.au

RuxCon 2008 Call For Papers - RuxCon strives to be Australia's most technical and interesting computer security conference. It will be held November 29th through the 30th, 2008 at the University of Technology, Sydney, Australia.

tags | paper, conference
SHA-256 | c8191067cbdc4f2341be82a48c7eda6b8f68ef5207f5c16914d920975661dce3
xcon2007-cfp.txt
Posted May 21, 2007
Site xfocus.org

Call For Papers for XCon2007. This conference will take place from August 28 through 29, 2007 in Beijing, China.

tags | paper, conference
SHA-256 | 06c0f75717f0d3a1c66426d361254def55bf81d8b9bbf7597f71ccd919f19627
alexGuestbook.txt
Posted Oct 20, 2006
Authored by Mohandko

@lex Guestbook suffers from a remote file inclusion vulnerability in Mxconf.php.

tags | exploit, remote, php, file inclusion
SHA-256 | ad345d07ac7c46a388bf07bc6ddeba5d4c6c366e729c56871766c33812205753
RuxCon2006CFP.txt
Posted Jul 20, 2006
Site ruxcon.org.au

RuxCon 2006 Call For Papers - The RuxCon staff would like to announce the call for papers for the fourth annual RuxCon conference. This year the conference will run from the 30th of September to the 1st of October, over the long weekend. As with previous years, RuxCon will be held at the University of Technology, Sydney, Australia.

tags | paper, conference
SHA-256 | 5ce189ddc3eeac2819f6c3aee283455405b4838640c3b3ebb1905f7e4d0ab771
PhxContactsSQL.txt
Posted Apr 1, 2006
Authored by Morocco Security Team

PhxContacts is susceptible to cross site scripting and SQL injection attacks.

tags | exploit, xss, sql injection
SHA-256 | 4774b065c8209bc86f66015b175739273d84ea4fff686de76672c30d782b43dc
Xcon2005_Liuxin.pdf
Posted Aug 31, 2005
Authored by LiuXin | Site xcon.xfocus.org

Xcon 2005: Research on Same Source Feature Measuring Technology of Software

SHA-256 | ecc8660c93c2e4c28023a871eed92a3fcae596c38b1fdc637a4405a90417300f
Xcon2005_ICBM.pdf
Posted Aug 31, 2005
Authored by ICBM | Site xcon.xfocus.org

Xcon 2005: Security in development environment

SHA-256 | ada975a45131d41540dbee4e5a081c01c8e6f6a5bc963b2035b134a6ac3b7f82
Xcon2005_Shok.pdf
Posted Aug 31, 2005
Authored by Matt Conover | Site xcon.xfocus.org

Xcon 2005: Profiling Malware and Rootkits from Kernel-Mode

tags | kernel
SHA-256 | f35044fbda6b53c3159c28d612cabdbcf4ab5bf98de1368f2d90bf6256db271e
Xcon2005_Baiyuanfan.pdf
Posted Aug 31, 2005
Authored by Baiyuanfan | Site xcon.xfocus.org

Xcon 2005: New thoughts in ring3 nt rootkit

SHA-256 | d0dc6ba9e5e2a145d29838a6a02926fda4ac8adb83af61bd3c4f840f4af2a2f0
Xcon2005_Seak.pdf
Posted Aug 31, 2005
Authored by Seak | Site xcon.xfocus.org

Xcon 2005: New architecture and approach in Network Virus Detection

tags | virus
SHA-256 | cdd1681d944eb8cec64eb1adac29df6247f521b7c6d350d79d1fe380205c85f0
Xcon2005_Tombkeeper.pdf
Posted Aug 31, 2005
Authored by TombKeeper | Site xcon.xfocus.org

Xcon 2005: I want to see farther

SHA-256 | b915fe90362db76cec184c3a1d6e71e00a87d32076bff84f7c84c37374aff602
Xcon2005_SoBeIt.pdf
Posted Aug 31, 2005
Authored by SoBeIt | Site xcon.xfocus.org

Xcon 2005: Windows Kernel Pool Overflow Exploitation

tags | overflow, kernel
systems | windows
SHA-256 | c7ba43a585d9880a05a3ab27f0be73b6725629e574a219b07e112b67dc36bfad
Xcon2005_San.pdf
Posted Aug 31, 2005
Authored by san | Site xcon.xfocus.org

Xcon 2005: Hacking Windows CE

systems | windows
SHA-256 | 590f520dff1623d1a11b0e8d49ad52cb7733604cf0dae833442b8908ea8a6183
Xcon2005_Marc_Schoenefeld.pdf
Posted Aug 31, 2005
Authored by Marc Schoenefeld | Site xcon.xfocus.org

Xcon 2005: Java & Secure Programming

tags | java
SHA-256 | d6b3ac72fd172c204d6d57072918910fec85af743030e6cc24440b1c52cf37dd
Xcon2005_Funnywei.pdf
Posted Aug 31, 2005
Authored by Funnywei | Site xcon.xfocus.org

Xcon 2005: Structural Signature and Signature's Structure

SHA-256 | 9ec4308f69278371a19a8fd3ad829146dc1f6e9bc11d2c805f3853f54a516609
Xcon2005_CoolQ.pdf
Posted Aug 31, 2005
Authored by CoolQ | Site xcon.xfocus.org

Xcon 2005: Advanced trojans in Grub

tags | trojan
SHA-256 | 9d66bf700c197ee8747ecbb8dfaa34a5442d6818524958c82f1113b916ec28ba
Xcon2005_Cawan.pdf
Posted Aug 31, 2005
Authored by Cawan | Site xcon.xfocus.org

Xcon 2005: Reconfigurable Synchronization Technique

SHA-256 | d37c98176daf5cff75d8b5aca1d5000624f20a50609b605b80e35356b1932238
Xcon2005_Drew_Copley.pdf
Posted Aug 31, 2005
Authored by Drew Copley | Site xcon.xfocus.org

Xcon 2005: Anti-Virus Heuristics

tags | virus
SHA-256 | 2ecef563b1af1bdb7220834ff9434253e41dce6fe29512d70e68840d9ba22576
ruxconCFP2005.txt
Posted Mar 24, 2005
Authored by ruxcon

RUXCON would like to announce the call for papers for the third annual RUXCON conference. Breaking from the RUXCON tradition of having the conference in winter months, this year the conference will be ran during the 1st and 2nd of October. As with previous years, RUXCON will be held at the University of Technology, Sydney, Australia. The dead line for submissions is the 31st of August.

tags | paper, conference
SHA-256 | e03576f7c21d5e7b8539b1b7d2776da5be19c966a6d4bc87a9d2612aabc9202c
Secunia Security Advisory 11678
Posted May 21, 2004
Authored by Secunia

A vulnerability, caused due to an unspecified error within Xconfig, has been discovered in Exceed versions 9.x. When exploited, local users can bypass certain restrictions.

tags | advisory, local
SHA-256 | ed2ff2c4f566f565d33db59092d739c063a6c615a912c4ac303918b0f624d4d2
cfp_p62.txt
Posted Apr 9, 2004
Authored by phrack, Phrack Staff | Site phrack.org

PHRACK 62 - CALL FOR PAPERS: The deadline is July 1st, 2004. Please submit your work as soon as possible. Hard cover copies will be made and released at Ruxcon in Australia this year.

tags | magazine
SHA-256 | 4773daf98c38ae3068e3d054d9e7d43d17b8378fc00c71b058d7f29e4bc46db9
mdklinuxconf.c
Posted Nov 30, 2002
Authored by Pokleyzz

Mandrake 8.2 linuxconf local root exploit.

tags | exploit, local, root
systems | linux, mandrake
SHA-256 | 10ac292ecd095adfff7090099b436f9adcb2b98fee0c74a8249eeff765272b78
nslconf.c
Posted Sep 30, 2002
Authored by RaiSe | Site netsearch-ezine.com

Linuxconf v1.28r3 and below local exploit which uses the ptrace method to find the offset. Tested on Mandrake 8.0 and 8.2, and Redhat 7.2 and 7.3.

tags | exploit, local
systems | linux, redhat, mandrake
SHA-256 | 7c69399dd7f5a08de186e149072b4b0ffad0e4adecf6598bc7fb8d45d8cc6354
lconfmdk.c
Posted Sep 17, 2002
Authored by Priest

Linuxconf local root exploit for Mandrake 8.2.

tags | exploit, local, root
systems | linux, mandrake
SHA-256 | bbdecd617d05c630f7b5a45d0f9bbe2c7853751345d776a2859834b022570a38
Page 2 of 3
Back123Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    16 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close