Exploit the possiblities
Showing 1 - 20 of 20 RSS Feed

Rosiello Security

Rosiello Security

>Rosiello Securit ywas founded by Angelo Rosiello, a long time contributor to the security community. He has dedicated rosiello.org to the discussion of computer security, articles, programs, and news.

AntiPhishing.pdf
Posted Jul 17, 2008
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Anti-Phishing Security Strategy - A lecture presented at BlackHat 2008.

MD5 | 02b0ce244ae22a137a30a54990265547
rfid-angelo-rosiello.pdf
Posted Nov 13, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

RFID: Security Briefings. A set of slides from a talk that discusses how RFID works and security menaces related to RFID.

MD5 | 74026e4fae989c7dfbc023caf422b9de
viruses_next_generation-ITUNDERGROUND.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Next Generation Viruses.

MD5 | c5385efbbbd3804016bd7ea911e3a8b9
Shadow_Software_Attacks.ppt
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Shadow Software Attacks.

MD5 | 42e96d3332d988ea630d77b16aa30074
Antiphish-ITUNDERGROUND.pdf
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello, Engin Kirda, Christopher Kruegel

Slides from a lecture given by the Technical University of Vienna Politecnico di Milano regarding AntiPhish: An Anti-Phishing Browser Plug-in based Solution.

MD5 | 969fed894882fcb169e7da7678f61b3b
writing-behind-a-buffer.pdf
Posted Oct 29, 2007
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Slides from a lecture discussing Writing Behind A Buffer.

MD5 | 6ea635b5085b5a66e1df73f9e2195101
kryptor-0.1.tar.gz
Posted Nov 20, 2005
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Kryptor is a graphical tool to encrypt files using the algorithm ARCS-256 bits. It is also possible to erase files by overwriting data with a pseudo-random sequence of bytes iterated three times, which will make data recovery a very complex operation.

MD5 | e0a1e0ce76d01f2c946575b6cdb43192
Shadow_Software_Attack.pdf
Posted Nov 13, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Whitepaper written to demonstrate that a shadow software attack is still possible. Winner of the ISW contest.

MD5 | b9638032cc022c840195bf33a6574741
proxyscanner-2.0.tar.gz
Posted Jul 21, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Proxy Scanner is a tool that tells you whether or not a proxy server can bounce your connection.

Changes: Can now be compiled on any Unix platform.
MD5 | 0229a95f6cf053d778a3a8963fc51ad9
rosiello_ports.html
Posted Jun 23, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Paper discussing the caveats of port assignments above 1024 and how users should have blocks of ports assigned to them.

MD5 | afc4864c189a9823b9088e8af8dbf8a9
The_Basics_of_Shellcoding.pdf
Posted May 25, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

White paper discussing the basics of shellcoding, a quick overview of assembly, and usage of shellcodes.

tags | shellcode
MD5 | 031e3f6436729d7dc26876fe8c86b548
proxyscanner.zip
Posted Apr 16, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Proxy Scanner for Windows that tells you whether or not a proxy server can bounce your connection.

systems | windows
MD5 | dc04376fbc54e5847d8d297fb53c4ecf
urc.zip
Posted Jan 7, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

This utility demonstrates a simple UDP backdoor which allows for remote program execution on a Microsoft Windows server.

tags | remote, udp
systems | windows
MD5 | 86d9079c78155ad855cdeca267f5a020
arcs.exe
Posted Nov 9, 2003
Authored by Angelo Rosiello, rosiello, Roberto Carrozzo | Site rosiello.org

Contest Windows binary of arcs.

systems | windows
MD5 | abd9ae85f78851255af4b24afcf98eaf
wuftpFreeze.c
Posted Nov 4, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

WU-FTPD 2.6.2 Freezer exploit that causes a denial of service condition when a valid login can be supplied.

tags | denial of service
MD5 | d4ec50955ef45b630d1fa428abd3f815
ARCS.tar.gz
Posted Oct 3, 2003
Authored by Angelo Rosiello, rosiello, Roberto Carrozzo | Site rosiello.org

A.R.C.S., or the Angelo Rosiello and Roberto Carrrozzo Stream 256 bit cipher, is an algorithm registered with the S.I.A.E. that the authors have allowed this site sole rights to host and distribute. The algorithm's theory utilizes Vernam's cipher, respecting Shannon's principles, and is based on MD5. The authors hope that someone will try to break this cipher and welcome all attempts and added research. Be forewarned, commercial use of this algorithm is forbidden without the Authors' consent. If you successfully crack this file that was encrypted with A.R.C.S., Packet Storm will send you a free t-shirt with the classic shellcode on the front of it. Supplies are limited, but we are not extremely worried. Thanks to all that help further the research and development of strong crypto.

tags | crypto, shellcode
MD5 | d39fd2e26f4752514784448467f722ac
arcs
Posted Sep 29, 2003
Authored by rosiello

Contest ELF binary of arcs

MD5 | 682d04789bcfb445a70b722dcc9a7125
CrackMe.ARCS
Posted Sep 29, 2003
Authored by rosiello

Contest file that has been encrypted with A.R.C.S. This file has a special message inside. Once cracked, utilize the instructions to redeem a free t-shirt.

MD5 | 04e33771caa9c31d42facdde52ddc5c3
StackOverflow-en.pdf
Posted Sep 10, 2003
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

White paper discussing stack overflows, ways to exploit them, and SIMPLESEM.

tags | overflow
MD5 | fd00b1f993c5f76ae944c8e8832e0d99
logo.jpg
Posted May 9, 2003
Authored by rosiello

Logo for Rosiello Security.

MD5 | adf11e4355557a03fa8b2eee46b5559d
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close