Twenty Year Anniversary
Showing 1 - 16 of 16 RSS Feed


Posted Mar 25, 2005
Authored by Dave Aitel | Site

A paper by Immunity describing in technical detail the details of the LLSSRV issue described in MS05-010. This paper also describes how this issue affects Windows 2000 AP SP3 and SP4 without authentication, something which was not described in the MS05-010 bulletin.

tags | paper
systems | windows, 2k
advisories | CVE-2005-0050
MD5 | 8fca2ad37584a5732b4b6edbc1621eb4
Posted Oct 20, 2004
Authored by Sergio Alvarez

A good introduction to writing exploits for the Win32 platform. Walks through creation of an exploit for a real vulnerable piece of software, using OllyDbg to help isolate the fault and exploit it.

tags | paper
systems | windows, 32
MD5 | c82b02cacf17ed00b5e672a952f10187
Posted Aug 24, 2004
Authored by Geoff Vass

A bit of a rant about how Microsoft and Virus scanners fail to properly pay attention to .txt file extensions and how they can be used by attackers to fall into the background.

tags | paper, virus
systems | windows
MD5 | 8c8f1633621e904ee458ed21ee9ec128
Posted Jan 6, 2004
Authored by Nicola Cuomo | Site

Small whitepaper describing the obfuscation algorithm used by Windows 2k/NT/XP Syskey and the steps required to remove its encryption from the password hashes. Tools to automate the process included.

tags | paper
systems | windows, 2k
MD5 | 0ff1b279635db3fd61771f14c0845e7b
Posted Dec 15, 2003
Authored by Delikon | Site

A simple tutorial on Windows Shellcoding - Shows how to write shellcode in asm that spawns a cmd shell. Includes tools to encode the asm code to avoid NULL bytes, and to generate the typical C shellcode. In Powerpoint and PDF format.

tags | paper, shell, shellcode
systems | windows, 2k
MD5 | 9bb1d585433160ae4eada84edb85d3be
Posted Nov 25, 2003
Authored by clappymonkey

Brief research paper that audits and discusses the true scope of how many hosts on the Internet actually have TCP port 139 listening and are susceptible to attack.

tags | paper, tcp
systems | windows
MD5 | bdd6e30719b9fc83c5360faff129ac70
Posted Jul 28, 2003

Paper discussing utilization of the Win32 exploit for the DCOM RPC vulnerability.

tags | paper
systems | windows, 32
MD5 | 889a041d43ec856b94ae7ad2a59817be
Posted Jul 14, 2003
Authored by Brett Moore SA | Site

Paper discussing more shatter attacks that are possible using SEH memory locations to escalate privileges in Windows. Related information available here.

tags | paper
systems | windows, 2k
MD5 | 841917c449222c7c68f22a84d3d11592
Posted Jul 11, 2003
Authored by Oliver Lavery | Site

An iDEFENSE released security paper reflecting on the Shatter Attacks found against the Windows operating system in 2002. It clarifies what the flaws in the Windows event model are, describes a related vulnerability that continues to exist in many popular software products and suggests ways in which these unfixable flaws might be addressed.

tags | paper
systems | windows, 2k
MD5 | abc0c958e4b7f3d53e3026d8fdc351a7
Posted Aug 10, 2002
Authored by Foon | Site

This paper presents a new generation of attacks against Microsoft Windows, and possibly other message-based windowing systems. The flaws presented in this paper are, at the time of writing, unfixable. The only reliable solution to these attacks requires functionality that is not present in Windows, as well as efforts on the part of every single Windows software vendor. This paper documents Next-Generation Win32 exploits being based off of fundamental API flaws.

tags | paper
systems | windows, 2k, 32
MD5 | 2f95ab2d480572b804598dd07555fba0
Posted Jul 10, 2002
Authored by Maarten Van Horenbeeck

Security Hardening of Windows 2000 and NT Server Machines - Contains a roundup of good security practices, hardening, ways that windows-boxes are penetrated, and a roundup of some useful tools. Written in 2001.

tags | paper
systems | windows, 2k
MD5 | 1e8a39003bf05aff01d0231118c58090
Posted Jul 8, 2002

How to hack windows remotely through file sharing.

tags | paper
systems | windows, 2k
MD5 | ff854fd2b5fc34401d21335c216b22d6
Posted Jan 25, 2002
Authored by David Litchfield | Site

Windows 2000 Format String Vulnerabilities - Includes detailed discussion of how format string bugs in fprintf(), vprintf() and sprintf() calls they are created, discovered, and exploited.

tags | paper, vulnerability
systems | windows, 2k
MD5 | f08de556c293621dc8bbde597c7b51c3
Posted May 31, 2001
Authored by Philip Cox

Whitepaper on hardening the Windows 2000 operating system.

tags | paper
systems | windows, 2k
MD5 | e21d70d39dd02251713657ef7f731d12
Posted Aug 16, 2000
Authored by Ofir Arkin | Site

Windows 2000 machines can reliably be identified remotely because they do not correctly respond to ICMP query messages with a nonstandard Type-of-Service value.

tags | paper
systems | windows, 2k
MD5 | 941778b22687c30aeb6b752df9a14505
Posted Jan 18, 2000
Authored by David Elswick

Windows 2000 Security - Log of a Windows 2000 hack and explanation of the dangers involved with the default security in Windows 2000 professional.

tags | paper
systems | windows, 2k
MD5 | 976b00715da24532db4d6256eb358c11
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By