all things security
Showing 1 - 16 of 16 RSS Feed

Files

llssrv_miss.pdf
Posted Mar 25, 2005
Authored by Dave Aitel | Site immunitysec.com

A paper by Immunity describing in technical detail the details of the LLSSRV issue described in MS05-010. This paper also describes how this issue affects Windows 2000 AP SP3 and SP4 without authentication, something which was not described in the MS05-010 bulletin.

tags | paper
systems | windows, 2k
advisories | CVE-2005-0050
MD5 | 8fca2ad37584a5732b4b6edbc1621eb4
Intro_to_Win32_Exploits.pdf
Posted Oct 20, 2004
Authored by Sergio Alvarez

A good introduction to writing exploits for the Win32 platform. Walks through creation of an exploit for a real vulnerable piece of software, using OllyDbg to help isolate the fault and exploit it.

tags | paper
systems | windows, 32
MD5 | c82b02cacf17ed00b5e672a952f10187
txt-rant.txt
Posted Aug 24, 2004
Authored by Geoff Vass

A bit of a rant about how Microsoft and Virus scanners fail to properly pay attention to .txt file extensions and how they can be used by attackers to fall into the background.

tags | paper, virus
systems | windows
MD5 | 8c8f1633621e904ee458ed21ee9ec128
Syskey.zip
Posted Jan 6, 2004
Authored by Nicola Cuomo | Site studenti.unina.it

Small whitepaper describing the obfuscation algorithm used by Windows 2k/NT/XP Syskey and the steps required to remove its encryption from the password hashes. Tools to automate the process included.

tags | paper
systems | windows, 2k
MD5 | 0ff1b279635db3fd61771f14c0845e7b
win32-shellcoding-tutorial.zip
Posted Dec 15, 2003
Authored by Delikon | Site delikon.de

A simple tutorial on Windows Shellcoding - Shows how to write shellcode in asm that spawns a cmd shell. Includes tools to encode the asm code to avoid NULL bytes, and to generate the typical C shellcode. In Powerpoint and PDF format.

tags | paper, shell, shellcode
systems | windows, 2k
MD5 | 9bb1d585433160ae4eada84edb85d3be
port139_audit.txt
Posted Nov 25, 2003
Authored by clappymonkey

Brief research paper that audits and discusses the true scope of how many hosts on the Internet actually have TCP port 139 listening and are susceptible to attack.

tags | paper, tcp
systems | windows
MD5 | bdd6e30719b9fc83c5360faff129ac70
illmob.txt
Posted Jul 28, 2003
Site illmob.org

Paper discussing utilization of the Win32 exploit for the DCOM RPC vulnerability.

tags | paper
systems | windows, 32
MD5 | 889a041d43ec856b94ae7ad2a59817be
shatterSEH.txt
Posted Jul 14, 2003
Authored by Brett Moore SA | Site security-assessment.com

Paper discussing more shatter attacks that are possible using SEH memory locations to escalate privileges in Windows. Related information available here.

tags | paper
systems | windows, 2k
MD5 | 841917c449222c7c68f22a84d3d11592
Shatter_Redux.pdf
Posted Jul 11, 2003
Authored by Oliver Lavery | Site idefense.com

An iDEFENSE released security paper reflecting on the Shatter Attacks found against the Windows operating system in 2002. It clarifies what the flaws in the Windows event model are, describes a related vulnerability that continues to exist in many popular software products and suggests ways in which these unfixable flaws might be addressed.

tags | paper
systems | windows, 2k
MD5 | abc0c958e4b7f3d53e3026d8fdc351a7
shatter.html
Posted Aug 10, 2002
Authored by Foon | Site security.tombom.co.uk

This paper presents a new generation of attacks against Microsoft Windows, and possibly other message-based windowing systems. The flaws presented in this paper are, at the time of writing, unfixable. The only reliable solution to these attacks requires functionality that is not present in Windows, as well as efforts on the part of every single Windows software vendor. This paper documents Next-Generation Win32 exploits being based off of fundamental API flaws.

tags | paper
systems | windows, 2k, 32
MD5 | 2f95ab2d480572b804598dd07555fba0
ntsec.pdf
Posted Jul 10, 2002
Authored by Maarten Van Horenbeeck

Security Hardening of Windows 2000 and NT Server Machines - Contains a roundup of good security practices, hardening, ways that windows-boxes are penetrated, and a roundup of some useful tools. Written in 2001.

tags | paper
systems | windows, 2k
MD5 | 1e8a39003bf05aff01d0231118c58090
Winsecompr.txt
Posted Jul 8, 2002
Site neoerudition.net

How to hack windows remotely through file sharing.

tags | paper
systems | windows, 2k
MD5 | ff854fd2b5fc34401d21335c216b22d6
win32format.doc
Posted Jan 25, 2002
Authored by David Litchfield | Site atstake.com

Windows 2000 Format String Vulnerabilities - Includes detailed discussion of how format string bugs in fprintf(), vprintf() and sprintf() calls they are created, discovered, and exploited.

tags | paper, vulnerability
systems | windows, 2k
MD5 | f08de556c293621dc8bbde597c7b51c3
hardenW2K12.pdf
Posted May 31, 2001
Authored by Philip Cox

Whitepaper on hardening the Windows 2000 operating system.

tags | paper
systems | windows, 2k
MD5 | e21d70d39dd02251713657ef7f731d12
windows2000.fingerprint.txt
Posted Aug 16, 2000
Authored by Ofir Arkin | Site sys-security.com

Windows 2000 machines can reliably be identified remotely because they do not correctly respond to ICMP query messages with a nonstandard Type-of-Service value.

tags | paper
systems | windows, 2k
MD5 | 941778b22687c30aeb6b752df9a14505
Windows_2000_Security.doc
Posted Jan 18, 2000
Authored by David Elswick

Windows 2000 Security - Log of a Windows 2000 hack and explanation of the dangers involved with the default security in Windows 2000 professional.

tags | paper
systems | windows, 2k
MD5 | 976b00715da24532db4d6256eb358c11
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Phishers Getting Smarter By Making Use Of User Location
Posted Oct 20, 2017

tags | headline, malware, cybercrime, fraud, phish
OSX Malware Spread Via Compromised Software Downloads
Posted Oct 20, 2017

tags | headline, malware, apple
Canadian Spooks Release Their Own Malware Detection Tool
Posted Oct 20, 2017

tags | headline, government, malware, canada, spyware
Judge: MalwareTech Is No Longer Under Curfew, GPS Monitoring
Posted Oct 20, 2017

tags | headline, hacker, government, malware, usa, conference
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close