what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files

vm.pdf
Posted Mar 22, 2006
Authored by Val Smith | Site offensivecomputing.net

Detecting the Presence of Virtual Machines Using the Local Data Table - This paper describes a method for determining the presence of virtual machine emulation in a non-privileged operating environment. This attack is useful for triggering anti-virtualization attacks and evading analysis.

tags | paper, local
SHA-256 | 48ac374b43d646206bf8a59b9cc0aed6ac19a76791acaea176314b493393c68e
KohnoBroidoClaffy05-devicefingerprinting.pdf
Posted Mar 26, 2005
Authored by tkohno | Site caida.org

Remote physical device fingerprinting by exploiting small, microscopic deviations in device hardware: clock skews. Presents research showing accuracy equivalent to DNA matches, even when the target was hundreds of milliseconds away.

tags | paper, remote
SHA-256 | 17e42aca61fb1e13d6384273c729283e39eb5b491370e0267bd70fdd7b2a8d12
port0paper.txt
Posted Jul 28, 2003
Authored by STE Jones | Site networkpenetration.com

Paper discussing utilization of port zero for OS fingerprinting and how to protect against it.

tags | paper
SHA-256 | bbe9a71a165db0e8b2e6a2f2d5c437c544faf4ba99ad3d4c8737d4bf2ef584a0
osdetect-lpd.txt
Posted Feb 21, 2001
Authored by Fobic | Site low-level.net

Remote OS Detection using LPD Querying - Line printer daemons listening on TCP port 515 can give away information about which OS is running. Proof of concept code which contains a database of LPD returned messages and OS matches here.

tags | paper, remote, tcp, proof of concept
SHA-256 | cded128bdfd32167081a2f12af24098e14d48c17d622174b582fc793b3e6d45d
osdetect-perl.txt
Posted Feb 13, 2001
Authored by Fobic | Site low-level.net

Examining Advanced Remote OS Detection Methods/Concepts using Perl - This paper discusses the theory and practice behind OS detection with a specific focus on the practice related to the PERL programming language. Methods and concepts for remote operating system detection are closely examined and implemented into Perl code.

tags | paper, remote, perl
SHA-256 | 42dc76c48a5bd38bca8b591b25e2bfb48e12b5dc3be5bf83200be9d48655549b
remote.html
Posted Oct 26, 1999
Authored by pho

Pho's alternate remote OS detection techinques page has been updated. Includes information on ICMP techniques, ARP techniques, IP techniques, and UDP techniques.

tags | paper, remote, udp
SHA-256 | 8ad58add858120309dfa20fecd05c30e086888dd27674d03eb1a7771daeb0615
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close