exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Favorites from todd

All Favorites

Whitepaper called The Apple Sandbox. It discuss the access control system in OS X and iOS operating systems.

2011-01-25 06:39:37 UTC | Permalink

Whitepaper called Non-Executable Stack ARM Exploitation.

2011-01-25 06:37:33 UTC | Permalink

111 bytes small FreeBSD/x86 portbinding and forking shellcode.

2011-01-22 02:55:24 UTC | Permalink

This exploit takes advantage of the same underflow as the original, but takes a different approach. Instead of underflowing into userspace (which doesn't work on 64-bit systems and is a lot of work), the author uses an underflow to some static values inside of the kernel which are referenced as pointers to userspace. This method is pretty simple and seems to be reliable.

2011-01-08 19:57:03 UTC | Permalink

GNU libc/regcomp(3) suffers from overflow and stack exhaustion vulnerabilities. proftpd.gnu.c exploit included.

2011-01-07 22:06:47 UTC | Permalink

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

2010-07-13 00:27:08 UTC | Permalink
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close