Search:
Type: Posts; User: frostedegg; Keyword(s):
Search:
Search took 0.05 seconds.
-
That would not work effectively at the processor level, as OS API commands translate into many many consecutive processor instructions. You would have to have a list of OS API commands and their...
-
June 23rd, 2005, 04:01 PM
But the compiler doesn't see the format string. The format string is entered as a parameter to an already compiled (exploitable) program (usually taking advantage of printf(string) instead of...
-
June 23rd, 2005, 01:10 PM
Avril Lavigne is hot and looks like she'd be really kinky in bed. Time for some alone time.....
-
June 23rd, 2005, 01:01 PM
If their wireless network is unsecure/unencrypted, do a quick MitM and redirect all their web requests to a temp page displaying, "you need more security, call/pay me now or die." Or something like...
-
June 23rd, 2005, 12:46 PM
If you don't want you server to respond to ping's, you just need to edit some values in the proc filesystem. Check it out:
This will cause the server to drop all IMCP type 0 packets, which...
-
June 23rd, 2005, 12:41 PM
I am pretty sure that TheHorse is correct in his assumption that these are used for padding. You are attempting to write an address into some variable and it is necessary to make sure the bytes are...
-
June 20th, 2005, 12:59 PM
just dont use a bank. Keep all your money in cash in a giant room upstairs.....with a big lock....
-
June 20th, 2005, 12:55 PM
I am not that paranoid. This was more outa curiousity. Even if an SSL dumped packet could be cracked, I doubt I would really change anything with my home network. I was just curious if such a...
-
June 20th, 2005, 12:52 PM
the AP/gateway still acts as a switch for the internal LAN, just as if everything was wired instead of wireless. Wireless just provides another means to connect to the gateway/switch instead of wired
-
June 20th, 2005, 12:46 PM
This can happen anytime the three-way handshake isn't successfully completed. When a server receives a SYN, it will respond with a SYN/ACK and wait to receive the final ACK. If the computer never...
-
June 16th, 2005, 04:09 PM
-
June 16th, 2005, 03:46 PM
-
June 16th, 2005, 03:11 PM
OK, My network security knowledge is not very good. I am doing some basic pentesting on my network because i know for a fact a buncha kids wardrive around my neighborhood for fun (i run wireless,...
-
June 15th, 2005, 01:28 PM
I don't think MS hired this guy to take him away from gentoo linux because they were attracting too many gamers......MS rules the gaming indsutry because companies write their code to run on native...
-
June 15th, 2005, 01:22 PM
possibly it is some kind of security against port scans. Some servers reply with SYN/ACK packets if a SYN is received destined to a closed port. This screws up some port scans, but makes the...
-
June 14th, 2005, 01:46 PM
If Bill Gates stuck a fat ass paycheck in my face I wouldn't say no, but then again I didn't found a linux distribution.......
Who knows why the hell MS hired him to "help MS understand Open...
-
June 14th, 2005, 01:35 PM
Nice websites, thanks for the post
-
June 10th, 2005, 06:27 PM
ahh sorry, didn't quite understand. C programming is definately a good start, you can also throw in some PHP or Perl. If you are doing network pentesting, TCP/IP is the basis of everything. Learn...
-
June 10th, 2005, 06:00 PM
hmm... grab a library card, read books on the topics you just mentioned in your post, ask questions here if you don't get something, and practice what you read (or it wont stick)...
For...
-
June 10th, 2005, 03:53 PM
No idea, Monad is being demoed today, so we can expect to see some articles with more detail next week. All I know is that microsoft will be using very simple verb-noun expressions.... like...
-
June 10th, 2005, 12:53 PM
Microsoft's DOS replacement for command line interface was demoed today at TechED in Orlando. Here are some quotes from a THG article that appeared yesterday (Snover is the architect doing the...
-
LOL
come on now man, why are you spying on the ex?? Unless you have her permission to view her email, I would suspect this to be invasion of privacy. I am pretty sure that if she found out you...
-
Once again I don't know if this has been covered or not yet, but here ya go:
INTRO:
I don't remember where I learned about Loadable Kernel Module injection, so I cant give the appropriate...
-
I am new to AO here and this is my first tutorial, so go easy. I've seen some good tutorials on the principles of Stack-Based Overflows, but haven't seen much on Heap-Based Overflows (maybe I missed...
-
alright, i think we pretty much summed up how to "defend" against port scans. There are many many different solutions. You should look at your network, the time/resources you have to defend port...
|
|