Search:

Type: Posts; User: frostedegg; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.02 seconds.

  1. Replies
    6
    Views
    5,891

    That would not work effectively at the processor...

    That would not work effectively at the processor level, as OS API commands translate into many many consecutive processor instructions. You would have to have a list of OS API commands and their...
  2. Replies
    16
    Views
    12,363

    But the compiler doesn't see the format string. ...

    But the compiler doesn't see the format string. The format string is entered as a parameter to an already compiled (exploitable) program (usually taking advantage of printf(string) instead of...
  3. Replies
    16
    Views
    4,008

    Avril Lavigne is hot and looks like she'd be...

    Avril Lavigne is hot and looks like she'd be really kinky in bed. Time for some alone time.....
  4. Replies
    23
    Views
    4,632

    If their wireless network is...

    If their wireless network is unsecure/unencrypted, do a quick MitM and redirect all their web requests to a temp page displaying, "you need more security, call/pay me now or die." Or something like...
  5. Replies
    9
    Views
    8,616

    If you don't want you server to respond to...

    If you don't want you server to respond to ping's, you just need to edit some values in the proc filesystem. Check it out:



    This will cause the server to drop all IMCP type 0 packets, which...
  6. Replies
    16
    Views
    12,363

    I am pretty sure that TheHorse is correct in his...

    I am pretty sure that TheHorse is correct in his assumption that these are used for padding. You are attempting to write an address into some variable and it is necessary to make sure the bytes are...
  7. Replies
    32
    Views
    21,287

    Poll: just dont use a bank. Keep all your money in...

    just dont use a bank. Keep all your money in cash in a giant room upstairs.....with a big lock....
  8. Replies
    9
    Views
    6,628

    I am not that paranoid. This was more outa...

    I am not that paranoid. This was more outa curiousity. Even if an SSL dumped packet could be cracked, I doubt I would really change anything with my home network. I was just curious if such a...
  9. Replies
    4
    Views
    10,054

    the AP/gateway still acts as a switch for the...

    the AP/gateway still acts as a switch for the internal LAN, just as if everything was wired instead of wireless. Wireless just provides another means to connect to the gateway/switch instead of wired
  10. Replies
    7
    Views
    9,257

    This can happen anytime the three-way handshake...

    This can happen anytime the three-way handshake isn't successfully completed. When a server receives a SYN, it will respond with a SYN/ACK and wait to receive the final ACK. If the computer never...
  11. Replies
    9
    Views
    6,628

    get a room

    get a room
  12. Replies
    9
    Views
    6,628

    spank you

    spank you
  13. Replies
    9
    Views
    6,628

    SSL Encryption

    OK, My network security knowledge is not very good. I am doing some basic pentesting on my network because i know for a fact a buncha kids wardrive around my neighborhood for fun (i run wireless,...
  14. Replies
    17
    Views
    4,533

    I don't think MS hired this guy to take him away...

    I don't think MS hired this guy to take him away from gentoo linux because they were attracting too many gamers......MS rules the gaming indsutry because companies write their code to run on native...
  15. Replies
    5
    Views
    2,214

    possibly it is some kind of security against port...

    possibly it is some kind of security against port scans. Some servers reply with SYN/ACK packets if a SYN is received destined to a closed port. This screws up some port scans, but makes the...
  16. Replies
    17
    Views
    4,533

    If Bill Gates stuck a fat ass paycheck in my face...

    If Bill Gates stuck a fat ass paycheck in my face I wouldn't say no, but then again I didn't found a linux distribution.......

    Who knows why the hell MS hired him to "help MS understand Open...
  17. Replies
    10
    Views
    8,443

    Nice websites, thanks for the post

    Nice websites, thanks for the post
  18. Replies
    11
    Views
    8,686

    ahh sorry, didn't quite understand. C...

    ahh sorry, didn't quite understand. C programming is definately a good start, you can also throw in some PHP or Perl. If you are doing network pentesting, TCP/IP is the basis of everything. Learn...
  19. Replies
    11
    Views
    8,686

    hmm... grab a library card, read books on the...

    hmm... grab a library card, read books on the topics you just mentioned in your post, ask questions here if you don't get something, and practice what you read (or it wont stick)...


    For...
  20. Thread: Monad Shell

    by frostedegg
    Replies
    3
    Views
    1,939

    No idea, Monad is being demoed today, so we can...

    No idea, Monad is being demoed today, so we can expect to see some articles with more detail next week. All I know is that microsoft will be using very simple verb-noun expressions.... like...
  21. Thread: Monad Shell

    by frostedegg
    Replies
    3
    Views
    1,939

    Monad Shell

    Microsoft's DOS replacement for command line interface was demoed today at TechED in Orlando. Here are some quotes from a THG article that appeared yesterday (Snover is the architect doing the...
  22. Replies
    8
    Views
    6,900

    LOL come on now man, why are you spying on the...

    LOL

    come on now man, why are you spying on the ex?? Unless you have her permission to view her email, I would suspect this to be invasion of privacy. I am pretty sure that if she found out you...
  23. Replies
    0
    Views
    8,930

    Loadable Kernel Module Injection

    Once again I don't know if this has been covered or not yet, but here ya go:

    INTRO:
    I don't remember where I learned about Loadable Kernel Module injection, so I cant give the appropriate...
  24. Replies
    0
    Views
    10,140

    Heap-Based Overflows

    I am new to AO here and this is my first tutorial, so go easy. I've seen some good tutorials on the principles of Stack-Based Overflows, but haven't seen much on Heap-Based Overflows (maybe I missed...
  25. Replies
    27
    Views
    20,371

    alright, i think we pretty much summed up how to...

    alright, i think we pretty much summed up how to "defend" against port scans. There are many many different solutions. You should look at your network, the time/resources you have to defend port...
Results 1 to 25 of 28
Page 1 of 2 1 2