Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: frostedegg; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    6
    Views
    787

    That would not work effectively at the processor...

    That would not work effectively at the processor level, as OS API commands translate into many many consecutive processor instructions. You would have to have a list of OS API commands and their...
  2. Replies
    16
    Views
    1,658

    But the compiler doesn't see the format string. ...

    But the compiler doesn't see the format string. The format string is entered as a parameter to an already compiled (exploitable) program (usually taking advantage of printf(string) instead of...
  3. Replies
    16
    Views
    868

    Avril Lavigne is hot and looks like she'd be...

    Avril Lavigne is hot and looks like she'd be really kinky in bed. Time for some alone time.....
  4. Replies
    23
    Views
    1,228

    If their wireless network is...

    If their wireless network is unsecure/unencrypted, do a quick MitM and redirect all their web requests to a temp page displaying, "you need more security, call/pay me now or die." Or something like...
  5. Replies
    9
    Views
    2,062

    If you don't want you server to respond to...

    If you don't want you server to respond to ping's, you just need to edit some values in the proc filesystem. Check it out:



    This will cause the server to drop all IMCP type 0 packets, which...
  6. Replies
    16
    Views
    1,658

    I am pretty sure that TheHorse is correct in his...

    I am pretty sure that TheHorse is correct in his assumption that these are used for padding. You are attempting to write an address into some variable and it is necessary to make sure the bytes are...
  7. Replies
    32
    Views
    3,242

    Poll: just dont use a bank. Keep all your money in...

    just dont use a bank. Keep all your money in cash in a giant room upstairs.....with a big lock....
  8. Replies
    9
    Views
    945

    I am not that paranoid. This was more outa...

    I am not that paranoid. This was more outa curiousity. Even if an SSL dumped packet could be cracked, I doubt I would really change anything with my home network. I was just curious if such a...
  9. Replies
    4
    Views
    1,197

    the AP/gateway still acts as a switch for the...

    the AP/gateway still acts as a switch for the internal LAN, just as if everything was wired instead of wireless. Wireless just provides another means to connect to the gateway/switch instead of wired
  10. Replies
    7
    Views
    1,165

    This can happen anytime the three-way handshake...

    This can happen anytime the three-way handshake isn't successfully completed. When a server receives a SYN, it will respond with a SYN/ACK and wait to receive the final ACK. If the computer never...
  11. Replies
    9
    Views
    945

    get a room

    get a room
  12. Replies
    9
    Views
    945

    spank you

    spank you
  13. Replies
    9
    Views
    945

    SSL Encryption

    OK, My network security knowledge is not very good. I am doing some basic pentesting on my network because i know for a fact a buncha kids wardrive around my neighborhood for fun (i run wireless,...
  14. Replies
    17
    Views
    999

    I don't think MS hired this guy to take him away...

    I don't think MS hired this guy to take him away from gentoo linux because they were attracting too many gamers......MS rules the gaming indsutry because companies write their code to run on native...
  15. Replies
    5
    Views
    610

    possibly it is some kind of security against port...

    possibly it is some kind of security against port scans. Some servers reply with SYN/ACK packets if a SYN is received destined to a closed port. This screws up some port scans, but makes the...
  16. Replies
    17
    Views
    999

    If Bill Gates stuck a fat ass paycheck in my face...

    If Bill Gates stuck a fat ass paycheck in my face I wouldn't say no, but then again I didn't found a linux distribution.......

    Who knows why the hell MS hired him to "help MS understand Open...
  17. Replies
    10
    Views
    1,373

    Nice websites, thanks for the post

    Nice websites, thanks for the post
  18. Replies
    11
    Views
    1,347

    ahh sorry, didn't quite understand. C...

    ahh sorry, didn't quite understand. C programming is definately a good start, you can also throw in some PHP or Perl. If you are doing network pentesting, TCP/IP is the basis of everything. Learn...
  19. Replies
    11
    Views
    1,347

    hmm... grab a library card, read books on the...

    hmm... grab a library card, read books on the topics you just mentioned in your post, ask questions here if you don't get something, and practice what you read (or it wont stick)...


    For...
  20. Thread: Monad Shell

    by frostedegg
    Replies
    3
    Views
    440

    No idea, Monad is being demoed today, so we can...

    No idea, Monad is being demoed today, so we can expect to see some articles with more detail next week. All I know is that microsoft will be using very simple verb-noun expressions.... like...
  21. Thread: Monad Shell

    by frostedegg
    Replies
    3
    Views
    440

    Monad Shell

    Microsoft's DOS replacement for command line interface was demoed today at TechED in Orlando. Here are some quotes from a THG article that appeared yesterday (Snover is the architect doing the...
  22. Replies
    8
    Views
    829

    LOL come on now man, why are you spying on the...

    LOL

    come on now man, why are you spying on the ex?? Unless you have her permission to view her email, I would suspect this to be invasion of privacy. I am pretty sure that if she found out you...
  23. Replies
    0
    Views
    4,377

    Loadable Kernel Module Injection

    Once again I don't know if this has been covered or not yet, but here ya go:

    INTRO:
    I don't remember where I learned about Loadable Kernel Module injection, so I cant give the appropriate...
  24. Replies
    0
    Views
    4,105

    Heap-Based Overflows

    I am new to AO here and this is my first tutorial, so go easy. I've seen some good tutorials on the principles of Stack-Based Overflows, but haven't seen much on Heap-Based Overflows (maybe I missed...
  25. Replies
    27
    Views
    2,370

    alright, i think we pretty much summed up how to...

    alright, i think we pretty much summed up how to "defend" against port scans. There are many many different solutions. You should look at your network, the time/resources you have to defend port...
Results 1 to 25 of 28
Page 1 of 2 1 2

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides