Search:
Type: Posts; User: Surreal; Keyword(s):
Search:
Search took 0.04 seconds.
-
November 13th, 2003, 08:21 PM
YEs you're right, opcodes not byte codes (hadn't had my morning coffee at the time of writing). You have all been a huge help!
-
November 13th, 2003, 01:31 PM
Hi,
Thanks for your response! I have read that paper - very good, but I am concentrating my efforts on the Win32 platform.
I can write the ASM but am having problems getting into byte code...
-
November 13th, 2003, 12:36 PM
Hi,
I am wondering how I can (and how everyone else can) convert my ASM code into byte code, for I wish to try and understand the art of exploit writing a little better.
Thanks.
-
August 21st, 2003, 11:36 AM
that was super! Thanks for your explanation :-)
-
August 21st, 2003, 10:49 AM
I would like to know, why it is considered to be a vulnerability if a firewall/host responds to a SYN/FIN packet?
Could someone please explain?
Thanks very much!
surreal
-
August 15th, 2003, 01:47 PM
-
August 15th, 2003, 12:22 PM
Thanks for your super explanation. It was just what I wa looking for.
Have a good weekend.
Could SNMP traffic be filtered, only permitting certain hosts to obtain this information? Who needs to...
-
August 15th, 2003, 09:59 AM
Hi,
I have been looking at our internal network and have noticed that if an attacker wanted to, he/she could gather a tremendious amount of information regarding all of our servers. I don't know...
-
August 12th, 2003, 12:26 PM
Hi,
I am doing a test on two servers at work.
Netbios on the two servers is enabled and accessible to those who enter correct username and password combinations.
My question is this:
If...
-
August 12th, 2003, 09:33 AM
Hi,
I am doing a test on two servers at work.
Netbios on the two servers is enabled and accessible to those who enter correct username and password combinations.
My question is this:
If...
-
July 30th, 2003, 02:24 PM
I am indeed using linux. That grep command sounds interesting. What did the command look like?
-
July 30th, 2003, 12:35 PM
I am doing a test on our servers at work. I have been using Nessus to do traditional vulnerability scans and my question is this:
I want to view the actual requests, in raw format that nessus...
-
July 28th, 2003, 08:57 PM
Ok, thanks for your help. If I find anything out I will be certain to let you know about.
Thanks again :-)
/S
-
July 28th, 2003, 02:07 PM
Hi,
I have been doing an internal audit of our network.
I have used, among others, Nessus to scan our servers which resulted in the servers crashing. We run Novell NetWare 5.60.03. EVERY server...
-
HEllo,
I am wondering how one can aquire the inbox name for a certain Exchange account. Would it be viewable in Internet headers of an email?
Does anyone have any ideas?
Thanks in advance!
...
-
June 20th, 2003, 08:51 AM
Hello,
How does one go about performing a reverse DNS request to see what domain name an IP maps to?
Thanks
-
June 10th, 2003, 10:22 AM
I don't believe that I have to configure a deny rules around all the services that I want open. The point of having a deny all rule is to block all traffic. After this has been defined then all...
-
Hello,
I am messing arounf with IP Policies on Win2K. I have created a rule that allows incoming and outgoing HTTP traffic. I have also created a rule that blocks all other traffic to ensure that...
-
My friend and I are sitting on a lan gaming, thats all. We are in the same room. It's my computer he is using and I was just playing around.
-
have just done the following:
C:\>net use \\x.x.x.x\IPC$ "" /u:administrator
The command completed successfully.
This is a friends computer and I want to give him a shock. What can I do?
...
-
April 30th, 2003, 11:12 AM
Hello,
I was wondering if I were to uninstall all the IIS help scripts and files, if it would influence IIS. Also, what about MSADC and webpub, can they be removed? What is their purpose?
...
-
April 2nd, 2003, 05:27 PM
>> tonybradley thanks for your response.
Yes the owners of the server are aware of my actions.
Well, I wish to get a little deeper into the system really - create a user account and/or as you...
-
April 2nd, 2003, 05:02 PM
Hello,
I am doing a pentest and have access to among others admin4.nsf. I have access to a window with the title: CROSS DOMAIN REQUEST CONFIGURATION. What can I do here? anything exciting? I...
-
April 1st, 2003, 03:32 PM
Good stuff. There is lots og help to get here. Thanks to you all *Vice$Dos$*
-
April 1st, 2003, 12:15 PM
Hello,
I am doing a pentest on a Dominos server and have read access to many databases, among others the names.nsf, admin4.nsf, and log.nsf. I can read their contents but don't really know what I...
|
|