Antichat снова доступен.
Форум Antichat (Античат) возвращается и снова открыт для пользователей.
Здесь обсуждаются безопасность, программирование, технологии и многое другое.
Сообщество снова собирается вместе.
Новый адрес: forum.antichat.xyz
 |
|
Software Distribution Malware Infection Vector |

21.07.2008, 14:43
|
|
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
Провел на форуме: 1781065
Репутация:
869
|
|
Software Distribution Malware Infection Vector
Software Distribution Malware Infection Vector
This paper presents an efficient mechanism as well as the corresponding reference implementation for on-the-fly infecting of executable code with malicious software. Their algorithm deploys virus infection routines and network redirection attacks, without requiring the modification of the application itself. This allows infection of executables with an embedded signature when the signature is not automatically verified before execution. They briefly discuss countermeasures such as secure channels, code authentication as well as trusted virtualization that enables the isolation of untrusted downloads from other applications running in trusted domains or compartments.
Paper:
http://packetstormsecurity.org/paper...ion.Vector.pdf
|
|
|
Reverse Engineering: Anti-Cracking Techniques. |

20.08.2008, 21:01
|
|
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
Провел на форуме: 1781065
Репутация:
869
|
|
Reverse Engineering: Anti-Cracking Techniques.
Reverse Engineering: Anti-Cracking Techniques
Many antivirus and antispyware solutions identify malicious programs by looking for known unique signatures contained inside them. Those signatures are stored inside a database which is constantly updated. This tutorial guides you through a number of steps to encrypt the executable file code section in order to render antivirus signature checking techniques ineffective against identifying the malicious code.
Download:
http://packetstormsecurity.org/paper..._Signature.pdf
|
|
|
The Most Wanted Hacking Book 2008 |

28.08.2008, 02:27
|
|
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
Провел на форуме: 1781065
Репутация:
869
|
|
The Most Wanted Hacking Book 2008
|
|
|
ASLR bypassing method on 2.6.17/20 Linux Kernel |

03.09.2008, 21:44
|
|
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
Провел на форуме: 1781065
Репутация:
869
|
|
ASLR bypassing method on 2.6.17/20 Linux Kernel
|
|
|

07.09.2008, 13:22
|
|
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
Провел на форуме: 1781065
Репутация:
869
|
|
XSS and More
|
|
|

10.09.2008, 20:06
|
|
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
Провел на форуме: 1781065
Репутация:
869
|
|
SQL Smuggling Attack
SQL Smuggling
This paper will present a new class of attack, called SQL Smuggling. SQL Smuggling is a sub-class of SQL Injection attacks that rely on differences between contextual interpretation performed by the application platform and the database server. While numerous instances of SQL Smuggling are commonly known, it has yet to be examined as a discrete class of attacks, with a common root cause. The root cause in fact has not yet been thoroughly investigated; this research is a result of a new smuggling technique, presented in this paper. It is fair to assume that further study of this commonality will likely lead to additional findings in this area.
Download:
http://packetstormsecurity.org/paper..._Smuggling.pdf
|
|
|

17.09.2008, 01:18
|
|
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
Провел на форуме: 1781065
Репутация:
869
|
|
Web 2.0 Attacks Revealed
Web 2.0 Attacks Revealed
Cert/CC Statistics shows that 7120 Software Vulnerabilities were
Reported in 2006
· 194 SQL Injection Vulnerabilities were found on BugTraq
between 2005-jan and 2005-June
· Symantec highlights in its most recent Internet Security Threat
Report that Web vulnerabilities constituted 69 percent of 2,249
new vulnerabilities identified for the first half of 2006, with 78
percent of "easily exploitable" vulnerabilities residing within Web
applications.
· Directory Traversal is the 2nd most common attack on the
internet as of the 2nd half of 2005
· Roughly 63% of the Web application vulnerabilities can be
accounted for by 4 vulnerability classes: file inclusion, SQL
injection, cross-site scripting, and directory traversal
http://www.infosecwriters.com/text_r...s-Revealed.pdf
|
|
|
Assault on Oracle PL/SQL - Injection |

05.10.2008, 17:54
|
|
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
Провел на форуме: 1781065
Репутация:
869
|
|
Assault on Oracle PL/SQL - Injection
Assault on Oracle PL/SQL - Injection
by Aelphaeis Mangarae from blackhat-forums
Table of Contents
Introduction 1
A Glance at Oracle APEX 4
-What is Oracle APEX?
-Architecture of Oracle APEX
-mod_plsql / XML DB HTTP
Oracle Database Permissions 7
-Invoker vs. Definer Rights
What Is SQL Injection? 8
-Introduction
-What Programming Languages are Vulnerable?
-Example: SQL Injection Exploitation
-SQL Injection Oracle vs. Other DBMS
PL/SQL Overview 12
-Introduction
-PL/SQL Data Types
-Procedures, Functions & Packages
-Executing Database Commands
-PL/SQL Triggers
-PL/SQL Cursors
PL/SQL Injection 21
-What is PL/SQL Injection?
-Injecting into a SELECT Query
-Injecting into DML
-Database Privilege Escalation
-Technique: Autonomous Transaction.
Download:
Paper
|
|
|
Best of Penetration Testing Tools |

28.04.2009, 12:34
|
|
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
Провел на форуме: 1781065
Репутация:
869
|
|
Best of Penetration Testing Tools
Best of Penetration Testing Tools
Larry, John, and Paul will explore the "Best Of" security tools. Part I will cover the best of network penetration testing tools. Six tools in total will be discussed, including a tip, trick, and/or use case for each one! Come learn about Nmap's IPv6 scanning, Cain & Abel's VoIP functionality, and much more!
1) Nmap - Worlds Best Port Scanner
2) Nessus - Vulnerability Scanner
3) Metasploit - Exploit framework
4) Pass-The-Hash - Who needs passwords?
5) Hydra - Brute force password guessing
6) Cain & Abel - The ultimate MITM utility
7) Spotlight - Core IMPACT.
http://pauldotcom.com/TriplePlay-Net...stingTools.pdf
|
|
|
Automatic creation of SQL injection and cross-site scripting attacks |

18.06.2009, 20:08
|
|
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
Провел на форуме: 1781065
Репутация:
869
|
|
Automatic creation of SQL injection and cross-site scripting attacks
Automatic creation of SQL injection and cross-site scripting attacks
This paper presents an automatic technique for creating inputs that expose SQLI and XSS vulnerabilities. The technique generates sample inputs, symbolically tracks taints through execution (including through database accesses), and mutates the inputs to produce concrete exploits. Ours is the first analysis of which we are aware that precisely addresses second-order XSS attacks.
Our technique creates real attack vectors, has few false positives, incurs no runtime overhead for the deployed application, works without requiring modification of application code, and handles dynamic programming-language constructs. We implemented the technique for PHP, in a tool Ardilla. We evaluated Ardilla on five PHP applications and found 68 previously unknown vulnerabilities (23 SQLI, 33 first-order XSS, and 12 second-order XSS).
Download PDF
http://www.cs.washington.edu/homes/m...-abstract.html
|
|
|
|
 |
|
|
Здесь присутствуют: 1 (пользователей: 0 , гостей: 1)
|
|
|
|