虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Exploits

  • I. Introduction This code Exploits a previously undisclosed vulnerability in the bit string deco

    I. Introduction This code Exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1

    标签: I. vulnerability Introduction undisclosed

    上传时间: 2015-05-15

    上传用户:xhz1993

  • win32缓冲区溢出实战。原文:Intro to Win32 Exploits。从漏洞发现到漏洞调试和漏洞利用。

    win32缓冲区溢出实战。原文:Intro to Win32 Exploits。从漏洞发现到漏洞调试和漏洞利用。

    标签: Exploits Intro 32 win

    上传时间: 2015-07-14

    上传用户:坏坏的华仔

  • 堆溢出全面介绍 Reliable Windows Heap Exploits

    堆溢出全面介绍 Reliable Windows Heap Exploits

    标签: Reliable Exploits Windows Heap

    上传时间: 2013-12-15

    上传用户:wfeel

  • Really Hacking SQL A Power Point Presentation on hacking SQL and Exploits

    Really Hacking SQL A Power Point Presentation on hacking SQL and Exploits

    标签: Presentation SQL Exploits Hacking

    上传时间: 2017-08-26

    上传用户:515414293

  • Physical Layer Security in Wireless Communications

    The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security Exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.

    标签: Communications Physical Security Wireless Layer in

    上传时间: 2020-05-31

    上传用户:shancjb

  • Feedback Control Theory

    Striking developments have taken place since 1980 in feedback control theory. The subject has be- come both more rigorous and more applicable. The rigor is not for its own sake, but rather that even in an engineering discipline rigor can lead to clarity and to methodical solutions to problems. The applicability is a consequence both of new problem formulations and new mathematical solutions to these problems. Moreover, computers and software have changed the way engineering design is done. These developments suggest a fresh presentation of the subject, one that Exploits these new developments while emphasizing their connection with classical control.

    标签: Feedback Control Theory

    上传时间: 2020-06-10

    上传用户:shancjb