«
Expand/Collapse
92 items tagged "alpha"
Related tags:
txt [+],
sql injection [+],
site [+],
alpha cross [+],
shell [+],
denial of service [+],
alpha1 [+],
server [+],
dolibarr [+],
cross site scripting [+],
inclusion [+],
version [+],
php shell [+],
php [+],
omnicom [+],
knull [+],
alpha 2 [+],
Support [+],
yaqas [+],
whcms [+],
web root [+],
version 6 [+],
upload [+],
traversal [+],
source [+],
service [+],
server version [+],
scripting [+],
rootage [+],
request [+],
record management services [+],
proof of concept [+],
potential security vulnerability [+],
open source [+],
network node manager [+],
neobill [+],
materiel [+],
lpd [+],
local [+],
injection [+],
information disclosure vulnerability [+],
information [+],
httpd server [+],
httpd [+],
forgery [+],
exe [+],
drupal [+],
directory traversal vulnerability [+],
directory [+],
digitalus [+],
denial of service exploit [+],
denial [+],
data [+],
code [+],
caedo [+],
buffer [+],
bbcode [+],
based buffer overflow [+],
avipreview [+],
avi file [+],
arbitrary code execution [+],
apprain [+],
alpha sql [+],
alpha remote [+],
alpha platforms [+],
alpha directory [+],
vulnerability [+],
xss [+],
wireless extensions [+],
wendy [+],
usb [+],
unicode [+],
toni [+],
tomatocart [+],
svn [+],
sven behnke [+],
sql [+],
spherecms [+],
security [+],
script [+],
ruby [+],
root hub [+],
root [+],
port scanning [+],
port [+],
poc [+],
player [+],
miranda [+],
lisbon [+],
kismet [+],
joomla [+],
johnnie [+],
john [+],
humanoid [+],
hpsbov [+],
file [+],
crash [+],
communication [+],
classifieds [+],
chipset driver [+],
chaos communication congress [+],
body [+],
badass [+],
BackTrack [+],
wifi [+],
web manager [+],
web applications [+],
web [+],
watt [+],
vulnerabilities [+],
usb wireless [+],
tandy color computer [+],
sutton grammar school [+],
sr 1 [+],
service vulnerability [+],
rms [+],
remote shell [+],
remote [+],
record [+],
read [+],
powiesys [+],
pdf [+],
parallel network [+],
openvms [+],
network [+],
namoroka [+],
mult [+],
month [+],
moaub [+],
milliwatt [+],
merci [+],
memory [+],
london [+],
login [+],
john ripper [+],
incremental mode [+],
hacks [+],
hacking [+],
game [+],
ethernet adapter [+],
ethernet [+],
disclosure [+],
creating [+],
colorful animation [+],
coco [+],
cle [+],
classic [+],
carte usb [+],
card [+],
caratteri [+],
bugtraq [+],
bruter [+],
brute forcer [+],
balloon altitude record [+],
balloon [+],
atari jaguar [+],
apex team [+],
amp [+],
amazon [+],
altitude [+],
alpha2 [+],
alpha version [+],
alpha 3 [+],
alpha [+],
aircrack [+],
adapter [+],
Wireless [+],
Tools [+],
Hardware [+],
General [+],
Angolo [+],
cms [+],
slickmsg [+],
cross [+]
-
-
16:07
»
SecDocs
Authors:
Sven Behnke Tags:
robotics Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Humanoid robots are investigated, because the human body facilitates acting in a world designed for humans, simplifies the interaction with humans, and allows for intuitive multimodal communication. They are also a tool to understand human intelligence. In the talk I will review some humanoid robot projects and introduce you to our robots Alpha, Toni, Kondo, and RoboSapien. Humanoid robots recently received a lot of attention from the media and researchers. Such robots have a human-like body plan, their sensors can perceive the same modalities as humans do, and their actions resemble human ones. In order to act successfully in a complex environment, these robots should adapt their behavior to the encountered situation, learn, and develop. In my talk, I will first motivate why humanoid robots are worth being investigated. On the one hand, motivation comes from the practical side. A human-like body is the ideal shape for a robot acting in an environment designed for humans. Stairs, doorknobs, light switches, tools, etc. are adapted to human proportions. Signs, labels, and acoustic signals target the human visual and auditory system, respectively. The advantages of humanoid robots are most obvious in the direct interaction with humans. Humans practice multimodal communication via speech, gaze direction, facial expressions, gestures, and body language from early childhood on. This interface is hence ideally suited for the communication between man and machine. Another advantage is that the human-like motion of humanoid robots is easy to predict for humans. This facilitates human-robot cooperation based on non-verbal communication. On the other hand, motivation comes from artificial intelligence (AI) research. Building intelligent artifacts is one important method for AI researchers in their quest to understand intelligence. Many researchers now believe that intelligence cannot exist without a body (Embodiment) and that it shows itself only through interaction with an environment (Situatedness). Building robots that act in complex environments allows for the grounding of symbols, which would be meaningless without this link. Robots are also used to test models of biological systems, e.g. for the navigation of desert ants. If one wants to investigate human intelligence in this way, one has to build humanoid robots. In the talk, I will introduce some humanoid robot projects. In particular, I will discuss walking robots, like Asimo und Johnnie, manipulation robots, like Wendy und Armar, and communication robots, like Kismet und Mexi. I will also report about some activities within our research project "NimbRo - Leaning Humanoid Robots". I will introduce you to Alpha, a full-scale humanoid, and Toni, a smaller biped, under construction in our lab. I will discuss mechanical design, electronics, communication, perception, behavior control, and simulation of these robots. Furthermore I will describe the commercially available robots RoboSapien and Kondo that we augmented with a Pocket PC and a camera in order to make them autonomous. Because humanoid robots are supposed to carry out a large variety of tasks, their evaluation is not easy. One possible evaluation method is the organization of competitions. In order to give you an impression of the state of the art, I will report about this year's RoboCup Humanoid League competitions, which took place in Lisbon. It will become obvious that many research problems need to be solved, before humanoid robots can be used in the real world. Among them are the development of high-performance actuators, sensors, and power supplies. A big challenge is the realization of energy-efficient dynamic walking that supports the dynamics of the system. There is a need for modular behavior control architectures that make controlling the many degrees of freedom of humanoid robots tractable. Furthermore, the integration of individual components must be done in a way that produces synergy effects, such as in audio-visual speech recognition and in active perception. Last, but not least, learning techniques need to be developed to adapt the behavior of humanoid robots to the situation at hand. These methods must be able to learn from few examples. One way to achieve quick learning is imitation. The humanoid body and human-like motion primitives simplify the mopping of observed actions to the robot. This could allow even naive users to 'program' a humanoid robot by demonstration. My talk will conclude with a speculative outlook to the future of humanoid robots. Using them as personal robots could change the way we live significantly.
-
16:07
»
SecDocs
Authors:
Sven Behnke Tags:
robotics Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Humanoid robots are investigated, because the human body facilitates acting in a world designed for humans, simplifies the interaction with humans, and allows for intuitive multimodal communication. They are also a tool to understand human intelligence. In the talk I will review some humanoid robot projects and introduce you to our robots Alpha, Toni, Kondo, and RoboSapien. Humanoid robots recently received a lot of attention from the media and researchers. Such robots have a human-like body plan, their sensors can perceive the same modalities as humans do, and their actions resemble human ones. In order to act successfully in a complex environment, these robots should adapt their behavior to the encountered situation, learn, and develop. In my talk, I will first motivate why humanoid robots are worth being investigated. On the one hand, motivation comes from the practical side. A human-like body is the ideal shape for a robot acting in an environment designed for humans. Stairs, doorknobs, light switches, tools, etc. are adapted to human proportions. Signs, labels, and acoustic signals target the human visual and auditory system, respectively. The advantages of humanoid robots are most obvious in the direct interaction with humans. Humans practice multimodal communication via speech, gaze direction, facial expressions, gestures, and body language from early childhood on. This interface is hence ideally suited for the communication between man and machine. Another advantage is that the human-like motion of humanoid robots is easy to predict for humans. This facilitates human-robot cooperation based on non-verbal communication. On the other hand, motivation comes from artificial intelligence (AI) research. Building intelligent artifacts is one important method for AI researchers in their quest to understand intelligence. Many researchers now believe that intelligence cannot exist without a body (Embodiment) and that it shows itself only through interaction with an environment (Situatedness). Building robots that act in complex environments allows for the grounding of symbols, which would be meaningless without this link. Robots are also used to test models of biological systems, e.g. for the navigation of desert ants. If one wants to investigate human intelligence in this way, one has to build humanoid robots. In the talk, I will introduce some humanoid robot projects. In particular, I will discuss walking robots, like Asimo und Johnnie, manipulation robots, like Wendy und Armar, and communication robots, like Kismet und Mexi. I will also report about some activities within our research project "NimbRo - Leaning Humanoid Robots". I will introduce you to Alpha, a full-scale humanoid, and Toni, a smaller biped, under construction in our lab. I will discuss mechanical design, electronics, communication, perception, behavior control, and simulation of these robots. Furthermore I will describe the commercially available robots RoboSapien and Kondo that we augmented with a Pocket PC and a camera in order to make them autonomous. Because humanoid robots are supposed to carry out a large variety of tasks, their evaluation is not easy. One possible evaluation method is the organization of competitions. In order to give you an impression of the state of the art, I will report about this year's RoboCup Humanoid League competitions, which took place in Lisbon. It will become obvious that many research problems need to be solved, before humanoid robots can be used in the real world. Among them are the development of high-performance actuators, sensors, and power supplies. A big challenge is the realization of energy-efficient dynamic walking that supports the dynamics of the system. There is a need for modular behavior control architectures that make controlling the many degrees of freedom of humanoid robots tractable. Furthermore, the integration of individual components must be done in a way that produces synergy effects, such as in audio-visual speech recognition and in active perception. Last, but not least, learning techniques need to be developed to adapt the behavior of humanoid robots to the situation at hand. These methods must be able to learn from few examples. One way to achieve quick learning is imitation. The humanoid body and human-like motion primitives simplify the mopping of observed actions to the robot. This could allow even naive users to 'program' a humanoid robot by demonstration. My talk will conclude with a speculative outlook to the future of humanoid robots. Using them as personal robots could change the way we live significantly.
-
-
11:00
»
Hack a Day
Retro is in the air today as [John] has tipped us off about a new game he has written for the Tandy Color Computer (CoCo), The game, inspired by the homebrew game DOWNFALL for the Atari Jaguar, features what looks like snappy game play, lots of bright colorful animation and has just entered the Alpha [...]
-
-
14:01
»
Hack a Day
At 11 AM London time, October 22, the Sutton grammar school for boys is going to be launching Apex Alpha, a high altitude amateur balloon for an attempt at the UK altitude record. Unlike a few other balloons we’ve seen, the Apex team is doing it right and giving everyone the downlink details for the [...]
-
-
6:38
»
Packet Storm Security Exploits
appRain versions 0.1.3 and 0.1.4-Alpha for both the Quick Start and Core editions suffer from multiple cross site scripting vulnerabilities.
-
-
17:06
»
Packet Storm Security Exploits
This Metasploit module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.53 prior to NNM_01203. By specifying a long 'arg' parameter when executing the 'jovgraph.exe' CGI program, an attacker can cause a stack-based buffer overflow and execute arbitrary code. The vulnerable code is within the option parsing function within "ovwebsnmpsrv.exe" with a timestamp prior to April 7th, 2010. Reaching the vulnerable code requires a 'POST' request with an 'arg' parameter that, when combined with a some static text, exceeds 10240 bytes. The parameter must begin with a dash. It is important to note that this vulnerability must be exploited by overwriting SEH. This is since overflowing the buffer with controllable data always triggers an access violation when attempting to write static text beyond the end of the stack. Exploiting this issue is a bit tricky due to a restrictive character set. In order to accomplish arbitrary code execution, a double-backward jump is used in combination with the Alpha2 encoder.
-
17:06
»
Packet Storm Security Recent Files
This Metasploit module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.53 prior to NNM_01203. By specifying a long 'arg' parameter when executing the 'jovgraph.exe' CGI program, an attacker can cause a stack-based buffer overflow and execute arbitrary code. The vulnerable code is within the option parsing function within "ovwebsnmpsrv.exe" with a timestamp prior to April 7th, 2010. Reaching the vulnerable code requires a 'POST' request with an 'arg' parameter that, when combined with a some static text, exceeds 10240 bytes. The parameter must begin with a dash. It is important to note that this vulnerability must be exploited by overwriting SEH. This is since overflowing the buffer with controllable data always triggers an access violation when attempting to write static text beyond the end of the stack. Exploiting this issue is a bit tricky due to a restrictive character set. In order to accomplish arbitrary code execution, a double-backward jump is used in combination with the Alpha2 encoder.
-
17:06
»
Packet Storm Security Misc. Files
This Metasploit module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.53 prior to NNM_01203. By specifying a long 'arg' parameter when executing the 'jovgraph.exe' CGI program, an attacker can cause a stack-based buffer overflow and execute arbitrary code. The vulnerable code is within the option parsing function within "ovwebsnmpsrv.exe" with a timestamp prior to April 7th, 2010. Reaching the vulnerable code requires a 'POST' request with an 'arg' parameter that, when combined with a some static text, exceeds 10240 bytes. The parameter must begin with a dash. It is important to note that this vulnerability must be exploited by overwriting SEH. This is since overflowing the buffer with controllable data always triggers an access violation when attempting to write static text beyond the end of the stack. Exploiting this issue is a bit tricky due to a restrictive character set. In order to accomplish arbitrary code execution, a double-backward jump is used in combination with the Alpha2 encoder.
-
-
19:00
»
Packet Storm Security Advisories
Month Of Abysssec Undisclosed Bugs - JMD-CMS versions Alpha 3.0.0.9 suffers from cross site scripting and remote shell upload vulnerabilities.
-
-
1:28
»
remote-exploit & backtrack
Bonjour, je débute dans le wifi et j’aimerai savoir si l’alpha AWUS036H 1 watt et compatible sur backtrack 3. J’aimerai également savoir si le site suivant pour acheter cette carte usb wifi est fiable : tandco.fr.
J’aimerai savoir pourquoi l’alpha 500 milliwatt est plus cher que la 1 watt. Selon ma logique sa devrai être le contraire, non ?
Merci de me répondre.
Cordialemant,
-
-
22:10
»
SecuriTeam
A potential security vulnerability has been identified with certain RMS (Record Management Services) patch kits for HP OpenVMS running on ALPHA platforms.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
4:25
»
remote-exploit & backtrack
Salve a tutti,
vorrei testare una wpa di alice a 24 caratteri sfruttando john the ripper nel " incremental mode" andando a creare nel file john.conf un mode incremental con i caratteri a me necessari.Ho gia visto nel forum di aircrack che e' necessario configuare un file di collelagamento con estensione .char esempio :
[Incremental:Alpha]
File = $JOHN/alpha.chr
MinLen = 1
MaxLen = 8
CharCount = 26
qui con questa configurazione john crea caratteri presi dal file alpha.char con lung. max di 8 e min di 1
Il mio problema e' che modificando il parametro maxlen con un valore maggiore di 8 john va in errore e non riesco neanche ad aprire il file alpha.chr.Sempre sul forum di aircrack dice anche di dover modificare il file john.pot ma non dice come.Sicuro del vostro aiuto vi ringrazio anticipatamente.
-
-
23:00
»
Packet Storm Security Recent Files
HP Security Bulletin - A potential security vulnerability has been identified with certain RMS (Record Management Services) patch kits for HP OpenVMS running on ALPHA platforms. The vulnerability could be locally exploited resulting in an escalation of privilege.
-
23:00
»
Packet Storm Security Advisories
HP Security Bulletin - A potential security vulnerability has been identified with certain RMS (Record Management Services) patch kits for HP OpenVMS running on ALPHA platforms. The vulnerability could be locally exploited resulting in an escalation of privilege.
-
-
8:44
»
remote-exploit & backtrack
I am deciding on which wifi card I should get. Either the 500mw or the 1000mw alpa networking booster card. Anyone here tried either cards. I search the forum and saw that some people were using the 500mw but want I to know if anyone has experienced better performance with the 1000mw or even the 2000mw adapter card?
Thanks
1. 500mw amazon.com/Adapter-Wardriving-Extension-Strongest-Market/dp/B000QYGNKQ/ref=dp_cp_ob_e_title_3?ie=UTF8&qid=1264171727&sr=8-1]Amazon.com:[/url] USB 500mW WiFI Adapter for Wardriving & Range Extension *Strongest on the Market*: Electronics
2. 1000mv amazon.com/Wireless-Original-Alfa-9dBi-Strongest/dp/B001O9X9EU/ref=sr_1_1?ie=UTF8&s=electronics&qid=1264434130&sr =1-1-spell]Amazon.com:[/url] 1000mW 1W 802.11b/g USB Wireless WiFi Network Adapter With Original Alfa Screw-On Swivel 9dBi Rubber Antenna *Strongest on the Market*: Electronics
-
-
4:03
»
remote-exploit & backtrack
MERCI AUX MODOS DE SUPPRIMER CE POST cause : DOUBLE POST
Bonjour à tous et bravo pour ce forum que je lis depuis qlqs semaines déjà;
j'ai un dell vostro 1520 et une cle Alfa AWUS036EH RTL8187L. Avec BT4 avec un clé wifi AWUS036EH RTL8187L en VMware (image telecharger sur le site officiel)
BT4 se lance bien en revanche ne detecte pas ma cle Alpha. je lance les commandes suivante :
root@bt:~# iwconfig
lo no wireless extensions.
eth0 no wireless extensions.
root@bt:~# lsusb
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
root@bt:~# airmon-ng
Interface Chipset Driver
bon rien...; je telecharger et j'install un driver et le patch, ca ne marche pas, j'en install un autre (telecharger sur un tuto d'air crack) la commande make passe bien donc pour moi le drivers est installé mais toujours rien dans iwcondif et airmon
voila, donc la je suis un peu perdu, je pense que le controleur usb n'est peut etre pas reconnu.....?
auriez vous une piste svp !!! :)
merci d'avance et bon dimanche !
-
4:03
»
remote-exploit & backtrack
MERCI AUX MODOS DE SUPPRIMER CE POST cause : DOUBLE POST
Bonjour à tous et bravo pour ce forum que je lis depuis qlqs semaines déjà;
j'ai un dell vostro 1520 et une cle Alfa AWUS036EH RTL8187L. Avec BT4 avec un clé wifi AWUS036EH RTL8187L en VMware (image telecharger sur le site officiel)
BT4 se lance bien en revanche ne detecte pas ma cle Alpha. je lance les commandes suivante :
root@bt:~# iwconfig
lo no wireless extensions.
eth0 no wireless extensions.
root@bt:~# lsusb
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
root@bt:~# airmon-ng
Interface Chipset Driver
bon rien...; je telecharger et j'install un driver et le patch, ca ne marche pas, j'en install un autre (telecharger sur un tuto d'air crack) la commande make passe bien donc pour moi le drivers est installé mais toujours rien dans iwcondif et airmon
voila, donc la je suis un peu perdu, je pense que le controleur usb n'est peut etre pas reconnu.....?
auriez vous une piste svp !!! :)
merci d'avance et bon dimanche !