«
Expand/Collapse
72 items tagged "concept"
Related tags:
sql [+],
cms [+],
txt [+],
sql injection [+],
exploit [+],
medya [+],
proof of concept [+],
proof [+],
xnview [+],
twitter [+],
traffic load [+],
tabnapping [+],
synergy [+],
reflection [+],
php [+],
opera [+],
mouse movements [+],
man in the middle attack [+],
keystrokes [+],
injection [+],
information leaks [+],
image swap [+],
hash collision [+],
free proof [+],
firefox [+],
file [+],
cross [+],
chunk [+],
cellphones [+],
authentication [+],
api [+],
tgz [+],
something [+],
rider [+],
reverberation [+],
prototype [+],
poc [+],
payloads [+],
overwrite [+],
nautilus [+],
microsoft windows [+],
integer overflow vulnerability [+],
gaps [+],
flexible interface [+],
echo servers [+],
digital [+],
day [+],
crimson editor [+],
buffer overflow vulnerability [+],
browser [+],
audio [+],
adobe acrobat [+],
x kernel [+],
valentin [+],
update [+],
ultimate ride [+],
transportation [+],
transparency sheets [+],
trackpad [+],
switch [+],
steampunk [+],
stair [+],
smartphone [+],
skateboard [+],
shell [+],
security [+],
sebastian [+],
robots [+],
robot [+],
richard [+],
rich decibel [+],
rfid [+],
repositories [+],
record [+],
qr code [+],
public key cryptography [+],
polarity [+],
platform [+],
physical tokens [+],
peripherals [+],
panic [+],
omnitouch [+],
multitouch [+],
misc [+],
mac os x [+],
mac os [+],
lopsided wheels [+],
lighttpd [+],
legalities [+],
lai [+],
keyboard [+],
kernel panic [+],
kequencer [+],
jdownloader [+],
iteration [+],
insight [+],
image [+],
hardware upgrade [+],
hackable [+],
flip [+],
explaination [+],
execution [+],
eric [+],
e commerce [+],
double pole [+],
dominos [+],
domino clock [+],
diy [+],
display [+],
design [+],
decibel [+],
dc motors [+],
d. probably [+],
d video [+],
cve [+],
cryptography [+],
conservative estimate [+],
commerce [+],
code [+],
clock [+],
chris harrison [+],
changing faces [+],
cellphone [+],
cell phone [+],
audio playback [+],
attention to detail [+],
apple magic [+],
angular momentum [+],
angular [+],
vulnerability [+],
hacks [+],
denial of service [+]
-
-
10:22
»
Packet Storm Security Exploits
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
-
10:22
»
Packet Storm Security Recent Files
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
-
10:22
»
Packet Storm Security Misc. Files
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
-
-
12:01
»
Hack a Day
The concept of cryptography touches our lives many times per day, and that’s probably a conservative estimate. We have a pretty good idea of how it works, having dealt with public-key cryptography for things like remote git repositories or ssh tunneling without a password. But we still enjoyed reading [Tiberiu Barbu's] primer on the subject [...]
-
-
11:01
»
Hack a Day
This skateboard concept lets you travel down stairs almost as smoothly as gliding down a hill. This seems to be the eighth iteration in [PoChih Lai's] attempts to add functionality to a board which will make it the ultimate ride for an urban outing. Check out the video after the break to see just how well [...]
-
-
10:01
»
Hack a Day
This image should look familiar to regular readers. It’s a concept that [Chris Harrison] has been working on for a while, and this hardware upgrade uses equipment which which we’re all familiar. The newest rendition, which is named the Omnitouch, uses a shoulder-mounted system for both input and output. The functionality is the same as [...]
-
-
15:01
»
Hack a Day
Here’s an interesting concept. Lets make a kit to build your own super simple cell phone. Thats basically what a group at the MIT media lab is proposing with this prototype. Consisting of an SM5100b GSM module and a 1.8″ 160×128 pixel LCD screen on a very basic board holding some buttons, this thing is [...]
-
-
12:31
»
Packet Storm Security Exploits
This is a proof of concept exploit for the vulnerability documented in MS11-046 for the Microsoft Windows Ancillary Function Driver (AFD).
-
-
10:01
»
Hack a Day
Here’s another audio playback hack that uses physical tokens to choose what you’re listening to. It uses Touchatag RFID hardware to control iTunes. The concept is very similar to the standalone Arduino jukebox we saw on Wednesday except this one interfaces with your computer and the tags select entire albums instead of just one song. [...]
-
-
10:01
»
Hack a Day
[Valentin] used a simple concept to build this auto-reversing rotating platform. The concept is extremely simple, the leads for the motor are attached to a double-pole double-throw switch which allow the polarity to be reversed. Flip the switch in one direction and it spins clockwise. Flip it in the other direction and it spins counter-clockwise. [...]
-
-
15:37
»
Packet Storm Security Exploits
This proof of concept demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker.
-
15:37
»
Packet Storm Security Recent Files
This proof of concept demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker.
-
15:37
»
Packet Storm Security Misc. Files
This proof of concept demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker.
-
-
7:54
»
Packet Storm Security Exploits
This proof of concept exploit sets permissions to 444 on an arbitrary file specified as an argument by leveraging SIGSTOP/SIGCONT signals and the Inotify API to win a race condition in X.
-
7:54
»
Packet Storm Security Recent Files
This proof of concept exploit sets permissions to 444 on an arbitrary file specified as an argument by leveraging SIGSTOP/SIGCONT signals and the Inotify API to win a race condition in X.
-
7:54
»
Packet Storm Security Misc. Files
This proof of concept exploit sets permissions to 444 on an arbitrary file specified as an argument by leveraging SIGSTOP/SIGCONT signals and the Inotify API to win a race condition in X.
-
-
10:01
»
Hack a Day
Legalities of doing something like this aside, this concept by [MadSci labs] gives some insight into how one would go about recording a 3D movie in 3D. Probably many of you have wondered if this could be done, but they took it one step further and actually made a device capable of doing just that. [...]
-
-
8:00
»
Hack a Day
[Richard] has been working on the concept of “incorporating more feeling into our digital objects”. His design is still just a concept but hopefully someone will take up the idea because we think the results would be amazing. The attention to detail in the design is impressive, the Rotary Mechanical Smartphone as he is calling [...]
-
-
10:32
»
Packet Storm Security Exploits
This is proof of concept chunk of javascript code that demonstrates the tabnapping phishing vulnerability that works across multiple browsers.
-
10:32
»
Packet Storm Security Misc. Files
This is proof of concept chunk of javascript code that demonstrates the tabnapping phishing vulnerability that works across multiple browsers.
-
-
5:00
»
Hack a Day
This concept robot uses angular momentum to roll around. You can see that on either end of the robot there are two discs which have been cut on one side to make them off-balance. For locomotion, two DC motors spin the outer discs which are not in contact with the floor. This spinning action exerts [...]
-
-
8:00
»
Hack a Day
This clock concept uses big dominos with changing faces to display the time. As far as we can tell they haven’t made it through to a finished product yet, but we loved the explaination of the engineering that went into the prototype. After the break you can watch [Eric] explain how he accomplished the design [...]
-
-
12:00
»
Hack a Day
It’s totally excellent when a simple concept results in something inspiring and fun. [Rich Decibel]‘s Kequencer is a good example, starting off as many projects do: “I had an idea the other day and I couldn’t decide if it was good or not so I just built it to find out.” Be still our hackable [...]
-
-
9:12
»
Hack a Day
This is a keyboard alternative that [Sebastian] is building from two Apple Magic Trackpads. The multitouch devices are a good platform for this because they’re designed to pick up several events at the same time. To prototype the locations of the keys he’s using printable transparency sheets. He gives you a sense of where the [...]
-
-
14:50
»
Packet Storm Security Recent Files
Crimson Editor version 3.70 SEH overwrite proof of concept exploit. This is the second proof of concept by the same author for this vulnerability.
-
14:49
»
Packet Storm Security Exploits
Crimson Editor version 3.70 SEH overwrite proof of concept exploit. This is the second proof of concept by the same author for this vulnerability.
-
-
11:49
»
Packet Storm Security Tools
Browser Rider is a hacking framework to build payloads that exploit the browser. The project aims to provide a powerful, simple and flexible interface to any client side exploit. Browser Rider is not a new concept. Similar tools such as BeEF or Backframe exploited the same concept. However most of the other existing tools out there are unmaintained, not updated and not documented. Browser Rider wants to fill those gaps by providing a better alternative.
-
11:49
»
Packet Storm Security Recent Files
Browser Rider is a hacking framework to build payloads that exploit the browser. The project aims to provide a powerful, simple and flexible interface to any client side exploit. Browser Rider is not a new concept. Similar tools such as BeEF or Backframe exploited the same concept. However most of the other existing tools out there are unmaintained, not updated and not documented. Browser Rider wants to fill those gaps by providing a better alternative.
-
-
14:00
»
Packet Storm Security Recent Files
This is a proof of concept exploit for GNOME's Nautilus file manager version 2.26.2.