«
Expand/Collapse
56 items tagged "header"
Related tags:
security vulnerability [+],
perl cgi [+],
perl [+],
header values [+],
cgi [+],
http [+],
exploit [+],
code execution [+],
null character [+],
name [+],
exim [+],
dovecot [+],
crafted [+],
php [+],
openssl [+],
null pointer [+],
mime header [+],
mime [+],
range [+],
privatedisk [+],
php header [+],
joomla [+],
ipv [+],
host header [+],
host [+],
cross site scripting [+],
apache [+],
tinyproxy [+],
source mac address [+],
protocol type [+],
protocol address [+],
multiple [+],
mac [+],
ipv6 header [+],
interoperability [+],
internet draft [+],
ietf [+],
http header [+],
hacks [+],
arp [+],
Hardware [+],
zenphoto [+],
x forwarded for [+],
windows [+],
whistles [+],
weborf [+],
type [+],
tool [+],
spring [+],
splayer [+],
slides [+],
sip channel [+],
sip [+],
security authors [+],
security [+],
ruby on rails [+],
ruby [+],
routing [+],
remote file include vulnerability [+],
remote buffer overflow vulnerability [+],
remote buffer overflow [+],
referer header [+],
referer [+],
printers [+],
print [+],
pin headers [+],
pin header [+],
pin [+],
philippe biondi [+],
netvolution [+],
mybb [+],
misc [+],
microsoft windows [+],
microsoft [+],
microcontrollers [+],
machine [+],
launchpad [+],
input side [+],
hulbert [+],
html [+],
header php [+],
header ip [+],
header email [+],
fragmentation [+],
filament [+],
email [+],
don [+],
contact [+],
clearsite [+],
chris hulbert [+],
change ip [+],
change [+],
buffer overflow vulnerability [+],
biondi [+],
bedfellows [+],
asterisk [+],
arduino [+],
Programming [+],
vulnerability [+],
denial of service [+],
service vulnerability [+]
-
-
16:13
»
Packet Storm Security Exploits
This is a reverse engineered version of the exploit by ev1lut10n that triggers a denial of service condition using a vulnerability in the Range header of Apache versions 1.3.x, 2.0.64 and below and 2.2.19 and below.
-
16:13
»
Packet Storm Security Recent Files
This is a reverse engineered version of the exploit by ev1lut10n that triggers a denial of service condition using a vulnerability in the Range header of Apache versions 1.3.x, 2.0.64 and below and 2.2.19 and below.
-
16:13
»
Packet Storm Security Misc. Files
This is a reverse engineered version of the exploit by ev1lut10n that triggers a denial of service condition using a vulnerability in the Range header of Apache versions 1.3.x, 2.0.64 and below and 2.2.19 and below.
-
-
6:05
»
Hack a Day
Don’t get us wrong, printable whistles are cool and all, but these printable header shrouds make us think that filament printers like the Makerbot and RepRap might just be worth their salt. This utilitarian purpose is a departure from the souvenirs, toys, and art that we’re used to seeing from the expensive development toys tools. The six and [...]
-
-
11:01
»
Hack a Day
[Chris Hulbert] is making it easy for Arduino users to program MSP430 chips with a header file that allows you to compile Arduino sketches for the Launchpad. This makes sense, as the growing number of Arduino sketches available, and the low cost of the TI Launchpad make for a good bedfellows. It’s really wasn’t that [...]
-
-
7:39
»
Hack a Day
[Ammon Allgaier] built a tool that can break apart pin headers with a high level of precision. In the video after the break he demonstrates the built-in features. They include an adjustable stop to select the number of pins you’d like in each chopped segment. There’s also a small groove in the input side which [...]
-
-
17:00
»
Packet Storm Security Recent Files
ARP Sniff (Sniffer Lite) is a tiny ARP sniffer. This tool will be useful to analyze the ARP packets in the network. The tool gives out two types of information, the 14 byte Ethernet header and 28 byte ARP header. The tool requires G++ compiler and a libpcap package. Three arguments are coded as of now. One is to list the available devices, second is to sniff the default device and third is to sniff the device given as argument. The sniffer outputs the Ethernet header (Source MAC address, Destination MAC address and Ethernet type), ARP Header (Hardware type, Protocol type, Hardware address length, Protocol address length, Opcode, Source Hardware address and Protocol address, Destination hardware address and Protocol address).
-
17:00
»
Packet Storm Security Exploits
ARP Sniff (Sniffer Lite) is a tiny ARP sniffer. This tool will be useful to analyze the ARP packets in the network. The tool gives out two types of information, the 14 byte Ethernet header and 28 byte ARP header. The tool requires G++ compiler and a libpcap package. Three arguments are coded as of now. One is to list the available devices, second is to sniff the default device and third is to sniff the device given as argument. The sniffer outputs the Ethernet header (Source MAC address, Destination MAC address and Ethernet type), ARP Header (Hardware type, Protocol type, Hardware address length, Protocol address length, Opcode, Source Hardware address and Protocol address, Destination hardware address and Protocol address).