«
Expand/Collapse
192 items tagged "net"
Related tags:
service vulnerability [+],
injection [+],
bugtracker [+],
xmlrpc [+],
tar gz [+],
runtime [+],
nessus [+],
download reports [+],
cms [+],
web [+],
sana [+],
cross [+],
proof of concept [+],
FCC [+],
vulnerability [+],
web application [+],
vulnerabilities [+],
txt [+],
slides [+],
silverlight [+],
runtime optimization [+],
quality web design [+],
quality [+],
opc [+],
net runtime optimization service [+],
microsoft silverlight [+],
mccoy [+],
jon mccoy [+],
integer overflow vulnerability [+],
hacking [+],
cve [+],
code [+],
blogengine [+],
attackers [+],
application asp [+],
access [+],
microsoft [+],
framework [+],
wodwebserver [+],
web root [+],
ways [+],
vulnerability note [+],
unauthorized access [+],
studios [+],
site [+],
service privilege [+],
service [+],
resource [+],
net resource [+],
mono [+],
microsoft asp [+],
malicious scripts [+],
magneto [+],
integer [+],
heap [+],
hash collision [+],
hacks [+],
hacker [+],
google [+],
form [+],
exploitation technique [+],
elcom [+],
drew miller [+],
directory traversal vulnerability [+],
directory traversal [+],
directory [+],
digital [+],
denial [+],
day [+],
corruption [+],
communitymanager [+],
black hat [+],
application [+],
microsoft net framework [+],
xss [+],
windows security [+],
video [+],
usb keyboard [+],
uri spoofing [+],
unicode string [+],
tom [+],
text segment [+],
source code [+],
solution [+],
security warnings [+],
security vulnerabilities [+],
random key [+],
providers [+],
privilege escalation vulnerability [+],
poc [+],
perspective [+],
paper [+],
null byte [+],
null [+],
multiple [+],
module [+],
micro [+],
memory technique [+],
memory segment [+],
mark dowd [+],
judicial review [+],
implementation [+],
functionality of dos [+],
fez [+],
exploits [+],
execution [+],
encryption [+],
economy act [+],
dll library [+],
digital economy [+],
concept implementation [+],
computer [+],
compiler optimization [+],
clickone [+],
byte [+],
based computer [+],
arbitrary code execution [+],
application execution [+],
alexander sotirov [+],
ARM [+],
zdi [+],
zabbix [+],
worth [+],
workmen [+],
wireless bridge [+],
what is net neutrality [+],
web police [+],
walled gardens [+],
waf [+],
vote [+],
virtual method [+],
violating [+],
usa [+],
uri open [+],
trojan horse [+],
touch screen [+],
tilde [+],
thunderscan [+],
third way [+],
tech [+],
tcp [+],
talk [+],
takes [+],
stm [+],
steps [+],
steadicam [+],
stall [+],
stacey higginbotham [+],
stable version [+],
sockets [+],
snmp [+],
shut [+],
shop [+],
shah tags [+],
senator al franken [+],
security analysis tool [+],
safer use [+],
ryan kim [+],
rundown [+],
rpc [+],
route [+],
rom [+],
remote [+],
regulators [+],
read [+],
quot [+],
quick solution [+],
quick [+],
pyxis [+],
pre [+],
postpones [+],
pirate hunt [+],
pirate [+],
penetration [+],
parabolic [+],
online [+],
network [+],
net neutrality legislation [+],
natively [+],
nab mobile [+],
monopoly [+],
monitoring [+],
metropcs [+],
mesh dish [+],
memory access [+],
matthew conover [+],
maps [+],
lobbying [+],
launch [+],
land [+],
jobo [+],
internet [+],
interesting science [+],
integer overflow [+],
inheritance [+],
infrastructure [+],
india [+],
ignores [+],
hollywood [+],
hit [+],
hijack [+],
higginbotham [+],
heap corruption [+],
hash [+],
hack in the box [+],
hack [+],
h.d. moore tags [+],
gigaom [+],
fxcop [+],
framework system [+],
framework common language runtime [+],
fbi [+],
fansonline [+],
exploit [+],
europe [+],
escalation [+],
engineer [+],
encoderparameter [+],
ektron [+],
dubai [+],
dish [+],
discovery [+],
disassembling [+],
design [+],
defensecode [+],
defense tactics [+],
defends [+],
defaced [+],
d moore [+],
cross site scripting [+],
cops [+],
cooking utensils [+],
conover [+],
congress [+],
communication [+],
common language runtime [+],
close [+],
client challenge [+],
client [+],
clash [+],
chicken [+],
chaos communication congress [+],
cameras [+],
busting [+],
business owners [+],
business [+],
bugtraq [+],
barrel [+],
auto [+],
authors [+],
audio [+],
arduino [+],
al franken [+],
accused [+],
Wireless [+],
Tools [+],
HackIt [+],
Countermeasures [+],
Community [+],
net neutrality [+],
code execution [+],
sql injection [+],
information disclosure vulnerability [+],
authentication [+],
sql [+],
padding [+],
neutrality [+],
asp [+],
denial of service [+]
-
-
18:39
»
Packet Storm Security Recent Files
This paper reveals the aspects of .NET runtime encryption and presents a proof of concept implementation for Hyperion, the implementation that generates a random key and uses it to encrypt the input file with AES-128.
-
18:39
»
Packet Storm Security Misc. Files
This paper reveals the aspects of .NET runtime encryption and presents a proof of concept implementation for Hyperion, the implementation that generates a random key and uses it to encrypt the input file with AES-128.
-
-
16:00
»
SecuriTeam
Microsoft .NET Framework is prone to a vulnerability that lets attackers execute arbitrary code.
-
-
11:01
»
Hack a Day
[Tom] is doing a little show and tell with his latest .NET Micro framework based project. He managed to get a prompt-based computer running on a FEZ Cobra board. A USB keyboard serves as the input device. To give himself a familiar way to navigate and execute programs [Tom] mimicked the functionality of DOS. Above [...]
-
11:01
»
Hack a Day
[Tom] is doing a little show and tell with his latest .NET Micro framework based project. He managed to get a prompt-based computer running on a FEZ Cobra board. A USB keyboard serves as the input device. To give himself a familiar way to navigate and execute programs [Tom] mimicked the functionality of DOS. Above [...]
-
-
16:00
»
SecuriTeam
Microsoft .NET Framework is prone to a vulnerability that lets attackers execute arbitrary code.
-
-
16:00
»
SecuriTeam
The Microsoft .NET Framework is prone to a remote information-disclosure vulnerability.
-
-
16:00
»
SecuriTeam
Microsoft .NET Framework is prone to a security-bypass vulnerability.
-
-
16:00
»
SecuriTeam
Microsoft .NET Framework is prone to a remote privilege-escalation vulnerability.
-
-
9:01
»
Hack a Day
Here’s a technique that will let you use the .NET framework on an STM32 Discovery board. [Singular Engineer] was happy to learn that the .NET Micro Framework had been ported for STM32 chips. It’s doesn’t look like the port has hit a stable version yet, but these instructions will be enough to get you up [...]
-
-
20:08
»
Packet Storm Security Exploits
A vulnerability in the .Net Request Validation mechanism allows bypassing the filter and execution of malicious scripts in the browsers of users via cross site scripting attacks. The exploitation technique explained here allows sending tags through the Request Validation Filter in a manner that will pass browser syntax and be rendered by browsers.
-
20:08
»
Packet Storm Security Recent Files
A vulnerability in the .Net Request Validation mechanism allows bypassing the filter and execution of malicious scripts in the browsers of users via cross site scripting attacks. The exploitation technique explained here allows sending tags through the Request Validation Filter in a manner that will pass browser syntax and be rendered by browsers.
-
20:08
»
Packet Storm Security Misc. Files
A vulnerability in the .Net Request Validation mechanism allows bypassing the filter and execution of malicious scripts in the browsers of users via cross site scripting attacks. The exploitation technique explained here allows sending tags through the Request Validation Filter in a manner that will pass browser syntax and be rendered by browsers.
-
-
17:00
»
SecuriTeam
Microsoft .NET Framework is prone to a remote code-execution vulnerability.
-
-
17:00
»
SecuriTeam
Mono ASP.NET is prone to an information-disclosure vulnerability in the ASP.NET implementation.
-
-
17:00
»
SecuriTeam
Microsoft .NET Framework is prone to a remote code-execution vulnerability.
-
-
17:00
»
SecuriTeam
Microsoft .NET Framework is prone to a remote code-execution vulnerability.
-
17:00
»
SecuriTeam
Microsoft .NET Framework is prone to a remote code-execution vulnerability.
-
-
13:42
»
Packet Storm Security Exploits
An integer overflow vulnerability has been discovered in the EncoderParameter class of the .NET Framework. Exploiting this vulnerability results in an overflown integer that is used to allocate a buffer on the heap. After the incorrect allocation, one or more user-supplied buffers are copied in the new buffer, resulting in a corruption of the heap.
-
13:42
»
Packet Storm Security Recent Files
An integer overflow vulnerability has been discovered in the EncoderParameter class of the .NET Framework. Exploiting this vulnerability results in an overflown integer that is used to allocate a buffer on the heap. After the incorrect allocation, one or more user-supplied buffers are copied in the new buffer, resulting in a corruption of the heap.
-
13:42
»
Packet Storm Security Misc. Files
An integer overflow vulnerability has been discovered in the EncoderParameter class of the .NET Framework. Exploiting this vulnerability results in an overflown integer that is used to allocate a buffer on the heap. After the incorrect allocation, one or more user-supplied buffers are copied in the new buffer, resulting in a corruption of the heap.
-
-
18:02
»
Packet Storm Security Recent Files
A logic flaw has been found in the way .NET grants permissions to ClickOnce applications. Combined with relaxed security warnings when handling OLE Packages in Office 2007 allows for attackers to run arbitrary .NET assemblies with Full Trust permissions.
-
18:02
»
Packet Storm Security Misc. Files
A logic flaw has been found in the way .NET grants permissions to ClickOnce applications. Combined with relaxed security warnings when handling OLE Packages in Office 2007 allows for attackers to run arbitrary .NET assemblies with Full Trust permissions.
-
-
9:23
»
Packet Storm Security Recent Files
Microsoft ASP.NET Forms suffers from a null byte termination authentication bypass vulnerability that exists in the CopyStringToUnAlingnedBuffer() function of the webengine4.dll library used by the .NET framework. The unicode string length is determined using the lstrlenW function. The lstrlenW function returns the length of the string, in characters not including the terminating null character. If the unicode string containing a null byte is passed, its length is incorrectly calculated, so only characters before the null byte are copied into the buffer.
-
9:23
»
Packet Storm Security Misc. Files
Microsoft ASP.NET Forms suffers from a null byte termination authentication bypass vulnerability that exists in the CopyStringToUnAlingnedBuffer() function of the webengine4.dll library used by the .NET framework. The unicode string length is determined using the lstrlenW function. The lstrlenW function returns the length of the string, in characters not including the terminating null character. If the unicode string containing a null byte is passed, its length is incorrectly calculated, so only characters before the null byte are copied into the buffer.
-
-
7:29
»
Packet Storm Security Exploits
.NET runtime optimization service privilege escalation exploit that leverages the fact that the service's EXE file can be overwritten by any non-admin domain user and local power users. This exploit compiles to a service that uses the original service's id.
-
7:29
»
Packet Storm Security Recent Files
.NET runtime optimization service privilege escalation exploit that leverages the fact that the service's EXE file can be overwritten by any non-admin domain user and local power users. This exploit compiles to a service that uses the original service's id.
-
7:29
»
Packet Storm Security Misc. Files
.NET runtime optimization service privilege escalation exploit that leverages the fact that the service's EXE file can be overwritten by any non-admin domain user and local power users. This exploit compiles to a service that uses the original service's id.
-
-
7:02
»
Hack a Day
Pyxis 2 is a recently released new embedded operating system. The first Pyxis OS would run on an arduino with a touch screen, and provided a nice GUI. Pyxis 2 on the other hand has departed from most of its predicator, and is now made on top of the .NET micro framework, and natively supports [...]
-
-
13:38
»
SecuriTeam
Several cross-site scripting and SQL-injection vulnerabilities were found in BugTracker.NET.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
9:22
»
Packet Storm Security Exploits
BlogEngine.NET version 1.6.x suffers from path disclosure, unauthorized access, directory traversal, and file upload vulnerabilities.
-
-
13:03
»
Packet Storm Security Exploits
Elcom CommunityManager.NET suffers from an authentication bypass vulnerability. Proof of concept code is included. Version 6.7 is vulnerable.
-
13:03
»
Packet Storm Security Misc. Files
Elcom CommunityManager.NET suffers from an authentication bypass vulnerability. Proof of concept code is included. Version 6.7 is vulnerable.
-
-
7:40
»
Hack a Day
This has been circulating around the net for a bit. For those that haven’t seen it, let me just give you a quick rundown of what is happening. This guy strapped a camera to a chicken’s head. No really, that’s it. There’s some interesting science behind it though. He’s taking advantage of the Vestibulo-Ocular Reflex [...]
-
-
13:00
»
Packet Storm Security Misc. Files
Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.
-
13:00
»
Packet Storm Security Recent Files
Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.
-
-
12:21
»
remote-exploit & backtrack
I'm building a wireless bridge between two sites, i don't want to have to invest a bag of money for a dish so i am going to make my own.
i can't seem to find any suitable ones on the net so i thought i'd ask here.
can anyone suggest where i could find mesh parabolic cooking utensils on the net? needs to be mesh because it will be outside, true parabola shape and at least 10" in diameter.
Thanks. :)
-
-
20:00
»
Packet Storm Security Misc. Files
Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.
-
20:00
»
Packet Storm Security Recent Files
Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.
-
-
18:01
»
Packet Storm Security Misc. Files
Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.
-
18:00
»
Packet Storm Security Recent Files
Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.
-
-
16:32
»
Packet Storm Security Misc. Files
Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.
-
-
17:00
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability in the data binding feature of Internet Explorer. In order to execute code reliably, this module uses the .NET DLL memory technique pioneered by Alexander Sotirov and Mark Dowd. This method is used to create a fake vtable at a known location with all methods pointing to our payload. Since the .text segment of the .NET DLL is non-writable, a prefixed code stub is used to copy the payload into a new memory segment and continue execution from there.
-
17:00
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability in the data binding feature of Internet Explorer. In order to execute code reliably, this module uses the .NET DLL memory technique pioneered by Alexander Sotirov and Mark Dowd. This method is used to create a fake vtable at a known location with all methods pointing to our payload. Since the .text segment of the .NET DLL is non-writable, a prefixed code stub is used to copy the payload into a new memory segment and continue execution from there.
-
-
3:22
»
SecDocs
Authors:
Jérémie Zimmermann Tags:
net neutrality Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: Net neutrality is an essential safeguard for competition, innovation, and fundamental freedoms. The debate is high in the US with the announce of FCC non discrimination principles (even if they sound irremediably bound to the interests of Hollywood industry). In the EU, the "Telecoms Package" has been the ground of intense debates on the issue. Dangerous provisions were voted, yet a very high level of awareness was raised, giving hope into further positive outcome of the debate. Why one shall care? What one can do about it? What is Net neutrality? Why is it crucial for the future of our online societies? What is the current state of Net neutrality legislation in the EU? What campaigns from civil societies, with what results? What will be the next steps? Net neutrality has been an indispensable catalyst of competition, innovation, and fundamental freedoms in the digital environment. A neutral Internet ensures that users face no conditions limiting access to applications and services. Likewise, it rules out any discrimination against the source, destination or actual content of the information transmitted over the network. Thanks to this principle, our society collectively built the Internet as we know it today. Except in some authoritarian regimes, everyone around the globe has access to the same Internet, and even the smallest entrepreneurs are on equal footing with the leading global enterprises. Moreover, Net neutrality stimulates the virtuous circle of a development model based on the growth of a common communication network that enables new uses and tools, as opposed to one relying on investments in filtering and controlling. Only under such conditions is Internet continuously improving our societies, enhancing freedom — including the freedom of expression and communication — and allowing for more efficient and creative markets. However, Net neutrality is now under the threat of telecom operators and content industries that see business opportunities in discriminating, filtering or prioritizing information flowing through the network. All around Europe, these kind of discriminatory practices, detrimental to both consumers and innovation, are emerging. No court or regulator seems to have adequate tools to counter these behaviors and preserve the general interest. Some provisions introduced in the EU "Telecoms Package" could even encourage such practices. We who build, use and love the Internet must be aware and active to protect it.