«
Expand/Collapse
97 items tagged "proof"
Related tags:
proof of concept [+],
crash proof [+],
zip [+],
txt [+],
php [+],
poc [+],
exploit [+],
buffer overflow [+],
tgz [+],
firefox [+],
com [+],
concept [+],
xnview [+],
version 6 [+],
umplayer [+],
twitter [+],
traffic load [+],
tabnapping [+],
synergy [+],
switcharoo [+],
slimpdf [+],
rpc [+],
remote proof [+],
remarkable extent [+],
reflection [+],
reader [+],
portable [+],
playlist [+],
planting [+],
password [+],
overflows [+],
opera [+],
nokia [+],
mouse movements [+],
minimal effort [+],
memory limit [+],
memory [+],
manager rpc [+],
man in the middle attack [+],
m3u playlist [+],
keystrokes [+],
javascript [+],
injection [+],
information leaks [+],
image swap [+],
human cognitive abilities [+],
hp ux [+],
history objects [+],
history [+],
hash collision [+],
hack in the box [+],
google [+],
free proof [+],
file [+],
execution [+],
eregi [+],
drupal [+],
disclosure [+],
cmsd [+],
clickit [+],
chunk [+],
chrome [+],
camera [+],
api [+],
amsterdam [+],
activity [+],
zip proof [+],
world writable [+],
webraider [+],
usn [+],
udev [+],
stack overflow [+],
shell out [+],
scanner service [+],
reverberation [+],
quality tool [+],
pcbsd [+],
overwrite [+],
nsopoc [+],
ninga [+],
nautilus [+],
microsoft windows [+],
malware [+],
lighttpd [+],
integer overflow vulnerability [+],
echo servers [+],
cve [+],
crimson editor [+],
buffer overflow vulnerability [+],
adobe acrobat [+],
x kernel [+],
water proof [+],
wap [+],
von neumann [+],
video [+],
ultrasonic sensors [+],
sql [+],
smartphones [+],
scott kelly [+],
routers [+],
root [+],
robots [+],
panic [+],
number [+],
myths and legends [+],
modern cars [+],
mac os x [+],
mac os [+],
kernel panic [+],
john von neumann [+],
isp [+],
implosion [+],
harvesting [+],
hacks [+],
full disclosure [+],
dr. john von neumann [+],
dr john von neumann [+],
design [+],
crash [+],
chaos communication camp [+],
cast design [+],
binary [+],
array [+],
afd [+],
Newbie [+],
Area [+],
denial of service [+],
vulnerability [+]
-
-
10:22
»
Packet Storm Security Exploits
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
-
10:22
»
Packet Storm Security Recent Files
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
-
10:22
»
Packet Storm Security Misc. Files
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
-
-
10:19
»
SecDocs
Tags:
engineering Event:
Chaos Communication Camp 2007 Abstract: John von Neumann is considered one of the greatest and most influential mathematicians of the 20th century, one of the men who invented computers. This audio feature captures his life in a live spoken-word visual performance. Dr. John von Neumann, a witty, plump Hungarian, was a brilliant mathematician, a computer pioneer, and the founder of game theory whom nobody hesitated to call a genius. He was known as great fun at parties, once drank fifteen vodka martinis in a single evening as a kind of experiment. But he also brought the first computers to Los Alamos, and his machines were promptly put to work on calculations of implosion. Von Neumann made important contributions to the development of the atomic and hydrogen bomb, calculated that implosion was indeed feasible. The legendary scientist became a consultant, served on the Atomic Energy Commission from 1954 to his death 1957.
-
-
12:31
»
Packet Storm Security Exploits
This is a proof of concept exploit for the vulnerability documented in MS11-046 for the Microsoft Windows Ancillary Function Driver (AFD).
-
-
21:57
»
Packet Storm Security Exploits
This file documents a proof of concept to demonstrate the cross site scripting vulnerability in the Drupal Activity module version 6.x.
-
-
15:37
»
Packet Storm Security Exploits
This proof of concept demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker.
-
15:37
»
Packet Storm Security Recent Files
This proof of concept demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker.
-
15:37
»
Packet Storm Security Misc. Files
This proof of concept demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker.
-
-
7:54
»
Packet Storm Security Exploits
This proof of concept exploit sets permissions to 444 on an arbitrary file specified as an argument by leveraging SIGSTOP/SIGCONT signals and the Inotify API to win a race condition in X.
-
7:54
»
Packet Storm Security Recent Files
This proof of concept exploit sets permissions to 444 on an arbitrary file specified as an argument by leveraging SIGSTOP/SIGCONT signals and the Inotify API to win a race condition in X.
-
7:54
»
Packet Storm Security Misc. Files
This proof of concept exploit sets permissions to 444 on an arbitrary file specified as an argument by leveraging SIGSTOP/SIGCONT signals and the Inotify API to win a race condition in X.
-
-
17:48
»
Packet Storm Security Exploits
JavaScript allows you to exploit human cognitive abilities to a remarkable extent; tools such as window positioning, history.forward() and history.back(), open some scary possibilities that we are completely unprepared to deal with. This proof-of-concept aims to demonstrate this; while it is intentionally crude and makes no real effort to conceal its operation, the transitions can be made seamless and very difficult to perceive. Very accurate click prediction can be achieved by carefully measuring mouse velocity and distance to destination, too.
-
17:48
»
Packet Storm Security Recent Files
JavaScript allows you to exploit human cognitive abilities to a remarkable extent; tools such as window positioning, history.forward() and history.back(), open some scary possibilities that we are completely unprepared to deal with. This proof-of-concept aims to demonstrate this; while it is intentionally crude and makes no real effort to conceal its operation, the transitions can be made seamless and very difficult to perceive. Very accurate click prediction can be achieved by carefully measuring mouse velocity and distance to destination, too.
-
17:48
»
Packet Storm Security Misc. Files
JavaScript allows you to exploit human cognitive abilities to a remarkable extent; tools such as window positioning, history.forward() and history.back(), open some scary possibilities that we are completely unprepared to deal with. This proof-of-concept aims to demonstrate this; while it is intentionally crude and makes no real effort to conceal its operation, the transitions can be made seamless and very difficult to perceive. Very accurate click prediction can be achieved by carefully measuring mouse velocity and distance to destination, too.
-
-
8:52
»
Packet Storm Security Exploits
It seems that relatively few people realize that holding a JavaScript handle to another window allows the attacker to tamper with the location and history objects at will, largely bypassing the usual SOP controls. With some minimal effort and the help of data: / javascript: URLs or precached pages, this can be leveraged to replace content in a manner that will likely escape even fairly attentive users.
-
8:52
»
Packet Storm Security Recent Files
It seems that relatively few people realize that holding a JavaScript handle to another window allows the attacker to tamper with the location and history objects at will, largely bypassing the usual SOP controls. With some minimal effort and the help of data: / javascript: URLs or precached pages, this can be leveraged to replace content in a manner that will likely escape even fairly attentive users.
-
8:52
»
Packet Storm Security Misc. Files
It seems that relatively few people realize that holding a JavaScript handle to another window allows the attacker to tamper with the location and history objects at will, largely bypassing the usual SOP controls. With some minimal effort and the help of data: / javascript: URLs or precached pages, this can be leveraged to replace content in a manner that will likely escape even fairly attentive users.
-
-
10:32
»
Packet Storm Security Exploits
This is proof of concept chunk of javascript code that demonstrates the tabnapping phishing vulnerability that works across multiple browsers.
-
10:32
»
Packet Storm Security Misc. Files
This is proof of concept chunk of javascript code that demonstrates the tabnapping phishing vulnerability that works across multiple browsers.
-
-
13:04
»
Hack a Day
With many modern cars coming equipped with an array of ultrasonic sensors mounted in the bumpers, it stands to reason that many junk yards have them too. [jimk3038] points out that, unless they’re crushed, they’re probably good. The list of features on these is pretty long, including being short proof, water proof, EMF proof and [...]
-
19:00
»
Packet Storm Security Exploits
Local proof of concept exploit that demonstrates a vulnerability with mountall where a udev rule is created with world-writable permissions.
-
-
15:01
»
Packet Storm Security Recent Files
Two working proof of concept exploits for a stack overflow in Ghostscript. One works against PCBSD exploiting the vulnerability through CUPS. The other creates a .ps file that will trigger the vulnerability.
-
15:01
»
Packet Storm Security Exploits
Two working proof of concept exploits for a stack overflow in Ghostscript. One works against PCBSD exploiting the vulnerability through CUPS. The other creates a .ps file that will trigger the vulnerability.
-
-
14:50
»
Packet Storm Security Recent Files
Crimson Editor version 3.70 SEH overwrite proof of concept exploit. This is the second proof of concept by the same author for this vulnerability.
-
14:49
»
Packet Storm Security Exploits
Crimson Editor version 3.70 SEH overwrite proof of concept exploit. This is the second proof of concept by the same author for this vulnerability.
-
-
19:43
»
Packet Storm Security Tools
WebRaider is a proof of concept quality tool to get a reverse shell out of SQL injection (MS-SQL) by using One Click Ownage.
-
-
10:51
»
remote-exploit & backtrack
here in the UK, I know that most ISP ship routers with Pre loaded sercurity..
most of which use pw of 8 char. in the form,number letter number ie1a2b3cd So does anyone know of a premade dictionary that i could run Aircrack -NG against that... this is just to prove a point