«
Expand/Collapse
55 items tagged "stream"
Related tags:
mini stream ripper [+],
service vulnerability [+],
denial of service [+],
converter [+],
ripper [+],
component [+],
buffer overflow vulnerability [+],
scandir [+],
ripper 2 [+],
mini [+],
code execution [+],
buffer [+],
vulnerability [+],
hacks [+],
unsuspecting victim [+],
stream recorder [+],
stack buffer [+],
shadow [+],
recorder [+],
pls file [+],
overflow [+],
m3u file [+],
exploit [+],
dep [+],
buffer overflow exploit [+],
based buffer overflow [+],
video [+],
svq [+],
stream service [+],
stream ciphers [+],
provisioning services [+],
provisioning [+],
php versions [+],
mops [+],
local buffer overflow [+],
local [+],
ffmpeg [+],
citrix [+],
chaos communication congress [+],
audio [+],
arduino [+],
xbmc [+],
wep wpa [+],
way [+],
vlc [+],
universal [+],
txt [+],
translation [+],
tor e. bjrstad [+],
tony hoang [+],
stream music [+],
stream down [+],
stepper motors [+],
stack overflow [+],
squeezebox [+],
speakers [+],
sahana [+],
safer use [+],
radios [+],
prototyping platform [+],
privacy event [+],
portable [+],
pdf [+],
pc. it [+],
office case [+],
office [+],
naima [+],
music [+],
mms [+],
misuse [+],
jahresrckblick [+],
home [+],
hoang [+],
forensic approach [+],
fnord [+],
eric filiol [+],
entertainment [+],
encryption [+],
digital [+],
consumption [+],
collection [+],
code [+],
cocsoft [+],
cnc [+],
clamav [+],
centralized location [+],
bet [+],
authentication [+],
aslr [+],
apple quicktime [+],
buffer overflow [+],
php [+],
rm mp [+],
exploits [+]
-
-
13:47
»
Hack a Day
We’d bet that most readers stream video as the lion’s share of their entertainment consumption. It’s getting easier and easier thanks to great platforms like XBMC, but not everything is available in one place, which can be a bit off-putting. [Tony Hoang] is trying to simplify his viewing experience by creating one remote to rule [...]
-
-
21:29
»
SecDocs
Authors:
Tor E. Bjørstad Tags:
cryptography Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: Even with "nothing to hide", we want to protect the privacy of our bits and bytes. Encryption is an important tool for this, and stream ciphers are a major class of symmetric-key encryption schemes. Algorithms such as RC4 (used in WEP/WPA, bittorrent, SSL), A5/1 (GSM telephony), E0 (bluetooth), as well as AES in counter (CTR) mode, are important examples of stream ciphers used in everyday applications.
-
-
19:09
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
7:44
»
Packet Storm Security Exploits
This Metasploit module exploits a stack based buffer overflow found in Mini-Stream RM-MP3 Converter version 3.1.2.1. The overflow is triggered when an unsuspecting victim opens the malicious PLS file.
-
7:44
»
Packet Storm Security Recent Files
This Metasploit module exploits a stack based buffer overflow found in Mini-Stream RM-MP3 Converter version 3.1.2.1. The overflow is triggered when an unsuspecting victim opens the malicious PLS file.
-
7:44
»
Packet Storm Security Misc. Files
This Metasploit module exploits a stack based buffer overflow found in Mini-Stream RM-MP3 Converter version 3.1.2.1. The overflow is triggered when an unsuspecting victim opens the malicious PLS file.
-
-
12:01
»
Hack a Day
[Rui] needed an easy way to play music in several different zones from one centralized location, but he didn’t want to run any new wiring in the process. He figured that the best way to do this would be to stream his music directly to his speakers over Ethernet. Earlier this year, he put together [...]
-
-
12:00
»
Hack a Day
[Reza Naima] has been using an Arduino as the center of his CNC setup for quite some time now. It handles three stepper motors, limiting switches, e-stop, and spindle control. The sketch he’s using allows him to stream g-code to the popular prototyping platform, freeing him from needing a dedicated PC. It’s worked so well [...]
-
-
21:05
»
SecDocs
Authors:
Eric Filiol Tags:
cryptography Event:
Black Hat EU 2010 Abstract: Despite the evergrowing use of block ciphers, stream ciphers are still widely used: satellite communications (military, diplomatic...), civilian telecommunications, software... If their intrinsic security can be considered as strong, the main drwaback lies in the high risk of key misuse wich introduces severe weaknesses, even for unconditionnally secure ciphers like the Vernam system. Such misuses are still very frequent, more than we could expect. In this talk we explain how to detect such misuses, to identify ciphertexts that are relevant to this misuse (among a huge amount of ciphertexts) and finally how to recover the underlying plaintext within minutes. This may also apply to (intendly or not) badly implemented block ciphers. To illustrate this technique, this talk will also deal with the technical cryptanalysis of encryption used in Office up to the 2003 version (RC4 based). We will focus on Word and Excel applications. The cryptanalysis has been successfully and we manage to recover more than 90% of the encrypted texts in a few seconds. The attack is based both on a pure mathematical effort AND a few basic forensic approach. In a more general cases (e.g. satellite communications), we just need to intercept ciphertexts. In the Office case, we will explain in our sense that the attack does not rely on particular weakness but in a setting that can be seriously considered and described as a possible intended trap. We will develop this concept to explain how in a more general way such trap can be built.
-
-
22:06
»
Packet Storm Security Recent Files
Month Of PHP Security - PHP uses the stream context during stream destruction, although it was already freed in the request shutdown before. PHP versions 5.2 through 5.2.13 and 5.3 through 5.3.2 are affected.
-
22:00
»
Packet Storm Security Exploits
Month Of PHP Security - PHP uses the stream context during stream destruction, although it was already freed in the request shutdown before. PHP versions 5.2 through 5.2.13 and 5.3 through 5.3.2 are affected.
-
-
6:00
»
Hack a Day
The Squeezbox media streaming systems are compact Linux WiFi enabled radios that let you stream your collection anywhere,so long as you have an AC or USB outlet nearby. But [Achim Sack] wanted to stream his collection from anywhere with no wires attached (translation). Some poking and prodding revealed a connector actually designed for a battery [...]