Exploit

Results: 786



#Item
281C Standard Library / C dynamic memory allocation / Pwn2Own / Nim / Attack / Cyberwarfare / Exploit / Mathematics / Memory management / Computing

The Birth of a Complete IE11 Exploit Under the New Exploit Mitigations Yuki Chen Qihoo 360 Vulcan Team @guhe120

Add to Reading List

Source URL: syscan.org

Language: English
282Software testing / Computing / Open Text Corporation / Portal software / Vulnerability / Social vulnerability / Exploit / Arbitrary code execution / Attack / Cyberwarfare / Risk / Computer security

Customer Advisory At OpenText, the security and privacy of your information is our top priority. Details OpenText is aware of and has been carefully monitoring the recent news surrounding Bourne Again Shell (Bash) remote

Add to Reading List

Source URL: techsupport.gxs.com

Language: English - Date: 2014-11-05 17:42:00
283Software bugs / X86 architecture / Computer programming / Assembly languages / Computer errors / MOV / Buffer overflow / Shellcode / Stack buffer overflow / Computing / X86 instructions / Software engineering

Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:39
284Relational database management systems / Cross-platform software / Database theory / Denial-of-service attacks / Software testing / Denial-of-service attack / SQL injection / Database security / Exploit / Computing / Data management / Software

Dealing with Database Denial of Service Version 1.0 Released: August 22, 2013

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-09-04 10:20:28
285Computing / Software testing / Hacking / Exploit / Evasion / Metasploit Project / Crimeware / Vulnerability / Firewall / Computer security / Cyberwarfare / Computer network security

Microsoft Word - 2012_AB_Mapping Evasions with Maltego.docx

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-10 12:36:00
286Polymorphic code / Buffer overflow / Assembly languages / Self-modifying code / Computer programming / Shellcode / Polymorphic engine / Addressing mode / Malware / Computing / Software engineering

Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:00
287Computer network security / Software testing / Rapid7 / Metasploit Project / Penetration test / Payment Card Industry Data Security Standard / Exploit / Attack / Vulnerability / Computer security / Software / Cyberwarfare

White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing?

Add to Reading List

Source URL: www.aquion.com.au

Language: English
288Computer network security / Software testing / Metasploit Project / Shellcode / Exploit / Nmap / Netcat / Hacker / Attack / Software / Computing / Computer security

    Penetration  Testing  with  Kali  Linux  

Add to Reading List

Source URL: www.offensive-security.com

Language: English - Date: 2014-03-20 10:23:43
289Exploit / Computer crimes / Identity theft / Anti-computer forensics / Hacker / Organized crime / Computer virus / Malware / Crime / Crimeware

Crimeware on the Net The “Behind the scenes” of the new web economy Iftach Ian Amit Director, Security Research – Finjan

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:30
290Server / Computing / Computer network security / Exploit / Client–server model

Information Operations Immunity Style www.immunityinc.com Agenda ●

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
UPDATE