Exploit

Results: 786



#Item
471Hacking / Software testing / Vulnerability / Exploit / Address space layout randomization / Zero / Computer security / Cyberwarfare / Failure

Taming wild copies From hopeless crash to working exploit Taming wild copies From hopeless crash to working

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:19:46
472Antivirus software / Hacking / McAfee / Backup software / Norton 360 / Vulnerability / Fortinet / Malware / Software bug / Software / Computing / Computer security

Exploring in the Wild: A Big Data Approach to Application Security Research (and Exploit Detection) Haifei Li, Chong Xu,

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2014-03-19 04:38:18
473Software bugs / Data types / Primitive types / Assembly languages / Instruction set architectures / Buffer overflow / Pointer / Stack buffer overflow / X86 / Computing / Software engineering / Computer programming

Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis Mingwei Zhang1 , Aravind Prakash2 , Xiaolei Li1 , Zhenkai Liang1 , and Heng Yin2 1 School of Computing, National University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2012-03-21 11:17:55
474Computer network security / Software testing / Metasploit Project / Rapid7 / HD Moore / Penetration test / Exploit / Nmap / Vulnerability / Software / Computer security / System software

Rapid7 Launches New Metasploit Community Edition for Free and Simple Vulnerability Verification Building on Metasploit Framework, New Solution Provides Streamlined User Interface for Network Discovery, Module Browsing an

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2012-11-29 09:06:07
475Access token / Single sign-on / Token coin / Microsoft Windows / Architecture of Windows NT / Privilege escalation / Pass the hash / Exploit / Security token / Computer security / Cyberwarfare / Security

Security Implications of Windows Access Tokens – A Penetration Tester’s Guide By Luke Jennings 14th April 2008

Add to Reading List

Source URL: labs.mwrinfosecurity.com

Language: English - Date: 2015-04-17 06:42:07
476Software / Booting / Rootkit / Advanced Configuration and Power Interface / Power-on self-test / Intel Core / BIOS / System software / Computing

CORE SECURITY TECHNOLOGIES © 2009 Persistent BIOS Infection “The early bird catches the worm” Anibal L. Sacco (Ssr Exploit writer)

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2009-03-25 18:45:02
477Internet standards / Cross-platform software / Debian / Ubuntu / Dynamic Host Configuration Protocol / Vulnerability / Exploit / Software / Computer architecture / Computing

TECHNICALBRIEF Shellshock: A Technical Report Trend Micro Threat Research Lab Introduction

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-09-30 02:22:57
478Computer security / Spamming / Social engineering / Multi-agent systems / Malware / Vulnerability / Exploit / WordPress / Phishing / Computer network security / Cyberwarfare / Computing

State of the Web 2015: Vulnerability Report March 2015 ©2015 Menlo Security Alright Reserved

Add to Reading List

Source URL: www.menlosecurity.com

Language: English - Date: 2015-03-24 03:17:16
479Print on demand / Printer / Lightning Source / Technology / Digital press / Printing / Publishing

MDL: Always one step ahead Print on Demand Print on Demand is revolutionising the book publishing industry and MDL is working with key suppliers to allow its clients to fully exploit this technology. Publishers can:

Add to Reading List

Source URL: www.macmillandistribution.co.uk

Language: English - Date: 2015-03-20 07:42:44
480C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / Software engineering / GADGET / MOV / Shellcode / NX bit / Computing / Software bugs / Computer architecture

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
UPDATE