Shellcode

Results: 175



#Item
21The Danger of Unrandomized Code EDWAR D J . SCHWART Z Of Headless User Accounts and Restricted Shells JAN SCHAUMANN

The Danger of Unrandomized Code EDWAR D J . SCHWART Z Of Headless User Accounts and Restricted Shells JAN SCHAUMANN

Add to Reading List

Source URL: www.usenix.org

Language: English
22Injecting Shellcode Into Running VMware Guests From the Host

Injecting Shellcode Into Running VMware Guests From the Host

Add to Reading List

Source URL: www.mnin.org

Language: English - Date: 2006-08-30 23:02:58
23Killing the Myth of Cisco IOS Diversity∗ : Recent Advances in Reliable Shellcode Design Ang Cui Jatin Kataria

Killing the Myth of Cisco IOS Diversity∗ : Recent Advances in Reliable Shellcode Design Ang Cui Jatin Kataria

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:34
24So I needed to create a packed file using a particular product, however the company’s website is offline and their utility is

So I needed to create a packed file using a particular product, however the company’s website is offline and their utility is

Add to Reading List

Source URL: www.mnin.org

Language: English - Date: 2006-08-18 13:01:11
25The shellcode basically resolves kernel32 functions, downloads, and executes xx

The shellcode basically resolves kernel32 functions, downloads, and executes xx

Add to Reading List

Source URL: www.mnin.org

Language: English - Date: 2007-03-30 15:11:52
26Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:39
27WOMBAT:	
  a	
  Worldwide	
  Observatory	
  	
   of	
  Malicious	
  Behaviors	
  and	
  A;ack	
  Threats	
   Corrado	
  Leita	
   Symantec	
  Research	
  Labs	
   WOMBAT	
  

WOMBAT:  a  Worldwide  Observatory     of  Malicious  Behaviors  and  A;ack  Threats   Corrado  Leita   Symantec  Research  Labs   WOMBAT  

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:51
28Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:00
29   	
   Penetration	
  Testing	
  with	
  Kali	
  Linux	
  

    Penetration  Testing  with  Kali  Linux  

Add to Reading List

Source URL: www.offensive-security.com

Language: English - Date: 2014-03-20 10:23:43
30Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28