Vuln Dev Mode:
(Page 34 of 75)  < Prev  29 30 31 32 33 34 35 36 37 38 39  Next >
Integer overflows 2004-04-27
integer hushmail com
Hey all,

I've been working on Gera's InsecureProgramming challenges and I stumped.
Regarding n1.c, the integer overflows, is this exploitable on Linux/x86?
I can cause a signedness error, but that's a huge amount of memory to
write and it SEGVs at the top of the stack.

Any help would been very m

[ more ]  [ reply ]
Re: unpacking UPX or PE-packed binaries 2004-04-27
Suresh Ponnusami (surya nsecure net)
Another good site is www.exetools.com
It contains almost everything for reverse engineering.
A good collection of packers, unpackers and all.
-
Suresh Ponnusami

----- Original Message -----
From: Inode
Subject: Re: unpacking UPX or PE-packed binaries

One of the most important unpacker resource..

[ more ]  [ reply ]
os/2 shellcode 2004-04-27
keratox (keratox runbox com)
Hi,

Anyone know where I can find os/2 shellcode?
Thanks

[ more ]  [ reply ]
RE: cobol language vulnerabilities 2004-04-26
Michael Wojcik (Michael Wojcik microfocus com)
> From: Kevin Partridge [mailto:kgp (at) nethere (dot) com [email concealed]]
> Sent: Thursday, April 22, 2004 9:03 PM
>
> I'm doing a paper on language issues in secure coding. ...
> I'd like to know where I could start with Cobol. I've already gotten the
> standard.

That's a very broad subject, obviously. I'm certainly no

[ more ]  [ reply ]
RE: key material 2004-04-23
Don Parker (dparker rigelksecurity com)
Hello, well as you mentioned yes the initial fill of the prng will dictate the length of
the lrs (linear recursive sequence) ie: an R6. So the initial fill of the R6 could be
like 010011. That being said you also get into maximal and non-maximal length lrs's as
well. You can also get into specifi

[ more ]  [ reply ]
RE: cobol language vulnerabilities 2004-04-23
Michael Iseyemi (MIseyemi Minacs com)
Kevin,

I am a Security professional with Cobol experience and will be glad to lend
assistance in this regard.

Thanks,
Michael

-----Original Message-----
From: Kevin Partridge [mailto:kgp (at) nethere (dot) com [email concealed]]
Sent: Thursday, April 22, 2004 9:03 PM
To: vuln-dev (at) securityfocus (dot) com [email concealed]
Subject: cobol language vul

[ more ]  [ reply ]
RE: unpacking UPX or PE-packed binaries 2004-04-23
Kayne Ian (Softlab) (Ian Kayne softlab co uk) (1 replies)
Karma,

Softice and a bit of patience. At any point, a compressed exe
must be uncompressed by the compressor stub so that it can
be properly executed.

The trick is to find the call that jumps from the stub to
the actual worm code once unpacked. There are a lot of ways
to do this, it's too long to

[ more ]  [ reply ]
Re: unpacking UPX or PE-packed binaries 2004-04-23
Clint Bodungen (clint secureconsulting com) (1 replies)
Re: unpacking UPX or PE-packed binaries 2004-04-26
Gadi Evron (ge linuxbox org) (1 replies)
Re: unpacking UPX or PE-packed binaries 2004-04-27
Clint Bodungen (clint secureconsulting com)
RNG 2004-04-23
Greg Kilford (greg_kilford hotmail com)
Hi everyone,

I was juz discussing with my pals the other day on the appropriate initial
input bit size to seed a PRNG of the structure below for it to be used to
generate the random bits for RSA key material of modulus 1024 bits or 2048
bits. Does anyone know what would be the ideal length/size

[ more ]  [ reply ]
[Rosiello Security] Negligent architecture for the assignment of the ports 2004-04-23
Angelo Rosiello (angelo rosiello org)


Probably, this could be a known problem for some system administrators(some people said it, but I couldn't find any clear mechanism relating my idea..), so this advisory is for who doesn't know the following attack.

Moreover no default possible solution is adopted by any operating system then I d

[ more ]  [ reply ]
RE: key material 2004-04-23
Greg Kilford (greg_kilford hotmail com) (2 replies)
So u are suggesting 1024/2048 bits size/length for A to seed the PRNG and
then after that the output stream O could be drawn to provide the bits for
RSA 1024/2048 bits modulo key materials generation?

A few of us are inclined towards this, but a few of my pals seem to think
weirdly. They feel t

[ more ]  [ reply ]
RE: key material 2004-04-24
David Schwartz (davids webmaster com)
RE: key material 2004-04-23
Burton M. Strauss III (BStrauss acm org)
cobol language vulnerabilities 2004-04-23
Kevin Partridge (kgp nethere com)
Hello all.

I'm wondering if anyone might be able to point me in the right
direction. I'm doing a paper on language issues in secure coding. A lot
has been written covering C/C++. And java gets good coverage for its
sandboxing. Almost no coverage of other languages exists out there. I've
found some

[ more ]  [ reply ]
unpacking UPX or PE-packed binaries 2004-04-23
Karma (steve frij com) (3 replies)
Hi List,

Just interested in how AV R&D companies unpack worms with complex UPX and PE
pack protocols.

Been trying to disect the recent Gaobot variants and getting no where with
my generic UPX-unpacker. Since this is more and more commonly used, I
thought I would be wise to consult the Lists.

Chee

[ more ]  [ reply ]
Re: unpacking UPX or PE-packed binaries 2004-04-24
Henrik Bøgh (henrik list boegh net)
Re: unpacking UPX or PE-packed binaries 2004-04-23
Gadi Evron (ge egotistical reprehensible net) (1 replies)
Re: unpacking UPX or PE-packed binaries 2004-04-23
Inode (inode mediaservice net)
Re: unpacking UPX or PE-packed binaries 2004-04-23
Blue Boar (BlueBoar thievco com) (1 replies)
Re: unpacking UPX or PE-packed binaries 2004-04-24
Gadi Evron (ge linuxbox org)
key material 2004-04-22
Greg Kilford (greg_kilford hotmail com) (1 replies)
Hi everyone,

I was juz discussing with my pals the other day on the appropriate initial
input bit size to seed a PRNG of the structure below for it to be used to
generate the random bits for RSA key material of modulus 1024 bits or 2048
bits. Anyone know what would be the ideal length/size of A

[ more ]  [ reply ]
RE: key material 2004-04-23
Burton M. Strauss III (BStrauss acm org)
Re: intercept nt/2k kernel api? 2004-04-20
auto349979 hushmail com (1 replies)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

comments inline

On Tue, 20 Apr 2004 01:50:15 -0700 "Oleg K.Artemjev" <olli (at) rbauto (dot) ru [email concealed]>
wrote:
>Hello, folks.
>
>I've mostly teoretical questions, please excuse possbile mistakes/stupidity,

> since I'm not
>using windows oftenly & I'm not a programmer,

[ more ]  [ reply ]
Re: intercept nt/2k kernel api? 2004-04-21
Roland Postle (mail blazde co uk)
Re: Windows Heap Overflow 2004-04-19
Douglas Santos (dsantos evicted org) (1 replies)
lavmarco (at) freemail (dot) it [email concealed] wrote:
> Hi all,
> Where can i gain complete information (papers, tutorial, etc..)
> about heap overflow exploitation in windows environment?

http://community.corest.com/~juliano/
http://www.immunit

[ more ]  [ reply ]
intercept nt/2k kernel api? 2004-04-20
Oleg K.Artemjev (olli rbauto ru) (1 replies)
Re: intercept nt/2k kernel api? 2004-04-20
Nicolas RUFF (lists) (ruff lists edelweb fr)
(Page 34 of 75)  < Prev  29 30 31 32 33 34 35 36 37 38 39  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus