サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
ドラクエ3
www.skullsecurity.org
One of the worst feelings when playing a capture-the-flag challenge is the hindsight problem. You spend a few hours on a level—nothing like the amount of time I spent on cnot, not by a fraction—and realize that it was actually pretty easy. But also a brainfuck. That’s what ROP’s all about, after all! Anyway, even though I spent a lot of time working on the wrong solution (specifically, I didn’t th
You can grab the hash_extender tool on Github! (Administrative note: I'm no longer at Tenable! I left on good terms, and now I'm a consultant at Leviathan Security Group. Feel free to contact me if you need more information!) Awhile back, my friend @mogigoma and I were doing a capture-the-flag contest at https://stripe-ctf.com. One of the levels of the contest required us to perform a hash length
First and foremost: if you want to cut to the chase, just download the torrent. If you want the full story, please read on…. Background Way back when I worked at Symantec, my friend Nick wrote a blog that caused a little bit of trouble for us: Attack of the Facebook Snatchers. I was blog editor at the time, and I went through the usual sign off process and, eventually, published it. Facebook was n
Greetings! Today seemed like a fun day to write about a really cool vector for cross-site scripting I found. In my testing, this attack is pretty specific and, in some ways, useless, but I strongly suspect that, with resources I don’t have access to, this can trigger stored cross-site scripting in some pretty nasty places. But I’ll get to that! Interestingly enough, between the time that I wrote t
In Part 2: runtime analysis, we discovered some important addresses in the Energizer Trojan – specifically, the addresses that make the call to recv() data. Be sure to read that section before reading this one. Now that we have some starting addresses, we can move on to a disassembler and look at what the code’s actually doing. Fortunately, the author made no attempt to disguise the code or pack o
WARNING: Wiki content is an archive, no promise about quality! Welcome to the Skull Security Wiki! This wiki was started by Ron (also known as iago[x86], iago[vL], etc.), and is dedicated to anything that I find interesting, feel like writing about, or want to share knowledge about. Since this is a wiki, you are free to make changes, if you want to. But keep in mind that this is designed to be min
WARNING: Wiki content is an archive, no promise about quality! Password dictionaries These are dictionaries that come with tools/worms/etc, designed for cracking passwords. As far as I know, I'm not breaking any licensing agreements by mirroring them with credit; if you don't want me to host one of these files, let me know and I'll remove it. Name Compressed Uncompressed Notes
Hey all, I’m really excited to announce the first release of a tool I’ve put a lot of hard work into: dnscat. It’s being released, along with a bunch of other tools that I’ll be blogging about, as part of nbtool 0.04. What can dnscat do? dnscat was designed in the tradition of Netcat and, more recently, Ncat. Basically, it lets two hosts communicate with each other via the DNS protocol. One of my
このページを最初にブックマークしてみませんか?
『SkullSecurity』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く