Phonetic attack commands crash bank phone lines

By Darren Pauli onSep 17, 2012 5:46 PM A security researcher has demonstrated a series of attacks capable of disabling touch tone and voice activated phone systems or forcing them to disclose sensitive information. In one test, a phone system run by an unnamed Indian bank had dumped customer PINs. Attacks including blind SQL injection and buffer overflows could be served to almost any interactive voice response (IVR) phone system,

pelock脱壳脚本

#log var addr msg "忽略所有异常" var iat1 var nextstop dbh //获得codebase ,codesize var cb var cs gmi eip,CODEBASE cmp $RESULT,0 je err mov cb,$RESULT gmi eip,CODESIZE cmp $RESULT,0 je err mov cs,$RESULT Check: //检查 PELock 1.0x -> Bartosz Wojcik 特征指纹 var temp mov temp,eip sub temp,5c

Linux rootkit implementation

Linux rootkit implementation Sunday, December 4, 2011 This is a rootkit i developed some time ago for educational purposes. It has the ability to hide itself from lsmod, hide processes, tcp connections, logged in users and to give uid 0 to any running process. The rootkit does not work on linux kernel >= 3.0; I′ve successfully tested it on kernels >= 2.6.26 && <= 2.6.38. The hiding

UTF-7 XSS 浅析

Author:laterain From:90sec Test on: IE 8.0 vul.php <?php header('Content-Type: text/html'); $string = $_GET["note"]; echo htmlentities($string); //用htmlentities函数过滤 ?> sec.php <?php header('Content-Type: text/html;charset=UTF-8'); $string = $_GET["note"]; echo htmlentities($string); ?> encode.php {换行符被xxoo了,请自己添加} <?php header('Content-Type: text/html;charset=UTF-8');?> <html> <head> <title>UTF-7 XSS