欢迎信息安全界的朋友!黑站、挂马的勿扰!只做基础理论研究。交流IDS、IPS、buffer overflow、内核编程 、sniffer,技术共享!
. . . . .
. . .
'BBNNNN . .
N . . .
N . . .
N. . .
N . . . N . NN
B . NN. NN
NN . . BN NN
N . . . . . ND. NN
N. . .. . NN . NN
N .. . NB NN
N B. . NN. NN
N . NN NB . NN
NNNBNNNN B . N. NN
N . .N NN
. N . N. NN
.N . . . . N . . BN ..
.. .B . . .. . . N NN . .
N NNN. B. . . N NNNNNN NNN
.. N N N N .NNNB NNN.B. BN. NBN B. B.
.B . . N NN . N N . NB NBN .N NN N N .
.NN . N NN . B .B . N N. . B N.BN.
. N N N . NN N ..B. N . N .B NN
N NN NNN N NNN N NB NNNN
. . B. BN NN . NNN NN NNNNNN. .NB N .
N N . . . . NN . N. . N
. N . . . . .B .
. D. . . . . . . N.
N . . ' . . N .
N . . . . . N .
. . . . NN .
. . N .
. . . N .
. . N. ..
. . NN .
. . . NNBNB. '
. . BNBNNNNN .
. . . . . .
. . .
CVE-2010-1297那个Adobe洞的内幕
作者:friddy 日期:2010-06-09
360本地提权webshell下测试程序
作者:friddy 日期:2010-02-02
Aurora 确定了
作者:friddy 日期:2010-01-17
大规模网页绑架转址之水落石出篇
作者:friddy 日期:2009-03-13
Command execution with a MySQL UDF
作者:friddy 日期:2009-02-03
Modern database management systems are powerful applications: they provide several instruments to interact with the underlying operating system.
On MySQL it is possible to create a User-Defined Function to execute commands on the underlying operating system. Marco Ivaldi demonstrated that some years ago. His raptor_udf2.c works well, but it has two limitations:
It is not MySQL 5.0+ compliant because it does not follow the new guidelines to create a proper UDF.
On MySQL it is possible to create a User-Defined Function to execute commands on the underlying operating system. Marco Ivaldi demonstrated that some years ago. His raptor_udf2.c works well, but it has two limitations:
It is not MySQL 5.0+ compliant because it does not follow the new guidelines to create a proper UDF.
关于MS08067的效率问题
作者:friddy 日期:2008-10-29
MS08067补丁前后比较分析结果
作者:friddy 日期:2008-10-24
MS08-067: Server 服务中的漏洞可能允许远程代码执行
http://www.microsoft.com/china/technet/security/bulletin/MS08-067.mspx
这条更新为重要,可以说与当年的冲击波类似。上午我对补丁前后分析,定位到微软修改过的函数结果如下:
发生缓冲区溢出的函数:
http://www.microsoft.com/china/technet/security/bulletin/MS08-067.mspx
这条更新为重要,可以说与当年的冲击波类似。上午我对补丁前后分析,定位到微软修改过的函数结果如下:
发生缓冲区溢出的函数:
MS08066本地权限提升漏洞exploit
作者:friddy 日期:2008-10-16
#Thanks to SoBeIt
#Original URL:http://www.whitecell.org/forums/viewthread.php?tid=796
#include <stdio.h>
#include <winsock2.h>
#include <windows.h>
#Original URL:http://www.whitecell.org/forums/viewthread.php?tid=796
#include <stdio.h>
#include <winsock2.h>
#include <windows.h>







