conference.hitb.nl
HITBSecConf2005 - Bahrain » Main Page
http://conference.hitb.nl/hitbsecconf2005
THIS PAGE IS NOW CLOSED. THIS PAGE IS NO LONGER BEING UPDATED. Posted by Administrator @ 2005-06-26 10:23 am. Photos and Presentation Slides. Well we’re back from HITBSecConf2005 Bahrain and the photos from the event are available online at http:/ photos.hackinthebox.org/. On behalf of the HITB Crew, we wish to express our heartfelt gratitude to all the speakers and sponsors who supported us for this conference! We will also be putting the presentation slides online in the coming days. The following pres...
conference.hackinthebox.nl
HITBSecConf2005 - Malaysia » Main Page
http://conference.hackinthebox.nl/hitbsecconf2005kl
Capture the flag (CTF). Open source security project showcase. Conference presentation materials have been released. You can download them from Packet Storm. THIS PAGE IS CLOSED. Filed under: Main Page. 8212; Administrator @ 1:41 pm. May 4, 2006. This site is no longer being updated. Please click here. To go to our latest conference page. HITBSecConf2005 - Conference Agenda Released. Filed under: Main Page. 8212; Administrator @ 3:40 pm. August 10, 2005. The 2-day Dual-Track security conference agenda.
conference.hitb.nl
HITBSecConf2005 - Malaysia » Main Page
http://conference.hitb.nl/hitbsecconf2005kl
Capture the flag (CTF). Open source security project showcase. Conference presentation materials have been released. You can download them from Packet Storm. THIS PAGE IS CLOSED. Filed under: Main Page. 8212; Administrator @ 1:41 pm. May 4, 2006. This site is no longer being updated. Please click here. To go to our latest conference page. HITBSecConf2005 - Conference Agenda Released. Filed under: Main Page. 8212; Administrator @ 3:40 pm. August 10, 2005. The 2-day Dual-Track security conference agenda.
xfocus.net
安全焦点::安全文摘
http://www.xfocus.net/articles
构造无人之境: Exploiting Realtek RTL8139单芯片以太网控制器. Windows XP 核心驱动 AFD.sys 本地权限提升漏洞分析(ms08066). 抒写Linux 2.6.x下内核级后门程序. Windows 内核漏洞 ms08025 分析. ObjectType HOOK干涉注册表操作(bypass Icesword,gmer,NIAP,etc.). Abnormal Traffic Detection and Alert.
xfocus.net
Windows XP 核心驱动 AFD.sys 本地权限提升漏洞分析(ms08066)
http://www.xfocus.net/articles/200810/986.html
Windows XP 核心驱动 AFD.sys 本地权限提升漏洞分析(ms08066). Sinister at whitecell.org). Homepage: http:/ www.whitecell.org. AfdGetRemoteAddress 中,当传入的第7个参数为 0 的时候,ProbeForWrite的检查形同虚设了。 注意第六个参数 PVOID Address, 它是由 Irp- UserBuffer 传入的,而 SIZE T Length 为. OutputBufferLength,那么如果在 DeviceIoControl 中的 OutputBuffer 设置成内核需要写. 的地址,OutputBufferLength 设置为 0,并设置正确的 IoDeviceCode 即可触发这个漏洞. PAGE:00017D17 ; int stdcall AfdGetRemoteAddress(int,int,char,int,int,PVOID Address,SIZE T Length,int). PAGE:00017D17 var 24 = dword ptr -24h.
conference.hackinthebox.nl
HITBSecConf2005 - Bahrain » Main Page
http://conference.hackinthebox.nl/hitbsecconf2005
THIS PAGE IS NOW CLOSED. THIS PAGE IS NO LONGER BEING UPDATED. Posted by Administrator @ 2005-06-26 10:23 am. Photos and Presentation Slides. Well we’re back from HITBSecConf2005 Bahrain and the photos from the event are available online at http:/ photos.hackinthebox.org/. On behalf of the HITB Crew, we wish to express our heartfelt gratitude to all the speakers and sponsors who supported us for this conference! We will also be putting the presentation slides online in the coming days. The following pres...
conference.hackinthebox.org
HITBSecConf2005 - Bahrain » Main Page
http://conference.hackinthebox.org/hitbsecconf2005
THIS PAGE IS NOW CLOSED. THIS PAGE IS NO LONGER BEING UPDATED. Posted by Administrator @ 2005-06-26 10:23 am. Photos and Presentation Slides. Well we’re back from HITBSecConf2005 Bahrain and the photos from the event are available online at http:/ photos.hackinthebox.org/. On behalf of the HITB Crew, we wish to express our heartfelt gratitude to all the speakers and sponsors who supported us for this conference! We will also be putting the presentation slides online in the coming days. The following pres...
svntrunk.wordpress.com
Before main() 分析 | keep moving
https://svntrunk.wordpress.com/2010/09/19/before-main-分析
Just another WordPress.com site. 九月 19, 2010. 作者 alert7 mailto: alert7@21cn.com alert7@xfocus.org. 主页: http:/ www.xfocus.org. 上述这部分请参考 漫谈兼容内核之八 ELF映像的装入(一) 或 linuxforum论坛上opera写的 分析ELF的加载过程. 在内核把控制权交给动态链接器 /lib/ld-2.2.4.so 的入口后,. 1 首先获取应用程序入口地址 通过调用 dl start函数 ,然后循环调用每个共享库的初始化函数,接着跳转到应用程序入口 start开始执行。 2 start例程压入一些参数到堆栈,就直接调用 libc start main函数。 3 在 libc start main函数中为动态连接器和应用程序安排destructor,并运行应用程序的初始化函数。 1) 动态链接器/lib/ld-2.2.4.so 的入口代码分析. Initial entry point code for the dynamic linker. Dl start user: n.