User Tools

Site Tools


exploit

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
exploit [2011/08/19 13:02] – [Two-staged l0dable exploit (unfinished)] nitramexploit [2011/08/19 13:38] (current) – [The Keys] nitram
Line 94: Line 94:
 Thus it's possible to send l0dables (*.c0d). Thus it's possible to send l0dables (*.c0d).
 This could be an option for remote exploits, when combining with other vectors. This could be an option for remote exploits, when combining with other vectors.
 +
 +**Countermeasure:** Extra check the incoming meta data and create only valid VCARD files.
 ====== Two-staged l0dable exploit (unfinished) ====== ====== Two-staged l0dable exploit (unfinished) ======
 We didn't were scared about the [[http://en.wikipedia.org/wiki/XXTEA|XXTEA]] crypto algorithm which We didn't were scared about the [[http://en.wikipedia.org/wiki/XXTEA|XXTEA]] crypto algorithm which
exploit.1313751745.txt.gz · Last modified: by nitram

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki