해킹191 728x90 Create a New User with UID 0 - ARM (Meta) # Exploit Title: Linux/ARM - Create a new user with UID 0 (MSF) # Date: 2010-11-25 # Author: Jonathan Salwan - twitter @shell_storm # Tested on: ARM926EJ-S rev 5 (v5l) # Issue link: https://metasploit.com/redmine/issues/3254 ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for mor.. 2010. 12. 9. Stuxnet Redux: Questions and Answers Stuxnet continues to be a hot topic. Here's an updated set of Questions and Answers on it. Q: What is Stuxnet? A: It's a Windows worm, spreading via USB sticks. Once inside an organization, it can also spread by copying itself to network shares if they have weak passwords. Q: Can it spread via other USB devices? A: Sure, it can spread anything that you can mount as a drive. Like a USB hard drive.. 2010. 11. 29. Hash Cracking tutorial with HashCat HashCat is a tool for cracking various types of hash. This tool can do more than one Hash cracking, which means we can put some hashes into a file.txt and it crack the hashes simultaneously. we can do offline cracking hashes (it means we don`t need an Internet connection that uses the hash databases that have been cracked before). the hash algorithm supported by this tool include: * MD5 * Md5 ($.. 2010. 11. 22. Tracking the IMDDOS Botnet For the compelete report on the IMDDOS Botnet, Tracking the Global Growth of the IMDDOS BotnetThe newly discovered IMDDOS Botnet is a commercial DDoS service. The botnet grew large very quickly. Beginning testing in April 2010, it reached a production peak activity by the second week of August of 25,000 unique recursive DNS lookups/hour to the command-and-control (CnC) servers. This paper detail.. 2010. 9. 17. Password Patterns In December 2009, a critical data breach in the Internet has been experienced. Around 32 million user passwords of rockyou.com web portal was stolen by a hacker which had used SQL injection for his attack. He got all passwords and made them anonymously (i.e. without usernames) available in the Internet to download. Security experts started analyzing the passwords and Imperva released a study reg.. 2010. 9. 16. 이전 1 ··· 18 19 20 21 22 23 24 ··· 39 다음 728x90 728x90