Dave Aitel

Results: 4



#Item
1

The Hacker Strategy Dave Aitel Security Research

Add to Reading List

Source URL: www.immunityinc.com

Language: English - Date: 2014-11-24 09:53:28
    2Batch file / Exploit / System call / Dave Aitel / Command Prompt / Security token / Exec / Computing / Scripting languages / Shellcode

    MOSDEF Dave Aitel Immunity, Inc http://www.immunitysec.com Who am I?

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:30
    3Shellcode / Software / Command shells / Batch file / Exploit / Security token / System call / Shell / Command Prompt / Computing / Scripting languages / System software

    An Introduction to MOSDEF Dave Aitel Immunity, Inc http://www.immunitysec.com Who am I?

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:21
    4Shellcode / Computer errors / Heap overflow / Circular buffer / C dynamic memory allocation / Segmentation fault / OllyDbg / Computing / Memory management / Computer programming

    Exploiting the MSRPC Heap Overflow – Part I Dave Aitel Sep 11, 2003

    Add to Reading List

    Source URL: www.immunitysec.com

    Language: English - Date: 2012-01-03 08:49:04
    UPDATE