Shellcode

Results: 175



#Item
31Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security

HITBSECCONF2009 - DUBAI CONFERENCE KIT Event Overview Venue: Sheraton Dubai Creek

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:55:03
32Computer network security / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Metasploit Project / Exploit / Conficker / Computer virus / Cyberwarfare / Computer security / Computing

Real-world Polymorphic Attack Detection Michalis Polychronakis,1 Kostas G. Anagnostakis,2 Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hellas, {mikepo, markatos}@ics.fo

Add to Reading List

Source URL: www.ics.forth.gr

Language: English - Date: 2012-03-22 09:28:01
33Cyberwarfare / Buffer overflow / Exploit / GNU Debugger / Stack / Buffer overflow protection / Shellcode / Software bugs / Computing / Computer programming

CS 395, Section 22 Introduction to Computer Systems Dinda, Fall 2001

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2003-01-31 17:41:14
34Computing / Shellcode / Kerberos / X86 / Ticket / Stack / Transmission Control Protocol / Computer network security / Computer architecture / Cyberwarfare

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28
35Systems engineering / Shellcode / Microsoft Gadgets / Stack buffer overflow / Buffer overflow / Gadget / Return-to-libc attack / Return-oriented programming / Heap spraying / Computing / Software bugs / Software quality

Size Does Matter/Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-10 08:46:40
36Chemistry / Rootkit / Shellcode / Hydrogen cyanide / Cyberwarfare / Computer security / Malware

PDF Document

Add to Reading List

Source URL: titanium.immunityinc.com

Language: English - Date: 2012-01-03 08:42:22
37Heap spraying / Address space layout randomization / Vulnerability / Buffer overflow / Shellcode / Heap feng shui / Alexander Sotirov / Exploit / Computer security / Cyberwarfare / Failure

PDF Document

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-09-16 18:43:29
38Exploit / Systems engineering / Shellcode / Principle of least privilege / Malware

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:28:32
39Computer programming / C Standard Library / Printf format string / Shellcode / Handle / Pointer / Circular buffer / Printf / C / Computing / Data types / Software engineering

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
40Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:55:03
UPDATE