v3rity技术文章集

简介:

 v3rity是由David Litchfield在2010年3月 建立起来的组织,旨在解决一些IT问题。官方网站提供了一些比较有用的文章。

Papers on Oracle Forensics
Oracle Forensics Part 7: Using the Oracle System Change Number in Forensic Investigations
Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin
Oracle Forensics Part 5: Finding Evidence in the Absence of Auditing
Oracle Forensics Part 4: Live Response
Oracle Forensics Part 3: Isolating Evidence of Attacks Against the Authentication Mechanism
Oracle Forensics Part 2: Locating Dropped Objects
Oracle Forensics Part 1: Dissecting the Redo Logs

Papers on Database Security
Hacking Aurora in Oracle 11g
Exploiting PL/SQL Injection With Only CREATE SESSION Privileges in Oracle 11g 
Understanding Database Security
Exploiting PL/SQL Injection Flaws with only CREATE SESSION Privileges
Bypassing DBMS_ASSERT (in certain situations)
Lateral SQL Injection – A New Class of Vulnerability in Oracle.
Cursor Injection – A New Method for Exploiting PL/SQL Injection and Potential Defences
Cursor Snarfing – A New Class of Attack in Oracle
Oracle PL/SQL Injection (Blackhat Japan)
Threat Profiling Microsoft SQL Server
Hack Proofing Oracle Application Server
Microsoft SQL Server Passwords
Data-mining with SQL Injection and Inference
Database Servers on Windows XP and the Unintended Consequences of Simple File Sharing
Web Application Disassembly with ODBC Error Messages
Hackproofing Lotus Domino Web Server

Papers on Buffer Overflows
An Introduction to Heap overflows on AIX 5.3L
Buffer Underruns, DEP, ASLR and Improving the Exploitation Prevention Mechanisms (XPMs) on the Windows Platform
Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server
Variations in Exploit methods between Linux and Windows
Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT/2000/XP
Windows Heap Overflows
Windows 2000 Format String Vulnerabilities
Buffer Overflows on SPARC Architecture
Buffer Overflows for Beginners
Exploiting Windows NT 4.0 Buffer Overruns (A Case Study: RASMAN.EXE)











本文转hackfreer51CTO博客,原文链接:http://blog.51cto.com/pnig0s1992/573371,如需转载请自行联系原作者

相关文章
|
6月前
|
传感器
GE通用电气 IC698PSA350 PACSystem RX7i 高容量电源模块
`IC698PSA350` 是一款适用于 `PACSystem RX7i` 平台的高容量电源模块,由艾默生自动化(前 GE IP)制造。该模块支持 `85-264 VAC` 或 `100-150 VDC` 输入,最大功率 `500 W`,提供 `5 VDC`, `12 VDC`, `-12 VDC` 三路输出,总计 `350 W`。模块占用 `RX7i` 机架的 `0` 号插槽,配备状态 LED 指示灯及过温、过压保护。有两种版本(A 系列和 B 系列),内置不同类型的保险丝。模块工作频率 `47-63 Hz`,温度范围 `0-60°C`,并具有气流检测功能。安装时需确保无电连接且正确接地。
|
人工智能 自然语言处理 监控
VME172PA-652SE TRICONEX 3664 TRICONEX 3009
VME172PA-652SE TRICONEX 3664 TRICONEX 3009
39 0
|
物联网 Android开发 API
BLE(Bluetooth Low Energy)---first part
          原文地址:https://developer.android.com/guide/topics/connectivity/bluetooth-le.html#terms     (本人是技术宅,翻译时候,只要以简洁易懂为准,看过一部分后,如果感觉我翻译的不够文艺,文法,咋样咋样的,请不要往下看了,你可以去看原文了,就别在这儿浪费时间了~)      安卓4.3(api level>=18)引入了内置的平台支持低功耗设备。
995 0
[Papers]NSE, $\p_3u$, Lebesgue space [Kukavica-Ziane, JMP, 2007]
$$\bex \p_3\bbu\in L^p(0,T;L^q(\bbR^3)),\quad \frac{2}{p}+\frac{3}{q}=2,\quad \frac{9}{4}\leq q\leq 3. \eex$$
776 0
[Papers]NSE, $u_3$, Lebesgue space [Cao-Titi, IUMJ, 2008]
$$\bex u_3\in L^p(0,T;L^q(\bbR^3)),\quad \frac{2}{p}+\frac{3}{q}=\frac{2}{3}+\frac{2}{3q},\quad \frac{7}{2}
887 0
[Papers]NSE, $u_3$, Lebesgue space [Jia-Zhou, NARWA, 2014]
$$\bex u_3\in L^\infty(0,T;L^\frac{10}{3}(\bbR^3)). \eex$$
720 0
[Papers]NSE, $\p_3u$, Lebesgue space [Cao, DCDSA, 2010]
$$\bex \p_3\bbu\in L^p(0,T;L^q(\bbR^3)),\quad \frac{2}{p}+\frac{3}{q}=2,\quad \frac{27}{16}\leq q\leq \frac{5}{2}. \eex$$
772 0