v3rity技术文章集

简介:

 v3rity是由David Litchfield在2010年3月 建立起来的组织,旨在解决一些IT问题。官方网站提供了一些比较有用的文章。

Papers on Oracle Forensics
Oracle Forensics Part 7: Using the Oracle System Change Number in Forensic Investigations
Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin
Oracle Forensics Part 5: Finding Evidence in the Absence of Auditing
Oracle Forensics Part 4: Live Response
Oracle Forensics Part 3: Isolating Evidence of Attacks Against the Authentication Mechanism
Oracle Forensics Part 2: Locating Dropped Objects
Oracle Forensics Part 1: Dissecting the Redo Logs

Papers on Database Security
Hacking Aurora in Oracle 11g
Exploiting PL/SQL Injection With Only CREATE SESSION Privileges in Oracle 11g 
Understanding Database Security
Exploiting PL/SQL Injection Flaws with only CREATE SESSION Privileges
Bypassing DBMS_ASSERT (in certain situations)
Lateral SQL Injection – A New Class of Vulnerability in Oracle.
Cursor Injection – A New Method for Exploiting PL/SQL Injection and Potential Defences
Cursor Snarfing – A New Class of Attack in Oracle
Oracle PL/SQL Injection (Blackhat Japan)
Threat Profiling Microsoft SQL Server
Hack Proofing Oracle Application Server
Microsoft SQL Server Passwords
Data-mining with SQL Injection and Inference
Database Servers on Windows XP and the Unintended Consequences of Simple File Sharing
Web Application Disassembly with ODBC Error Messages
Hackproofing Lotus Domino Web Server

Papers on Buffer Overflows
An Introduction to Heap overflows on AIX 5.3L
Buffer Underruns, DEP, ASLR and Improving the Exploitation Prevention Mechanisms (XPMs) on the Windows Platform
Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server
Variations in Exploit methods between Linux and Windows
Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT/2000/XP
Windows Heap Overflows
Windows 2000 Format String Vulnerabilities
Buffer Overflows on SPARC Architecture
Buffer Overflows for Beginners
Exploiting Windows NT 4.0 Buffer Overruns (A Case Study: RASMAN.EXE)











本文转hackfreer51CTO博客,原文链接:http://blog.51cto.com/pnig0s1992/573371,如需转载请自行联系原作者

相关文章
|
开发工具 git 开发者
|
Java Docker 容器
使用 Spring Boot 构建 Docker 镜像并进行多模式部署
使用 Spring Boot 构建 Docker 镜像并进行多模式部署
641 2
|
网络协议 安全 网络安全
软考软件设计师必背100题(上)
软考软件设计师必背100题(上)
553 0
|
移动开发 JavaScript 小程序
uView Radio 单选框
uView Radio 单选框
413 0
|
Prometheus 监控 Cloud Native
Prometheus实战篇:Prometheus监控mongodb
Prometheus实战篇:Prometheus监控mongodb
|
消息中间件 Kafka Apache
Apache Doris Routine Load快速体验之案例(2)2
Apache Doris Routine Load快速体验之案例(2)2
591 0
|
Java Android开发 开发者
【Uniapp开发】APP的真机调试指南,从开发到上架全过程
【Uniapp开发】APP的真机调试指南,从开发到上架全过程
918 0
|
机器学习/深度学习 文字识别 算法
使用Python从图像中提取表格
使用Python从图像中提取表格
|
大数据 Linux 网络安全
VirtualBox虚拟机里安装centos和虚拟机相互通讯和访问外网
VirtualBox虚拟机里安装centos和虚拟机相互通讯和访问外网
803 0
VirtualBox虚拟机里安装centos和虚拟机相互通讯和访问外网
|
前端开发
前端扫盲202307手写apply
前端扫盲202307手写apply
185 0