热门
v3rity是由David Litchfield在2010年3月 建立起来的组织,旨在解决一些IT问题。官方网站提供了一些比较有用的文章。
Papers on Oracle ForensicsOracle Forensics Part 7: Using the Oracle System Change Number in Forensic InvestigationsOracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle BinOracle Forensics Part 5: Finding Evidence in the Absence of AuditingOracle Forensics Part 4: Live ResponseOracle Forensics Part 3: Isolating Evidence of Attacks Against the Authentication MechanismOracle Forensics Part 2: Locating Dropped ObjectsOracle Forensics Part 1: Dissecting the Redo Logs
Papers on Database SecurityHacking Aurora in Oracle 11gExploiting PL/SQL Injection With Only CREATE SESSION Privileges in Oracle 11g Understanding Database SecurityExploiting PL/SQL Injection Flaws with only CREATE SESSION PrivilegesBypassing DBMS_ASSERT (in certain situations)Lateral SQL Injection – A New Class of Vulnerability in Oracle.Cursor Injection – A New Method for Exploiting PL/SQL Injection and Potential DefencesCursor Snarfing – A New Class of Attack in OracleOracle PL/SQL Injection (Blackhat Japan)Threat Profiling Microsoft SQL ServerHack Proofing Oracle Application ServerMicrosoft SQL Server PasswordsData-mining with SQL Injection and InferenceDatabase Servers on Windows XP and the Unintended Consequences of Simple File SharingWeb Application Disassembly with ODBC Error MessagesHackproofing Lotus Domino Web Server
Papers on Buffer OverflowsAn Introduction to Heap overflows on AIX 5.3LBuffer Underruns, DEP, ASLR and Improving the Exploitation Prevention Mechanisms (XPMs) on the Windows PlatformDefeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 ServerVariations in Exploit methods between Linux and WindowsNon-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT/2000/XPWindows Heap OverflowsWindows 2000 Format String VulnerabilitiesBuffer Overflows on SPARC ArchitectureBuffer Overflows for BeginnersExploiting Windows NT 4.0 Buffer Overruns (A Case Study: RASMAN.EXE)
本文转hackfreer51CTO博客,原文链接:http://blog.51cto.com/pnig0s1992/573371,如需转载请自行联系原作者