Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
For 802.11 and bluetooth security people alike. Latest trends, attack surface issues, and prevention. How wireless security is becoming the new vector to hacking corporate websites and applications. 

Current Page: 1 of 1
Results 1 - 7 of 7
6 years ago
Nokia
I don't think it's a clear cut either. As Web App Security professionals we seemed to have made a subconscious decision that XSS is local and this is the generally accepted definition, for reasons such as that is where the payload is executed, it is the client that is the end point of the attack etc etc - but to go back to the buffer overflow methodology, if you manage to send data to a remote
Forum: XSS Info
6 years ago
Nokia
That was always my view point too; however, if you think about local and remote exploits in the traditional sense - say your XSS vector directs a user to your XXS proxy and his browser comes under your control remotely - strictly this would be classed as a remote attack as the end point of your exploit is remote to you. I think historically remote and local exploits have been classed from a buf
Forum: XSS Info
6 years ago
Nokia
Remnote or local? Does it depend on your personal definition of a remote or local attack? There is a discussion about it here: http://antionline.com/showthread.php?t=276613 Thought I would mention it here as there are a lot more Web Security Professionals here than on Antionline who would probably have a more valid view point on the subject that the current posters in the topic.
Forum: XSS Info
6 years ago
Nokia
Quote insert live CD like Knoppix, copy the SAM/system/security file and bruteforce it at home. If this was how it was done then that would denote someone has physical access to a domain controller, or to a host that someone has logged onto with domain admin credentials - in either case the OP be pretty fooked if this is what has happened.. If you have changed the domain admin password and it
Forum: Networking
7 years ago
Nokia
If anyone's interested; I managed to test it and it 'mostly' worked - I could anticipate the DNS request emanating from the source IP and a short script was able to send the DNS reply back to the host before the legitimate one arrived (it arrived a considerable amount of time before the legitimate one as it gets a pretty good head start... but I had to cheat to get it through the PIX). As menti
Forum: Networking
7 years ago
Nokia
An old topic I know but maybe a useful link for cracking a WEP key on WIndows: http://www.tazforum.thetazzone.com/viewtopic.php?t=2069 At the time of witting packet injection was not possible on Windows, or was at least in the 'design' stage. It is now possible however it is not a easy as it is on a Linux host.
Forum: Wireless Security
7 years ago
Nokia
Hi, I have a theory about a possible method of DNS spoofing from a network when using a PIX firewall (up to and including version 7.x of the PIX OS) I plan to test it over this coming weekend but thought I would mention it here to see if anyone has anything to say about it. By default a PIX will allow the first DNS response back into a network providing that the stateful element meets wha
Forum: Networking
Current Page: 1 of 1