[w00giving '99 #4]: VNC is a software package that permits a user to view a remote desktop in real-time. To protect intruder to access the remote desktop, VNC has a password protection. This encryption is done using 3DES, but this encryption is very poor and can be attacked (through brute-force).
4fab2bb54a0a55a4b1e33e1ca86cb8fc49dfdae873e7efcd45c27a2f9d617c51
The Basics of Cryptography: Learn the basic of cryptography and how to break it in this short, simple and easy-to-understand text.
fff2de46b4df67eeb9c1cb05c58195d52ac5d84f72c6759cc86ade1fa67e5484
lids is an intrusion detection system patch for the Linux kernel; it can protect important files from being changed. When it's in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.
b38a4df3e05b43cf55bb5e9716bf5149a24df6b1633fb8006b9e1f42913f4260
The su command on SCO's UnixWare 7 has improper bounds checking on the username passed (via argv[1]), which can cause a buffer overflow when a lengthy username is passed.
2f370cc88cadf6efc7b1f8a55d5ae2f5c3b8ce45ae76e772bf81e939d0b03feb
[w00giving '99 #6]: UnixWare 7's Xsco. Due to improper bounds checking, an overflow occurs when a lengthy argument (argv[1]) is passed. Because Xsco runs with superuser privileges, this can be exploited for elevated privileges.
0710e3286329f4ec82f0b43031b6894da9140f1c90cf3c7b571b5b51ad62ad0d
[w00giving '99 #7]: UnixWare 7's xlock. The xlock command on SCO's UnixWare 7 has improper bounds checking on the username passed (via argv[1]), which can cause a buffer overflow when a lengthy username is passed. Exploit by K2
42dca4082a24f106af872bb2a9c3e695482d75141ae5f77e6e01c1aec727dbff
Clean, functional, and fast banner scanner.
86258d4a2f264691c77ffa0a0993644a51c8e6e327f63358160b93a492155b7d
The ELZA is a scripting language written in PERL aimed at automating HTTP requests, while maintaining fill browser-like behavoir, which enables it to go to places within web sites unaccessible to netcat, telnet, or similar tools. Features: Extraction of _dynamic_ URLs from from HTML;Handling of forms, passing custom form fields and field values, collecting hidden form fields; Following redirects and refreshes; Handling of cookies, honoring their Path and Domain attributes; HTTP Referer, User-Agent, and other HTTP headers for perfect mimicry; HTTP basic authorization including dictionary attacks; Looping for repeated requesting or dictionary attacks; Conditional execution; HTTPS communication via a SSL tunnel; Forms hijacking. Scripts written in ELZA can be executed remotely via POST or forked for load generation.
e5627cc320ee5aaa12c0c74d92cec2b85f9afcb5d372b8b2b7375671bf325bbf