搜索结果
找到约 29 项符合
Exploit 的查询结果
按分类筛选
单片机开发 this a l33t 0x36 0day exploit by Matrix_DK :) This should give root, i give root to by the way,on al
this a l33t 0x36 0day exploit by Matrix_DK :) This should give root, i give root to by the way,on all BSD systems with abuse installed.
Internet/网络编程 socks5 remote exploit/ linux x86易受到的攻击 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0*
socks5 remote exploit/ linux x86易受到的攻击 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r10 (compiled on a redhat 6.0) => 400* socks5-s5watch-1.0r9-2 (redhat-contri ...
Linux/Unix编程 一个自动查找retloc的小脚本,主要在于可以提取其中的findretloc函数使exploit更加智能化,具体使用参看源代码.灵感来自coresecurity paper和dvdman的exploi
一个自动查找retloc的小脚本,主要在于可以提取其中的findretloc函数使exploit更加智能化,具体使用参看源代码.灵感来自coresecurity paper和dvdman的exploit.
书籍 Cognitive+Radio+Networks
According to the statistics of the Federal Communications Commission
(FCC), temporal and geographical variations in the utilization of the as-
signed spectrum range from 15% to 85%. The limited available radio spec-
trum and the inefficiency in spectrum usage necessitate a new commu-
nication paradi ...
技术资料 缓冲区溢出攻击—检测、剖析与预防
对一些恶名昭彰的Internet攻击(如SQL Slammer和Blaster蠕虫)的取证调查,显示了缓冲区溢区是高明的黑客进行攻击时选择的弱点。这些蠕虫会使Internet速度减慢甚至瘫痪,并且需要花费数十亿美元清除它们。目前,威力更强的、更阴险的威胁已经以“Custom exploits”的形式出现,即每一次攻击的exploit都是不同的,从而使expl ...
人工智能/神经网络 megahal is the conversation simulators conversing with a user in natural language. The program will
megahal is the conversation simulators conversing with a user in natural language. The program will exploit the fact that human beings tend to read much more meaning into what is said than is actually there
MegaHAL differs from conversation simulators such as ELIZA in that it uses
a Markov Model to ...
技术管理 This document represents the first stage in a process of taking the National Strategy for Police Inf
This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in the right form, in the right time at an appropriate cost. The ...
书籍 Amplify-and-Forward+Relaying
Relaying techniques, in which a source node communicates to a destination node
with the help of a relay, have been proposed as a cost-effective solution to address
the increasing demand for high data rates and reliable services over the air. As
such, it is crucial to design relay systems that are ab ...
其他书籍 Every day, patches are created to cover up security holes in software applications and operating sys
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one st ...
微处理器开发 Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.
Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any
of the resource kits. It has proved to be an extremely versatile tool on
the unix platform. So why should NT always be unix s poor cousin when it
comes to tcp/ip testing and exploration? I bet many NT admins out there
ke ...