搜索结果

找到约 6 项符合 Exploits 的查询结果

Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. ...
https://www.eeworm.com/dl/620/152835.html
下载: 92
查看: 1056

其他书籍 win32缓冲区溢出实战。原文:Intro to Win32 Exploits。从漏洞发现到漏洞调试和漏洞利用。

win32缓冲区溢出实战。原文:Intro to Win32 Exploits。从漏洞发现到漏洞调试和漏洞利用。
https://www.eeworm.com/dl/542/175194.html
下载: 65
查看: 1037

其他书籍 堆溢出全面介绍 Reliable Windows Heap Exploits

堆溢出全面介绍 Reliable Windows Heap Exploits
https://www.eeworm.com/dl/542/391407.html
下载: 180
查看: 1016

文章/文档 Really Hacking SQL A Power Point Presentation on hacking SQL and Exploits

Really Hacking SQL A Power Point Presentation on hacking SQL and Exploits
https://www.eeworm.com/dl/652/482789.html
下载: 113
查看: 1030

书籍 Physical Layer Security in Wireless Communications

The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have trie ...
https://www.eeworm.com/dl/522054.html
下载: 1
查看: 79

书籍 Feedback Control Theory

Striking developments have taken place since 1980 in feedback control theory. The subject has be- come both more rigorous and more applicable. The rigor is not for its own sake, but rather that even in an engineering discipline rigor can lead to clarity and to methodical solutions to problems. The a ...
https://www.eeworm.com/dl/522454.html
下载: 1
查看: 55