Quantcast
Channel: IT Trenches » exploit
Browsing all 3 articles
Browse latest View live

Sure you can use my security context – exploit me!

I recently blogged about the fact that the initial reports of the Google Aurora attack focused on Internet Explorer version 6. Some comments on the Information Security Community Group on LinkedIn got...

View Article


Image may be NSFW.
Clik here to view.

Whak-a-mole testing for Microsoft DLL exploit

HD Moore of Metasploit fame has created a tool to identify applications which exhibit the DLL hijack flaw about which Microsoft recently released a security advisory. This tool in HD Moore’s own words...

View Article

DLL hole also affects EXE files

According to a Heise Media report, the DLL binary planting vulnerability is not just limited to DLL files but affects EXE files. The example given: An HTML file is saved along with a copy of a file...

View Article
Browsing all 3 articles
Browse latest View live




<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>