0day
dandandeshui
在众多大牛中穿行,在人海中攀爬的有志向的小青年!
展开
-
头型设计,看看你最适合那种吧!
发型设计是一门综合的艺术,它涉及广泛,须掌握多门学科,影响发型设计主要有:头型、脸型、五官、身材、年龄,其次有职业、肤色、着装、个性嗜好、季节、发质、适用性和时代性。 一、头型: 人的头型大至可以分为大、小、长、尖、圆等几种型状。 (1)头型大:头型大的人,不宜烫发,最好剪成中长或长的直发,也可以剪出层次,刘海不宜梳得过于太高,最好能盖住一部分前额; (2)头型小:头发要做得蓬松一转载 2009-10-03 10:46:00 · 133233 阅读 · 44 评论 -
Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics
In the first parts of the exploit writing tutorial, I have discussed some common vulnerabilities that can lead to 2 types of exploits : stack based buffer overflows (with direct EIP overwrite), and st转载 2011-11-01 12:19:57 · 1127 阅读 · 0 评论 -
Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode
Where do you want to jmp today ?In one of my previous posts (part 1 of writing stack based buffer overflow exploits), I have explained the basisc about discovering a vulnerability and using that i转载 2011-11-01 12:17:03 · 4485 阅读 · 0 评论 -
Exploit writing tutorial part 10 : Chaining DEP with ROP – the Rubik’s[TM] Cube
Table of ContentsIntroductionHardware DEP in the Win32 worldBypassing DEP – Building blocksWhat are our options ?The gadgetWindows function calls to bypass DEPChoose your weaponFun转载 2011-11-01 12:29:53 · 3722 阅读 · 0 评论 -
Exploit writing tutorial part 7 : Unicode – from 0×00410041 to calc
Finally … after spending a couple of weeks working on unicode and unicode exploits, I’m glad and happy to be able to release this next article in my basic exploit writing series : writing exploits for转载 2011-11-01 12:24:44 · 3115 阅读 · 0 评论 -
Exploit writing tutorial part 3b : SEH Based Exploits – just another example
I have indicated that SEH needs to be overwritten by a pointer to “pop pop ret” and that next SEH needs to be overwritten with 6 bytes to jump over SEH… Of course, this structure was based on the logi转载 2011-11-01 12:34:16 · 1450 阅读 · 0 评论 -
Exploit writing tutorial part 8 : Win32 Egg Hunting
IntroductionEaster is still far away, so this is probably the right time to talk about ways to hunting for eggs (so you would be prepared when the easter bunny brings you another 0day vulnerability)转载 2011-11-01 12:26:16 · 29102 阅读 · 0 评论 -
Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
In all previous tutorials in this Exploit writing tutorial series, we have looked at building exploits that would work on Windows XP / 2003 server.The success of all of these exploits (whether they转载 2011-11-01 12:23:31 · 10651 阅读 · 0 评论 -
Where do you want to jmp today ? In one of my previous posts (part 1 of writing stack based buffer
In the first 2 parts of the exploit writing tutorial series, I have discussed how a classic stack buffer overflow works and how you can build a reliable exploit by using various techniques to jump to转载 2011-11-01 12:18:31 · 6832 阅读 · 0 评论 -
Exploit writing tutorial part 1 Stack Based Overflows
Last friday (july 17th 2009), somebody (nick)named ‘Crazy_Hacker’ has reported a vulnerability inEasy RM to MP3 Conversion Utility (on XP SP2 En), via packetstormsecurity.org. (seehttp://packets转载 2011-11-01 12:14:46 · 2372 阅读 · 0 评论 -
漏洞论!
感觉要真的在安全方面有深的发展,必须要学会去理解一些思想,还要善于归纳总结,最后提出自己见解,自己的思想。 像溢出攻击,虽然已经是发展了那么多年了,但其shellcode编写也差不多是那么一个模式。写出汇编,编译,得到二进制代码,修改汇编,编译,再得到二进制代码,最后用\0aa\0xbb的形式把二进制代码写到攻击程序里面。这在unix等下面一般shellcode要求比较简单,那还勉强过得原创 2011-10-30 00:24:55 · 589 阅读 · 0 评论 -
哈哈!女生必看!男士看看也不错!关于如何打扮自己呀!
日常基本护肤早上: 洁面-爽肤-眼霜-精华(精华的顺序请仔细阅读产品说明或者询问BA,不一定就是在乳霜之前)-日霜(凝胶--乳液--乳霜)-防晒隔离晚上: 卸妆-洁面-爽肤-眼霜-精华(精华的顺序请仔细阅读产品说明或者询问BA,不一定就是在乳霜之前))-晚霜什么样的洗面奶才是适合你的? 每个人肤质不一样很难说!!但是有一个标准,如果洗完会让你紧绷的,考虑换一个吧。。其实乳装不一定就洗不干净,泡沫的转载 2010-01-03 13:25:00 · 1286 阅读 · 0 评论 -
叫你提取安装包里面的文件,捆绑木马无处藏!(有改动)
最近在优化软件的时候,出现程序不稳定现象,所以想把程序复原,把修复的DLL组件放回原处,但是原理的DLL组件忘记备份了,哎,难道必须从新安装吗?开动脑筋,是不是可以从安装包里面提取呢,好像以前在修复系统的时候用到过这些知识!下面在网上找到的一点知识,给大家分享啦!我们下载的软件大多已被封装成了安装包,只要运行它你就可以轻易的完成文件复制、组件注册、注册表信息导入等一系列操作转载 2010-02-27 13:22:00 · 3725 阅读 · 1 评论 -
男人好色有四品
自古英雄难过美人关。环肥燕瘦身集三千宠爱,霸王别姬千古绝唱唱到今,美艳海伦引发十年战争,英国甚至出了个爱美人,不爱江山的温莎公爵。圣人孔子也有言曰“食色,性也。”男人好色,纯属本性使然,乃合情合理之事,世人不该一味斥之、责之、骂之。 虽然男人个个好色,但其外在表现却千差万别。在此试分为极品、精品、妙品、庸品四类以概之。 第一类:极品男人。此类男人具备坚定、宽容、刚毅、威严、果敢的性格。转载 2009-10-03 10:45:00 · 10261 阅读 · 0 评论 -
推荐计算机科学类的经典书籍
推荐计算机科学类的经典书籍(一)1.The Art of Computer ProgrammingAuthor: Donald.E.Knuth Web site: http://www-cs-faculty.stanford.edu/~knuth/taocp.html Book Info: 这部书被誉为20世纪最重要的20部著作之一,与Einstein的 相对论>>并列,是转载 2009-10-03 10:15:00 · 10222 阅读 · 4 评论 -
SD卡破解(游戏)
Wii 破解强力贴!!还继续买盘么?只需要SD卡一张即可破解转载>!!!本来自己的一台机器,买了wii fit以后,稍微玩了几次就扔那里,琢磨着哪天有好人可以帮我破解下,这几天心血来潮,琢磨着玩意,就那样不知不觉的给软解了。应大家的要求,先把详细步骤公布如下:( 这是一种直接读取 USB 移动设备的方法,比 自己下载刻盘玩 我觉得要对大家会 合适很多。)首先需要准备的东西1原创 2009-10-03 10:26:00 · 3342 阅读 · 0 评论 -
海明威《老人与海》
海明威《老人与海》 他是个独自在湾流①中一条小船上钓鱼的老人,至今已去了八十四天,一条鱼也没逮住。头四十天里,有个男孩子跟他在一起。可是,过了四十天还没捉到一条鱼,孩子的父母对他说,老人如今准是十足地“倒了血霉”,这就是说,倒霉到了极点,于是孩子听从了他们的吩咐,上了另外一条船,头一个礼拜就捕到了三条好鱼。孩子看见老人每天回来时船总是空的,感到很难受,他总是走下岸去,帮原创 2009-10-03 10:29:00 · 6452 阅读 · 0 评论 -
Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit developm
In the first parts of this exploit writing tutorial, I have mainly used Windbg as a tool to watch registers and stack contents while evaluating crashes and building exploits. Today, I will discuss som转载 2011-11-01 12:21:35 · 1230 阅读 · 0 评论