The Long Run

2007-08-29 Thread Dave Aitel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 As of today, one of the best hacker books ever, long out of print and unavailable except from eBay and crusty used book stores in the East Village, is now available for free download here: http://www.immunityinc.com/downloads/TheLongRun.pdf Dave

Re: Fate Research Labs Presents: Analysis of the NTDLL.DLL Exploit

2003-03-28 Thread Dave Aitel
d in the appendix." That would be, uh, ALL NT applications? Dave Aitel SVP Research and Engineering Immunity, Inc. http://www.immunitysec.com/CANVAS/ <--"Exploits that don't have to brute force." On Fri, 28 Mar 2003 09:30:23 -0600 "Eric Hines" <[EMAIL PROTECTED

Re: WebDAV exploit: using wide character decoder scheme

2003-03-26 Thread Dave Aitel
ode manually, just out of curiosity? Dave Aitel Advanced Engineering Directorate Immunity, Inc. http://www.immunitysec.com/CANVAS/ "Hacking like it's done in the movies." On Wed, 26 Mar 2003 22:55:12 +0900 ¿ÀÁ¤¿í <[EMAIL PROTECTED]> wrote: > my @return_addresses=( > &

Re: IIS 5.0 WebDAV -Proof of concept-. Fully documented.

2003-03-25 Thread Dave Aitel
ave a chance to use the encoder sometime soon, I'm sure. I'm not having the same problem you are with characters > 0x7f though. Did you use the % character in your shellcode? Dave Aitel VP of Research and Development Immunity, Inc. http://www.immunitysec.com/CANVAS/ "Hacking l

Re: Microsoft Security Advisory MS 03-007

2003-03-18 Thread Dave Aitel
ently than previously hoped? I'm really curious. Also in the article is a insanely optimistic belief that most vulnerabilities are found first by "researchers who publish them" and that "it's been about a year since a significant 0day exploit was revealed." Da

Re: Preventing exploitation with rebasing

2003-02-05 Thread Dave Aitel
m seeing with Windows 2000 SP3 here in my lab. (I spent a while trying to track down what a particular field with the Locator traffic was, but it turned out to be just a part of my stack.) In practice, you would want to get the address of the data segment for RPCRT4, I imagine, rather than the a

The Advantages of Block-Based Protocol Analysis for Security Testing

2003-02-05 Thread Dave Aitel
inputs to a program can be reduced intelligently by a tester, compensating for incomplete knowledge of the target's implementation or design. Thank you, Dave Aitel Public and Media Relations Immunity, Inc. http://www.immunitysec.com/ 917-545-4742

locator exploit

2003-02-01 Thread Dave Aitel
So after writing the RPC locator exploit, I noticed that the service is not actually vulnerable until it has been initialized properly. Does anyone have any more information on how often and when this service is intialized (as opposed to simply started)? Here is tethereal output illustrating an u

SPIKE Proxy 1.4.7 is now available

2003-01-30 Thread Dave Aitel
the end of February (during BlackHat). Thanks, Dave Aitel Media Relations Immunity, Inc. http://www.immunitysec.com/

Re: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!

2003-01-25 Thread Dave Aitel
he Hello bug, I hereby pre-name it the "Yo G! What's up! SQL!" worm. Dave Aitel Immunity, Inc. On Sat, 25 Jan 2003 13:56:36 -0500 "trent dilkie" <[EMAIL PROTECTED]> wrote: > Can anybody confirm that this worm is spreading on the Desktop Engine > too?(MSDE)

Re: Netscape Problems.

2002-11-27 Thread Dave Aitel
platforms fuzzers are happily picking out stack overflows in initial handshake messages. Were you comparing a vendor's internal bug database to various bugzillas you might have a better case. Dave Aitel Immunity, Inc. On Tue, 26 Nov 2002 19:17:56 +1300 (NZDT) zen-parse <[EMAIL PROTECTED]&

Re: MS WIN RPC DoS CODE FROM SPIKE v2.7

2002-10-22 Thread Dave Aitel
have the random seed that crashed it. Then you can do some more work to manually isolate the exact packet or sequence that crashes it. On Tue, 2002-10-22 at 14:25, lion wrote: > * > * MS WIN RPC DoS CODE FROM SPIKE v2.7 > * -- Dave Aitel <[EMAIL PROTECTED]> Immunity, Inc signa

[Immunity, Inc.]Vulnerability: RPC Service DoS (port 135/tcp) onWindows 2000 SP3

2002-10-18 Thread Dave Aitel
Immunity Advisory to the General Public Vulnerability: RPC Service DoS (port 135/tcp) on Windows 2000 SP3 Author: Dave Aitel Date: October 18, 2002 Because the default SPIKE 2.7 run has been able to discover this vulnerability, and various people have contacted me regarding it, I offer this

SPIKE 2.7 Released: There's a party at my house, so bring the beerand follow me....

2002-10-07 Thread Dave Aitel
t one case, they succeed. You can verify all Immunity packages with hashdb ( http://www.immunitysec.com/hashdb.html ). A full changelog is available at http://www.immunitysec.com/CHANGELOG.txt . Dave Aitel Immunity, Inc.

Re: [VulnWatch] Notes on the SQL Cumulative patch

2002-10-03 Thread Dave Aitel
I've run into, gives you LOCAL/SYSTEM. LOCAL/SYSTEM usually has significant privileges. Dave Aitel Immunity, Inc. "Unchecked buffer in SQL Server 2000 authentication function (CAN-2002-1123): What’s the scope of this vulnerability? This is a buffer overrun vulnerability. By send

PPTP

2002-10-01 Thread Dave Aitel
gainst 192.168.1.100 after setting up PPTP on that machine. It's a good idea to set up SoftIce as well. bash$ ./generic_send_tcp 192.168.1.100 1723 ./pptp.spk 0 0 #wait for crash. It's in the second packet, I believe. Dave Aitel Immunity, Inc. References -

SPIKE 2.6 Released...

2002-09-04 Thread Dave Aitel
. SPIKE Proxy now includes a crawler, and dcedump now includes a Unix port of ifids. A full changelog is available at: http://www.immunitysec.com/CHANGELOG.txt There's also a new SPIKE mailing list at: http://www.immunitysec.com/mailman/listinfo/spike Dave Aitel Immunity, Inc. (P.

Re: iDEFENSE Security Advisory: Linuxconf locally exploitablebuffer overflow

2002-08-28 Thread Dave Aitel
. :> So in this case, "Exclusively" means "Exclusive to iDefense and everyone else in the whole world who bothers to do basic QA (run sharefuzz) on their systems." Dave Aitel Immunity, Inc. On Wed, 2002-08-28 at 11:58, David Endler wrote: > > -BEGIN PGP SIG

Re: Microsoft SQL Server 2000,7 OpenRowSet Buffer Overflowvulnerability (#NISR02072002)

2002-08-09 Thread Dave Aitel
So, unless I'm mistaken, there's no way to patch MS Desktop Engine for this bug. Unless someone can point out a way to get it to SP2, since the SQL Server SP2 installer won't work for it. Also, does anyone find it odd that you have to literally copy a dll over another dll to apply the hotfix? Not

Re: UnBodyGuard a.k.a Bouncer (Solaris kernel function hijacking)(fwd)

2002-07-08 Thread Dave Aitel
, you probably still have some time as everyone rushes to update their trojans. Dave Aitel Immunity, Inc www.immunitysec.com P.S. md5sums for BodyGuard, since key distribution is still a hard problem: If you need a high level of assurance, feel free to call, or e-mail Immunity and we will read n

Re: UnBodyGuard a.k.a Bouncer (Solaris kernel function hijacking)(fwd)

2002-07-05 Thread Dave Aitel
On Thu, 2002-07-04 at 09:06, noir sin wrote: > > Resend: > attachment moved to http://gsu.linux.org.tr/~noir/b.tar.gz > since no more than 100K is allowed > > Hi, > > Recently, Dave Aitel posted a link to a loadable kernel module for the > Solaris operating system to

SPIKE version released that detects .HTR and ISAPI overflows (see spike.sourceforge.net)

2002-04-10 Thread Dave Aitel
web app auditing as well now. Yes, SPIKE is still GPL. Dave Aitel