So most people on here have probably heard of Bitcoin from somewhere,
and most of you have probably got tired of it - but bear with me
because this is kind of entertaining. For those of you that have been
stuck in a darkened room with a disassembler and no internet access
for the past few months,
Can anyone help in solving what this shellcode does?
Try harder.
FYI to the list - This is for the CTP challenge by offensive security
apparently. It does nothing really useful.
On Wed, Feb 1, 2012 at 2:57 PM, Joshua Thomas rappercra...@gmail.comwrote:
Can anyone help in solving what this shellcode does?
Welcome to why BitCoin is so impressive. You've got this app. It's wide
open to the Internet, to the point where it opens up firewall rules if
necessary. It's running some home grown network protocol, that ostensibly
ships little executable programs around. It's written in C++, the
non-memory
In the second part of the FC4.me challenge, it says you need XXX amount of
bytes for a reg key.
The shellcode below, is of course, assembly instructions. Have you tried
running the entire code? There's a CC / break in the end in case you load
the code into another program, so you won't execute
Folks,
We have talked about this one quite a few times (including
http://blog.si6networks.com/2011/09/router-advertisement-guard-ra-guard.html).
-- still, most implementations remain broken.
If you care to get this fixed, please provide feedback about this I-D on
the IETF *v6ops* mailing-list
Folks,
We have talked about this one quite a few times (including
http://blog.si6networks.com/2011/09/router-advertisement-guard-ra-guard.html).
-- still, most implementations remain broken.
If you care to get this fixed, please provide feedback about this I-D on
the IETF *v6ops* mailing-list
CAL-2012-0004 opera array integer overflow
1 Affected Products
=
11.60 and prior
2 Vulnerability Details
=
Code Audit Labs http://www.vulnhunt.com has discovered a integer
overflow vulnerability in array functions like
Int32Array,Int16Array... .
Opear