lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <NHBBJKMMFKCGNHDPMAJJKEAOCEAA.exurity@rogers.com> From: exurity at rogers.com (Executable Security) Subject: Win-Trap captured DCOM-RPC exploit code, on the spot! I heard that one website claims that it has come up with ideas to trap the exploit code when it goes through the buffer overflow vulnerabilities. Check the http://www.phsecurity.com out and you will be amazed by its technology as I was. Its Win-Trap captured the exploit code even if the machine is un-patched with MS03-026 patch. That is great!! HC