[<prev] [next>] [day] [month] [year] [list]
Message-ID: <002401cc6cc3$3897b270$a9c71750$@sekure.org>
Date: Tue, 6 Sep 2011 15:31:37 -0300
From: "Nelson Brito" <nbrito@...ure.org>
To: <full-disclosure@...ts.grok.org.uk>, <bugtraq@...urityfocus.com>,
<submissions@...ketstormsecurity.org>
Subject: Permutation Oriented Programming - Part 2.
Just to let you know that new example codes and a demonstration video is now
available.
The new example codes is capable to bypass a MS08-078 workaround recommended by
Microsoft, proving the power of a Permutation Oriented Programming approach.
- Video:
http://fnstenv.blogspot.com/2011/09/permutation-oriented-programming-2.html
- Codes:
http://permutation-oriented-programming.googlecode.com/files/MS08-078_XML_Island
_Bypass.zip
For further details and extra documents/codes, please, refer to:
- http://code.google.com/p/permutation-oriented-programming/
Best regards.
PS: The vulnerability itself is not the key component, but the way it is
exploited is that so.
Nelson Brito
"Intellectus excedit, praestat tacere."
--
http://about.me/nbrito
8BD6 8CAD 41B7 19C5 EC04 C66D 70ED 23E4 E5AB 95EB
/* CIDR Calculator C Algorithm */
netmask = ~(0xffffffff >> cidr);
hostid = (1 << (32 - cidr)) - 2;
_1st_addr = (ntohl(addr) & netmask) + 1;
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists