Skip to main content

Articles

eXploiting Local Stack on Windows

posted onDecember 12, 2005
by hitbsecnews

By: Nish Bhalla

In this article we will discuss what a stack overflow is provide a little background on stack overflows and attempt to write a local overflow exploit.

Review: Mac OS X x86 10.4.1 & 10.4.3

posted onDecember 12, 2005
by hitbsecnews

By: L33tdawg

Disclaimer: This article is for INFORMATIONAL / EDUCATIONAL purposes only. HITB does not condone software piracy.

Introduction

Back in June 2005 when Apple first announced its plans to scrap its partnership with IBM and switch its computers to Intel's microprocessors, I think everyone was a little too shocked for words. There was once a time when Apple had sworn that PowerPC was a more superior platform and that Intel basically sucked.

How to Build a Simple Wireless Authenticated Gateway (SWAG) Using OpenBSD

posted onFebruary 20, 2005
by hitbsecnews

By: Rosli Sukri

Now, without spending a lot of money you to can build an authenticated gateway solution to verify your WIFI users. First and foremost you need to get your hands on the coolest free BSD system for firewalls and security devices. In this example I will be using OpenBSD3.6 stock standard as a build and a base system (but I guess you could use FreeBSD5.3 – me thinks the newer FreeBSD are getting a bit bloated but the background fscking, fscking rocks dude!)

A Solution To Red Hat PIE Protection

posted onFebruary 20, 2005
by hitbsecnews

By: Zarul Shahrin

The paper has been specially re-written for the Hack In The Box E-Zine. The solution part is totally new and not in the original paper posted on Bugtraq. Much thanks to L33tdawg for giving me
the chance to include my paper.

I read a great article written by Vangelis about exploiting local vulnerabilities under
Fedora 2. It was a great article but our Redhat Security Expert, Arjan van de Ven said that the author did not compile the vulnerable program into PIE executable: