Full Disclosure mailing list archives

Permutation Oriented Programming - Part 2.


From: "Nelson Brito" <nbrito () sekure org>
Date: Tue, 6 Sep 2011 15:31:37 -0300

Just to let you know that new example codes and a demonstration video is now
available.

The new example codes is capable to bypass a MS08-078 workaround recommended by
Microsoft, proving the power of a Permutation Oriented Programming approach.

- Video:
http://fnstenv.blogspot.com/2011/09/permutation-oriented-programming-2.html
- Codes:
http://permutation-oriented-programming.googlecode.com/files/MS08-078_XML_Island
_Bypass.zip

For further details and extra documents/codes, please, refer to:
- http://code.google.com/p/permutation-oriented-programming/

Best regards.

PS: The vulnerability itself is not the key component, but the way it is
exploited is that so.

Nelson Brito
"Intellectus excedit, praestat tacere."
--
http://about.me/nbrito
8BD6 8CAD 41B7 19C5 EC04 C66D 70ED 23E4 E5AB 95EB

/* CIDR Calculator C Algorithm */
netmask   = ~(0xffffffff >> cidr);
hostid    = (1 << (32 - cidr)) - 2;
_1st_addr = (ntohl(addr) & netmask) + 1;


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: