Full Disclosure mailing list archives
Permutation Oriented Programming - Part 2.
From: "Nelson Brito" <nbrito () sekure org>
Date: Tue, 6 Sep 2011 15:31:37 -0300
Just to let you know that new example codes and a demonstration video is now available. The new example codes is capable to bypass a MS08-078 workaround recommended by Microsoft, proving the power of a Permutation Oriented Programming approach. - Video: http://fnstenv.blogspot.com/2011/09/permutation-oriented-programming-2.html - Codes: http://permutation-oriented-programming.googlecode.com/files/MS08-078_XML_Island _Bypass.zip For further details and extra documents/codes, please, refer to: - http://code.google.com/p/permutation-oriented-programming/ Best regards. PS: The vulnerability itself is not the key component, but the way it is exploited is that so. Nelson Brito "Intellectus excedit, praestat tacere." -- http://about.me/nbrito 8BD6 8CAD 41B7 19C5 EC04 C66D 70ED 23E4 E5AB 95EB /* CIDR Calculator C Algorithm */ netmask = ~(0xffffffff >> cidr); hostid = (1 << (32 - cidr)) - 2; _1st_addr = (ntohl(addr) & netmask) + 1; _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Permutation Oriented Programming - Part 2. Nelson Brito (Sep 06)