Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 05/29/14 in all areas

  1. Hello RST .. Yesteday .. While i'm diving in Google i found some one Called : David A. Wheeler he is Write A very very useful book about : Secure Programming for Linux and Unix -> How to ? Wish i could find same in Windows !!! That's great book (2003) --> Old but Gold You can download it as pdf in -> here <- This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs. Specific guidelines for C, C++, Java, Perl, PHP, Python, Tcl, and Ada95 are included. For a current version of the book When i check out his site i'm find alot of amazing articles & papers So .. check it out How to Prevent the next Heartbleed David A. Wheeler 2014-05-28 (originally 2014-04-29) I Called it The Greatest Paper .. it's Really Great Read it from : How to Prevent the next Heartbleed OR : You Can download it as pdf by NO-MERCY --> HERE <-- 38 Pages link 4 Visitors : http://www.4shared.com/office/7aJ1b6cyce/How_to_Prevent_the_next_Heartb.html MD5 : 88C19FC94C522FBD85BE3BFCCDA28462 Regrads NO-MERCY
    1 point
  2. In filmulet veti vedea cum functioneaza! Rata de succes foarte scazuta deoarece pluginul NRPE are un fisier de config care contine allowed_hosts = 127.0.0.1 ca default iar dupa configurare de obicei se pun doar serverele pe care le doreste administratorul! Am intrebat si pe canalul lor de IRC si mi-au confirmat ca doar cei trecuti in allowed_hosts pot da comenzi! Daca cunoaste cineva si lucreaza cu Nagios si NRPE este asteptat aici poate ne invata mai multe chestii cum putem da bypass la allowed_hosts! http://smarth.ro/public/nrpe-exploit.py http://smarth.ro//public/shell.txt
    -1 points
×
×
  • Create New...