[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Permutation Oriented Programming - Part 2.
- To: <full-disclosure@xxxxxxxxxxxxxxxxx>, <bugtraq@xxxxxxxxxxxxxxxxx>, <submissions@xxxxxxxxxxxxxxxxxxxxxxx>
- Subject: [Full-disclosure] Permutation Oriented Programming - Part 2.
- From: "Nelson Brito" <nbrito@xxxxxxxxxx>
- Date: Tue, 6 Sep 2011 15:31:37 -0300
Just to let you know that new example codes and a demonstration video is now
available.
The new example codes is capable to bypass a MS08-078 workaround recommended by
Microsoft, proving the power of a Permutation Oriented Programming approach.
- Video:
http://fnstenv.blogspot.com/2011/09/permutation-oriented-programming-2.html
- Codes:
http://permutation-oriented-programming.googlecode.com/files/MS08-078_XML_Island
_Bypass.zip
For further details and extra documents/codes, please, refer to:
- http://code.google.com/p/permutation-oriented-programming/
Best regards.
PS: The vulnerability itself is not the key component, but the way it is
exploited is that so.
Nelson Brito
"Intellectus excedit, praestat tacere."
--
http://about.me/nbrito
8BD6 8CAD 41B7 19C5 EC04 C66D 70ED 23E4 E5AB 95EB
/* CIDR Calculator C Algorithm */
netmask = ~(0xffffffff >> cidr);
hostid = (1 << (32 - cidr)) - 2;
_1st_addr = (ntohl(addr) & netmask) + 1;
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/