Microsoft Windows DLL Load Hijacking (2269637)

/
Microsoft Windows DLL Load Hijacking (2269637)

(MS09-062) GDI+ .Net PropertyItem Heap Overflow Vulnerability (957488)

/
(MS09-062) GDI+ .Net PropertyItem Heap Overflow Vulnerability (957488)

Microsoft Windows Desktop Wallpaper Code Execution Vulnerability

/
Microsoft Windows Desktop Wallpaper Code Execution Vulnerability

Microsoft Internet Explorer ‘Forced Tweet’ Cross Domain

/
Microsoft Internet Explorer 'Forced Tweet' Cross Domain

Kevin Mitnick & Dave Kennedy – Adaptive Penetration Testing Derbycon 2011

/
Penetration Testing is something that has many different meaning depending on the context used by the person. The Penetration Testing Execution Standard (PTES) is aimed to change that. In this talk we’ll be covering adaptive penetration testing which essentially is the ability to conform and change based on the environment that your attacking. We’ll be covering several live examples used in real-world penetration tests, how we discovered some clever tricks to circumvent security controls, and eventually be creative and gain unauthorized access.

JS.Alescurf Trojan

/
Systems Affected: Windows 98, Windows 95, Windows XP, Solaris, Windows Me, Windows Vista, Windows NT, Windows Server 2003, Linux, Windows 2000 JS.Alescurf is a detection for malicious code that can be injected in to vulnerable Internet Web pages.

ROUTERPWN: A Mobile Router Exploitation Framework Demonstrated at ShmooCon 2012

/
Routerpwn is a mobile exploitation framework that helps you in the exploitation of vulnerabilities in network devices such as residential and commercial routers, switches and access points. It is a compilation of ready to run local and remote web exploits. Programmed in Javascript and HTML in order to run in all "smart phones" and mobile Internet devices, including Android, iPhone, BlackBerry and all tablets. You can even store it off line for local exploitation without Internet connection.

Attacking Proximity Card Access Systems by Brad Antoniewicz at ShmooCon 2012

/
From the card to the backend database, proximity card access systems contain a variety of components, all which are vulnerable to attack but have been rarely targeted. This demo-driven presentation explores and attacks each of the various components (RFID tags, controllers, and backend systems) of a popular deployment configuration.

School Bullying Outbreak

/
To create bully-free classrooms, it’s necessary that we educate teachers, students and parents about the prevalence and consequences of it. We all believe a school should be a safe place for the children, a place where they can learn without fear or apprehension.