search for: 0wned

Displaying 6 results from an estimated 6 matches for "0wned".

Did you mean: owned
1997 Apr 27
0
Overflow in xlock (fwd)
...ewicz marcus@venus.wis.pk.edu.pl == |- -| == tel. +048 (0-12) 37-44-99 marcus@krakow.linux.org.pl == |- -| == Strona Domowa - http://venus.wis.pk.edu.pl/marcus/ == |- ---------- Forwarded message ---------- Date: Sat, 26 Apr 1997 16:16:05 -0400 From: George Staikos <staikos@0WNED.ORG> Approved: R.E.Wolff@BitWizard.nl To: BUGTRAQ@NETSPACE.ORG Subject: Overflow in xlock There appears to be an exploitable buffer overflow in xlock, the X based screensaver/locker. Xlock is installed suid root on machines with shadowed passwords. I have verified this on xlock versions on AI...
2009 Mar 26
6
CentOS VPN server for iPhone
So far, OpenVPN has been working very well for me. Unfortunately, the iPhone doesn't have (yet?) an OpenVPN client, so I'm forced to work with what's available. The options are: L2TP, PPTP and IPSec. If you were to install a VPN endpoint on CentOS, which protocol would you prefer? The condition is to avoid shabby VPN servers that make the system less secure. I've seen some
2004 Nov 16
2
FireWire Security issues
...ocation, esp. public access systems, should re-evaluate their system security and consider additional physical security measures if they are equipped with "FireWire" ports. These ports are also called "iLink" on some Sony models. Overview: --------- In the presentation, "0wned by an iPod" which Maximilian Dornseif from Laboratory for Dependable Distributed Systems at RWTH Aachen University held at the PacSec.jp/core04 conference in Tokyo on Nov 11/12, several new techniques involving the IEEE 1394 interface commonly found on laptops, desktops, and some servers were...
1998 Jun 19
16
WARNING: Break-in attempts
Greetings all, I''m forwarding a copy of an email I sent reporting attempted break-ins on my main server, earth.terran.org. I am forwarding this because I think it is relevant that folks watch for this kind of activity in their logs to catch people who "try doorknobs" in the middle of the night. After sending this email, I sent a talk request to the user, who was still logged
2016 May 03
9
[Bug 95251] New: vdpau decoder capabilities: not supported
https://bugs.freedesktop.org/show_bug.cgi?id=95251 Bug ID: 95251 Summary: vdpau decoder capabilities: not supported Product: Mesa Version: 11.2 Hardware: Other OS: All Status: NEW Severity: normal Priority: medium Component: Drivers/DRI/nouveau Assignee: nouveau at
1997 Apr 29
9
Yet Another DIP Exploit?
I seem to have stumbled across another vulnerability in DIP. It appears to allow any user to gain control of arbitrary devices in /dev. For instance, I have successfully stolen keystrokes from a root login as follows... (I could also dump characters to the root console) $ whoami cesaro $ cat < /dev/tty1 <------ root login here bash: /dev/tty1: Permission denied