Help
RSS
API
Feed
Maltego
Contact
Domain > 4jslg.uninformed.org
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-05
23.99.229.252
(
ClassC
)
Port 80
HTTP/1.1 200 OKServer: nginx/1.21.3Date: Tue, 05 Nov 2024 04:52:14 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-alive !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.01 Transitional//EN http://www.w3.org/TR/html4/loose.dtd>html>head> link relstylesheet hrefdflt.css typetext/css> link relalternate typeapplication/rss+xml titleuninformed.org RSS feed href/uninformed.rss> title>Uninformed - vol 10/title>/head>body>table border0 cellspacing0 cellpadding0 aligncenter width800 >tr> td>img srcimages/top_left.jpg width87 height15 border0 altUninformed: >/td> td colspan2 width703 height15 stylebackground-image: url(images/top_mid.jpg); alignright valignbottom classtagline>Informative Information for the Uninformed/td> td rowspan4 valigntop>img srcimages/top_right.jpg width10 height67 border0 alt>/td>/tr>tr> td>img srcimages/mid_top_left.jpg width87 height52 border0 alt>/td> td colspan2>img srcimages/mid_top_mid.jpg width703 height52 border0 alt>/td>/tr>tr> td rowspan2 valigntop>img srcimages/mid_bottom_left.jpg alt width87 height16 border0>br>img srcimages/bottom_left.jpg width87 height21 border0 alt>/td> td height16 width16>img srcimages/mid_bottom_right.jpg width16 height16 border0 alt>/td> td height16 width688 alignright valignbottom> table cellspacing0 cellpadding0 alignleft border0 classnav stylebackground-image: url(images/nav_bg.jpg); >tr> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?> a classnav href?>Current/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?v9> a classnav href?v9>v9/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?v8> a classnav href?v8>v8/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?v7> a classnav href?v7>v7/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?v6> a classnav href?v6>v6/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?v5> a classnav href?v5>v5/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?v4> a classnav href?v4>v4/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?v3> a classnav href?v3>v3/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?v2> a classnav href?v2>v2/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?v1> a classnav href?v1>v1/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?vall> a classnav href?vall>All/a> /td> td classnav onMouseOverjavascript:this.classNamenav_hover; onMouseOutjavascript:this.classNamenav; onClickjavascript:window.location?oabout> a classnav href?oabout>About/a> /td> /tr> /table> span classvolume>span stylewhite-space: nowrap;>Vol 10span stylefont-size: 15px;>»/span> 2008.Oct/span>/span> /td>/tr>tr> td valigntop>img srcimages/bottom_mid.jpg width16 height21 border0 alt>/td> td>br>br>div classheading>Engineering in Reverse/div>div classabstract>span classabstract_title>a href?v10&a4&tsumry>Can you find me now? Unlocking the Verizon Wireless xv6800 (HTC Titan) GPS/a>/span> br/>span classabstract_author styleline-height: 20px>Skywing/span>br>In August 2008 Verizon Wireless released a firmware upgrade for their xv6800 (rebranded HTC Titan) line of Windows Mobile smartphones that provided a number of new features previously unavailable on the device on the initial release firmware. In particular, support for accessing the devices built-in Qualcomm gpsOne assisted GPS chipset was introduced with this update. However, Verizon Wireless elected to attempt to lock down the GPS hardware on xv6800 such that only applications authorized by Verizon Wireless would be able to access the devices built-in GPS hardware and perform location-based functions (such as GPS-assisted navigation). The mechanism used to lock down the GPS hardware is entirely client-side based, however, and as such suffers from fundamental limitations in terms of how effective the lockdown can be in the face of an almost fully user-programmable Windows Mobile-based device. This article outlines the basic philosophy used to prevent unauthorized applications from accessing the GPS hardware and provides a discussion of several of the flaws inherent in the chosen design of the protection mechanism. In addition, several pitfalls relating to debugging and reverse engineering programs on Windows Mobile are also discussed. Finally, several suggested design alterations that would have mitigated some of the flaws in the current GPS lock down system from the perspective of safeguarding the privacy of user location data are also presented.br>div classdownload>a href?v10&a4&ttxt>txt/a> | a href?v10&a4&tpdf>pdf/a> | a href?v10&a4>html/a>/div>/div>br>div classabstract>span classabstract_title>a href?v10&a1&tsumry>Using dual-mappings to evade automated unpackers/a>/span> br/>span classabstract_author styleline-height: 20px>skape/span>br>Automated unpackers such as Renovo, Saffron, and Pandoras Bochs attempt to dynamically unpack executables by detecting the execution of code from regions of virtual memory that have been written to. While this is an elegant method of detecting dynamic code execution, it is possible to evade these unpackers by dual-mapping physical pages to two distinct virtual address regions where one region is used as an editable mapping and the second region is used as an executable mapping. In this way, the editable mapping is written to during the unpacking process and the executable mapping is used to execute the unpacked code dynamically. This effectively evades automated unpackers which rely on detecting the execution of code from virtual addresses that have been written to. br>div classdownload>a href?v10&a1&ttxt>txt/a> | a href?v10&a1&tpdf>pdf/a> | a href?v10&a1>html/a>/div>/div>br>div classheading>Exploitation Technology/div>div classabstract>span classabstract_title>a href?v10&a2&tsumry>Analyzing local privilege escalations in win32k/a>/span> br/>span classabstract_author styleline-height: 20px>mxatone/span>br>This paper analyzes three vulnerabilities that were found in win32k.sys that allow kernel-mode code execution. The win32k.sys driver is a major component of the GUI subsystem in the Windows operating system. These vulnerabilities have been reported by the author and patched in MS08-025. The first vulnerability is a kernel pool overflow with an old communication mechanism called the Dynamic Data Exchange (DDE) protocol. The second vulnerability involves improper use of the ProbeForWrite function within string management functions. The third vulnerability concerns how win32k handles system menu functions. Their discovery and exploitation are covered.br>div classdownload>a href?v10&a2&ttxt>txt/a> | a href?v10&a2&tpdf>pdf/a> | a href?v10&a2>html/a>/div>/div>br>div classabstract>span classabstract_title>a href?v10&a3&tsumry>Exploiting Tomorrows Internet Today: Penetration testing with IPv6/a>/span> br/>span classabstract_author styleline-height: 20px>H D Moore/span>br>This paper illustrates how IPv6-enabled systems with link-local and auto-configured addresses can be compromised using existing security tools. While most of the techniques described can apply to real IPv6 networks, the focus of this paper is to target IPv6-enabled systems on the local network. br>div classdownload>a href?v10&a3&ttxt>txt/a> | a href?v10&a3&tpdf>pdf/a> | a href?v10&a3>html/a>/div>/div>br>/td>/tr>/table>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]