--
When we have enough free software
At our call, hackers, at our call,
We'll throw out those dirty licenses
Ever more, hackers, ever more.

--- Begin Message ---

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Don Paker ha publicado recientemente en SecurityFocus la segunda y
última parte de su artículo didáctico "Examining a Public Exploit",
en el que se estudia en un entorno controlado el exploit RPC DCOM.
Para ello utiliza algunas de las herramientas "open source" más
conocidas en materia de seguridad de redes.

Examining a Public Exploit, Part 2
By Don Parker  Sep 15, 2004

The purpose of this article is to analyze a public exploit in a lab
environment, see the alerts generated by an intrusion detection
system, and then do some packet analysis of the malicious binary in
order to better understand what it does and how you may have been
compromised.

http://www.securityfocus.com/infocus/1801


La primera parte del artículo se publicó el pasado 11 de agosto y
puede leer en:
http://www.securityfocus.com/infocus/1795

Saludos,
Diego

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQUmyU7TSsYAZDTheEQJihwCeP1erQ55LQnm3Ehi4tliz3dtjEh4An0bb
C5OtqduBYaSCMuffpxR+Ez5C
=wdqz
-----END PGP SIGNATURE-----



--- End Message ---

Responder a