--
When we have enough free software
At our call, hackers, at our call,
We'll throw out those dirty licenses
Ever more, hackers, ever more.
--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Don Paker ha publicado recientemente en SecurityFocus la segunda y
última parte de su artículo didáctico "Examining a Public Exploit",
en el que se estudia en un entorno controlado el exploit RPC DCOM.
Para ello utiliza algunas de las herramientas "open source" más
conocidas en materia de seguridad de redes.
Examining a Public Exploit, Part 2
By Don Parker Sep 15, 2004
The purpose of this article is to analyze a public exploit in a lab
environment, see the alerts generated by an intrusion detection
system, and then do some packet analysis of the malicious binary in
order to better understand what it does and how you may have been
compromised.
http://www.securityfocus.com/infocus/1801
La primera parte del artículo se publicó el pasado 11 de agosto y
puede leer en:
http://www.securityfocus.com/infocus/1795
Saludos,
Diego
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3
iQA/AwUBQUmyU7TSsYAZDTheEQJihwCeP1erQ55LQnm3Ehi4tliz3dtjEh4An0bb
C5OtqduBYaSCMuffpxR+Ez5C
=wdqz
-----END PGP SIGNATURE-----
--- End Message ---