Remote_exec

  • Post author:
  • Post category:其他



==Phrack Inc.==

Volume 0x0b, Issue 0x3e, Phile #0x08 of 0x10

|=—–=[ FIST! FIST! FIST! Its all in the wrist: Remote Exec ]=———=|

|=———————————————————————–=|

|=————————–=[ by grugq ]=——————————=|


1 – Abtract

2 – Introduction

3 – Principles

4 – Background

5 – Requirements

6 – Design and Implementation

6.1 – gdbprpc

6.2 – ul_exec

7 – Conclusion

8 – Greets

9 – Bibliography

10 – SourceC0de

—[ 1 – Abstract

The infrastructue of anti-forensics is built on the three strategies of

data destruction, data hiding and data contraception. The principles of

data contracteption, and a technique for executing a data contraception

attack are presented.



版权声明:本文为jccumt原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。