After having studied and tested various types of attack on 32-bit linux machine (shellcode injection, return to libc, GOT overwriting) I focused on the 64-bit world. I hadn't any problems in the implementation of a basic shellcode injection attack.
But now I'm trying to make a return to libc attack on x86_64 in order to bypass the NX-stack protection.
I access the network through a connection which is most likely compromised by a MITM attack. I can't do much about it. What steps should I take to lessen the influence of this attack. I'm especially concerned about the attacker messing with repository links and compromising my system.
hi pls i need your help i'm two days with this problem and i can't fix this, i have a Ddos attack but my dtacenter say that no is an attack, i have 200 Reading Request and 2b ram, my vps is down, my MaxClients / ServerLimit are 256 but the server is to limit, pls very thanks for your help
I have been hit by an Cross Site Scripting / XSS / RFI Attack, where I cant find it anywhere in the source of the files and Hashes on files have not been changed according to OSSEC HIDS that I run real time monitoring on all webdirs.
The Attack happens on IE9 Only it and appends java script code like beneath, notice that it starts after /html> tag closes normally.