ºÝºÝߣshows by User: htbridge / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: htbridge / Thu, 11 Jul 2013 05:51:44 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: htbridge Welcome in the World Wild Web https://fr.slideshare.net/slideshow/welcome-intheworldwildweb/24134506 welcome-in-the-world-wild-web-130711055144-phpapp02
In our interconnected world, users are everyday facing an hostile environment, even if most of them are usually not aware of the underlying risks. During his talk at 4th brokers forum which occurred in Chavannes-de-Bogis, Frederic BOURLA presented some of the threats which could deadly impact brokers businesses. This short talk is a basic and visual security awareness initiation for brokers and insurers. Source: https://www.htbridge.com/publications/welcome_to_the_world_wild_web.html]]>

In our interconnected world, users are everyday facing an hostile environment, even if most of them are usually not aware of the underlying risks. During his talk at 4th brokers forum which occurred in Chavannes-de-Bogis, Frederic BOURLA presented some of the threats which could deadly impact brokers businesses. This short talk is a basic and visual security awareness initiation for brokers and insurers. Source: https://www.htbridge.com/publications/welcome_to_the_world_wild_web.html]]>
Thu, 11 Jul 2013 05:51:44 GMT https://fr.slideshare.net/slideshow/welcome-intheworldwildweb/24134506 htbridge@slideshare.net(htbridge) Welcome in the World Wild Web htbridge In our interconnected world, users are everyday facing an hostile environment, even if most of them are usually not aware of the underlying risks. During his talk at 4th brokers forum which occurred in Chavannes-de-Bogis, Frederic BOURLA presented some of the threats which could deadly impact brokers businesses. This short talk is a basic and visual security awareness initiation for brokers and insurers. Source: https://www.htbridge.com/publications/welcome_to_the_world_wild_web.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/welcome-in-the-world-wild-web-130711055144-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In our interconnected world, users are everyday facing an hostile environment, even if most of them are usually not aware of the underlying risks. During his talk at 4th brokers forum which occurred in Chavannes-de-Bogis, Frederic BOURLA presented some of the threats which could deadly impact brokers businesses. This short talk is a basic and visual security awareness initiation for brokers and insurers. Source: https://www.htbridge.com/publications/welcome_to_the_world_wild_web.html
from High-Tech Bridge SA (HTBridge)
]]>
786 39 https://cdn.slidesharecdn.com/ss_thumbnails/welcome-in-the-world-wild-web-130711055144-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Fuzzing: An introduction to Sulley Framework /slideshow/fuzzing-an-introduction-to-sulley-framework/21700632 the-sulley-fuzzing-framework-130522145917-phpapp02
Fuzzing is the art of knowing how to put heavy pressure on software in order to find security vulnerabilities. Fuzzing frameworks have been among us since many years. Some of them have made the difference and been adopted by well-known computer security researchers. This paper is an introduction to the fascinating world of fuzzing by exploring the awesome Sulley Fuzzing Framework. We also intend to demonstrate how quick and easy it could be to find security breaches and weaknesses in nowadays software. Link to publication: https://www.htbridge.com/publications/fuzzing_an_introduction_to_sulley_framework.html]]>

Fuzzing is the art of knowing how to put heavy pressure on software in order to find security vulnerabilities. Fuzzing frameworks have been among us since many years. Some of them have made the difference and been adopted by well-known computer security researchers. This paper is an introduction to the fascinating world of fuzzing by exploring the awesome Sulley Fuzzing Framework. We also intend to demonstrate how quick and easy it could be to find security breaches and weaknesses in nowadays software. Link to publication: https://www.htbridge.com/publications/fuzzing_an_introduction_to_sulley_framework.html]]>
Wed, 22 May 2013 14:59:16 GMT /slideshow/fuzzing-an-introduction-to-sulley-framework/21700632 htbridge@slideshare.net(htbridge) Fuzzing: An introduction to Sulley Framework htbridge Fuzzing is the art of knowing how to put heavy pressure on software in order to find security vulnerabilities. Fuzzing frameworks have been among us since many years. Some of them have made the difference and been adopted by well-known computer security researchers. This paper is an introduction to the fascinating world of fuzzing by exploring the awesome Sulley Fuzzing Framework. We also intend to demonstrate how quick and easy it could be to find security breaches and weaknesses in nowadays software. Link to publication: https://www.htbridge.com/publications/fuzzing_an_introduction_to_sulley_framework.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/the-sulley-fuzzing-framework-130522145917-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Fuzzing is the art of knowing how to put heavy pressure on software in order to find security vulnerabilities. Fuzzing frameworks have been among us since many years. Some of them have made the difference and been adopted by well-known computer security researchers. This paper is an introduction to the fascinating world of fuzzing by exploring the awesome Sulley Fuzzing Framework. We also intend to demonstrate how quick and easy it could be to find security breaches and weaknesses in nowadays software. Link to publication: https://www.htbridge.com/publications/fuzzing_an_introduction_to_sulley_framework.html
Fuzzing: An introduction to Sulley Framework from High-Tech Bridge SA (HTBridge)
]]>
3331 12 https://cdn.slidesharecdn.com/ss_thumbnails/the-sulley-fuzzing-framework-130522145917-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Novell GroupWise Multiple Untrusted Pointer Dereferences Exploitation /slideshow/novell-group-wiseuntrustedpointerdereference/18498152 novell-groupwise-untrusted-pointer-dereference-130409160733-phpapp02
In November 2012 High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in Novell GroupWise 2012. Details of the vulnerabilities were disclosed in April 2013. This paper demonstrates vulnerability exploitation to execute arbitrary code on the vulnerable system. Link to publication: https://www.htbridge.com/publications/novell_groupwise_untrusted_pointer_dereference_exploitation.html]]>

In November 2012 High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in Novell GroupWise 2012. Details of the vulnerabilities were disclosed in April 2013. This paper demonstrates vulnerability exploitation to execute arbitrary code on the vulnerable system. Link to publication: https://www.htbridge.com/publications/novell_groupwise_untrusted_pointer_dereference_exploitation.html]]>
Tue, 09 Apr 2013 16:07:33 GMT /slideshow/novell-group-wiseuntrustedpointerdereference/18498152 htbridge@slideshare.net(htbridge) Novell GroupWise Multiple Untrusted Pointer Dereferences Exploitation htbridge In November 2012 High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in Novell GroupWise 2012. Details of the vulnerabilities were disclosed in April 2013. This paper demonstrates vulnerability exploitation to execute arbitrary code on the vulnerable system. Link to publication: https://www.htbridge.com/publications/novell_groupwise_untrusted_pointer_dereference_exploitation.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/novell-groupwise-untrusted-pointer-dereference-130409160733-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In November 2012 High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in Novell GroupWise 2012. Details of the vulnerabilities were disclosed in April 2013. This paper demonstrates vulnerability exploitation to execute arbitrary code on the vulnerable system. Link to publication: https://www.htbridge.com/publications/novell_groupwise_untrusted_pointer_dereference_exploitation.html
Novell GroupWise Multiple Untrusted Pointer Dereferences Exploitation from High-Tech Bridge SA (HTBridge)
]]>
551 4 https://cdn.slidesharecdn.com/ss_thumbnails/novell-groupwise-untrusted-pointer-dereference-130409160733-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Manipulating Memory for Fun & Profit /slideshow/manipulating-memory-for-fun-profit/16428307 manipulating-memory-for-fun-and-profit-130208140243-phpapp01
During this presentation at Information Security Day for ISACA Luxembourg Chapter, Frédéric BOURLA presented most memory manipulation tricks from both offensive and defensive angles. 3 Demo videos available on publication page, original URL: https://www.htbridge.com/publications/manipulating_memory_for_fun_and_profit.html]]>

During this presentation at Information Security Day for ISACA Luxembourg Chapter, Frédéric BOURLA presented most memory manipulation tricks from both offensive and defensive angles. 3 Demo videos available on publication page, original URL: https://www.htbridge.com/publications/manipulating_memory_for_fun_and_profit.html]]>
Fri, 08 Feb 2013 14:02:43 GMT /slideshow/manipulating-memory-for-fun-profit/16428307 htbridge@slideshare.net(htbridge) Manipulating Memory for Fun & Profit htbridge During this presentation at Information Security Day for ISACA Luxembourg Chapter, Frédéric BOURLA presented most memory manipulation tricks from both offensive and defensive angles. 3 Demo videos available on publication page, original URL: https://www.htbridge.com/publications/manipulating_memory_for_fun_and_profit.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/manipulating-memory-for-fun-and-profit-130208140243-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> During this presentation at Information Security Day for ISACA Luxembourg Chapter, Frédéric BOURLA presented most memory manipulation tricks from both offensive and defensive angles. 3 Demo videos available on publication page, original URL: https://www.htbridge.com/publications/manipulating_memory_for_fun_and_profit.html
Manipulating Memory for Fun & Profit from High-Tech Bridge SA (HTBridge)
]]>
1005 4 https://cdn.slidesharecdn.com/ss_thumbnails/manipulating-memory-for-fun-and-profit-130208140243-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
In-Memory Fuzzing with Java (Publication from High-Tech Bridge) /slideshow/inmemory-fuzzing-with-java/15937363 in-memory-fuzzing-130110132228-phpapp02
New publication from Xavier Roussel, Junior Security Analyst, High-Tech Bridge: In-Memory Fuzzing with Java https://www.htbridge.com/publications/in_memory_fuzzing_with_java.html]]>

New publication from Xavier Roussel, Junior Security Analyst, High-Tech Bridge: In-Memory Fuzzing with Java https://www.htbridge.com/publications/in_memory_fuzzing_with_java.html]]>
Thu, 10 Jan 2013 13:22:28 GMT /slideshow/inmemory-fuzzing-with-java/15937363 htbridge@slideshare.net(htbridge) In-Memory Fuzzing with Java (Publication from High-Tech Bridge) htbridge New publication from Xavier Roussel, Junior Security Analyst, High-Tech Bridge: In-Memory Fuzzing with Java https://www.htbridge.com/publications/in_memory_fuzzing_with_java.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/in-memory-fuzzing-130110132228-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> New publication from Xavier Roussel, Junior Security Analyst, High-Tech Bridge: In-Memory Fuzzing with Java https://www.htbridge.com/publications/in_memory_fuzzing_with_java.html
In-Memory Fuzzing with Java (Publication from High-Tech Bridge) from High-Tech Bridge SA (HTBridge)
]]>
939 11 https://cdn.slidesharecdn.com/ss_thumbnails/in-memory-fuzzing-130110132228-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CVE 2012-1889 Microsoft XML core services uninitialized memory vulnerability /slideshow/cve-20121889-microsoft-xml-core-services-uninitialized-memory-vulnerability/13543501 cve-2012-1889-120704143048-phpapp01
Before the 30th of May 2012 attackers were exploiting a new Microsoft Internet explorer 0day... See more at source page: https://www.htbridge.com/publications/cve_2012_1889_microsoft_xml_core_services_uninitialized_memory_vulnerability.html]]>

Before the 30th of May 2012 attackers were exploiting a new Microsoft Internet explorer 0day... See more at source page: https://www.htbridge.com/publications/cve_2012_1889_microsoft_xml_core_services_uninitialized_memory_vulnerability.html]]>
Wed, 04 Jul 2012 14:30:46 GMT /slideshow/cve-20121889-microsoft-xml-core-services-uninitialized-memory-vulnerability/13543501 htbridge@slideshare.net(htbridge) CVE 2012-1889 Microsoft XML core services uninitialized memory vulnerability htbridge Before the 30th of May 2012 attackers were exploiting a new Microsoft Internet explorer 0day... See more at source page: https://www.htbridge.com/publications/cve_2012_1889_microsoft_xml_core_services_uninitialized_memory_vulnerability.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cve-2012-1889-120704143048-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Before the 30th of May 2012 attackers were exploiting a new Microsoft Internet explorer 0day... See more at source page: https://www.htbridge.com/publications/cve_2012_1889_microsoft_xml_core_services_uninitialized_memory_vulnerability.html
CVE 2012-1889 Microsoft XML core services uninitialized memory vulnerability from High-Tech Bridge SA (HTBridge)
]]>
583 5 https://cdn.slidesharecdn.com/ss_thumbnails/cve-2012-1889-120704143048-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybercrime in nowadays businesses - A real case study of targeted attack /slideshow/cybercrime-in-nowadays-businesses-a-real-case-study-of-targeted-attack/11651005 cybercrimeinnowadaysbusinesses-arealcasestudyoftargetedattack-120218114015-phpapp02
Through a real case study, we will explore the complexity of such attacks which endanger today's businesses. All: https://www.htbridge.ch/publications/cybercrime_in_nowadays_businesses_a_real_case_study_of_targeted_attack.html]]>

Through a real case study, we will explore the complexity of such attacks which endanger today's businesses. All: https://www.htbridge.ch/publications/cybercrime_in_nowadays_businesses_a_real_case_study_of_targeted_attack.html]]>
Sat, 18 Feb 2012 11:40:11 GMT /slideshow/cybercrime-in-nowadays-businesses-a-real-case-study-of-targeted-attack/11651005 htbridge@slideshare.net(htbridge) Cybercrime in nowadays businesses - A real case study of targeted attack htbridge Through a real case study, we will explore the complexity of such attacks which endanger today's businesses. All: https://www.htbridge.ch/publications/cybercrime_in_nowadays_businesses_a_real_case_study_of_targeted_attack.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybercrimeinnowadaysbusinesses-arealcasestudyoftargetedattack-120218114015-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Through a real case study, we will explore the complexity of such attacks which endanger today&#39;s businesses. All: https://www.htbridge.ch/publications/cybercrime_in_nowadays_businesses_a_real_case_study_of_targeted_attack.html
Cybercrime in nowadays businesses - A real case study of targeted attack from High-Tech Bridge SA (HTBridge)
]]>
699 5 https://cdn.slidesharecdn.com/ss_thumbnails/cybercrimeinnowadaysbusinesses-arealcasestudyoftargetedattack-120218114015-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Spying Internet Explorer 8.0 /slideshow/spying-internet-explorer-80/11650963 inlinehookingspyinginternetexplorer8-0-120218113452-phpapp01
Malicious software, Malware: this documents introduces this kind of threats by spying a widespread internet browser (IE8).]]>

Malicious software, Malware: this documents introduces this kind of threats by spying a widespread internet browser (IE8).]]>
Sat, 18 Feb 2012 11:34:48 GMT /slideshow/spying-internet-explorer-80/11650963 htbridge@slideshare.net(htbridge) Spying Internet Explorer 8.0 htbridge Malicious software, Malware: this documents introduces this kind of threats by spying a widespread internet browser (IE8). <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/inlinehookingspyinginternetexplorer8-0-120218113452-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Malicious software, Malware: this documents introduces this kind of threats by spying a widespread internet browser (IE8).
Spying Internet Explorer 8.0 from High-Tech Bridge SA (HTBridge)
]]>
562 2 https://cdn.slidesharecdn.com/ss_thumbnails/inlinehookingspyinginternetexplorer8-0-120218113452-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Frontal Attacks - From basic compromise to Advanced Persistent Threat /slideshow/frontal-attacks-from-basic-compromise-to-advanced-persistent-threat/11650911 frontalattacks-frombasiccompromisetoadvancedpersistentthreat-120218112833-phpapp01
This document addresses the major threats which face today's companies, from database exfiltration in DMZ to the Advanced Persistent Threats recently undergone inmany international organizations. Read more: https://www.htbridge.ch/publications/frontal_attacks_from_basic_compromise_to_advanced_persistent_threat.html]]>

This document addresses the major threats which face today's companies, from database exfiltration in DMZ to the Advanced Persistent Threats recently undergone inmany international organizations. Read more: https://www.htbridge.ch/publications/frontal_attacks_from_basic_compromise_to_advanced_persistent_threat.html]]>
Sat, 18 Feb 2012 11:28:30 GMT /slideshow/frontal-attacks-from-basic-compromise-to-advanced-persistent-threat/11650911 htbridge@slideshare.net(htbridge) Frontal Attacks - From basic compromise to Advanced Persistent Threat htbridge This document addresses the major threats which face today's companies, from database exfiltration in DMZ to the Advanced Persistent Threats recently undergone inmany international organizations. Read more: https://www.htbridge.ch/publications/frontal_attacks_from_basic_compromise_to_advanced_persistent_threat.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/frontalattacks-frombasiccompromisetoadvancedpersistentthreat-120218112833-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This document addresses the major threats which face today&#39;s companies, from database exfiltration in DMZ to the Advanced Persistent Threats recently undergone inmany international organizations. Read more: https://www.htbridge.ch/publications/frontal_attacks_from_basic_compromise_to_advanced_persistent_threat.html
Frontal Attacks - From basic compromise to Advanced Persistent Threat from High-Tech Bridge SA (HTBridge)
]]>
31308 8 https://cdn.slidesharecdn.com/ss_thumbnails/frontalattacks-frombasiccompromisetoadvancedpersistentthreat-120218112833-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Inline Hooking in Windows /slideshow/inline-hooking-in-windows/11650892 inlinehookinginwindows-120218112641-phpapp02
This document is the second of a series of five articles relating to the art of hooking.]]>

This document is the second of a series of five articles relating to the art of hooking.]]>
Sat, 18 Feb 2012 11:26:40 GMT /slideshow/inline-hooking-in-windows/11650892 htbridge@slideshare.net(htbridge) Inline Hooking in Windows htbridge This document is the second of a series of five articles relating to the art of hooking. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/inlinehookinginwindows-120218112641-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This document is the second of a series of five articles relating to the art of hooking.
Inline Hooking in Windows from High-Tech Bridge SA (HTBridge)
]]>
1604 3 https://cdn.slidesharecdn.com/ss_thumbnails/inlinehookinginwindows-120218112641-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Userland Hooking in Windows /htbridge/userland-hooking-in-windows userlandhookinginwindows-120218112016-phpapp02
This document is the first of a series of five articles relating to the art of hooking. All: https://www.htbridge.ch/publications/]]>

This document is the first of a series of five articles relating to the art of hooking. All: https://www.htbridge.ch/publications/]]>
Sat, 18 Feb 2012 11:20:13 GMT /htbridge/userland-hooking-in-windows htbridge@slideshare.net(htbridge) Userland Hooking in Windows htbridge This document is the first of a series of five articles relating to the art of hooking. All: https://www.htbridge.ch/publications/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/userlandhookinginwindows-120218112016-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This document is the first of a series of five articles relating to the art of hooking. All: https://www.htbridge.ch/publications/
Userland Hooking in Windows from High-Tech Bridge SA (HTBridge)
]]>
2349 3 https://cdn.slidesharecdn.com/ss_thumbnails/userlandhookinginwindows-120218112016-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Defeating Data Execution Prevention and ASLR in Windows /slideshow/defeating-data-execution-prevention-and-aslr-in-windows/11650748 defeatingdataexecutionpreventionandaslrinwindowsxpsp3-120218111235-phpapp02
Data prevention Execution (DEP) and Address space layout randomization (ASLR) are two protection mechanisms integrated in Windows Read more: https://www.htbridge.ch/publications/defeating_data_execution_prevention_and_aslr_in_windows_xp_sp3.html]]>

Data prevention Execution (DEP) and Address space layout randomization (ASLR) are two protection mechanisms integrated in Windows Read more: https://www.htbridge.ch/publications/defeating_data_execution_prevention_and_aslr_in_windows_xp_sp3.html]]>
Sat, 18 Feb 2012 11:12:31 GMT /slideshow/defeating-data-execution-prevention-and-aslr-in-windows/11650748 htbridge@slideshare.net(htbridge) Defeating Data Execution Prevention and ASLR in Windows htbridge Data prevention Execution (DEP) and Address space layout randomization (ASLR) are two protection mechanisms integrated in Windows Read more: https://www.htbridge.ch/publications/defeating_data_execution_prevention_and_aslr_in_windows_xp_sp3.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defeatingdataexecutionpreventionandaslrinwindowsxpsp3-120218111235-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data prevention Execution (DEP) and Address space layout randomization (ASLR) are two protection mechanisms integrated in Windows Read more: https://www.htbridge.ch/publications/defeating_data_execution_prevention_and_aslr_in_windows_xp_sp3.html
Defeating Data Execution Prevention and ASLR in Windows from High-Tech Bridge SA (HTBridge)
]]>
2122 4 https://cdn.slidesharecdn.com/ss_thumbnails/defeatingdataexecutionpreventionandaslrinwindowsxpsp3-120218111235-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Structured Exception Handler Exploitation /slideshow/structured-exception-handler-exploitation/11650678 structuredexceptionhandlerexploitation-120218110507-phpapp01
The SEH exploitation technique was publicly documented by David Litchfield in September of 2003.]]>

The SEH exploitation technique was publicly documented by David Litchfield in September of 2003.]]>
Sat, 18 Feb 2012 11:05:03 GMT /slideshow/structured-exception-handler-exploitation/11650678 htbridge@slideshare.net(htbridge) Structured Exception Handler Exploitation htbridge The SEH exploitation technique was publicly documented by David Litchfield in September of 2003. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/structuredexceptionhandlerexploitation-120218110507-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The SEH exploitation technique was publicly documented by David Litchfield in September of 2003.
Structured Exception Handler Exploitation from High-Tech Bridge SA (HTBridge)
]]>
854 3 https://cdn.slidesharecdn.com/ss_thumbnails/structuredexceptionhandlerexploitation-120218110507-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Fake malware and virus scanners /slideshow/fake-malware-andvirusscanners/11650513 fakemalwareandvirusscanners-120218104945-phpapp02
Rogue security software reports a virus infection, even if your computer is clean. Security Publications: https://www.htbridge.ch/publications/]]>

Rogue security software reports a virus infection, even if your computer is clean. Security Publications: https://www.htbridge.ch/publications/]]>
Sat, 18 Feb 2012 10:49:42 GMT /slideshow/fake-malware-andvirusscanners/11650513 htbridge@slideshare.net(htbridge) Fake malware and virus scanners htbridge Rogue security software reports a virus infection, even if your computer is clean. Security Publications: https://www.htbridge.ch/publications/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fakemalwareandvirusscanners-120218104945-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Rogue security software reports a virus infection, even if your computer is clean. Security Publications: https://www.htbridge.ch/publications/
Fake malware and virus scanners from High-Tech Bridge SA (HTBridge)
]]>
398 2 https://cdn.slidesharecdn.com/ss_thumbnails/fakemalwareandvirusscanners-120218104945-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Become fully aware of the potential dangers of ActiveX attacks /htbridge/become-fully-aware-of-the-potential-dangers-of-activex-attacks becomefullyawareofthepotentialdangersofactivexattacks-120218104721-phpapp01
Exploiting ActiveX components vulnerabilities in Windows has become a favored method of attackers aiming to compromise specific computers. Full version: https://www.htbridge.ch/publications/become_fully_aware_of_the_potential_dangers_of_activex_attacks.html]]>

Exploiting ActiveX components vulnerabilities in Windows has become a favored method of attackers aiming to compromise specific computers. Full version: https://www.htbridge.ch/publications/become_fully_aware_of_the_potential_dangers_of_activex_attacks.html]]>
Sat, 18 Feb 2012 10:47:19 GMT /htbridge/become-fully-aware-of-the-potential-dangers-of-activex-attacks htbridge@slideshare.net(htbridge) Become fully aware of the potential dangers of ActiveX attacks htbridge Exploiting ActiveX components vulnerabilities in Windows has become a favored method of attackers aiming to compromise specific computers. Full version: https://www.htbridge.ch/publications/become_fully_aware_of_the_potential_dangers_of_activex_attacks.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/becomefullyawareofthepotentialdangersofactivexattacks-120218104721-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Exploiting ActiveX components vulnerabilities in Windows has become a favored method of attackers aiming to compromise specific computers. Full version: https://www.htbridge.ch/publications/become_fully_aware_of_the_potential_dangers_of_activex_attacks.html
Become fully aware of the potential dangers of ActiveX attacks from High-Tech Bridge SA (HTBridge)
]]>
784 2 https://cdn.slidesharecdn.com/ss_thumbnails/becomefullyawareofthepotentialdangersofactivexattacks-120218104721-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Client-side threats - Anatomy of Reverse Trojan attacks /slideshow/clientside-threats-anatomy-of-reverse-trojan-attacks/11650348 clientsidethreatsanatomyofreversetrojanattacks-120218103213-phpapp02
Client-side vulnerabilities are among the biggest threats facing users. Full version: https://www.htbridge.ch/publications/client_side_threats_anatomy_of_reverse_trojan_attacks.html]]>

Client-side vulnerabilities are among the biggest threats facing users. Full version: https://www.htbridge.ch/publications/client_side_threats_anatomy_of_reverse_trojan_attacks.html]]>
Sat, 18 Feb 2012 10:32:11 GMT /slideshow/clientside-threats-anatomy-of-reverse-trojan-attacks/11650348 htbridge@slideshare.net(htbridge) Client-side threats - Anatomy of Reverse Trojan attacks htbridge Client-side vulnerabilities are among the biggest threats facing users. Full version: https://www.htbridge.ch/publications/client_side_threats_anatomy_of_reverse_trojan_attacks.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/clientsidethreatsanatomyofreversetrojanattacks-120218103213-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Client-side vulnerabilities are among the biggest threats facing users. Full version: https://www.htbridge.ch/publications/client_side_threats_anatomy_of_reverse_trojan_attacks.html
Client-side threats - Anatomy of Reverse Trojan attacks from High-Tech Bridge SA (HTBridge)
]]>
1317 6 https://cdn.slidesharecdn.com/ss_thumbnails/clientsidethreatsanatomyofreversetrojanattacks-120218103213-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-htbridge-48x48.jpg?cb=1523210960 High-Tech Bridge SA is a Swiss company dedicated to Information Security by Ethical Hacking. Vendor and product independent approach, internal Research &amp; Development department assure the highest quality of our security services. Corporate ISO 27001 certification guarantees proper internal risk management, permanent business continuity and absolute confidentiality of our customer's data. The highest level of privacy of our customers is guaranteed by the law and constitution of Switzerland. https://www.htbridge.com/ https://cdn.slidesharecdn.com/ss_thumbnails/welcome-in-the-world-wild-web-130711055144-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/welcome-intheworldwildweb/24134506 Welcome in the World W... https://cdn.slidesharecdn.com/ss_thumbnails/the-sulley-fuzzing-framework-130522145917-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/fuzzing-an-introduction-to-sulley-framework/21700632 Fuzzing: An introducti... https://cdn.slidesharecdn.com/ss_thumbnails/novell-groupwise-untrusted-pointer-dereference-130409160733-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/novell-group-wiseuntrustedpointerdereference/18498152 Novell GroupWise Multi...