nomoreroot.blogspot.com
No More RootInformation security, exploits, database security, web application security, windows security, hacking, 0day, whatever, etc.
http://nomoreroot.blogspot.com/
Information security, exploits, database security, web application security, windows security, hacking, 0day, whatever, etc.
http://nomoreroot.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Saturday
LOAD TIME
0.4 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
17
SSL
EXTERNAL LINKS
23
SITE IP
172.217.12.161
LOAD TIME
0.422 sec
SCORE
6.2
No More Root | nomoreroot.blogspot.com Reviews
https://nomoreroot.blogspot.com
Information security, exploits, database security, web application security, windows security, hacking, 0day, whatever, etc.
No More Root: Google Chrome Drag and Drop fun
http://nomoreroot.blogspot.com/2010/01/google-chrome-drag-and-drop-fun.html
Information security, exploits, database security, web application security, windows security, hacking, 0day, whatever, etc. Jan 26, 2010. Google Chrome Drag and Drop fun. With Google Chrome any code can be injected from a website to another website by drag and drop. This feature is not available in Firefox, Internet Explorer and Safari. I wonder if this can be abused in some way? I opened a bug for you in the Chromium project:. Http:/ code.google.com/p/chromium/issues/detail? January 27, 2010 at 12:29 PM.
No More Root: March 2009
http://nomoreroot.blogspot.com/2009_03_01_archive.html
Information security, exploits, database security, web application security, windows security, hacking, 0day, whatever, etc. Mar 16, 2009. Antivirus, antivirus, antivirus. My last post was about a bug in an antivirus product, not big deal, all software has bugs. I was kindly pointed to this article http:/ isc.sans.org/diary.html? We all know that antivirus suck but not being able to detect a very old exploit with signature analysis that really sucks. Subscribe to: Posts (Atom). Messenger, etc. Cesar ...
No More Root: January 2011
http://nomoreroot.blogspot.com/2011_01_01_archive.html
Information security, exploits, database security, web application security, windows security, hacking, 0day, whatever, etc. Jan 25, 2011. Information security sucks (Part I). This will be a series of short blog posts describing why I think information security sucks. Basically we are protecting our assets with insecure software. Subscribe to: Posts (Atom). There was an error in this gadget. Information security sucks (Part I). Messenger, etc. Cesar has authored several white papers on database, appl...
No More Root: January 2010
http://nomoreroot.blogspot.com/2010_01_01_archive.html
Information security, exploits, database security, web application security, windows security, hacking, 0day, whatever, etc. Jan 26, 2010. Google Chrome Drag and Drop fun. With Google Chrome any code can be injected from a website to another website by drag and drop. This feature is not available in Firefox, Internet Explorer and Safari. I wonder if this can be abused in some way? Blogger allows to run arbitrary Javascript. Naif demo: Click here. BTW: It's not possible to steal Blogger cookies if you are...
No More Root: Information security sucks (Part I)
http://nomoreroot.blogspot.com/2011/01/information-security-sucks-part-i.html
Information security, exploits, database security, web application security, windows security, hacking, 0day, whatever, etc. Jan 25, 2011. Information security sucks (Part I). This will be a series of short blog posts describing why I think information security sucks. Basically we are protecting our assets with insecure software. This is exactly why the Common Criteria exists. January 25, 2011 at 11:44 PM. January 26, 2011 at 7:08 AM. Subscribe to: Post Comments (Atom). There was an error in this gadget.
TOTAL PAGES IN THIS WEBSITE
17
blog.teusink.net: Passwords stored using reversible encryption: how it works (part 1)
http://blog.teusink.net/2009/08/passwords-stored-using-reversible.html
About security, pentesting and everything else. Tuesday, August 25, 2009. Passwords stored using reversible encryption: how it works (part 1). This feature is not enabled by default but I’ve seen it a couple of times in customer networks. As I couldn’t find any description of how this mechanism works or any tool to recover these passwords, I decided to investigate. When you change your password on a domain that has reversible encryption enabled, a password filter. You can look at this structure in an AD ...
blog.teusink.net: July 2010
http://blog.teusink.net/2010_07_01_archive.html
About security, pentesting and everything else. Sunday, July 4, 2010. Hacking wireless presenters with an Arduino and Metasploit. I gave a presentation this week at Hack in the Box. In Amsterdam about hacking wireless presenters (slides here. At lot of security research has been done on wireless keyboards in the last couple of years. 27Mhz keyboards were attacked successfully and can be sniffed using a home-built device. Needless to say doing so may be a criminal offence in your country. I started my res...
blog.teusink.net: When bugs are forgotten
http://blog.teusink.net/2010/09/when-bugs-are-forgotten.html
About security, pentesting and everything else. Thursday, September 2, 2010. When bugs are forgotten. Last year, at HAR2009, there was a presentation. About reverse engineering switch firmware. The researchers had found there is a backdoor password in some Accton-based switches (which are sold by several manufacturers, such as 3Com). It was a very nice piece of reverse engineering. So here it is, more than a year later, a 365-day exploit. Posted by Niels Teusink. Subscribe to: Post Comments (Atom).
blog.teusink.net: July 2009
http://blog.teusink.net/2009_07_01_archive.html
About security, pentesting and everything else. Thursday, July 23, 2009. A common Apache .htaccess misconfiguration. If you want to restrict a directory on an Apache server to specific users, you will probably use an .htaccess/.htpasswd. Configuration. This allows you to add authentication to a directory or an entire site. The sad thing is, if I search. For sample configurations on Google, five out of ten examples are insecure…. AuthName "My Private Files". Yes, the last one is nasa.gov) that donR...
blog.teusink.net: May 2010
http://blog.teusink.net/2010_05_01_archive.html
About security, pentesting and everything else. Thursday, May 13, 2010. Presenting at Hack in the Box 2010 - Amsterdam. The first part of the conference program for HITBSecConf 2010 - Amsterdam. I will be giving a presentation on the security of 2.4GHz wireless presenters. I will be talking about hardware reverse engineering and building an Arduino. Based device to attack these devices. With such a device you can send random keystrokes to someone using such a presenter during a presentation.
blog.teusink.net: Windows password filters
http://blog.teusink.net/2009/08/windows-password-filters.html
About security, pentesting and everything else. Thursday, August 27, 2009. During my HAR talk, I briefly described the password filter mechanism. A password filter is a DLL that is listed in the registry at HKEY LOCAL MACHINE SYSTEM CurrentControlSet Control Lsa Notification Packages. Of course, a password filter could also choose to do something else with the plaintext password. As I described in my previous blog post. The procedures you need to implement are quite well documented.
blog.teusink.net: Cybaby: the software you can use to hack wireless presenters
http://blog.teusink.net/2010/07/cybaby-software-you-can-use-to-hack.html
About security, pentesting and everything else. Sunday, July 4, 2010. Cybaby: the software you can use to hack wireless presenters. I was going to make my code somewhat prettier before releasing it, but as many people where asking for it I decided to release the version I used for the demo. It's called Cybaby (because my hardware was being a crybaby and I'm too lazy to think of a better name). Too build the hardware get yourself an Arduino (I tested with the Duemillanove. Init on Arduino Duemillanove.
blog.teusink.net: HAR 2009 talk references
http://blog.teusink.net/2009/08/har-2009-talk-references.html
About security, pentesting and everything else. Tuesday, August 25, 2009. HAR 2009 talk references. I promised to put up some nice ‘further reading’ material for those who have seen my HAR talk. So here it is:. Disabling the LM hash. The original post from 1997 by Paul Ashton. Luke Jennings research page. A tutorial on the tool by CG. You can see the video of my talk here. Or download it here. Posted by Niels Teusink. Subscribe to: Post Comments (Atom). Passwords stored using reversible encryption: how .
blog.teusink.net: August 2009
http://blog.teusink.net/2009_08_01_archive.html
About security, pentesting and everything else. Thursday, August 27, 2009. During my HAR talk, I briefly described the password filter mechanism. A password filter is a DLL that is listed in the registry at HKEY LOCAL MACHINE SYSTEM CurrentControlSet Control Lsa Notification Packages. Of course, a password filter could also choose to do something else with the plaintext password. As I described in my previous blog post. The procedures you need to implement are quite well documented. The encrypted passwor...
blog.teusink.net: Why MS10-046 mentions my name
http://blog.teusink.net/2010/08/why-ms10-046-mentions-my-name.html
About security, pentesting and everything else. Monday, August 2, 2010. Why MS10-046 mentions my name. Some people have asked me why Microsoft credits me in MS10-046. Aka the patch for the lnk bug). In version 1.0 of the original advisory. They only mentioned .LNK files as an attack vector. When playing around with the bug and the published exploit code. They updated the workaround and were kind enough to credit me for the additional attack vector. Posted by Niels Teusink. Why MS10-046 mentions my name.
TOTAL LINKS TO THIS WEBSITE
23
nomoreroomatheinn.wordpress.com
SOLE SOUL
July 21, 2015. I just cannot for the life of me write any longer. I feel like my arteries are blocked and I haven’t any blood in my body. I feel like the ink has dried up and left me lonely and lost. If I can’t write and make art then what do I have? I can pick my scabs and make poetry out of old dried up wounds. Now my words have dried up inside me, but the ink is still wet. July 15, 2015. My body cries to be removed from the skin it’s in. Years of torment and abuse has thickened my outer layer. Origina...
nomoreroominhell-jammy.blogspot.com
No More Room In Hell
No More Room In Hell. I like films. Especially unusual ones. I'm using this blog to write reviews about some of them. I have not written reviews before. Hopefully they will get better over time. Tuesday, 7 June 2011. Directed By: Fritz Lang. Written By: Dudley Nichols. Starring: Walter Pidgeon, Joan Bennet, George Sanders. Once in Hollywood, and free of the Nazi censorship that had banned his earlier work The Testament of Dr. Mabuse. Lang decided to put his vitriolic hatred of Nazi Germany to film. Being...
No More Room In Hell
When there's no more room in hell, the dead will walk the earth. No More Room in Hell is the ultimate ruthless and unforgiving co-operative zombie survival experience on the Source Engine, delivering award winning survival horror gameplay with dozens of weapons and multiple game modes. We're now on Steam! Click here to download. Update 1.09.7 Released. January 11th, 2018 by Dman757. No More Room in Hell 2 - Teaser. July 25th, 2017 by Dman757. Patch 1.09.4 release imminent. April 17th, 2015 by Riley.
nomoreroominhellwhen.blogspot.com
“When There’s No More Room In Hell”
8220;When There’s No More Room In Hell”. Thursday, May 29, 2014. 8220;When There’s No More Room In Hell”. 8220;When There’s No More Room In Hell”. The Dead Shall Walk The Earth. Gregory V. Boulware. 8216;The Mystery and Quest for The Monks of the Wissahickon’. 8216;Valley Green’. The fish were always jumping while anglers donned their prize gear in their pursuit. Usually it was the fish that enjoyed the last laugh. My name is Salestian Michaels. I’m currently employed by the ‘Philadelphia...I was there w...
nomoreroomtobreathe.deviantart.com
NoMoreRoomToBreathe (Jessii) | DeviantArt
Window.devicePixelRatio*screen.width 'x' window.devicePixelRatio*screen.height) :(screen.width 'x' screen.height) ; this.removeAttribute('onclick')". Lt;3 Jessii <3. Traditional Art / Hobbyist. Deviant for 7 Years. This deviant's full pageview. Last Visit: 200 weeks ago. Lt;3 Jessii <3. This is the place where you can personalize your profile! By moving, adding and personalizing widgets. You can drag and drop to rearrange. You can edit widgets to customize them. The bottom has widgets you can add! Share ...
No More Root
Information security, exploits, database security, web application security, windows security, hacking, 0day, whatever, etc. Jan 25, 2011. Information security sucks (Part I). This will be a series of short blog posts describing why I think information security sucks. Basically we are protecting our assets with insecure software. Jan 26, 2010. Google Chrome Drag and Drop fun. I wonder if this can be abused in some way? Blogger allows to run arbitrary Javascript. Editing a blog post I realized that Blogge...
nomoreroses.com /// homepage
A collection of Music / Images / Information. Tour Dates and Contact Info. No More Roses.com.
nomorerottenapples.blogspot.com
Bluecell Complain Forum Continues...
Bluecell Complain Forum Continues. Wednesday, February 25, 2015. Summing up 2013 and 2014 :) : my music journey. To be honest, I'm surprised that my blog is still up! I thought it will be pull down since I haven been blogging for the longest time! N here I come to write something again :). Ahhhtime flies and its 2015 already! And this blog has also been around for some time already! 2014 has been pretty fulfilling for me! 1) wrote different genre of songs. They may not be perfect but I love all the s...
NOMOREROTTENEGGS.COM
My Site
This is my site description. Powered by InstantPage® from GoDaddy.com. Want one?