tags

alert (1) art (1) asteriks (1) bof (1) browser (1) buffer overflow (1) computer (1) connect (1) cookie (1) crack (2) db_connect (1) db_driver (1) db_load (1) ddos (1) debugging (1) defaced (4) Deprecated plugin (1) document (1) dos (1) errors (1) expl (2) exploit (2) game over (1) geek (1) geeky (1) generd (1) gov.my (1) GSM (1) hack (2) hacker (1) hacking (1) hacks (2) hitb (1) hobbyist (1) ihack (1) index (1) inject (1) injection (1) java (1) javascript (1) lfi (2) malaysia (1) meta (1) metasploit (1) microwave (1) mysql (1) nerd (1) nerdy (1) netstat (1) nmap (1) outbout (1) owned (1) packet (2) pass (1) password (1) pdos (1) psexec (1) pub (1) pwn (1) retrive (1) reveal (1) reverse (1) reverse shell (1) rfi (2) root (1) sarawak (1) security (1) SEH (2) session (1) shellcode (1) sibu (1) sniffing (1) sql (1) sqli (1) stack overflow (1) turk (1) user (1) vnc (1) web (1) which one (1) wideband (1) you (1)

5pl017

Inj3ct0r.com

http://sec.jetlib.com/

Defacement-art-Underground-propaganda

Wireless hack,Wifi hack & security

Tuesday, December 22, 2009

Some Definition on POC.

Some darkside definition,

lfi - local file inclusion; works only on local
rfi - remote file inclusion; works remotely
shellcode - code that spawn shell or has shell code to spawn shell
DOS - Denial of Service
DDOS - A distributed denial of service attack (DDoS) occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
PDOS - Permanent denial of service is the technique of physically damaging a computer from a remote point to render it useless
SEH - Structured Exception Handling
BOF - Buffer over flow buffer overrun, is an anomaly where a process stores data in a buffer outside the memory the programmer set aside for it.

0 Comments:


 

fizpentest, mfCc 2007-2011

IMPORTANT: This information is for research and academic purposes only! This info is not to be abused! I am not responsible for any damage that you may create!