dachb0den .
information . history . contributions . links . contact




users .
h1kari . nfiltr8 . CommPort5 . pldn . Daimun



projects .
bsd-airtools . sql++ . screamingcobra . tibook-nix . blackhack . d.amp


archives .
tools . exploits . advisories




archives . advisories
Infobot Advisory
This advisory outlines problems in infobot's 'fortran math' handling code that allows you to execute arbitrary commands on the target host. This is an extremely high risk vulnerabilty, so make sure you get patched!
> Download Infobot Advisory

MPG123 Advisory
There exists a buffer overflow condition in MPG123 that could possibly allow exploitation in certain conditions. This advisory demonstrates one of many problems with mpg123's input handling.
> Download MPG123 Advisory

AOLIM Advisory
This advisory demonstrates the weakness in AOLIM's choice of encryption (xor). It shows methods for decoding user passwords being sent over the internet and is provided in conjunction with naimpass, which can be found in the tools section.
> Download AOLIM Advisory

Auto_FTP.pl Advisory
This advisory outlines security flaws in Auto_FTP.pl and precautions you can use to protect yourself.
> Download Auto_FTP.pl Advisory

CoinStar Advisory
This advisory outlines how you can exploit CoinStar machines and receive free money vouchers that you can use in CoinStar supporting stores.
> Download CoinStar Advisory

archives . advisories . whitepapers
Practical Exploitation of RC4 Weaknesses in WEP Environments
This document will give a brief background on 802.11b based WEP weaknesses and outline a few additional flaws in rc4 that stem off of the concepts outlined in "Weaknesses in the Key Scheduling Algorithm of RC4" (FMS) and "Using the Fluhrer, Mantin, and Shamir Attack to Break WEP" (SIR) and describes specific methods that will allow you to optimize key recovery. This document is provided as a conceptual supplement to dweputils, a wep auditing toolset, which is part of the bsd-airtools package provided by Dachb0den Labs. The basic goal of the article is to provide technical details on how to effectively implement the FMS attack so that it works efficiently with both a small amount of iv collection time as well as cracking and processing time and to provide details on how other pseudo random generation algorithm (prga) output bytes reveal key information.
> Download Practical Exploitation of RC4 Weaknesses in WEP Environments

Security Through Obscurity; The European Way
This whitepaper is about europe and how they are considering outlawing the distribution of computer security information to help cut down on computer crime. This contains a thorough outline of why this form of security through obscurity doesn't work.
> Download Security Through Obscurity; The European Way

Clinton's Cyber-Defense Plans
A well documented article on how Clinton plans to deal with cyber-terrorism and other electronic warfare issues in the new millenium.
> Download Clinton's Cyber-Defense Plans

Distributed Denial of Service Review
An insightful look into the workings behind distributed denial of service, how it works, and how to prevent it. This was written in light of the attacks against Yahoo! and eBay to help convey to the public how these new denial of service methods work.
> Download Distributed Denial of Service Review

A Look at the Internet: Past and Future
This whitepaper documents the history and present status of the internet and how it has benefited the world. It also includes information on how growing technology has decreased the rights and freedom of speech of certain individuals due to the increasing amount of technology that the general public doesn't understand.
> Download A Look at the Internet: Past and Future

Is YOUR Network Secure?
This whitepaper outlines all of the necessary actions you should take if your network is hacked. It introduces an imaginary company that's been hacked and it walks through all of the ways you can lock down the network and make sure they never get back in.
> Download Is YOUR Network Secure?

Implementing a Secure Network
Implementing a Secure Network walks you through all the steps you should go through to implement a stable and secure network, from the ground up.
> Download Implementing a Secure Network



copyright © 2001, dachb0den labs - aus der dose. please send any comments, suggestions, questions to the .
all information is property of dachb0den, distribution is permitted as long as credit is given.