-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
August
-
Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), August 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
2
-
-
85080589075
-
Supermicro IPMI documentation omission: Presence of second admin account
-
October
-
Floris Bos. Supermicro IPMI documentation omission: presence of second admin account. Full Disclosure mailing list, October 2011. http://seclists.org/fulldisclosure/2011/Oct/530.
-
(2011)
Full Disclosure Mailing List
-
-
Bos, F.1
-
3
-
-
85080557604
-
Supermicro IPMI security
-
brc csf. October
-
brc csf. Supermicro IPMI security. Web Hosting Talk forum post, October 2010. http://www.webhostingtalk.com/showthread.php?t=992082.
-
(2010)
Web Hosting Talk Forum Post
-
-
-
7
-
-
85080480357
-
-
January
-
Dan Farmer. Dell backdoor, January 2013. http://fish2.com/ipmi/dell/secret.html.
-
(2013)
Dell Backdoor
-
-
Farmer, D.1
-
9
-
-
35949000051
-
Implementing and detecting an ACPI BIOS rootkit
-
John Heasman. Implementing and detecting an ACPI BIOS rootkit. Talk at Black Hat Europe, 2006. http://www.blackhat.com/presentations/bh-europe06/bh-eu-06-Heasman.pdf.
-
(2006)
Talk at Black Hat Europe
-
-
Heasman, J.1
-
11
-
-
85080599218
-
-
December
-
Hewlett-Packard. HP Integrated Lights-Out security, 7 edition, December 2010. http://bizsupport2.austin.hp.com/ bc/docs/support/SupportManual/c00212796/ c00212796.pdf.
-
(2010)
HP Integrated Lights-Out Security, 7 Edition
-
-
-
12
-
-
85080540905
-
-
March
-
Hewlett-Packard. HP ProLiant Lights Out-100 User Guide, March 2010. http://bizsupport1.austin.hp.com/bc/docs/support/SupportManual/c02063205/ c02063205.pdf.
-
(2010)
HP ProLiant Lights Out-100 User Guide
-
-
-
13
-
-
85080597077
-
-
October
-
Hewlett-Packard. HP iLO 3 User Guide, October 2012. http://bizsupport2.austin.hp.com/bc/docs/support/SupportManual/c02774507/c02774507.pdf.
-
(2012)
HP iLO 3 User Guide
-
-
-
14
-
-
85080606616
-
-
April
-
Independent Security Evaluators. Exploiting SOHO routers, April 2013. http://securityevaluators.com/content/case-studies/routers/soho router hacks.jsp.
-
(2013)
Exploiting SOHO Routers
-
-
-
15
-
-
84874232272
-
-
Hewlett-Packard, NEC, and Dell. February
-
Intel, Hewlett-Packard, NEC, and Dell. Intelligent Platform Management Interface Specification v2.0, February 2004. http://www.intel.com/content/dam/www/public/us/en/documents/product-briefs/ second-gen-interface-spec-v2-rev1-4.pdf.
-
(2004)
Intelligent Platform Management Interface Specification V2.0
-
-
-
17
-
-
33751032041
-
Subvirt: Implementing malware with virtual machines
-
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, and Jacob R. Lorch. SubVirt: Implementing malware with virtual machines. In 27th IEEE Symposium on Security and Privacy, SP’06, 2006.
-
(2006)
27th IEEE Symposium on Security and Privacy, SP’06
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
21
-
-
85080506829
-
IPMI configuration on ninth-generation dell PowerEdge servers
-
August
-
Weimin Pan and Haihong Zhuo. IPMI configuration on ninth-generation Dell PowerEdge servers. Dell Power Solutions, August 2006. http://www.dell.com/downloads/global/power/ps3q06-20050317-Zhuo.pdf.
-
(2006)
Dell Power Solutions
-
-
Pan, W.1
Zhuo, H.2
-
22
-
-
34547941727
-
Introducing blue pill
-
June
-
Joanna Rutkowska. Introducing Blue Pill. The Invisible Things Lab’s blog, June 2006. http://theinvisiblethings.blogspot.com/2006/06/introducing-blue-pill.html.
-
(2006)
The Invisible Things Lab’s Blog
-
-
Rutkowska, J.1
-
23
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. On the effectiveness of address-space randomization. In 11th ACM conference on Computer and Communications Security, CCS ’04, pages 298–307, 2004.
-
(2004)
11th ACM Conference on Computer and Communications Security, CCS ’04
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
25
-
-
85080591874
-
IPMI: Hacking servers that are turned “off
-
June
-
Johannes Ullrich. IPMI: Hacking servers that are turned “off”. ISC Diary blog, June 2012. https://isc.sans.edu/diary/IPMI%3Aminimal+Hacking+servers+that+are+turned+%22off%22/13399.
-
(2012)
ISC Diary Blog
-
-
Ullrich, J.1
|