Summerschool Aachen 2005/Challenges
< Summerschool Aachen 2005
Revision as of 08:21, 22 September 2005 by 134.130.242.47 (talk)
- Daniel & Yves - glibc 2.3.5 look at how to exploit heap-based overflows (avoiding the checks)
- Typo & Ilja - 0wn putty
- Update: We found some exploitable bugs. --Typo 18:10, 20 Sep 2005 (CEST)
- Christian feat. Max - verBOTen - a bot that mirrors only that stuff that is protected by robots.txt
- Max: Exif_Thumb finish last years project - done see [1]
Open Challenges
- extend p0f to fingerrprint ScaPy (default) packets
- find a way to fingerprint
- Build an HTTP-Infrastructure Fingerprinting Tool
- Scan our strange network, fingerprint the stuff in there, modify existing fingerprinting tools to do so
- Find out how httprint works
- Build a minimal DHCP Server on ScaPy
- Build an Fingerprinting Tool for
- dhcp
- rsync
- ssh
- ssl
- Look into timing/fingerprinting SSH
- (avoidance)