Archive for June, 2010

Analyzing undocumented formats

muts

Usually when I analyze a protocol or a file-format I spend a few hours or days mapping out targets. The first step towards really understanding what you’re dealing with is to really get to know your target. Search for old…

Read More

UFO: Alien Invasion Part 2 – One More Thing…

dookie2000ca

This post is a continuation of part 1 of exploiting UFO: Alien Invasion.  When I was downloading this game, I noticed that they had a version for Mac OSX as well and since public Mac exploits are few and far…

Read More

UFO: Alien Invasion Part 1 – From Packet to Pwnage

dookie2000ca

In addition to accepting submissions, we at the Exploit Database also have the opportunity to verify the exploits that we post on the site. Recently, I came across an exploit advisory by Jason Geffner targeting the open-source game, UFO: Alien…

Read More

Reliable Weekly Exploit Database Updates

muts

We have finally got around to syncing our exploits archive and SVN server. Both the downloadable archive and SVN server will be updated once a week. The date of the last sync can be found at the top right of…

Read More

The Exploit Database Reloaded

muts

We are happy to announce some new and exciting features as part of the Exploit-DB. Some of the new improvements will greatly enhance your experience on Exploit-DB – such as CVE’s being added to each exploit.  This improves your ability…

Read More