Uninformed: Informative Information for the Uninformed

Vol 1» 2005.May


Bibliography

1
3APA3A, offtopic. Bypassing Client Application Protection Techniques.

http://www.securiteam.com/securityreviews/6S0030ABPE.html; accessed Mar 17, 2005.

2
Dubrawsky, Ido. Data Driven Attacks Using HTTP Tunneling.

http://www.securityfocus.com/infocus/1793; accessed Mar 15, 2005.

3
GNU. GNU httptunnel.

http://www.nocrew.org/software/httptunnel.html; accessed Mar 15, 2005.

4
iDEFENSE. AOL Instant Messenger aim:goaway URI Handler Buffer Overflow Vulnerability.

http://www.idefense.com/application/poi/display?id=121&type=vulnerabilities; accessed Mar 08, 2005.

5
Microsoft Corporation. Working with Internet Explorer 6 Security Settings.

http://www.microsoft.com/windows/ie/using/howto/security/settings.mspx; accessed Mar 15, 2005.

6
Microsoft Corporation. The Component Object Model: A Technical Overview.

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dncomg/html/msdn_comppr.asp; accessed Mar 16, 2005.

7
Microsoft Corporation. About WinINet.

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wininet/wininet/about_wininet.asp; accessed Mar 16, 2005.

8
OSVDB. Microsoft IE Object Type Property Overflow.

http://www.osvdb.org/displayvuln.php?osvdb_id=2967; accessed Mar 08, 2005.

9
rattle. Using Process Infection to Bypass Windows Software Firewalls.

http://www.phrack.org/show.php?p=62&a=13; accessed Mar 17, 2005.