|
- 1
-
3APA3A, offtopic. Bypassing Client Application Protection Techniques.
http://www.securiteam.com/securityreviews/6S0030ABPE.html;
accessed Mar 17, 2005.
- 2
-
Dubrawsky, Ido. Data Driven Attacks Using HTTP Tunneling.
http://www.securityfocus.com/infocus/1793; accessed
Mar 15, 2005.
- 3
-
GNU. GNU httptunnel.
http://www.nocrew.org/software/httptunnel.html;
accessed Mar 15, 2005.
- 4
-
iDEFENSE. AOL Instant Messenger aim:goaway URI Handler Buffer Overflow Vulnerability.
http://www.idefense.com/application/poi/display?id=121&type=vulnerabilities;
accessed Mar 08, 2005.
- 5
-
Microsoft Corporation. Working with Internet Explorer 6 Security Settings.
http://www.microsoft.com/windows/ie/using/howto/security/settings.mspx;
accessed Mar 15, 2005.
- 6
-
Microsoft Corporation. The Component Object Model: A Technical Overview.
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dncomg/html/msdn_comppr.asp;
accessed Mar 16, 2005.
- 7
-
Microsoft Corporation. About WinINet.
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wininet/wininet/about_wininet.asp;
accessed Mar 16, 2005.
- 8
-
OSVDB. Microsoft IE Object Type Property Overflow.
http://www.osvdb.org/displayvuln.php?osvdb_id=2967;
accessed Mar 08, 2005.
- 9
-
rattle. Using Process Infection to Bypass Windows Software Firewalls.
http://www.phrack.org/show.php?p=62&a=13; accessed
Mar 17, 2005.
|