Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    prev next

Winter2002 cover image
Volume 19
Number 4
60 pages
Winter2002 back cover image
Quote: "Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is tell them they are being attacked, and denounce the peacemakers for lack of patriotism and exposing the country to danger. It works the same in any country." - Hermann Goering, Hitler's designated successor, before being sentenced to death at the Nuremberg trials.
Notes: Page 11 has a copy of a check with an explanation, page 14 has a copy of a letter from the U.S. Department of Justice, page 24 has info about questionable Sprint billing practices, that are not in the index.

Author
Nom de plume Chris Shiflett
Name
Email chris@shiflett.org
Notes

Aritcle
Synopsis Discusses a vulnerability in the Microsoft Passport service.
Notes References "Passport Hacking" in 18:3 (..)
Code None
Page 6
Pages 1 and two thirds
In Best of 2600 book? No

Links
Error on 05/11/2009 Original vulnerability report. Original link
Original article No local copy No archive.org
Ok on 05/11/2009 Microsoft Q313675 security patch. Original link
Original article Local copy on 08/14/2009 No archive.org
Ok on 05/11/2009 Author's interactive demonstration. Original link
Original article Local copy on 08/14/2009 No archive.org

Addendum

Keywords
Exploit A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.    (more..)