Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Nouveaux articles (fr): 1pwnthhW21zdnQ5WucjmnF3pk9puT5fDF
Amélioration du site: 1hckU85orcGCm8A9hk67391LCy4ECGJca

Contribute to SecuObs by sending bitcoins or dogecoins.

Chercher :
Newsletter :  


Revues :
- Presse
- Presse FR
- Vidéos
- Twitter
- Secuobs





Sommaires :
- Tendances
- Failles
- Virus
- Concours
- Reportages
- Acteurs
- Outils
- Breves
- Infrastructures
- Livres
- Tutoriels
- Interviews
- Podcasts
- Communiques
- USBsploit
- Commentaires


Revue Presse:
- Tous
- Francophone
- Par mot clé
- Par site
- Le tagwall


Top bi-hebdo:
- Ensemble
- Articles
- Revue
- Videos
- Twitter
- Auteurs


Articles :
- Par mot clé
- Par auteur
- Par organisme
- Le tagwall


Videos :
- Toutes
- Par mot clé
- Par site
- Le tagwall


Twitter :
- Tous
- Par mot clé
- Par compte
- Le tagwall


Commentaires :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS/XML :
- Articles
- Commentaires
- Revue
- Revue FR
- Videos
- Twitter


RSS SecuObs :
- sécurité
- exploit
- windows
- attaque
- outil
- microsoft


RSS Revue :
- security
- microsoft
- windows
- hacker
- attack
- network


RSS Videos :
- curit
- security
- biomet
- metasploit
- biometric
- cking


RSS Twitter :
- security
- linux
- botnet
- attack
- metasploit
- cisco


RSS Comments :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS OPML :
- Français
- International











Revue de presse francophone :
- Appaloosa AppDome nouent un partenariat pour accompagner les entreprises dans le déploiement et la protection des applications mobiles
- D-Link offre une avec un routeur VPN sans fil AC
- 19 mai Paris Petit-Déjeuner Coreye Développer son business à l'abri des cyberattaques
- POYNTING PRESENTE LA NOUVELLE ANTENNE OMNI-291, SPECIALE MILIEU MARITIME, CÔTIER ET MILIEU HUMIDE
- Flexera Software Les utilisateurs français de PC progressent dans l'application de correctifs logiciels, mais des défis de tailles subsistent
- Riverbed lance SD-WAN basé sur le cloud
- Fujitsu multi-récompensé VMware lui décerne plusieurs Partner Innovation Awards à l'occasion du Partner Leadership Summit
- Zscaler Private Access sécuriser l'accès à distance en supprimant les risques inhérents aux réseaux privés virtuels
- QNAP annonce la sortie de QTS 4.2.1
- Une enquête réalisée par la société de cyber sécurité F-Secure a décelé des milliers de vulnérabilités graves, potentiellement utilisables par des cyber criminels pour infiltrer l'infrastru
- Trouver le juste équilibre entre une infrastructure dédiée et cloud le dilemme de la distribution numérique
- 3 juin - Fleurance - Cybersécurité Territoires
- Cyber-assurances Seules 40 pourcents des entreprises françaises sont couvertes contre les violations de sécurité et les pertes de données
- Des étudiants de l'ESIEA inventent CheckMyHTTPS un logiciel qui vérifie que vos connexions WEB sécurisées ne sont pas interceptées
- Les produits OmniSwitch d'Alcatel-Lucent Enterprise ALE gagnent en sécurité pour lutter contre les cyber-attaques modernes

Dernier articles de SecuObs :
- DIP, solution de partage d'informations automatisée
- Sqreen, protection applicative intelligente de nouvelle génération
- Renaud Bidou (Deny All): "L'innovation dans le domaine des WAFs s'oriente vers plus de bon sens et d'intelligence, plus de flexibilité et plus d'ergonomie"
- Mises à jour en perspective pour le système Vigik
- Les russes ont-ils pwn le système AEGIS ?
- Le ministère de l'intérieur censure une conférence au Canada
- Saut d'air gap, audit de firmware et (in)sécurité mobile au programme de Cansecwest 2014
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- #FIC2014: Entrée en territoire inconnu
- Le Sénat investit dans les monnaies virtuelles

Revue de presse internationale :
- VEHICLE CYBERSECURITY DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Real-world Attack
- Demand letter served on poll body over disastrous Comeleak breach
- The Minimin Aims To Be The Simplest Theremin
- Hacking group PLATINUM used Windows own patching system against it
- Hacker With Victims in 100 Nations Gets 7 Years in Prison
- HPR2018 How to make Komboucha Tea
- Circuit Bender Artist bends Fresnel Lens for Art
- FBI Director Suggests iPhone Hacking Method May Remain Secret
- 2016 Hack Miami Conference May 13-15, 2016
- 8-bit Video Wall Made From 160 Gaming Keyboards
- In An Era Of Decline, News Sites Can t Afford Poor Web Performance
- BeautifulPeople.com experiences data breach 1m affected
- Swedish Air Space Infringed, Aircraft Not Required
- Why cybercriminals attack healthcare more than any other industry
- Setting the Benchmark in the Network Security Forensics Industry

Annuaire des videos
- FUZZING ON LINE PART THREE
- Official Maltego tutorial 5 Writing your own transforms
- Official Maltego tutorial 6 Integrating with SQL DBs
- Official Maltego tutorial 3 Importing CSVs spreadsheets
- install zeus botnet
- Eloy Magalhaes
- Official Maltego tutorial 1 Google s websites
- Official Maltego tutorial 4 Social Networks
- Blind String SQL Injection
- backdoor linux root from r57 php shell VPS khg crew redc00de
- How To Attaque Pc With Back Track 5 In Arabique
- RSA Todd Schomburg talks about Roundup Ready lines available in 2013
- Nessus Diagnostics Troubleshooting
- Panda Security Vidcast Panda GateDefender Performa Parte 2 de 2
- MultiPyInjector Shellcode Injection

Revue Twitter
- RT @fpalumbo: Cisco consistently leading the way ? buys vCider to boost its distributed cloud vision #CiscoONE
- @mckeay Looks odd... not much to go on (prob some slideshow/vid app under Linux)
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- [Blog Spam] Metasploit and PowerShell payloads
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- An inexpensive proxy service called is actually a front for #malware distribution -

Mini-Tagwall
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone

+ de mots clés pour la revue de presse

Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit

+ de mots clés pour les videos

Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall

+ de mots clés pour la revue Twitter

Top bi-hebdo des articles de SecuObs
- [Ettercap – Partie 2] Ettercap par l'exemple - Man In the Middle et SSL sniffing
- [Infratech - release] version 0.6 de Bluetooth Stack Smasher
- [IDS Snort Windows – Partie 2] Installation et configuration
- [Infratech - vulnérabilité] Nouvelle version 0.8 de Bluetooth Stack Smasher
- Mises à jour en perspective pour le système Vigik
- USBDumper 2 nouvelle version nouvelles fonctions !
- EFIPW récupère automatiquement le mot de passe BIOS EFI des Macbook Pro avec processeurs Intel
- La sécurité des clés USB mise à mal par USBDUMPER
- Une faille critique de Firefox expose les utilisateurs de Tor Browser Bundle
- Installation sécurisée d'Apache Openssl, Php4, Mysql, Mod_ssl, Mod_rewrite, Mod_perl , Mod_security

Top bi-hebdo de la revue de presse
- StackScrambler and the Tale of a Packet Parsing Bug

Top bi-hebdo de l'annuaire des videos
- DC++ Botnet. How To DDos A Hub With Fake IPs.
- Comment creer un server botnet!!!!(Réseau de pc zombies)
- Defcon 14 Hard Drive Recovery Part 3

Top bi-hebdo de la revue Twitter
- RT @secureideas: I believe that all the XSS flaws announced are fixed in CVS. Will test again tomorrow if so, release 1.4.3. #BASESnort
- Currently, we do not support 100% of the advanced PDF features found in Adobe Reader... At least that's a good idea.
- VPN (google): German Foreign Office Selects Orange Business for Terrestrial Wide: Full
- @DisK0nn3cT Not really, mostly permission issues/info leak...they've had a couple of XSS vulns but nothing direct.
- Swatting phreaker swatted and heading to jail: A 19-year-old American has been sentenced to eleven years in pris..
- RT @fjserna You are not a true hacker if the calc.exe payload is not the scientific one... infosuck.org/0x0035.png

Top des articles les plus commentés
- [Metasploit 2.x – Partie 1] Introduction et présentation
- Microsoft !Exploitable un nouvel outil gratuit pour aider les développeurs à évaluer automatiquement les risques
- Webshag, un outil d'audit de serveur web
- Les navigateurs internet, des mini-systèmes d’exploitation hors de contrôle ?
- Yellowsn0w un utilitaire de déblocage SIM pour le firmware 2.2 des Iphone 3G
- CAINE un Live[CD|USB] pour faciliter la recherche légale de preuves numériques de compromission
- Nessus 4.0 placé sous le signe de la performance, de l'unification et de la personnalisation
- [Renforcement des fonctions de sécurité du noyau Linux – Partie 1] Présentation
- [IDS Snort Windows – Partie 1] Introduction aux IDS et à SNORT
- Origami pour forger, analyser et manipuler des fichiers PDF malicieux

CVE-2012-1535 Adobe Flash Player Integer Overflow Vulnerability Analysis by Brian Mariani Frédéric Bourla

Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS

Menu > Articles de la revue de presse : - l'ensemble [tous | francophone] - par mots clé [tous] - par site [tous] - le tagwall [voir] - Top bi-hebdo de la revue de presse [Voir]

S'abonner au fil RSS global de la revue de presse



CVE-2012-1535 Adobe Flash Player Integer Overflow Vulnerability Analysis by Brian Mariani Frédéric Bourla

Par contagio
Le [2012-10-15] à 00:29:20



Présentation : Brian Mariani and Frédéric Bourla from High-Tech Bridge SA www.htbridge.com sent their excellent deep analysis of CVE-2012-1535 vulnerability in Adobe Flash Player. The Word documents with Flash that exploited that vulnerability appeared in August but did not become as popular as RTF CVE-2012-0158, which remains to be the most widely used exploit for targeted email attachments. The reason for it is that integer overflows are difficult to exploit in general and CVE-2012-1535 is by far less reliable. This does not mean it is not in use and I will post several recent document with this exploit in the next article. The full analysis is posted below, plus you can download it in PDF format. Download the full paper slides in PDF format here http contagio.deependresearch.org docs CVE-2012-1535-Adobe-Flash-Player-Integer-Overflow-Vulnerability-Analysis.pdf Download files for analysis http contagiodump.blogspot.com 2012 08 cve-2012-1535-samples-and-info.html --------------------------------------------------------------------------------------------------- Previous papers by the same authors CVE-2012-1889 Security Update Analysis - Analysis video and presentation from High-Tech Bridge by Brian Mariani and Frédéric Bourla CVE-2012-1889 Microsoft XML vulnerability - Samples and Analysis by Brian Mariani and Frédéric Bourla CVE CVE-2012-1535 Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service application crash via crafted SWF content, as exploited in the wild in August 2012 with SWF content in a Word document. ANALYSIS Slide 02A FEW WORDS ABOUT FLASH PLAYER Adobe Flash is a multimedia platform used to add animation, video, and interactivity to web pages. Flash manipulates vectors and graphics to provide animation of text, drawingsand images. It supports bidirectional streaming of audio and video. It can capture user inputs via mouse, keyboard, microphone and camera. Flash contains an object-oriented language called ActionScript. It supports automation via the JavaScript Flash language. 03ADOBE FLASH PLAYER HISTORY Flash originated with the application SmartSketch, developed by Jonathan Gay. It was published by FutureWave Software, which was founded by CharlieJackson, Jonathan Gay and Michelle Welsh. As the Internet became more popular, FutureWave added cell animation editing to the vector drawing capabilities of SmartSketch and released FutureSplash Animator on multiple platforms. FutureWave approached Adobe Systems with an offer to sell them FutureSplash in 1995, but Adobe turned them down at that time. In 1996, FutureSplash was acquired by Macromedia and released as Flash, contracting Future and Splash . Flash is currently developed and distributed by Adobe Systems, as the result of their purchase of Macromedia in 2005. 04FLASH IS NOT AN EXCEPTION Just as other widespread software Adobe Flash Player has been heavily audited by cybercriminals the last years. Their main objective is to find high-risk security vulnerabilities which does almost not need user's interactivity in order to fully compromise a remote system. Since 2006 Adobe Flash security problems have raised considerably. Tens of vulnerabilities have been reported the last year. The following slides confirms this issue by giving an overview of Adobe Flash Player vulnerabilities reported between 2006 and 2011. 05SOME STATISTICS Reported vulnerabilities in Adobe Flash Player 06SOME BAD NEWS ABOUT FLASH PLAYER 07TIMELINE OF THE CVE 2012-1535 In this document we will be focused in a pretty recent Adobe Flash Playervulnerability tagged as CVE-2012-1535 by Mitre. Before the 14th August 2012 the flaw was seriously abused over Internet and mainly distributed through malicious Microsoft Word documents. 2 4 On 14th August 2012 Adobe has finally released a patch. 2 On August 15th 2012 Alien Vault Labs 4 has published a brief analysis based on a malicious Microsoft Office Word documents with an embedded SWF file. The 17th August 2012 Mila Parkour from Contagiodump 3 has posted some of these samples. Finally, the 17th August 2012 Rapid7 has published a working exploit for IE 6 7 and 8 on Windows XP SP3 and finally updated the exploit for IE 9 on Windows 7 SP1. 08SAMPLES FROM CONTAGIODUMP 1 Mila Parkour provided us with some of the aforementioned samples in order to dig about this vulnerability. These ones are Microsoft Word documents with an embedded SWF document. After a trivial analysis one can easily understand that these files contain suspicious data. There is enough doubtful information to realize that they were intended to launch a client side exploit in Adobe Flash Player. The following slides show some key information found in the sample 7E3770351AED43FD6C5CAB8E06DC0300-iPhone 5 Battery.doc. 09SAMPLES FROM CONTAGIODUMP 2 The Shockwave Flash object is easily identifiable. 10SAMPLES FROM CONTAGIODUMP 3 The ActionScript heapspray code and the payload can definitely be recognized. 11SAMPLES FROM CONTAGIODUMP 4 Eventually a strange font description named Pspop can be found embedded into the SWF document. 12VULNERABILITY DETAILS The flaw relies on the ActiveX component of Adobe Flash Player before version 11.3.300.271. The code responsible for parsing the OTF file format OpenType Format triggers an exception when the file has a large nTables value contained in the kerning. After the code parses the OTF file, an integer overflow occurs and corrupts the memory. In this document we analyze the process which includes the ActionScript heap spray process finishing by triggering the vulnerability which permits code execution. Our lab environment is an English Windows XP SP3 operating system with Internet Explorer version 7 with Flash 11_3_300_268 installed. 13INTEGER OVERFLOWS An integer overflow vulnerability differs a lot from other kinds of security issues such as buffer or heap overflows. One cannot hijack instantly the execution flow or directly write at arbitrary memory locations. Not all integer overflows are actually exploitable. Many can lead to a denial of service but not always to arbitrary code execution. What is true is that very often one could force a program to read or grab an erroneous value and this can contribute to create serious problems into the program s logic. Owing to all these explanations, integer overflows vulnerabilities are relatively difficult to spot and to exploit. 14HEAP SPRAYING WITH ACTIONSCRIPT ActionScript is a programming language used in Adobe Air and Flash. Heap spraying is an exploitation technique which consist in placing a specific sequence of bytes at a predictable memory location of the targeted process by allocating chunks of memory. It also provides a way to allocate chunks in the heap area. In the CVE-2009-1869 vulnerability a security researcher named Roee Hay used an ActionScript heap spraying in his exploit. The Actionscript code was originally published over Internet. 15 If you are willing to know more about heap spraying, please read this this document https www.htbridge.com publication CVE-2012-1889.pdf 15THE ACTIONSCRIPT HEAPSPRAY CODE 16THE CODE DETAILS The most important lines are 3, 4 and from 17 up to 29. At line 3 the class array is used to create an object named Memory. At line 4 the size of the memory chunk is defined to 0x100000 bytes. At line 19, the function doSpray defines a variable named chunk of thebytearray class. The while loop at line 21 will write the second argument using the asciicharacter set in the memory chunk. Lastly at line 26 a for loop will fill up the memory object with the desired numberof chunks. The next slide show the results of this piece of code. 17THE RESULTS OF HEAPSPRAYING Welcome to the 0x0c world Let s analyze the vulnerability now. 18VULNERABILITY ANALYSIS 1 After triggering a working exploit, the call stack is as described in the image below 19VULNERABILITY ANALYSIS 2 One can observe that the return addresses start always from the 0x10000000 base memory address. This is clearly because we are dealing with a non-aslr address space layout randomization windows module. 20VULNERABILITY ANALYSIS 3 At the line 00 it is possible to identify the 0x0c0c0c0b address which confirms that the flow of execution has been successfully hijacked. 21VULNERABILITY ANALYSIS 4 Taking into consideration the last return address in the previous call stack minus ten bytes lets us discover the instruction who gains code execution. An EAX pointer seems to allow the attacker to redirect program flow control. 22VULNERABILITY ANALYSIS 5 In order to trace the source of the problem we put a breakpoint at the entry point of the function containing the instruction responsible of triggering the exploit. After running the exploit again and breaking at the entry point, the last return address of the call stack tells us about the address 0x104354e4. 23VULNERABILITY ANALYSIS 6 Just before the instruction at the address 0x104354e4 is a call which seems to jump to the function who gets the data from the malformed OTF file. We will call this function issue_func. 24VULNERABILITY ANALYSIS 7 According to Rapid7 the code responsible for parsing the OTF file format triggers an exception when the file has a large nTables value contained in the kerning. If we refer to the malformed OTF file embedded into the SWF document the ntables value is set to 10000000. 25VULNERABILITY ANALYSIS 8 After Adobe Flash loads the malicious SWF document in memory we can find the malformed OTF format and the crafted data some bytes farther in memory. 26VULNERABILITY ANALYSIS 9 When Adobe Flash parses the OTF file the 10000000 value is passed during the execution of the issue_function. The instruction at the address 0x104418C0 reads the large ntable value 10000000. 27VULNERABILITY ANALYSIS 10 Later the instruction SHL EAX, 4 at the address 0x104418c9 logically shifts the EAX register 4 bits to the left. This operation converts the EAX register value to ZERO, leading to an integer overflow. The erroneous value is then pushed into the stack at the instruction 0x104418cc. In the shifting instruction Adobe Flash does an operation over an invalid value and this is exactly what contributes to create serious problems into the program's logic but more importantly into the memory area. The integer overflow corrupts memory in such a way that it is possible to later gain code execution. 28VULNERABILITY ANALYSIS 11 The code continues and reaches a call to a function which will parse the crafted data from the malformed OTF file. This function is resolved at the address 0x10442237. 29VULNERABILITY ANALYSIS 12 In the heart of this function, the previously erroneous value pushed into the stack 00000000 will be taken at the instruction 0x10442261. When the code reaches this function for the third time the ECX register points to the beginning of the Kern Table. At this moment it starts to parse the data with the use of the EAX register as the offset reference. 30VULNERABILITY ANALYSIS 13 At the fifth entry in the function the EAX register will be equal to 8. After adding the EAX and ECX registers, ECX will point to the crafted data which will later corrupt the memory. 31VULNERABILITY ANALYSIS 14 At the end of the function EBX and EAX values will be equal to the 1e0cffe8 value. This value will be slightly modified and finally written into the memory pointed by the ESI register by four instructions located in the issue_func function. 32VULNERABILITY ANALYSIS 15 Here s the memory corruption after the code has processed the previously described instructions many times. 33VULNERABILITY ANALYSIS 16 From the issue_func function, the code will push the ESI register and calls the function at the address 0x1044167b. This is the function which triggers the payload. 34VULNERABILITY ANALYSIS 17 At this moment the ESI register points to the corrupted memory. The EAX register gets the value pointed by ESI at the address 0x10441687. Eventually after reaching the CALL instruction the arbitrary code execution is reached. 35 MITIGATE THE RISK Updating is the best choice for protecting yourself from this specific threat. 14 When this kind of threats is delivered through Microsoft Office documents some mitigations techniques are available, such as Using EMET. Setting the protected view as the default mode. Enforcing ActiveX security settings. 36REFERENCES 1 http en.wikipedia.org wiki Adobe_Flash 2 http www.adobe.com support security bulletins apsb12-18.html 3 http contagiodump.blogspot.ch 2012 08 cve-2012-1535-samples-and-info.html 4 http labs.alienvault.com labs index.php 2012 cve-2012-1535-adobe-flash-being-exploited-in-the-wild 5 https community.rapid7.com community metasploit blog 2012 08 17 adobe-flash-player-exploit-cve-2012-1535-now-available-for-metasploit 6 http downloads.securityfocus.com vulnerabilities exploits 55009.rb 7 http feliam.wordpress.com 2010 02 15 filling-adobes-heap 8 http livedocs.adobe.com flash 9.0_fr ActionScriptLangRefV3 Array.html 9 http help.adobe.com en_US as3 dev WS5b3ccc516d4fbf351e63e3d118676a5388-8000.html 10 https www.corelan.be index.php 2011 12 31 exploit-writing-tutorial-part-11-heap-spraying-demystified 11 https community.rapid7.com community metasploit blog 2012 08 17 adobe-flash-player-exploit-cve-2012-1535-now-available-for-metasploit 12 http www.phrack.org issues.html issue 60 id 10 13 http blogs.technet.com b mmpc archive 2012 08 31 a-technical-analysis-on-cve-2012-1535-adobe- flash-player-vulnerability-part-2.aspx 14 http get.adobe.com flashplayer 15 http code.google.com p roeehay source browse trunk Adobe_Flash_CVE-2009- 1869 src HeapLib.as r 2 THANK YOU FOR READING Your questions are always welcome brian.mariani htbridge.com frederic.bourla htbridge.com

Les mots clés de la revue de presse pour cet article : adobe flash integer overflow vulnerability
Les videos sur SecuObs pour les mots clés : adobe flash overflow vulnerability
Les éléments de la revue Twitter pour les mots clé : adobe flash overflow vulnerability



AddThis Social Bookmark Widget



Les derniers articles du site "contagio" :

- Ransomware.OSX.KeRanger samples
- Files download information
- Potao Express samples
- Downloads currently not available.
- Ask and you shall receive
- Equation samples - from the Kaspersky Report and additional
- Video archives of security conferences
- AlienSpy Java RAT samples and traffic information
- OnionDuke samples
- Wirelurker for OSX, iOS Part I and Windows Part II samples




S'abonner au fil RSS global de la revue de presse

Menu > Articles de la revue de presse : - l'ensemble [tous | francophone] - par mots clé [tous] - par site [tous] - le tagwall [voir] - Top bi-hebdo de la revue de presse [Voir]



Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail




SecuToolBox :

Mini-Tagwall des articles publiés sur SecuObs :

Mini-Tagwall de l'annuaire video :

Mini-Tagwall des articles de la revue de presse :

Mini-Tagwall des Tweets de la revue Twitter :