Documents & Advisories
[ main | members | docs | tools | bfi | archive | links | contact ]



Fallimenti Promettenti (pdf slides) by vecna (28 September 2007) [Italian]

Sicurezza dei Sistemi P2P per il Data Store Distribuito (pdf article) by tlei and guy montag (23 September 2007) [Italian]

Exploiting Kernel Vulnerabilities (ogg audio) by sgrakkyu and twiz (19 June 2007) [Italian]

Il parere dei vecchi: perchè sicurezza e privacy non possono convivere? (html article) by vecna (22 May 2007) [Italian]

Practical Steganalysis 1: Spammimic (article / full package) by vecna (9 April 2007) [English]

UMA (Unlicensed Mobile Access): infrastruttura e sicurezza (pdf slides) by zen (8 February 2007) [Italian]

Exploiting hidden services to setup anonymous communication infrastructure (pdf slides) by naif (21 October 2006) [English]

Exploiting Software: How To Break Code (ppt slides) by buffer and quequero@UIC (17 October 2006) [Italian]

Fingerprinting e attacco ad un sistema informatico (pdf and ppt slides) by buffer and zen (07 October 2006) [Italian]

La Minaccia Fantasma. Privacy e sicurezza, rischi del 2006 (html article) by vecna (06 October 2006) [Italian]

Anomaly Detection through System Call Argument Analysis (pdf slides / mp3 audio) by Raistlin (03 August 2006) [English]

La Privacy e i motori di ricerca (pdf and ppt slides) by vecna (20 May 2006) [Italian]

My IDS is better than yours! or.. is it? (pdf slides) by Raistlin (26 January 2006) [English]

La Full Disclosure: cos'è, a cosa serve, perché è proibita (mp3 audio) by Raistlin (03 September 2005) [Italian]

PGP Luci ed ombre. Storia ed evoluzione dello strumento per la privacy più usato al mondo (pdf slides / ogg audio) by naif (28 May 2005) [Italian]

Automatic Detection of Web Application Security Flaws (pdf slides) by Raistlin (01 April 2005) [English]

Sabbia: a low-latency design for anonymous networks (pdf paper) by vecna and Raistlin (01 January 2005) [English]

Detecting 0-day Attacks with Learning Intrusion Detection System (pdf slides / rm video) by Raistlin (29 July 2004) [English]

Il sottile confine tra privacy e sicurezza: i dispositivi biometrici (pdf slides / ogg audio) by vodka (15 May 2004) [Italian]

E-Money: dove sono i miei soldi? (pdf slides) by nail and naga@Antifork (08 May 2004) [Italian]

Free & Secure: alcune feature di sicurezza nei sistemi operativi free (pdf slides) by zen (08 May 2004) [Italian]

Secure by default? (pdf slides) by Kobaiashi (08 May 2004) [Italian]

wireless (in)security: (in)sicurezza dell'802.11 (pdf and ppt slides) by naif and vodka (07 May 2004) [Italian]

iN-FiT: IDA based network file transfer (pdf slides) by valv0 (06 May 2004) [Italian]

Hacking della firma digitale e attacco ai contenuti della smartcard: alcune casistiche (pdf slides) by Kobaiashi (06 May 2004) [Italian]

Unsupervised Learning and Data Mining for Intrusion Detection (pdf slides) by Raistlin (21 April 2004) [English]

s0ftpj Digital Security by NeURo@MetroOlografix (March 2004) [Italian]

BFi, la rivista digitale dell'underground italiano by NeURo@MetroOlografix (February 2004) [Italian]

File di log: importanza ed analisi (base) (pdf slides) by vodka (4 November 2003) [Italian]

File di log: importanza ed analisi (avanzato) (pdf slides) by vodka (4 November 2003) [Italian]

Ethical hacking, unethical laws (pdf slides / mp3 audio / avi video) by Raistlin (14 October 2003) [Italian]

Firma digitale e problemi di sicurezza (pdf slides) by Raistlin (20 September 2003) [Italian]

Nuovi progetti di steganografia (pdf slides) by vecna (20 September 2003) [Italian]

La programmazione sicura secondo D. J. Bernstein (pdf slides / mp3 audio) by Quest (20 June 2003) [Italian]

Invisible Irc Project, anonymous real time communication (pdf slides / ogg audio) by vodka (14 June 2003) [Italian]

Steganografia, l'arte della scrittura nascosta (pdf slides / ogg audio) by vecna (14 June 2003) [Italian]

Linux kernel hacking (pdf slides) by valv0 and quest (15 April 2003) [Italian]

Kernel rootkit: attacchi e contromisure (pdf slides) by FuSyS (7 July 2002) [Italian]

IDS: intrusione, controllo e contenimento nel digital warfare by Raistlin (22 June, 2002) [Italian]

OTU: advanced man in the middle concept and code for linux by vecna (BFi#10, file 11 of 18, 30 September, 2001) [English]

Detecting Loadable Kernel Modules (LKM) (featuring KSTAT) by Toby Miller (09 April, 2001) [English]

Covert Shells (featuring 007Shell and B0CK) by J. Christian Smith (12 November, 2001) [English]

S0ft Project Speaks to Antioffline.com by Sil@Antioffline.com (15 July, 2000) [English]

Informazione: libera o privata? by Tom Maddox (10 March, 2000) [Italian]

Winamp Reversing by .+Ma+. (BFi#7, file 18 of 22, 25 December, 1999) [English]




Here are available for downloading the advisories published by s0ftpr0ject.
If you want to inform us about bugs or software problems, write to advisory@s0ftpj.org. Our members will verify what you wrote and will distribute the advisory with care.


SPJ-001-000: (July 12, 1999) World writable root owned script in SalesBuilder (RedHat 6.0)

SPJ-002-000: (July 19, 1999) Possible Denial Of Service using DNS

SPJ-003-000: (Apr 30, 2000) Remotely Exploitable Buffer Overflow in Sniffit

SPJ-004-000: (June 10, 2000) Multiple Remote CGI Vulnerabilities in MailStudio2000


[ main | members | docs | tools | bfi | archive | links | contact ]
s0ftpr0ject digital security for y2k is no (c)opyright 1997-2003 of s0ftpr0ject team
Webmaster is smaster (PGP Key) - Contact us at staff@s0ftpj.org (public PGP Key)