From Wikipedia, the free encyclopedia
This is an automated report generated by
COIBot .
If your username appears here, it means that COIBot has been tracking a link that you have added to one or more articles. COIBot tracks links for one of the following "blacklist and monitor" reasons, which can be found above the actual records (if they are not there, the link is not monitored/blacklisted anymore):
Next to your username will be one of these reasons, or a percentage overlap of your username has with the domain of the added link. Your appearance there does not mean you or one of the other accounts named here have a
conflict of interest with adding the link, or that you or one of the other accounts named here were
spamming the link: it may very well be accidental overlap, or a good link that was picked up by the bot accidentily, or a good link which is nonetheless under investigation of
Wikipedia:Conflict of interest/Noticeboard or
Wikipedia:WikiProject Spam .
For more information on the working of the bot, see the user page of
COIBot . If you have further questions, notify COIBot's maintainer,
Dirk Beetstra , or ask on
Wikipedia talk:WikiProject Spam .
2014-01-08 21:42:47 (UTC):
w:cs:User:Tomáš Drahoňovský (
t -
c ; 26) to
w:cs:Přetečení na haldě (
diff top?) - Link: packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt (
R /
Xmeta /
L - still there ) Other links: blogs.technet.com/b/srd/archive/2009/08/04/preventing-the-exploitation-of-user-mode-heap-corruption-vulnerabilities.aspx (26, 5551, X, X-
R /
X /
L ) www.phrack.org/issues.html?issue=66&id=10#article (26, 360, 1, 0-
R /
X /
L ) packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt (26, 36, 1, 1-
R /
X /
L ) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (26, -1, X, X-
R /
X /
L ) www.ptsecurity.com/download/defeating-xpsp2-heap-protection.pdf (26, 167, 1, 1-
R /
X /
L ) www.heise-online.co.uk/security/A-Heap-of-Risk--/features/74634 (26, 166, 1, 1-
R /
X /
L ) doc.bughunter.net/buffer-overflow/heap-corruption.html (26, 30, 2, 1-
R /
X /
L ) doc.bughunter.net/buffer-overflow/heap-corruption.html (26, 30, 2, 1-
R /
X /
L )
2014-03-09 13:15:44 (UTC):
w:zh:User:Eland Zhou (
t -
c ; 1346) to
w:zh:User:Eland Zhou/è·¨ç«è¯·æ±ä¼ªé (
diff - DELETED ) - Link: packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf (
R /
Xmeta /
L ) Other links: www.ihteam.net/csrf_generator.html (1346, , X, X-
R /
X /
L ) quaxio.com/csrf_state_mutation_on_read_requests/ (1346, , X, X-
R /
X /
L ) blog.eyallupu.com/2012/04/csrf-defense-in-spring-mvc-31.html (1346, , X, X-
R /
X /
L ) ricardozuasti.com/2012/preventing-csrf-in-java-web-apps/ (1346, , X, X-
R /
X /
L ) ha.ckers.org/xss.html (1346, , X, X-
R /
X /
L ) projects.webappsec.org/Cross-Site+Request+Forgery (1346, , X, X-
R /
X /
L ) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (1346, , X, X-
R /
X /
L ) www.owasp.org/index.php/CSRF_Guard (1346, , X, X-
R /
X /
L ) www.cgisecurity.com/csrf-faq.html (1346, , X, X-
R /
X /
L ) www.threadstrong.com/courses/csrf/ (1346, , X, X-
R /
X /
L ) packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf (1346, 36, X, X-
R /
X /
L ) yehg.net/lab/pr0js/view.php/A_Most-Neglected_Fact_About_CSRF.pdf (1346, , X, X-
R /
X /
L ) www.devilscafe.in/2012/03/cross-site-request-forgery-csrf.html (1346, , X, X-
R /
X /
L ) www.webappsecblog.com/CsrfAndSameOriginXss.html (1346, , X, X-
R /
X /
L ) secunia.com/advisories/22467/ (1346, 2192, X, X-
R /
X /
L ) www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29 (1346, , X, X-
R /
X /
L ) docs.djangoproject.com/en/1.2/releases/1.2.5/#csrf-exception-for-ajax-requests (1346, , X, X-
R /
X /
L ) people.mozilla.org/~bsterne/content-security-policy/origin-header-proposal.html (1346, , X, X-
R /
X /
L ) www.adobe.com/devnet/flashplayer/articles/cross_domain_policy.html (1346, , X, X-
R /
X /
L ) msdn.microsoft.com/en-us/library/cc197955.aspx (1346, , X, X-
R /
X /
L ) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (1346, , X, X-
R /
X /
L ) code.google.com/p/hasc-research/downloads/list (1346, , X, X-
R /
X /
L ) code.google.com/p/hasc-research/downloads/list (1346, , X, X-
R /
X /
L ) www.owasp.org/index.php/OWASP_Israel_2012_01#18:15_-_19:00.C2.A0:_AJAX.E2.80.99_Hammer_-_Harnessing_AJAX_for_CSRF_Attacks (1346, , X, X-
R /
X /
L ) www.neohaxor.org/2009/08/11/dynamic-cross-site-request-forgery/ (1346, , X, X-
R /
X /
L ) voices.washingtonpost.com/securityfix/2009/07/weaponizing_web_20.html (1346, , X, X-
R /
X /
L ) securethoughts.com/2009/07/hacking-csrf-tokens-using-css-history-hack/ (1346, , X, X-
R /
X /
L ) www.vimeo.com/1762861 (1346, , X, X-
R /
X /
L ) www.adambarth.com/papers/2008/barth-jackson-mitchell-b.pdf (1346, , X, X-
R /
X /
L ) www.kb.cert.org/vuls/id/264385 (1346, 919, X, X-
R /
X /
L ) www.kb.cert.org/vuls/id/584089 (1346, 919, X, X-
R /
X /
L ) www.kb.cert.org/CERT_WEB%5Cservices%5Cvul-notes.nsf/bymetric?open&start=908 (1346, 919, X, X-
R /
X /
L ) www.webappsec.org/projects/whid/byclass_class_attack_method_value_cross_site_request_forgery_(csrf).shtml (1346, , X, X-
R /
X /
L ) www.darkreading.com/security/perimeter-security/211201111/ (1346, , X, X-
R /
X /
L ) cwe.mitre.org/documents/vuln-trends/index.html (1346, , X, X-
R /
X /
L ) www.isecpartners.com/media/11961/CSRF_Paper.pdf (1346, , X, X-
R /
X /
L ) shiflett.org/articles/cross-site-request-forgeries (1346, , X, X-
R /
X /
L ) bank.example.com/withdraw?account=Alice&amount=1000000&for=Mallory"> (1346, , X, X-
R /
X /
L ) www.w3.org/TR/html4/struct/objects.html#h-13.2 (1346, , X, X-
R /
X /
L )
2014-04-14 09:49:45 (UTC):
w:zh:User:Zhibinr (
t -
c ; 38) to
w:zh:User:Zhibinr/跨站请求伪造 (
diff top?) - Link: packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf (
R /
Xmeta /
L - still there ) Other links: www.ihteam.net/csrf_generator.html (38, , X, X-
R /
X /
L ) quaxio.com/csrf_state_mutation_on_read_requests/ (38, , X, X-
R /
X /
L ) blog.eyallupu.com/2012/04/csrf-defense-in-spring-mvc-31.html (38, , X, X-
R /
X /
L ) ricardozuasti.com/2012/preventing-csrf-in-java-web-apps/ (38, , X, X-
R /
X /
L ) ha.ckers.org/xss.html (38, , X, X-
R /
X /
L ) projects.webappsec.org/Cross-Site+Request+Forgery (38, , X, X-
R /
X /
L ) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (38, , X, X-
R /
X /
L ) www.owasp.org/index.php/CSRF_Guard (38, , X, X-
R /
X /
L ) www.cgisecurity.com/csrf-faq.html (38, , X, X-
R /
X /
L ) www.threadstrong.com/courses/csrf/ (38, , X, X-
R /
X /
L ) packetstormsecurity.org/papers/attack/Using_XSS_to_bypass_CSRF_protection.pdf (38, 36, X, X-
R /
X /
L ) yehg.net/lab/pr0js/view.php/A_Most-Neglected_Fact_About_CSRF.pdf (38, , X, X-
R /
X /
L ) www.devilscafe.in/2012/03/cross-site-request-forgery-csrf.html (38, , X, X-
R /
X /
L ) www.webappsecblog.com/CsrfAndSameOriginXss.html (38, , X, X-
R /
X /
L ) secunia.com/advisories/22467/ (38, 2192, X, X-
R /
X /
L ) www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29 (38, , X, X-
R /
X /
L ) docs.djangoproject.com/en/1.2/releases/1.2.5/#csrf-exception-for-ajax-requests (38, , X, X-
R /
X /
L ) people.mozilla.org/~bsterne/content-security-policy/origin-header-proposal.html (38, , X, X-
R /
X /
L ) www.adobe.com/devnet/flashplayer/articles/cross_domain_policy.html (38, , X, X-
R /
X /
L ) msdn.microsoft.com/en-us/library/cc197955.aspx (38, , X, X-
R /
X /
L ) halls-of-valhalla.org/beta/articles/cross-site-request-forgery-demystified,47/ (38, , X, X-
R /
X /
L ) code.google.com/p/hasc-research/downloads/list (38, , X, X-
R /
X /
L ) www.owasp.org/index.php/OWASP_Israel_2012_01#18:15_-_19:00.C2.A0:_AJAX.E2.80.99_Hammer_-_Harnessing_AJAX_for_CSRF_Attacks (38, , X, X-
R /
X /
L ) www.neohaxor.org/2009/08/11/dynamic-cross-site-request-forgery/ (38, , X, X-
R /
X /
L ) voices.washingtonpost.com/securityfix/2009/07/weaponizing_web_20.html (38, , X, X-
R /
X /
L ) securethoughts.com/2009/07/hacking-csrf-tokens-using-css-history-hack/ (38, , X, X-
R /
X /
L ) www.vimeo.com/1762861 (38, , X, X-
R /
X /
L ) www.adambarth.com/papers/2008/barth-jackson-mitchell-b.pdf (38, , X, X-
R /
X /
L ) www.kb.cert.org/vuls/id/264385 (38, 919, X, X-
R /
X /
L ) www.kb.cert.org/vuls/id/584089 (38, 919, X, X-
R /
X /
L ) www.kb.cert.org/CERT_WEB%5Cservices%5Cvul-notes.nsf/bymetric?open&start=908 (38, 919, X, X-
R /
X /
L ) www.webappsec.org/projects/whid/byclass_class_attack_method_value_cross_site_request_forgery_(csrf).shtml (38, , X, X-
R /
X /
L ) www.darkreading.com/security/perimeter-security/211201111/ (38, , X, X-
R /
X /
L ) cwe.mitre.org/documents/vuln-trends/index.html (38, , X, X-
R /
X /
L ) www.isecpartners.com/media/11961/CSRF_Paper.pdf (38, , X, X-
R /
X /
L ) shiflett.org/articles/cross-site-request-forgeries (38, , X, X-
R /
X /
L ) bank.example.com/withdraw?account=Alice&amount=1000000&for=Mallory"> (38, , X, X-
R /
X /
L ) www.w3.org/TR/html4/struct/objects.html#h-13.2 (38, , X, X-
R /
X /
L )
2014-04-19 17:08:17 (UTC): User
Favonian
t •
c •
dc •
l •
ef •
b •
bl ; (107720) to
Buffer overflow (
|
talk |
history |
links |
watch |
logs ) (
diff top?) - Link: packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf (
R /
Xmeta /
L - still there ) Other links: www.blackhat.com/presentations/bh-asia-04/bh-jp-04-ukai-eng.ppt (107720, 1051, X, X-
R /
X /
L ) packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf (107720, 36, X, X-
R /
X /
L ) developer.intel.com/design/processor/manuals/253666.pdf (107720, -1, X, X-
R /
X /
L ) conference.hitb.org/hitbsecconf2006kl/materials/DAY%201%20-%20Saumil%20Shah%20-%20Writing%20Metasploit%20Plugins.pdf (107720, 33, X, X-
R /
X /
L ) c0re.23.nu/~chris/presentations/overflow2005.pdf (107720, 12, X, X-
R /
X /
L ) dcs.ics.forth.gr/Activities/papers/stride-IFIP-SEC05.pdf (107720, 14, X, X-
R /
X /
L ) www.securityforest.com/downloads/educationtree/bof-eng.txt (107720, 10, X, X-
R /
X /
L ) www.neworder.box.sk/newsread.php?newsid=12476 (107720, 23, X, X-
R /
X /
L ) www.net-security.org/dl/articles/unicodebo.pdf (107720, 436, X, X-
R /
X /
L ) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (107720, -1, X, X-
R /
X /
L ) raykoid666.wordpress.com (107720, 14, X, X-
R /
X /
L ) metasploit.com/users/opcode/msfopcode.cgi (107720, 170, X, X-
R /
X /
L ) packetstormsecurity.com/files/download/121751/ModernOverflowTargets.pdf (107720, 171, X, X-
R /
X /
L ) www.securityfocus.com/archive/1/462728/30/150/threaded (107720, 2010, X, X-
R /
X /
L ) User is in trusted groups sysop, rollbacker on some wikis
2014-07-25 13:06:02 (UTC): User
105.158.2.232
t •
c •
dc •
l •
ef •
b •
bl ; (29) to
User:Penubag/Uploaded images (
|
talk |
history |
links |
watch |
logs ) (
diff top?) - Link: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (
R /
Xmeta /
L - removed ) Other links: host.tld (29, 0, X, X-
R /
X /
L ) r57shell.net (29, , X, X-
R /
X /
L ) r57shell.net (29, , X, X-
R /
X /
L ) rootshell-security.net (29, 6, X, X-
R /
X /
L ) rootshell-security.net (29, 6, X, X-
R /
X /
L ) google.com/search (29, -1, X, X-
R /
X /
L ) google.com/search (29, -1, X, X-
R /
X /
L ) ftp.powernet.com.tr/supermail/debug/k3 (29, 6, X, X-
R /
X /
L ) ftp.powernet.com.tr/supermail/debug/k3 (29, 6, X, X-
R /
X /
L ) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (29, 36, X, X-
R /
X /
L ) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (29, 36, X, X-
R /
X /
L ) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (29, 12, X, X-
R /
X /
L ) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (29, 12, X, X-
R /
X /
L ) wwp.icq.com/scripts/contact.dll?msgto=656555 (29, 12, X, X-
R /
X /
L ) wwp.icq.com/scripts/contact.dll?msgto=656555 (29, 12, X, X-
R /
X /
L ) ",$uploadurl))) (29, 0, X, X-
R /
X /
L ) ".$login.":".$pass."@".$host."\ (29, 0, X, X-
R /
X /
L ) r57shell.net/404/ittir.js (29, , X, X-
R /
X /
L ) r57shell.net/404/ittir.js (29, , X, X-
R /
X /
L ) ccteam.ru (29, 30, X, X-
R /
X /
L ) ccteam.ru (29, 30, X, X-
R /
X /
L ) ccteam.ru/releases/cc999shell (29, 30, X, X-
R /
X /
L ) ccteam.ru/releases/cc999shell (29, 30, X, X-
R /
X /
L ) ccteam.ru/files/c999sh_sources/ (29, 30, X, X-
R /
X /
L ) ccteam.ru/files/c999sh_sources/ (29, 30, X, X-
R /
X /
L ) ccteam.ru/update/c999shell/ (29, 30, X, X-
R /
X /
L ) ccteam.ru/update/c999shell/ (29, 30, X, X-
R /
X /
L ) ccteam.ru/releases/c999shell (29, 30, X, X-
R /
X /
L ) ccteam.ru/releases/c999shell (29, 30, X, X-
R /
X /
L )
1970-01-01 00:00:00 (UTC):
w:fr:User:197.247.9.69 (
t -
c ; 25) to
w:fr:Upload.php (
diff - DELETED ) - Link: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (
R /
Xmeta /
L ) Other links: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (25, 36, 2, 1-
R /
X /
L ) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (25, 36, 2, 1-
R /
X /
L ) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (25, 12, 4, 1-
R /
X /
L ) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (25, 12, 4, 1-
R /
X /
L ) wwp.icq.com/scripts/contact.dll?msgto=656555 (25, 12, 4, 1-
R /
X /
L ) wwp.icq.com/scripts/contact.dll?msgto=656555 (25, 12, 4, 1-
R /
X /
L ) ",$uploadurl))) (25, 0, X, X-
R /
X /
L ) ".$login.":".$pass."@".$host."\ (25, 0, X, X-
R /
X /
L ) ccteam.ru (25, 30, 10, 1-
R /
X /
L ) ccteam.ru (25, 30, 10, 1-
R /
X /
L ) ccteam.ru/releases/cc999shell (25, 30, 10, 1-
R /
X /
L ) ccteam.ru/releases/cc999shell (25, 30, 10, 1-
R /
X /
L ) ccteam.ru/files/c999sh_sources/ (25, 30, 10, 1-
R /
X /
L ) ccteam.ru/files/c999sh_sources/ (25, 30, 10, 1-
R /
X /
L ) ccteam.ru/update/c999shell/ (25, 30, 10, 1-
R /
X /
L ) ccteam.ru/update/c999shell/ (25, 30, 10, 1-
R /
X /
L ) ccteam.ru/releases/c999shell (25, 30, 10, 1-
R /
X /
L ) ccteam.ru/releases/c999shell (25, 30, 10, 1-
R /
X /
L ) host.tld (25, 0, X, X-
R /
X /
L ) rootshell-security.net (25, 6, 2, 1-
R /
X /
L ) rootshell-security.net (25, 6, 2, 1-
R /
X /
L ) google.com/search (25, -1, X, X-
R /
X /
L ) google.com/search (25, -1, X, X-
R /
X /
L ) ftp.powernet.com.tr/supermail/debug/k3 (25, 6, 2, 1-
R /
X /
L ) ftp.powernet.com.tr/supermail/debug/k3 (25, 6, 2, 1-
R /
X /
L )
2015-01-25 16:09:49 (UTC): User
Lynctekrua
t •
c •
dc •
l •
ef •
b •
bl ; (42) to
User:Lynctekrua (
|
talk |
history |
links |
watch |
logs ) (
diff top?) - Link: www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (
R /
Xmeta /
L - removed ) Other links: wwp.icq.com/scripts/contact.dll?msgto=656555 (42, 12, X, X-
R /
X /
L ) ",$uploadurl))) (42, 0, X, X-
R /
X /
L ) ".$login.":".$pass."@".$host."\ (42, 0, X, X-
R /
X /
L ) r57shell.net/404/ittir.js (42, , X, X-
R /
X /
L ) r57shell.net/404/ittir.js (42, , X, X-
R /
X /
L ) ccteam.ru (42, 30, X, X-
R /
X /
L ) ccteam.ru (42, 30, X, X-
R /
X /
L ) ccteam.ru/releases/cc999shell (42, 30, X, X-
R /
X /
L ) ccteam.ru/releases/cc999shell (42, 30, X, X-
R /
X /
L ) ccteam.ru/files/c999sh_sources/ (42, 30, X, X-
R /
X /
L ) ccteam.ru/files/c999sh_sources/ (42, 30, X, X-
R /
X /
L ) ccteam.ru/update/c999shell/ (42, 30, X, X-
R /
X /
L ) ccteam.ru/update/c999shell/ (42, 30, X, X-
R /
X /
L ) ccteam.ru/releases/c999shell (42, 30, X, X-
R /
X /
L ) ccteam.ru/releases/c999shell (42, 30, X, X-
R /
X /
L ) host.tld (42, 0, X, X-
R /
X /
L ) r57shell.net (42, , X, X-
R /
X /
L ) r57shell.net (42, , X, X-
R /
X /
L ) rootshell-security.net (42, 6, X, X-
R /
X /
L ) rootshell-security.net (42, 6, X, X-
R /
X /
L ) google.com/search (42, -1, X, X-
R /
X /
L ) google.com/search (42, -1, X, X-
R /
X /
L ) ftp.powernet.com.tr/supermail/debug/k3 (42, 6, X, X-
R /
X /
L ) ftp.powernet.com.tr/supermail/debug/k3 (42, 6, X, X-
R /
X /
L ) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (42, 36, X, X-
R /
X /
L ) www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c (42, 36, X, X-
R /
X /
L ) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (42, 12, X, X-
R /
X /
L ) wwp.icq.com/scripts/online.dll?icq=656555&img=5 (42, 12, X, X-
R /
X /
L ) wwp.icq.com/scripts/contact.dll?msgto=656555 (42, 12, X, X-
R /
X /
L )
2016-03-24 16:35:40 (UTC): User
Davaakhatan
t •
c •
dc •
l •
ef •
b •
bl ; (20) to
Port Scanner (
|
talk |
history |
links |
watch |
logs ) (
diff !top) - Link: packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (
R /
Xmeta /
L - removed ) Other links: www.linuxjournal.com/article/4234 (20, 6047, X, X-
R /
X /
L ) www.thenetworkadministrator.com/hack/PortScanning.htm (20, 6, 2, 2-
R /
X /
L ) packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (20, 36, 2, 2-
R /
X /
L )
2016-03-25 02:34:51 (UTC):
w:mn:User:Davaakhatan (
t -
c ; 20) to
w:mn:Порт Сканнер (
diff !top) - Link: packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (
R /
Xmeta /
L - still there ) Other links: www.linuxjournal.com/article/4234 (20, 6047, X, X-
R /
X /
L ) www.thenetworkadministrator.com/hack/PortScanning.htm (20, 6, 2, 2-
R /
X /
L ) packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (20, 36, 2, 2-
R /
X /
L ) www.phrack.com/issues.html?issue=49&id=15 (20, 154, 2, 2-
R /
X /
L ) www.networkuptime.com/nmap/page3-13.shtml (20, 9, 4, 2-
R /
X /
L ) www.networkuptime.com/nmap/page3-10.shtml (20, 9, 4, 2-
R /
X /
L ) support.microsoft.com/kb/313418 (20, -1, X, X-
R /
X /
L ) support.microsoft.com/kb/313418 (20, -1, X, X-
R /
X /
L )
2016-05-07 10:53:59 (UTC):
w:it:User:-Kali Yuga- (
t -
c ; 4057) to
w:it:Trojan (informatica) (
diff !top) - Link: www.packetstormsecurity.org/poisonpen/unix/fingerd.c (
R /
Xmeta /
L - removed ) Other links: www.packetstormsecurity.org/poisonpen/unix/fingerd.c (4057, 36, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/04/14/atmos-un-nuovo-trojan-bancario-evoluzione-di-citadel/ (4057, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/03/30/usb-thief-un-nuovo-trojan-per-il-furto-di-dati-basato-su-dispositivi-usb/ (4057, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/03/16/massiccia-ondata-di-infezioni-del-trojan-nemucod-in-italia/ (4057, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2015/12/18/slembunk-un-nuovo-trojan-android-colpisce-app-bancarie/ (4057, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/01/25/asacub-nuovo-trojan-bancario-per-android/ (4057, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/03/03/il-trojan-acecard-mette-a-rischio-gli-utenti-di-app-bancarie-per-android/ (4057, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/03/04/triada-un-nuovo-trojan-per-android-quasi-impossibile-da-rimuovere/ (4057, 39, X, X-
R /
X /
L ) www.certnazionale.it/tag/trojan/ (4057, 39, X, X-
R /
X /
L ) www.symantec.com/connect/articles/security-11-part-2-trojans-and-other-threats (4057, 4851, X, X-
R /
X /
L ) User is in a trusted group rollbacker on some wikis
2016-05-20 07:55:16 (UTC):
w:ja:User:Lanseisei (
t -
c ; 38) to
w:ja:パケットジェネレータ (
diff !top) - Link: packetstormsecurity.org/DoS/targa3.c (
R /
Xmeta /
L - still there ) Other links: www.wirefloss.com (38, 3, 1, 1-
R /
X /
L ) sites.google.com/site/simplepacketsender (38, -1, X, X-
R /
X /
L ) xcap.weebly.com/index.html (38, 1, 1, 1-
R /
X /
L ) netsniff-ng.org (38, 32, 1, 1-
R /
X /
L ) umpa.umitproject.org (38, 3, 1, 1-
R /
X /
L ) packetstormsecurity.org/DoS/targa3.c (38, 36, 1, 1-
R /
X /
L ) www.secdev.org/projects/scapy/ (38, 30, 1, 1-
R /
X /
L ) github.com/jabberwock/rain (38, -1, X, X-
R /
X /
L ) pierf.sourceforge.net (38, -1, X, X-
R /
X /
L ) packeth.sourceforge.net (38, -1, X, X-
R /
X /
L ) www.linuxfoundation.org/en/Net:Pktgen (38, 4530, X, X-
R /
X /
L ) packetsender.com (38, 36, 1, 1-
R /
X /
L ) pcs.sourceforge.net (38, -1, X, X-
R /
X /
L ) ostinato.org (38, 7, 1, 1-
R /
X /
L ) nemesis.sourceforge.net (38, -1, X, X-
R /
X /
L ) www.the-odin.com/ipsorcery.html (38, 22, 1, 1-
R /
X /
L ) www.tamos.com/htmlhelp/commwifi/pgen.htm (38, 11, 3, 1-
R /
X /
L ) www.tamos.com/htmlhelp/commview/pgen.htm (38, 11, 3, 1-
R /
X /
L ) www.colasoft.com/jp/packet_builder/ (38, 37, 6, 1-
R /
X /
L ) packetbuilder.net (38, 1, 1, 1-
R /
X /
L ) bittwist.sourceforge.net (38, -1, X, X-
R /
X /
L ) anettest.sourceforge.net (38, -1, X, X-
R /
X /
L )
2016-05-21 18:16:38 (UTC):
w:ko:User:Montouesto (
t -
c ; 1872) to
w:ko:힙 오버플로 (
diff !top) - Link: packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt (
R /
Xmeta /
L - still there ) Other links: www.ptsecurity.com/download/defeating-xpsp2-heap-protection.pdf (1872, 167, 1, 1-
R /
X /
L ) www.heise-online.co.uk/security/A-Heap-of-Risk--/features/74634 (1872, 166, 1, 1-
R /
X /
L ) web.archive.org/web/20060713194734/http://doc.bughunter.net/buffer-overflow/heap-corruption.html (1872, -1, X, X-
R /
X /
L ) blogs.technet.com/b/srd/archive/2009/08/04/preventing-the-exploitation-of-user-mode-heap-corruption-vulnerabilities.aspx (1872, 5551, X, X-
R /
X /
L ) www.phrack.org/issues.html?issue=66&id=10 (1872, 360, 7, 0-
R /
X /
L ) packetstormsecurity.org/files/view/40638/MallocMaleficarum.txt (1872, 36, 1, 1-
R /
X /
L ) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (1872, -1, X, X-
R /
X /
L )
2016-06-09 18:45:38 (UTC):
wikidata:www:User:Balajijagadesh (
t -
c ; 226067) to
wikidata:www:Q7840362 (
diff !top) - Link: packetstormsecurity.org/distributed/tfn2k.tgz (
R /
Xmeta /
L - removed ) Other links: packetstormsecurity.org/distributed/tfn2k.tgz (226067, 36, X, X-
R /
X /
L ) packetstormsecurity.org/distributed/tfn2k.tgz (226067, 36, X, X-
R /
X /
L ) User is in trusted groups sysop, rollbacker on some wikis
2016-10-06 11:35:20 (UTC):
w:mn:User:Zorigt (
t -
c ; 1379) to
w:mn:Порт Сканнер (
diff !top) - Link: packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (
R /
Xmeta /
L - still there ) Other links: www.linuxjournal.com/article/4234 (1379, 6047, X, X-
R /
X /
L ) www.thenetworkadministrator.com/hack/PortScanning.htm (1379, 6, X, X-
R /
X /
L ) packetstormsecurity.org/files/view/54973/port-scanning-techniques.txt (1379, 36, X, X-
R /
X /
L ) User is in a trusted group sysop on some wikis
2017-01-25 09:12:08 (UTC):
w:uk:User:173.38.209.6 (
t -
c ; 7) to
w:uk:Targa (
diff !top) - Link: packetstormsecurity.org/files/14099/targa.c.html (
R /
Xmeta /
L - still there ) Other links: packetstormsecurity.org/files/14099/targa.c.html (7, 36, 1, 1-
R /
X /
L )
2017-05-24 21:33:50 (UTC):
wikidata:www:User:Jsamwrites (
t -
c ; 73011) to
wikidata:www:Q3967708 (
diff !top) - Link: packetstormsecurity.org/distributed/stachel.tgz (
R /
Xmeta /
L - removed ) Other links: packetstormsecurity.org/distributed/stachel.tgz (73011, 36, 2, 1-
R /
X /
L ) packetstormsecurity.org/distributed/stachel.tgz (73011, 36, 2, 1-
R /
X /
L )
2017-12-15 20:32:06 (UTC):
w:nl:User:Sjoerddebruin (
t -
c ; 40782) to
w:nl:Computervirus (
diff !top) - Link: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (
R /
Xmeta /
L - still there ) Other links: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (40782, 36, X, X-
R /
X /
L ) packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (40782, 36, X, X-
R /
X /
L ) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (40782, -1, X, X-
R /
X /
L ) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (40782, -1, X, X-
R /
X /
L ) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (40782, 2133, X, X-
R /
X /
L ) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (40782, 2133, X, X-
R /
X /
L ) User is in trusted groups sysop, rollbacker on some wikis
2018-02-23 19:16:18 (UTC): User
ClueBot NG
t •
c •
dc •
l •
ef •
b •
bl ; (-1) to
Buffer overflow (
|
talk |
history |
links |
watch |
logs ) (
diff !top) - Link: packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf (
R /
Xmeta /
L - still there ) Other links: www.phrack.com/issues.html?issue=49&id=14 (-1, 154, X, X-
R /
X /
L ) www.security-express.com/archives/bugtraq/1995_1/0403.html (-1, , X, X-
R /
X /
L ) web.archive.org/web/20070901222723/http://www.security-express.com/archives/bugtraq/1995_1/0403.html (-1, -1, X, X-
R /
X /
L ) world.std.com/~franl/worm.html (-1, , X, X-
R /
X /
L ) web.archive.org/web/20070520233435/http://world.std.com/~franl/worm.html (-1, -1, X, X-
R /
X /
L ) csrc.nist.gov/publications/history/ande72.pdf (-1, , X, X-
R /
X /
L ) www.usenix.org/legacy/events/sec01/full_papers/larochelle/larochelle_html/ (-1, , X, X-
R /
X /
L ) raykoid666.wordpress.com (-1, 14, X, X-
R /
X /
L ) pax.grsecurity.net/docs/aslr.txt (-1, , X, X-
R /
X /
L ) www.ngsec.com/ngproducts/stackdefender/ (-1, , X, X-
R /
X /
L ) web.archive.org/web/20070513235539/http://www.ngsec.com/ngproducts/stackdefender/ (-1, -1, X, X-
R /
X /
L ) www.sys-manage.com/english/products/products_BufferShield.html (-1, , X, X-
R /
X /
L ) technet2.microsoft.com/WindowsServer/en/Library/b0de1052-4101-44c3-a294-4da1bd1ef2271033.mspx?mfr=true (-1, , X, X-
R /
X /
L ) linux.softpedia.com/get/System/Operating-Systems/Kernels/Openwall-Linux-kernel-patch-16454.shtml (-1, , X, X-
R /
X /
L ) web.archive.org/web/20120219111512/http://linux.softpedia.com/get/System/Operating-Systems/Kernels/Openwall-Linux-kernel-patch-16454.shtml (-1, -1, X, X-
R /
X /
L ) kerneltrap.org/node/644 (-1, , X, X-
R /
X /
L ) archive.is/20120529183334/http://kerneltrap.org/node/644 (-1, , X, X-
R /
X /
L ) pax.grsecurity.net (-1, , X, X-
R /
X /
L ) blogs.msdn.com/michael_howard/archive/2006/08/16/702707.aspx (-1, , X, X-
R /
X /
L ) www.usenix.org/publications/login/2005-06/pdfs/alexander0506.pdf (-1, , X, X-
R /
X /
L ) blogs.msdn.com/michael_howard/archive/2006/01/30/520200.aspx (-1, , X, X-
R /
X /
L ) www.usenix.org/events/sec03/tech/full_papers/cowan/cowan_html/index.html (-1, , X, X-
R /
X /
L ) www.uninformed.org/?v=2&a=4&t=txt (-1, , X, X-
R /
X /
L ) wiki.x.org/wiki/ProPolice (-1, , X, X-
R /
X /
L ) web.archive.org/web/20070212032750/http://wiki.x.org/wiki/ProPolice (-1, -1, X, X-
R /
X /
L ) www.usenix.org/publications/library/proceedings/sec98/full_papers/cowan/cowan.pdf (-1, , X, X-
R /
X /
L ) directory.fsf.org/libsafe.html (-1, , X, X-
R /
X /
L ) www.securecoding.cert.org/confluence/x/QwY (-1, , X, X-
R /
X /
L ) www.iso.org/obp/ui/#iso:std:iso-iec:tr:24731:-1:ed-2:v1:en:sec:4 (-1, , X, X-
R /
X /
L ) www.theiling.de/projects/erwin.html (-1, , X, X-
R /
X /
L ) www.and.org/vstr/ (-1, , X, X-
R /
X /
L ) bstring.sf.net (-1, , X, X-
R /
X /
L ) wiretap.area.com/Gopher/Library/Techdoc/Virus/inetvir.823 (-1, , X, X-
R /
X /
L ) wiretap.area.com/Gopher/Library/Techdoc/Virus/inetvir.823 (-1, , X, X-
R /
X /
L ) www.cplusplus.com/reference/vector/vector/at/ (-1, , X, X-
R /
X /
L ) www.owasp.org/index.php/Buffer_Overflows (-1, , X, X-
R /
X /
L ) www.owasp.org/index.php/Buffer_Overflows (-1, , X, X-
R /
X /
L ) www.blackhat.com/presentations/bh-asia-04/bh-jp-04-ukai-eng.ppt (-1, 1051, X, X-
R /
X /
L ) packetstormsecurity.org/papers/Win2000/Intro_to_Win32_Exploits.pdf (-1, 36, X, X-
R /
X /
L ) developer.intel.com/design/processor/manuals/253666.pdf (-1, -1, X, X-
R /
X /
L ) web.archive.org/web/20071129123212/http://developer.intel.com/design/processor/manuals/253666.pdf (-1, -1, X, X-
R /
X /
L ) conference.hitb.org/hitbsecconf2006kl/materials/DAY%201%20-%20Saumil%20Shah%20-%20Writing%20Metasploit%20Plugins.pdf (-1, 33, X, X-
R /
X /
L ) c0re.23.nu/~chris/presentations/overflow2005.pdf (-1, 12, X, X-
R /
X /
L ) web.archive.org/web/20070928011639/http://c0re.23.nu/~chris/presentations/overflow2005.pdf (-1, -1, X, X-
R /
X /
L ) dcs.ics.forth.gr/Activities/papers/stride-IFIP-SEC05.pdf (-1, 14, X, X-
R /
X /
L ) www.enderunix.org/docs/en/bof-eng.txt (-1, , X, X-
R /
X /
L ) www.neworder.box.sk/newsread.php?newsid=12476 (-1, 23, X, X-
R /
X /
L ) web.archive.org/web/20070818115455/http://www.neworder.box.sk/newsread.php?newsid=12476 (-1, -1, X, X-
R /
X /
L ) www.net-security.org/dl/articles/unicodebo.pdf (-1, 436, X, X-
R /
X /
L ) web.archive.org/web/20060105041036/http://www.net-security.org/dl/articles/unicodebo.pdf (-1, -1, X, X-
R /
X /
L ) www.microsoft.com/technet/security/bulletin/MS04-028.mspx (-1, -1, X, X-
R /
X /
L ) metasploit.com/users/opcode/msfopcode.cgi (-1, 170, X, X-
R /
X /
L ) web.archive.org/web/20070512195939/http://www.metasploit.com/users/opcode/msfopcode.cgi (-1, -1, X, X-
R /
X /
L ) packetstormsecurity.com/files/download/121751/ModernOverflowTargets.pdf (-1, 171, X, X-
R /
X /
L ) www.securityfocus.com/archive/1/462728/30/150/threaded (-1, 2010, X, X-
R /
X /
L ) d-nb.info/gnd/4752450-9 (-1, , X, X-
R /
X /
L ) cansecwest.com/csw08/csw08-holtmann.pdf (-1, , X, X-
R /
X /
L ) www.exploit-db.com/docs/18346.pdf (-1, , X, X-
R /
X /
L ) csrc.nist.gov/publications/history/ande72.pdf (-1, , X, X-
R /
X /
L ) web.archive.org/web/20071129123212/http://www.syngress.com/book_catalog/327_SSPC/sample.pdf (-1, -1, X, X-
R /
X /
L ) web.archive.org/web/20090817230359/http://doc.bughunter.net/buffer-overflow/ (-1, -1, X, X-
R /
X /
L ) www.blackhat.com/presentations/bh-usa-04/bh-us-04-silberman/bh-us-04-silberman-paper.pdf (-1, 1051, X, X-
R /
X /
L ) web.archive.org/web/20130126024851/http://www.awarenetwork.org/etc/alpha/?x=5 (-1, -1, X, X-
R /
X /
L ) www.sans.org/reading_room/whitepapers/securecode/386.php (-1, , X, X-
R /
X /
L ) www.cert.org/books/secure-coding (-1, , X, X-
R /
X /
L ) www.cert.org/secure-coding (-1, , X, X-
R /
X /
L ) www.securecoding.cert.org (-1, , X, X-
R /
X /
L ) iac.dtic.mil/iatac/download/Vol7_No4.pdf (-1, , X, X-
R /
X /
L ) phrack.org/issues/49/14.html#article (-1, 360, X, X-
R /
X /
L ) raykoid666.wordpress.com/2009/11/28/remote-buffer-overflow-from-vulnerability-to-exploit-part-1/ (-1, 14, X, X-
R /
X /
L ) www.gamesindustry.biz/content_page.php?aid=1461 (-1, , X, X-
R /
X /
L ) web.archive.org/web/20070927210513/http://www.gamesindustry.biz/content_page.php?aid=1461 (-1, -1, X, X-
R /
X /
L ) www.microsoft.com/technet/security/bulletin/ms02-039.mspx (-1, -1, X, X-
R /
X /
L ) research.eeye.com/html/advisories/published/AL20010717.html (-1, , X, X-
R /
X /
L ) User is in trusted groups bot, rollbacker, reviewer on some wikis
2018-12-19 09:59:52 (UTC):
w:it:User:MapiVanPelt (
t -
c ; 10258) to
w:it:Trojan (informatica) (
diff !top) - Link: www.packetstormsecurity.org/poisonpen/unix/fingerd.c (
R /
Xmeta /
L - removed ) Other links: www.packetstormsecurity.org/poisonpen/unix/fingerd.c (10258, 36, X, X-
R /
X /
L ) www.irchelp.org/irchelp/security/index.html (10258, 175, X, X-
R /
X /
L ) www.irchelp.org/irchelp/security/trojan.html (10258, 175, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/04/14/atmos-un-nuovo-trojan-bancario-evoluzione-di-citadel/ (10258, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/03/30/usb-thief-un-nuovo-trojan-per-il-furto-di-dati-basato-su-dispositivi-usb/ (10258, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/03/16/massiccia-ondata-di-infezioni-del-trojan-nemucod-in-italia/ (10258, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2015/12/18/slembunk-un-nuovo-trojan-android-colpisce-app-bancarie/ (10258, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/01/25/asacub-nuovo-trojan-bancario-per-android/ (10258, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/03/03/il-trojan-acecard-mette-a-rischio-gli-utenti-di-app-bancarie-per-android/ (10258, 39, X, X-
R /
X /
L ) www.certnazionale.it/news/2016/03/04/triada-un-nuovo-trojan-per-android-quasi-impossibile-da-rimuovere/ (10258, 39, X, X-
R /
X /
L ) www.certnazionale.it/tag/trojan/ (10258, 39, X, X-
R /
X /
L ) www.symantec.com/connect/articles/security-11-part-2-trojans-and-other-threats (10258, 4851, X, X-
R /
X /
L ) www.dw.com/en/german-government-to-use-trojan-spyware-to-monitor-citizens/a-19066629 (10258, -1, X, X-
R /
X /
L ) www.webnews.it/2011/10/12/germania-trojan-stato/ (10258, 534, X, X-
R /
X /
L ) www.gdata.it/security-labs/informazioni/storia-del-malware/i-primi-anni (10258, 6, X, X-
R /
X /
L ) www.treccani.it/vocabolario/trojan-horse/ (10258, -1, X, X-
R /
X /
L ) techterms.com/definition/trojanhorse (10258, 867, X, X-
R /
X /
L ) usa.kaspersky.com/internet-security-center/threats/trojans#.VvD3eOLhDtQ (10258, 206, X, X-
R /
X /
L ) User is in a trusted group sysop on some wikis
2019-06-29 19:03:50 (UTC):
w:it:User:Botcrux (
t -
c ; 877576) to
w:it:Stacheldraht (
diff !top) - Link: packetstormsecurity.org/distributed/stachel.tgz (
R /
Xmeta /
L - removed ) Other links: packetstormsecurity.org/distributed/stachel.tgz (877576, 36, X, X-
R /
X /
L ) User is in a trusted group bot on some wikis
2019-09-05 11:53:03 (UTC):
w:ar:User:Khalidalamoudi (
t -
c ; 1654) to
w:ar:مؤتمرات أمان الكمبيوتر (
diff !top) - Link: packetstormsecurity.org/files/107632/HITB-2012-CFP-Europe.txt (
R /
Xmeta /
L - removed ) Other links: www.secureworldexpo.com (1654, , X, X-
R /
X /
L ) www.securit.ws (1654, , X, X-
R /
X /
L ) www.digitalbond.com/index.php/events (1654, , X, X-
R /
X /
L ) web.archive.org/web/20101228203154/http://www.digitalbond.com/index.php/events/ (1654, -1, X, X-
R /
X /
L ) www.ruhrsec.de (1654, , X, X-
R /
X /
L ) www.appsecusa.org (1654, , X, X-
R /
X /
L ) zeenews.india.com/news/net-news/cyber-experts-show-vulnerability-of-gsm-networks_759318.html (1654, , X, X-
R /
X /
L ) nullcon.net (1654, , X, X-
R /
X /
L ) www.nspw.org (1654, , X, X-
R /
X /
L ) www.internetsociety.org/events/ndss-symposium (1654, , X, X-
R /
X /
L ) infowarcon.com (1654, , X, X-
R /
X /
L ) www.ieee-security.org/TC/SP-Index.html (1654, , X, X-
R /
X /
L ) www.icissp.org (1654, , X, X-
R /
X /
L ) web.archive.org/web/20140625153121/http://conference.hitb.org/ (1654, -1, X, X-
R /
X /
L ) www.conference.hitb.org (1654, 33, X, X-
R /
X /
L ) www.hackitoergosum.org (1654, , X, X-
R /
X /
L ) hackinparis.com (1654, , X, X-
R /
X /
L ) www.hackerhalted.com (1654, , X, X-
R /
X /
L ) www.grehack.fr (1654, , X, X-
R /
X /
L ) www.hackerhalted.com (1654, , X, X-
R /
X /
L ) fsec.foi.hr (1654, , X, X-
R /
X /
L ) www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,9163.0 (1654, , X, X-
R /
X /
L ) web.archive.org/web/20121030222352/http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,9163.0/ (1654, -1, X, X-
R /
X /
L ) www.css.umcs.lublin.pl (1654, , X, X-
R /
X /
L ) news.cnet.com/8301-27080_3-20001126-245.html (1654, , X, X-
R /
X /
L ) cansecwest.com (1654, , X, X-
R /
X /
L ) cansecwest.com (1654, , X, X-
R /
X /
L ) www.brucon.org (1654, , X, X-
R /
X /
L ) technet.microsoft.com/en-us/security/cc261637.aspx (1654, , X, X-
R /
X /
L ) news.cnet.com/Microsoft-meets-the-hackers/2009-1002_3-5747813.html (1654, , X, X-
R /
X /
L ) www.microsoft.com/technet/security/bluehat/default.mspx (1654, -1, X, X-
R /
X /
L ) www.blackhat.com (1654, 1051, X, X-
R /
X /
L ) www.cscic.state.ny.us/security/conferences (1654, , X, X-
R /
X /
L ) web.archive.org/web/20110221112525/http://www.cscic.state.ny.us/security/conferences/ (1654, -1, X, X-
R /
X /
L ) www.albany.edu/iasymposium (1654, , X, X-
R /
X /
L ) www.acsac.org/archive (1654, , X, X-
R /
X /
L ) www.acsac.org (1654, , X, X-
R /
X /
L ) www.sigsac.org/ccs.html (1654, , X, X-
R /
X /
L ) 44con.com (1654, , X, X-
R /
X /
L ) nullcon.net/website/goa-2018/speakers/haroon-meer.php (1654, , X, X-
R /
X /
L ) web.archive.org/web/20081120004825/http://www.chicagocon.com/content/view/97/7 (1654, -1, X, X-
R /
X /
L ) www.chicagocon.com/content/view/97/7 (1654, , X, X-
R /
X /
L ) www.sxconference.com (1654, , X, X-
R /
X /
L ) www.chicagocon.com/content/view/33/12 (1654, , X, X-
R /
X /
L ) www.chicagocon.com/content/view/33/12 (1654, , X, X-
R /
X /
L ) www.ares-conference.eu (1654, , X, X-
R /
X /
L ) infosectrainingevents.com (1654, , X, X-
R /
X /
L ) u-sys.org/HCC (1654, , X, X-
R /
X /
L ) ohm2013.org (1654, , X, X-
R /
X /
L ) www.har2009.org (1654, , X, X-
R /
X /
L ) www.stichtinghxx.nl (1654, , X, X-
R /
X /
L ) web.archive.org/web/20100112052137/http://stichtinghxx.nl/ (1654, -1, X, X-
R /
X /
L ) wildwesthackinfest.com (1654, , X, X-
R /
X /
L ) www.toorcon.org (1654, , X, X-
R /
X /
L ) www.thotcon.org (1654, , X, X-
R /
X /
L ) www.thehackersconference.com (1654, , X, X-
R /
X /
L ) www.skydogcon.com/SDC2 (1654, , X, X-
R /
X /
L ) www.rootcon.org (1654, , X, X-
R /
X /
L ) roadsec.com.br (1654, , X, X-
R /
X /
L ) quahogcon.org (1654, , X, X-
R /
X /
L ) www.pumpcon.org (1654, , X, X-
R /
X /
L ) phreaknic.info/pn12 (1654, , X, X-
R /
X /
L ) web.archive.org/web/20130221022754/http://www.phreaknic.info/pn12/ (1654, -1, X, X-
R /
X /
L ) nuitduhack.com/en (1654, , X, X-
R /
X /
L ) www.nsec.io (1654, , X, X-
R /
X /
L ) www.nohat.it/index.html (1654, , X, X-
R /
X /
L ) www.malcon.org (1654, , X, X-
R /
X /
L ) web.archive.org/web/20130526164938/http://www.malcon.org/ (1654, -1, X, X-
R /
X /
L ) www.layerone.org (1654, , X, X-
R /
X /
L ) infiltratecon.com (1654, , X, X-
R /
X /
L ) hardwear.io (1654, , X, X-
R /
X /
L ) www.hacktivity.com (1654, , X, X-
R /
X /
L ) hackmiami.org (1654, , X, X-
R /
X /
L ) www.hackfest.ca (1654, , X, X-
R /
X /
L ) www.icalab.com/hackersidol (1654, , X, X-
R /
X /
L ) web.archive.org/web/20140411173256/http://www.icalab.com/hackersidol/ (1654, -1, X, X-
R /
X /
L ) www.hackersday.org (1654, , X, X-
R /
X /
L ) www.theguardian.com/technology/blog/2011/may/23/hack-in-the-box-security-conference (1654, , X, X-
R /
X /
L ) packetstormsecurity.org/files/107632/HITB-2012-CFP-Europe.txt (1654, 36, X, X-
R /
X /
L ) www.g0s.org (1654, , X, X-
R /
X /
L ) www.infosecisland.com/blogtag/2183/GrrCON.html (1654, , X, X-
R /
X /
L ) www.ekoparty.com.ar (1654, , X, X-
R /
X /
L ) web.archive.org/web/20120325050037/http://ekoparty.com.ar/ (1654, -1, X, X-
R /
X /
L ) dianainitiative.org (1654, , X, X-
R /
X /
L ) infosecisland.com/blogview/17012-Wow-So-That-Was-DerbyCon.html (1654, , X, X-
R /
X /
L ) www.CypherCon.com (1654, , X, X-
R /
X /
L ) www.icalab.com/organization/about-us (1654, , X, X-
R /
X /
L ) web.archive.org/web/20160618055016/https://www.icalab.com/organization/about-us (1654, -1, X, X-
R /
X /
L ) circlecitycon.com (1654, , X, X-
R /
X /
L ) www.securitybsides.com (1654, , X, X-
R /
X /
L ) www.athcon.org (1654, , X, X-
R /
X /
L ) web.archive.org/web/20100403092901/http://www.athcon.org/ (1654, -1, X, X-
R /
X /
L ) motherboard.vice.com/en_us/article/vbne9a/a-history-of-badgelife-def-cons-unlikely-obsession-with-artistic-circuit-boards (1654, , X, X-
R /
X /
L ) signalprocessingsociety.org/events/conferences (1654, , X, X-
R /
X /
L ) www.phdays.com/en/ (1654, , X, X-
R /
X /
L ) 0seccon.com (1654, , X, X-
R /
X /
L ) www.virusbtn.com/conference (1654, , X, X-
R /
X /
L ) www.usenix.org/conferences/byname/108 (1654, , X, X-
R /
X /
L ) www.troopers.de (1654, , X, X-
R /
X /
L ) www.swisscyberstorm.com (1654, , X, X-
R /
X /
L ) www.sstic.org (1654, , X, X-
R /
X /
L ) www.sstic.org (1654, , X, X-
R /
X /
L ) www.sourceconference.com (1654, , X, X-
R /
X /
L ) www.sinconf.org (1654, , X, X-
R /
X /
L )
2020-02-14 20:41:29 (UTC):
w:tr:User:Huunta (
t -
c ; 14883) to
w:tr:Stacheldraht (
diff !top) - Link: packetstormsecurity.org/distributed/stachel.tgz (
R /
Xmeta /
L - still there ) Other links: packetstormsecurity.org/distributed/stachel.tgz (14883, 36, 1, 1-
R /
X /
L ) staff.washington.edu/dittrich/misc/stacheldraht.analysis (14883, -1, X, X-
R /
X /
L ) staff.washington.edu/dittrich/talks/nanog/stacheldraht.html (14883, -1, X, X-
R /
X /
L ) packetstormsecurity.com/distributed/stachel.tgz (14883, 171, 1, 1-
R /
X /
L )
2020-03-08 14:46:00 (UTC):
w:de:User:Granada (
t -
c ; 223) to
w:de:Stephanie Wehner (
diff !top) - Link: packetstormsecurity.org/files/25297/fbsdfun.htm (
R /
Xmeta /
L - still there ) Other links: qutech.nl/stephanie-wehner-wins-ammodo-science-award-2019/ (223, 245, 2, 1-
R /
X /
L ) doi.org/10.1063/1.5120591 (223, -1, X, X-
R /
X /
L ) www.tudelft.nl/en/2018/tu-delft/eu-awards-ten-million-euro-to-european-quantum-internet-alliance-to-speed-up-development-of-quantum-internet/ (223, 3662, X, X-
R /
X /
L ) 2020.qcrypt.net (223, 11, 1, 1-
R /
X /
L ) qutech.nl/person/stephanie-wehner-roadmap/ (223, 245, 2, 1-
R /
X /
L ) zdb-katalog.de/list.xhtml?t=iss%3D%220028-0836%22&key=cql (223, 60289, X, X-
R /
X /
L ) packetstormsecurity.org/files/25297/fbsdfun.htm (223, 36, 1, 1-
R /
X /
L ) www.iqi.caltech.edu/people.html (223, -1, X, X-
R /
X /
L )
2020-04-07 15:43:20 (UTC):
w:sq:User:Dorina.M (
t -
c ; 27) to
w:sq:Stephanie Wehner (
diff !top) - Link: packetstormsecurity.org/files/25297/fbsdfun.htm (
R /
Xmeta /
L - still there ) Other links: ammodo-science-award.org/en/ (27, 26, 1, 1-
R /
X /
L ) qutech.nl/stephanie-wehner-wins-ammodo-science-award-2019/ (27, 245, 4, 1-
R /
X /
L ) doi.org/10.1038%2Fnature15759 (27, -1, X, X-
R /
X /
L ) ui.adsabs.harvard.edu/abs/2015Natur.526..682H (27, -1, X, X-
R /
X /
L ) www.tudelft.nl/en/2018/tu-delft/eu-awards-ten-million-euro-to-european-quantum-internet-alliance-to-speed-up-development-of-quantum-internet/ (27, 3662, X, X-
R /
X /
L ) 2018.qcrypt.net (27, 2, 1, 1-
R /
X /
L ) 2017.qcrypt.net/qcrypt-charter/ (27, 2, 1, 1-
R /
X /
L ) doi.org/10.1038%2Fd41586-018-01835-3 (27, -1, X, X-
R /
X /
L ) ui.adsabs.harvard.edu/abs/2018Natur.554..289C (27, -1, X, X-
R /
X /
L ) www.r4k.net (27, 4, 1, 1-
R /
X /
L ) web.archive.org/web/20130327083229/http://www.r4k.net (27, -1, X, X-
R /
X /
L ) packetstormsecurity.org/files/25297/fbsdfun.htm (27, 36, 1, 1-
R /
X /
L ) qutech.nl/person/stephanie-wehner-roadmap/ (27, 245, 4, 1-
R /
X /
L ) www.cosmosmagazine.com/node/3872/full (27, 5166, X, X-
R /
X /
L ) web.archive.org/web/20120403162611/http://www.cosmosmagazine.com/node/3872/full (27, -1, X, X-
R /
X /
L ) www.newscientist.com/article/dn19797-quantum-uncertainty-controls-action-at-a-distance.html (27, -1, X, X-
R /
X /
L ) doi.org/10.1126%2Fscience.1192065 (27, -1, X, X-
R /
X /
L ) ui.adsabs.harvard.edu/abs/2010Sci...330.1072O (27, -1, X, X-
R /
X /
L ) doi.org/10.1103%2FPhysRevLett.100.220502 (27, -1, X, X-
R /
X /
L ) ui.adsabs.harvard.edu/abs/2008PhRvL.100v0502W (27, -1, X, X-
R /
X /
L ) qutech.nl/roadmap/quantum-internet/ (27, 245, 4, 1-
R /
X /
L ) qutech.nl/roadmap/quantum-internet/ (27, 245, 4, 1-
R /
X /
L ) www.albumacademicum.uva.nl (27, -1, X, X-
R /
X /
L )
2020-10-22 00:02:01 (UTC):
n:ru:User:NewsBots (
t -
c ; 6079823) to
n:ru:US-CERT предупреждает об атаке на Linux системы с использованием SSH ключей (
diff top) - Link: packetstormsecurity.org/UNIX/penetration/rootkits/phalanx-b6.tar.bz2 (
R /
Xmeta /
L - still there ) Other links: connect.ok.ru/offer?url=https:%2F%2Fru.wikinews.org%2Fwiki%2FUS-CERT_%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B4%25D1%2583%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B6%25D0%25B4%25D0%25B0%25D0%25B5%25D1%2582_%25D0%25BE%25D0%25B1_%25D0%25B0%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B5_%25D0%25BD%25D0%25B0_Linux_%25D1%2581%25D0%25B8%25D1%2581%25D1%2582%25D0%25B5%25D0%25BC%25D1%258B_%25D1%2581_%25D0%25B8%25D1%2581%25D0%25BF%25D0%25BE%25D0%25BB%25D1%258C%25D0%25B7%25D0%25BE%25D0%25B2%25D0%25B0%25D0%25BD%25D0%25B8%25D0%25B5%25D0%25BC_SSH_%25D0%25BA%25D0%25BB%25D1%258E%25D1%2587%25D0%25B5%25D0%25B9&title=US-CERT+%D0%BF%D1%80%D0%B5%D0%B4%D1%83%D0%BF%D1%80%D0%B5%D0%B6%D0%B4%D0%B0%D0%B5%D1%82+%D0%BE%D0%B1+%D0%B0%D1%82%D0%B0%D0%BA%D0%B5+%D0%BD%D0%B0+Linux+%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D1%8B+%D1%81+%D0%B8%D1%81%D0%BF%D0%BE%D0%BB%D1%8C%D0%B7%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5%D0%BC+SSH+%D0%BA%D0%BB%D1%8E%D1%87%D0%B5%D0%B9+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, 1200951, X, X-
R /
X /
L ) vkontakte.ru/share.php?url=https:%2F%2Fru.wikinews.org%2Fwiki%2FUS-CERT_%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B4%25D1%2583%25D0%25BF%25D1%2580%25D0%25B5%25D0%25B6%25D0%25B4%25D0%25B0%25D0%25B5%25D1%2582_%25D0%25BE%25D0%25B1_%25D0%25B0%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B5_%25D0%25BD%25D0%25B0_Linux_%25D1%2581%25D0%25B8%25D1%2581%25D1%2582%25D0%25B5%25D0%25BC%25D1%258B_%25D1%2581_%25D0%25B8%25D1%2581%25D0%25BF%25D0%25BE%25D0%25BB%25D1%258C%25D0%25B7%25D0%25BE%25D0%25B2%25D0%25B0%25D0%25BD%25D0%25B8%25D0%25B5%25D0%25BC_SSH_%25D0%25BA%25D0%25BB%25D1%258E%25D1%2587%25D0%25B5%25D0%25B9&title=US-CERT+%D0%BF%D1%80%D0%B5%D0%B4%D1%83%D0%BF%D1%80%D0%B5%D0%B6%D0%B4%D0%B0%D0%B5%D1%82+%D0%BE%D0%B1+%D0%B0%D1%82%D0%B0%D0%BA%D0%B5+%D0%BD%D0%B0+Linux+%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D1%8B+%D1%81+%D0%B8%D1%81%D0%BF%D0%BE%D0%BB%D1%8C%D0%B7%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5%D0%BC+SSH+%D0%BA%D0%BB%D1%8E%D1%87%D0%B5%D0%B9+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, -1, X, X-
R /
X /
L ) www.opennet.ru/opennews/art.shtml?num=17592 (6079823, 29235, X, X-
R /
X /
L ) packetstormsecurity.org/UNIX/penetration/rootkits/phalanx-b6.tar.bz2 (6079823, 36, X, X-
R /
X /
L ) hep.uchicago.edu/admin/report_072808.html (6079823, -1, X, X-
R /
X /
L ) www.us-cert.gov/current...) (6079823, 1442, X, X-
R /
X /
L ) www.us-cert.gov/current/#ssh_key_based_attacks (6079823, 1442, X, X-
R /
X /
L ) hep.uchicago.edu/admin/report_072808.html (6079823, -1, X, X-
R /
X /
L ) www.us-cert.gov/current/#ssh_key_based_attacks (6079823, 1442, X, X-
R /
X /
L ) User is in a trusted group bot on some wikis
2020-10-22 11:00:31 (UTC):
n:ru:User:NewsBots (
t -
c ; 6079823) to
n:ru:Атака на ftpd из состава FreeBSD (
diff !top) - Link: packetstormsecurity.org/0908-exploits/bsd-setusercontext.txt (
R /
Xmeta /
L - still there ) Other links: connect.ok.ru/offer?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%2590%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B0_%25D0%25BD%25D0%25B0_ftpd_%25D0%25B8%25D0%25B7_%25D1%2581%25D0%25BE%25D1%2581%25D1%2582%25D0%25B0%25D0%25B2%25D0%25B0_FreeBSD&title=%D0%90%D1%82%D0%B0%D0%BA%D0%B0+%D0%BD%D0%B0+ftpd+%D0%B8%D0%B7+%D1%81%D0%BE%D1%81%D1%82%D0%B0%D0%B2%D0%B0+FreeBSD+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, 1200951, X, X-
R /
X /
L ) vkontakte.ru/share.php?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%2590%25D1%2582%25D0%25B0%25D0%25BA%25D0%25B0_%25D0%25BD%25D0%25B0_ftpd_%25D0%25B8%25D0%25B7_%25D1%2581%25D0%25BE%25D1%2581%25D1%2582%25D0%25B0%25D0%25B2%25D0%25B0_FreeBSD&title=%D0%90%D1%82%D0%B0%D0%BA%D0%B0+%D0%BD%D0%B0+ftpd+%D0%B8%D0%B7+%D1%81%D0%BE%D1%81%D1%82%D0%B0%D0%B2%D0%B0+FreeBSD+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, -1, X, X-
R /
X /
L ) www.opennet.ru/opennews/art.shtml?num=23234 (6079823, 29235, X, X-
R /
X /
L ) secunia.com/advisories/...) (6079823, 2192, X, X-
R /
X /
L ) secunia.com/advisories/36353/ (6079823, 2192, X, X-
R /
X /
L ) packetstormsecurity.org/0908-exploits/bsd-setusercontext.txt (6079823, 36, X, X-
R /
X /
L ) secunia.com/advisories/36353/ (6079823, 2192, X, X-
R /
X /
L ) User is in a trusted group bot on some wikis
2020-10-22 18:09:11 (UTC):
n:ru:User:NewsBots (
t -
c ; 6079823) to
n:ru:Уязвимости в python-cjson, glpng, Ruby, Qt, Arora, FreeType, Foxit Reader и OpenOffice.org Impress (
diff top) - Link: packetstormsecurity.org/1007-exploits/arora-dos.txt (
R /
Xmeta /
L - still there ) Other links: connect.ok.ru/offer?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%25A3%25D1%258F%25D0%25B7%25D0%25B2%25D0%25B8%25D0%25BC%25D0%25BE%25D1%2581%25D1%2582%25D0%25B8_%25D0%25B2_python-cjson%2C_glpng%2C_Ruby%2C_Qt%2C_Arora%2C_FreeType%2C_Foxit_Reader_%25D0%25B8_OpenOffice.org_Impress&title=%D0%A3%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8+%D0%B2+python-cjson%2C+glpng%2C+Ruby%2C+Qt%2C+Arora%2C+FreeType%2C+Foxit+Reader+%D0%B8+OpenOffice.org+Impress+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, 1200951, X, X-
R /
X /
L ) vkontakte.ru/share.php?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%25A3%25D1%258F%25D0%25B7%25D0%25B2%25D0%25B8%25D0%25BC%25D0%25BE%25D1%2581%25D1%2582%25D0%25B8_%25D0%25B2_python-cjson%2C_glpng%2C_Ruby%2C_Qt%2C_Arora%2C_FreeType%2C_Foxit_Reader_%25D0%25B8_OpenOffice.org_Impress&title=%D0%A3%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8+%D0%B2+python-cjson%2C+glpng%2C+Ruby%2C+Qt%2C+Arora%2C+FreeType%2C+Foxit+Reader+%D0%B8+OpenOffice.org+Impress+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8 (6079823, -1, X, X-
R /
X /
L ) www.opennet.ru/opennews/art.shtml?num=27632 (6079823, 29235, X, X-
R /
X /
L ) secunia.com/advisories/40775/ (6079823, 2192, X, X-
R /
X /
L ) packetstormsecurity.org/1007-exploits/arora-dos.txt (6079823, 36, X, X-
R /
X /
L ) secunia.com/advisories/40588/ (6079823, 2192, X, X-
R /
X /
L ) www.foxitsoftware.com/announcements/2010861227.html (6079823, 255, X, X-
R /
X /
L ) www.kb.cert.org/vuls/id/275247 (6079823, 919, X, X-
R /
X /
L ) secunia.com/advisories/40816/ (6079823, 2192, X, X-
R /
X /
L ) freetype.sourceforge.net (6079823, -1, X, X-
R /
X /
L ) secunia.com/secunia_research/2010-87/ (6079823, 2192, X, X-
R /
X /
L ) www.fifi.org/doc/libglpng-dev/glpng.html (6079823, 17, X, X-
R /
X /
L ) www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/ (6079823, 1052, X, X-
R /
X /
L ) secunia.com/advisories/40335/ (6079823, 2192, X, X-
R /
X /
L ) cheeseshop.python.org/pypi/python-cjson (6079823, 11, X, X-
R /
X /
L ) User is in a trusted group bot on some wikis
2020-11-10 11:00:12 (UTC):
w:nl:User:Hoyanova (
t -
c ; 8540) to
w:nl:Computervirus (
diff !top) - Link: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (
R /
Xmeta /
L - still there ) Other links: packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (8540, 36, 2, 1-
R /
X /
L ) packetstormsecurity.org/files/96667/Exim-Exploit-In-The-Wild-Advisory.html (8540, 36, 2, 1-
R /
X /
L ) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (8540, -1, X, X-
R /
X /
L ) web.archive.org/web/20110626220820/http://puwang.barabasilab.com/Talks/Venice_PPT.pdf (8540, -1, X, X-
R /
X /
L ) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (8540, 2133, X, X-
R /
X /
L ) tweakers.net/nieuws/59787/mobiele-virussen-gaan-zich-verspreiden-via-mms.html (8540, 2133, X, X-
R /
X /
L )
2021-02-27 16:58:17 (UTC):
w:tr:User:78.185.129.51 (
t -
c ; 90) to
w:tr:ZenGo (
diff - DELETED ) - Link: packetstormsecurity.org/files/author/2011/ (
R /
Xmeta /
L ) Other links: web.archive.org/web/20120319040724/http://www.securityfocus.com/bid/3702 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/4160 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303225051/http://www.securityfocus.com/bid/4160 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/2198 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303224238/http://www.securityfocus.com/bid/2198 (90, -1, X, X-
R /
X /
L ) web.archive.org/web/20120319040653/http://www.securityfocus.com/bid/3714 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/3714 (90, 2010, X, X-
R /
X /
L ) www.securityfocus.com/bid/3714 (90, 2010, X, X-
R /
X /
L ) www.securityfocus.com/bid/4159 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303235645/http://www.securityfocus.com/bid/4159 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/889 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303222719/http://www.securityfocus.com/bid/889 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/3791 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303205059/http://www.securityfocus.com/bid/3791 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/3838 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303211446/http://www.securityfocus.com/bid/3838 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/3885 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303223045/http://www.securityfocus.com/bid/3885 (90, -1, X, X-
R /
X /
L ) securityvulns.com/source2540.html (90, , X, X-
R /
X /
L ) web.archive.org/web/20160303224039/http://securityvulns.com/source2540.html (90, -1, X, X-
R /
X /
L ) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=55 (90, , X, X-
R /
X /
L ) web.archive.org/web/20130428063118/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=55 (90, -1, X, X-
R /
X /
L ) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=49 (90, , X, X-
R /
X /
L ) web.archive.org/web/20130429051111/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=49 (90, -1, X, X-
R /
X /
L ) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=41 (90, , X, X-
R /
X /
L ) web.archive.org/web/20130428063055/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=41 (90, -1, X, X-
R /
X /
L ) www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=31 (90, , X, X-
R /
X /
L ) web.archive.org/web/20130428063034/http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=31 (90, -1, X, X-
R /
X /
L ) packetstormsecurity.org/files/author/2011/ (90, 36, X, X-
R /
X /
L ) web.archive.org/web/20120325162914/http://packetstormsecurity.org/files/author/2011/ (90, -1, X, X-
R /
X /
L ) www.wired.com/news/infostructure/0,1377,56481,00.html (90, , X, X-
R /
X /
L ) web.archive.org/web/20081011171607/http://www.wired.com/news/infostructure/0,1377,56481,00.html (90, -1, X, X-
R /
X /
L ) www.tamersahin.com/mssecrets (90, , X, X-
R /
X /
L ) web.archive.org/web/20140223183026/http://www.tamersahin.com/mssecrets/ (90, -1, X, X-
R /
X /
L ) hurarsiv.hurriyet.com.tr/goster/ShowNew.aspx?id=5999287 (90, , X, X-
R /
X /
L ) www.tamersahin.com/english/#/speeches (90, , X, X-
R /
X /
L ) web.archive.org/web/20120820014639/http://tamersahin.com/english/#/speeches (90, -1, X, X-
R /
X /
L ) www.tamersahin.com/foo/tamer_project.pdf (90, , X, X-
R /
X /
L ) web.archive.org/web/20120127120401/http://www.tamersahin.com/foo/tamer_project.pdf (90, -1, X, X-
R /
X /
L ) www.tamersahin.com/foo/tamer_project_pres.ppt (90, , X, X-
R /
X /
L ) web.archive.org/web/20120127120428/http://www.tamersahin.com/foo/tamer_project_pres.ppt (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/5782 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303222958/http://www.securityfocus.com/bid/5782 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/4062 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303210924/http://www.securityfocus.com/bid/4062 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/4206 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303230028/http://www.securityfocus.com/bid/4206 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/6145 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303230121/http://www.securityfocus.com/bid/6145 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/6041 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303223218/http://www.securityfocus.com/bid/6041 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/4021 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303215432/http://www.securityfocus.com/bid/4021 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/6447 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303214008/http://www.securityfocus.com/bid/6447 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/6098 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303223748/http://www.securityfocus.com/bid/6098 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/6877 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303220343/http://www.securityfocus.com/bid/6877 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/6042 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303205841/http://www.securityfocus.com/bid/6042 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/6044 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303222953/http://www.securityfocus.com/bid/6044 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/5968 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303204908/http://www.securityfocus.com/bid/5968 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/5803 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303213426/http://www.securityfocus.com/bid/5803 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/3501 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303215816/http://www.securityfocus.com/bid/3501 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/5967 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303205650/http://www.securityfocus.com/bid/5967 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/4833 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160304031923/http://www.securityfocus.com/bid/4833 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/6345 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303223450/http://www.securityfocus.com/bid/6345 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/6034 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303225017/http://www.securityfocus.com/bid/6034 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/3788 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160304031916/http://www.securityfocus.com/bid/3788 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/4128 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303205621/http://www.securityfocus.com/bid/4128 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/4153 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303234905/http://www.securityfocus.com/bid/4153 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/3874 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303215303/http://www.securityfocus.com/bid/3874 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/4785 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303225947/http://www.securityfocus.com/bid/4785 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/3866 (90, 2010, X, X-
R /
X /
L ) web.archive.org/web/20160303220754/http://www.securityfocus.com/bid/3866 (90, -1, X, X-
R /
X /
L ) www.securityfocus.com/bid/3702 (90, 2010, X, X-
R /
X /
L )
Displayed all 29 additions.