Happy Birthday to You
Happy Birthday to You
Happy Birthday... err, Mr Internet
Happy Birthday to You
lo
A news item from National Geographic
Friday, October 30, 2009
Monday, October 12, 2009
Where'd he go... Where'd who go?
(The disappearance of milw0rm)
(ed: milw0rm is back online, I'll leave this up as a testaments to my fanboiness. There are no additions since 21/09/09 though...)
(re-ed: More to come later, wow: http://bl4cksecurity.blogspot.com/2009/11/str0ke-milworms-funeral-is-this-friday.html)
Why did milw0rm disappear, and why is noone talking about it?
For years, milw0rm.com was one of the best places to find out "what got broken today", providing an amusing and sometimes scary overview of the latest and greatest exploits for operating systems and applications. What set them apart from sites like nvd.nist.gov, however, was the fact that each of these published vulnerabilites had an exploit attached. In languaes from C to Python, the interested reader could learn how to construct actual exploit code from a vulerability, just by reading through the thousands of examples on milw0rm. Another valuable resource on the site was its "papers" section. From XSS and SQL injection (script kiddie) to social engieering (old school), the papers were published by anyone and everyone, but they always seemed to be of reasonable quality, providing interesting insights into how security works.
milw0rm was going strong, publishing around 10 web app exploits per day, until around the 25th of September, when the posts suddenly dried up. Then, a few days ago, around the 8th of October, the web server stopped responding. The archive of milw0rm exploits is still available from second hand sources and is well worth a look if you weren't a regular milw0rm visitor while the site was with us.
(re-ed: More to come later, wow: http://bl4cksecurity.blogspot.com/2009/11/str0ke-milworms-funeral-is-this-friday.html)
Why did milw0rm disappear, and why is noone talking about it?
For years, milw0rm.com was one of the best places to find out "what got broken today", providing an amusing and sometimes scary overview of the latest and greatest exploits for operating systems and applications. What set them apart from sites like nvd.nist.gov, however, was the fact that each of these published vulnerabilites had an exploit attached. In languaes from C to Python, the interested reader could learn how to construct actual exploit code from a vulerability, just by reading through the thousands of examples on milw0rm. Another valuable resource on the site was its "papers" section. From XSS and SQL injection (script kiddie) to social engieering (old school), the papers were published by anyone and everyone, but they always seemed to be of reasonable quality, providing interesting insights into how security works.
milw0rm was going strong, publishing around 10 web app exploits per day, until around the 25th of September, when the posts suddenly dried up. Then, a few days ago, around the 8th of October, the web server stopped responding. The archive of milw0rm exploits is still available from second hand sources and is well worth a look if you weren't a regular milw0rm visitor while the site was with us.
Subscribe to:
Posts (Atom)