Несмотря на то, что два года назад было зявлено (http://www.opennet.me/opennews/art.shtml?num=5851) о закрытии электронного журнала Phrack, сформирован новый редакторский коллектив и выпущен Phrack #64 (http://www.phrack.org/issues.html?issue=64).
Интересное в 64 выпуске (http://www.phrack.org/issues.html?issue=64):
- A brief history of the Underground scene (http://www.phrack.org/issues.html?issue=64&id=4#article)
- Hijacking RDS TMC traffic information signal (http://www.phrack.org/issues.html?issue=64&id=5#article)
- Attacking the Core: Kernel Exploitation Notes (http://www.phrack.org/issues.html?issue=64&id=6#article)
- Automated vulnerability auditing in machine code (http://www.phrack.org/issues.html?issue=64&id=8#article)
- The use of set_head to defeat the wilderness (http://www.phrack.org/issues.html?issue=64&id=9#article)
- <a href="http://www.phrack.org/issues.html?issue=64&id=10#article" title="Cryptanalysis of DPA-128">Cryptanalysis of DPA-128</a>;
- <a href="http://www.phrack.org/issues.html?issue=64&id=11#article&quo... OS X Wars - A XNU Hope</a>
- Hacking deeper in the system (http://www.phrack.org/issues.html?issue=64&id=12#article)
- The art of exploitation: Autopsy of cvsxpl (http://www.phrack.org/issues.html?issue=64&id=13#article)
- Remote blind TCP/IP spoofing (http://www.phrack.org/issues.html?issue=64&id=15#article)
URL: http://seclists.org/fulldisclosure/2007/May/0496.html
Новость: http://www.opennet.me/opennews/art.shtml?num=10969