ng Oracle Is Addressing 36 Java Vulnerabilities By packetstormsecurity.com Published On :: Mon, 13 Jan 2014 15:32:58 GMT Full Article headline flaw patch oracle java
ng Fiesta Hackers Caught Hitting Cisco Customers With Java Attack By packetstormsecurity.com Published On :: Fri, 24 Jan 2014 16:14:08 GMT Full Article headline hacker flaw cisco java
ng IE Java Axes Won't Swing Until September By packetstormsecurity.com Published On :: Thu, 14 Aug 2014 14:54:24 GMT Full Article headline microsoft java
ng Oracle Issues 98 Security Fixes Including 14 For Java By packetstormsecurity.com Published On :: Wed, 15 Apr 2015 14:04:22 GMT Full Article headline flaw patch oracle java
ng Oracle Slings 193 Patches, Nixes Exploited Java Zero Day By packetstormsecurity.com Published On :: Thu, 16 Jul 2015 14:21:49 GMT Full Article headline flaw patch oracle java
ng Jenkins Vuln Makes For Great Monero Mining Slaves By packetstormsecurity.com Published On :: Tue, 20 Feb 2018 13:57:33 GMT Full Article headline malware flaw cryptography java
ng Security Failings At Siemens Could Lead To An Attack Worse Than Stuxnet By packetstormsecurity.com Published On :: Thu, 26 May 2011 13:52:07 GMT Full Article headline worm scada
ng Worm Spreading Via RDP By packetstormsecurity.com Published On :: Mon, 29 Aug 2011 14:01:07 GMT Full Article headline microsoft worm
ng Danger Worm Hijacks Facebook Accounts To Inject Banking Trojan By packetstormsecurity.com Published On :: Tue, 29 Nov 2011 16:49:19 GMT Full Article headline bank trojan worm facebook
ng Facebook Koobface Worm 'Hacker Gang Named' By packetstormsecurity.com Published On :: Tue, 17 Jan 2012 16:06:00 GMT Full Article headline hacker worm facebook
ng 'Super-Powerful' Flame Worm Actually Boring Bloatware By packetstormsecurity.com Published On :: Thu, 31 May 2012 16:51:20 GMT Full Article headline malware worm
ng US Identified As Stuxnet Perpetrator With Obama's Backing By packetstormsecurity.com Published On :: Sat, 02 Jun 2012 06:43:15 GMT Full Article headline government malware usa cyberwar worm iran
ng New Table-Munching Worm Ravages Iranian Biz Databases By packetstormsecurity.com Published On :: Mon, 26 Nov 2012 15:17:21 GMT Full Article headline database worm iran
ng Eight-Year Nortel Hacking Operation Again Shows Enterprise Vulnerabilities By packetstormsecurity.com Published On :: Fri, 17 Feb 2012 16:09:48 GMT Full Article headline hacker china flaw nortel
ng MS03-046 Exchange 2000 XEXCH50 Heap Overflow By packetstormsecurity.com Published On :: Thu, 31 Dec 2009 02:27:04 GMT This is an exploit for the Exchange 2000 heap overflow. Due to the nature of the vulnerability, this exploit is not very reliable. This Metasploit module has been tested against Exchange 2000 SP0 and SP3 running a Windows 2000 system patched to SP4. It normally takes between one and 100 connection attempts to successfully obtain a shell. This exploit is *very* unreliable. Full Article
ng Windows 2000/XP/2003 win32k.sys SfnINSTRING Denial Of Service By packetstormsecurity.com Published On :: Fri, 23 Apr 2010 04:29:00 GMT win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnINSTRING. Full Article
ng ECLIPSEDWING 1.5.2 Windows 2000 / 2003 / XP MS08-67 SMB Exploit By packetstormsecurity.com Published On :: Sat, 15 Apr 2017 01:44:59 GMT ECLIPSEDWING exploits the SMB vulnerability patched by MS08-67. It affects Microsoft Windows 2000, 2003, and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity. Full Article
ng Mexico Shuts Down Drug Gang's Antennas, Radios By packetstormsecurity.com Published On :: Mon, 05 Dec 2011 15:57:03 GMT Full Article headline phone science mexico
ng A 'Hacker' Exposed A Drug Lord And Is Trying To Save His Own Life By packetstormsecurity.com Published On :: Thu, 18 May 2017 14:15:13 GMT Full Article headline government cyberwar mexico
ng Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
ng LPRng use_syslog Remote Format String Vulnerability By packetstormsecurity.com Published On :: Wed, 17 Feb 2010 23:45:41 GMT This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". Full Article
ng Morris Worm fingerd Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 05 Nov 2018 21:05:50 GMT This Metasploit module exploits a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Full Article
ng Microsoft Is Accused Of Giving Misguided Security Advice By packetstormsecurity.com Published On :: Fri, 27 May 2011 13:41:39 GMT Full Article headline microsoft cookiejacking
ng Opera Boosts Its Anti-Phishing Defenses By packetstormsecurity.com Published On :: Fri, 25 Apr 2008 12:12:07 GMT Full Article opera phish
ng Opera Sings Anti-Malware Tune By packetstormsecurity.com Published On :: Fri, 06 Jun 2008 02:27:59 GMT Full Article malware opera
ng Opera Adds Security, Firefox Coming By packetstormsecurity.com Published On :: Thu, 12 Jun 2008 08:08:45 GMT Full Article mozilla opera firefox
ng Opera Browser Dinged By Code Execution Flaw By packetstormsecurity.com Published On :: Wed, 28 Oct 2009 17:08:56 GMT Full Article flaw opera
ng Opera Users Baffled By Vulnerability Warnings By packetstormsecurity.com Published On :: Tue, 09 Mar 2010 04:55:46 GMT Full Article opera
ng Opera Fixes Critical Form-Handling Flaw By packetstormsecurity.com Published On :: Fri, 28 Jan 2011 16:43:24 GMT Full Article headline opera
ng Book Review: 'The Tangled Web' By Michal Zalewski By packetstormsecurity.com Published On :: Sat, 11 Feb 2012 06:59:09 GMT No Starch Press: $49.95 If you are a security engineer, a researcher, a hacker or just someone who keeps your ear to the ground when it comes to computer security, chances are you have seen the name Michal Zalewski. He has been responsible for an abundance of tools, research, proof of concepts and helpful insight to many over the years. He recently released a book called "The Tangled Web - A Guide To Securing Modern Web Applications". Normally, when I read books about securing web applications, I find many parallels where authors will give an initial lay of the land, dictating what technologies they will address, what programming languages they will encompass and a decent amount of detail on vulnerabilities that exist along with some remediation tactics. Such books are invaluable for people in this line of work, but there is a bigger picture that needs to be addressed and it includes quite a bit of secret knowledge rarely divulged in the security community. You hear it in passing conversation over beers with colleagues or discover it through random tests on your own. But rarely are the oddities documented anywhere in a thorough manner. Before we go any further, let us take a step back in time. Well over a decade ago, the web was still in its infancy and an amusing vulnerability known as the phf exploit surfaced. It was nothing more than a simple input validation bug that resulted in arbitrary code execution. The average hacker enjoyed this (and many more bugs like it) during this golden age. At the time, developers of web applications had a hard enough time getting their code to work and rarely took security implications into account. Years later, cross site scripting was discovered and there was much debate about whether or not a cross site scripting vulnerability was that important. After all, it was an issue that restricted itself to the web ecosystem and did not give us a shell on the server. Rhetoric on mailing lists mocked such findings and we (Packet Storm) received many emails saying that by archiving these issues we were degrading the quality of the site. But as the web evolved, people starting banking online, their credit records were online and before you knew it, people were checking their social network updates on their phone every five minutes. All of a sudden, something as small as a cross site scripting vulnerability mattered greatly. To make the situation worse, many programs were developed to support web-related technologies. In the corporate world, being first to market or putting out a new feature in a timely fashion trumphs security. Backwards compatibility that feeds poor design became a must for any of the larger browser vendors. The "browser wars" began and everyone had different ideas on how to solve different issues. To say web-related technologies brought many levels of complexity to the modern computing experience is a great understatement. Browser-side programming languages, such as JavaScript, became a playground for hackers. Understanding the Document Object Model (DOM) and the implications of poorly coded applications became one of those lunch discussions that could cause you to put your face into your mashed potatoes. Enter "The Tangled Web". This book puts some very complicated nuances in plain (enough) english. It starts out with Zalewski giving a brief synopsis of the security industry and the web. Breakdowns of the basics are provided and it is written in a way that is inviting for anyone to read. It goes on to cover a wide array of topics inclusive to the operation of browsers, the protocols involved, the various types of documents handled and the languages supported. Armed with this knowledge, the reader is enabled to tackle the next section detailing browser security features. As the author puts it, it covers "everything from the well-known but often misunderstood same-origin policy to the obscure and proprietary zone settings of Internet Explorer". Browsers, it ends up, have a ridiculous amount of odd dynamics for even the simplest acts. The last section wraps things up with upcoming security features and various browser mechanisms to note. I found it a credit to the diversity of the book that technical discussion could also trail off to give historical notes on poor industry behavior. When it noted DNS hijacking by various providers it reminded me of the very distinct and constantly apparent disconnect between business and knowledge of technology. When noting how non-HTTP servers were being leveraged to commit cross site scripting attacks, Zalewski also made it a point to note how the Internet Explorer releases only have a handful of prohibited ports but all other browsers have dozens that they block. The delicate balance of understanding alongside context is vital when using information from this book and applying it to design. Every page offers some bit of interesting knowledge that dives deep. It takes the time to note the odd behaviors small mistakes can cause and also points out where flawed security implementations exist. This book touches on the old and the new and many things other security books have overlooked. Another nice addition is that it provides security engineering cheatsheets at the end of each chapter. To be thorough, it explains both the initiatives set out by RFCs while it also documents different paths various browser vendors have taken in tackling tricky security issues. Google's Chrome, Mozilla's Firefox, Microsoft's Internet Explorer, Apple's Safari and Opera are compared and contrasted greatly throughout this book. In my opinion, the web has become a layer cake over the years. New shiny technologies and add-ons have been thrown into the user experience and with each of them comes a new set of security implications. One-off findings are constantly discovered and documented (and at Packet Storm we try to archive every one of them), but this is the first time I have seen a comprehensive guide that focuses on everything from cross-domain content inclusion to content-sniffing. It is the sort of book that should be required reading for every web developer. -Todd Full Article headline microsoft flaw google mozilla opera apple firefox chrome
ng Opera Brings Standalone VPN App To Android Devices By packetstormsecurity.com Published On :: Tue, 23 Aug 2016 14:12:16 GMT Full Article headline privacy phone google opera cryptography
ng Opera Just Added A Bitcoin-Mining Blocker By packetstormsecurity.com Published On :: Fri, 22 Dec 2017 16:12:26 GMT Full Article headline opera
ng WarVOX Telephony Auditing Tool By packetstormsecurity.com Published On :: Fri, 06 Mar 2009 18:58:11 GMT WarVOX is a suite of tools for exploring, classifying, and auditing telephone systems. Unlike normal wardialing tools, WarVOX works with the actual audio from each call and does not use a modem directly. This model allows WarVOX to find and classify a wide range of interesting lines, including modems, faxes, voice mail boxes, PBXs, loops, dial tones, IVRs, and forwarders. WarVOX provides the unique ability to classify all telephone lines in a given range, not just those connected to modems, allowing for a comprehensive audit of a telephone system. Full Article
ng After Hacking Of CBI Website, India Hits Back By packetstormsecurity.com Published On :: Mon, 06 Dec 2010 16:05:35 GMT Full Article headline india cyberwar pakistan
ng CIA Contractor Released After Pakistan Killings By packetstormsecurity.com Published On :: Wed, 16 Mar 2011 14:21:32 GMT Full Article headline government usa pakistan cia
ng Google And Apple Among Hundreds Hit In High-Profile Pakistan Hack By packetstormsecurity.com Published On :: Mon, 26 Nov 2012 15:17:30 GMT Full Article headline hacker dns google yahoo apple pakistan
ng Godzilla Wreaks Revenge On Pakistani Government Web Sites By packetstormsecurity.com Published On :: Tue, 12 Mar 2013 15:02:09 GMT Full Article headline hacker government data loss pakistan
ng Deep Inside The CIA's Targeted Killings By packetstormsecurity.com Published On :: Wed, 10 Apr 2013 02:18:37 GMT Full Article headline government usa pakistan terror cia
ng Tenshi Log Monitoring Program 0.12 By packetstormsecurity.com Published On :: Sat, 18 Sep 2010 19:43:42 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
ng NIELD (Network Interface Events Logging Daemon) 0.10 By packetstormsecurity.com Published On :: Sat, 29 Jan 2011 20:07:48 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules. Full Article
ng NIELD (Network Interface Events Logging Daemon) 0.11 By packetstormsecurity.com Published On :: Sun, 26 Jun 2011 07:41:52 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules. Full Article
ng Tenshi Log Monitoring Program 0.13 By packetstormsecurity.com Published On :: Thu, 14 Jul 2011 00:33:12 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
ng NIELD (Network Interface Events Logging Daemon) 0.20 By packetstormsecurity.com Published On :: Wed, 17 Aug 2011 14:31:42 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
ng NIELD (Network Interface Events Logging Daemon) 0.21 By packetstormsecurity.com Published On :: Tue, 27 Dec 2011 17:28:33 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
ng NIELD (Network Interface Events Logging Daemon) 0.22 By packetstormsecurity.com Published On :: Fri, 10 Feb 2012 22:31:56 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
ng NIELD (Network Interface Events Logging Daemon) 0.23 By packetstormsecurity.com Published On :: Wed, 11 Apr 2012 15:17:25 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
ng Tenshi Log Monitoring Program 0.14 By packetstormsecurity.com Published On :: Sun, 03 Jun 2012 17:11:51 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
ng NIELD (Network Interface Events Logging Daemon) 0.3.0 By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 00:48:42 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
ng NIELD (Network Interface Events Logging Daemon) 0.4.0 By packetstormsecurity.com Published On :: Wed, 07 Aug 2013 02:02:28 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
ng NIELD (Network Interface Events Logging Daemon) 0.5.0 By packetstormsecurity.com Published On :: Wed, 26 Feb 2014 05:12:18 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article