al Julian Assange Is Given Right To Appeal By packetstormsecurity.com Published On :: Fri, 16 Dec 2011 15:32:10 GMT Full Article headline data loss sweden
al Pirate Bay Prison Sentences Are Final, Court Rules By packetstormsecurity.com Published On :: Thu, 02 Feb 2012 16:46:11 GMT Full Article headline government pirate sweden
al Wikileaks' Julian Assange Loses Extradition Appeal By packetstormsecurity.com Published On :: Wed, 30 May 2012 15:28:57 GMT Full Article headline britain data loss sweden
al Vista Security Credentials Tarnished In Malware Survey By packetstormsecurity.com Published On :: Fri, 09 May 2008 15:56:28 GMT Full Article malware microsoft survey
al McDonalds Survey Scam Is Super-Size Fraud By packetstormsecurity.com Published On :: Mon, 01 Dec 2008 21:23:12 GMT Full Article survey fraud scam phish
al Survey Reveals Culture Of IT Admin Snooping By packetstormsecurity.com Published On :: Thu, 11 Jun 2009 16:57:54 GMT Full Article privacy survey
al Survey - Half Of Businesses Do Not Secure Personal Data By packetstormsecurity.com Published On :: Thu, 24 Sep 2009 22:30:35 GMT Full Article privacy survey
al Yahoo Found Serving Java-Malware Spreading Ads By packetstormsecurity.com Published On :: Mon, 06 Jan 2014 15:59:15 GMT Full Article headline malware yahoo java
al Multi-Platform Java Bot Marshals Zombie Force Against Spammers By packetstormsecurity.com Published On :: Thu, 30 Jan 2014 15:57:37 GMT Full Article headline malware botnet flaw java
al Oracle Releases 167 Critical Security Fixes For Java And Sun Systems By packetstormsecurity.com Published On :: Tue, 20 Jan 2015 16:17:47 GMT Full Article headline flaw patch oracle java
al Whisper This, But Java Deserialization Vulnerability Affects More Libraries By packetstormsecurity.com Published On :: Mon, 07 Dec 2015 15:03:13 GMT Full Article headline flaw oracle java
al Java Plug-In Malware Alert To Be Issued By Oracle By packetstormsecurity.com Published On :: Tue, 22 Dec 2015 17:11:10 GMT Full Article headline malware flaw oracle java
al Cisco Security Kit Has Java Deserialization Bug And A Default Password Snafu By packetstormsecurity.com Published On :: Thu, 08 Mar 2018 14:03:24 GMT Full Article headline flaw password cisco java
al Stuxnet Clones May Target Critical US Systems, DHS Warns By packetstormsecurity.com Published On :: Wed, 27 Jul 2011 03:03:01 GMT Full Article headline government malware usa worm
al Security Giants Split Over Stuxnet Lookalike Duqu By packetstormsecurity.com Published On :: Thu, 20 Oct 2011 23:21:56 GMT Full Article headline worm symantec mcafee
al Worm Steals 45,000 Facebook Passwords, Researchers Say By packetstormsecurity.com Published On :: Fri, 06 Jan 2012 00:31:34 GMT Full Article headline malware worm facebook social
al 'Super-Powerful' Flame Worm Actually Boring Bloatware By packetstormsecurity.com Published On :: Thu, 31 May 2012 16:51:20 GMT Full Article headline malware worm
al Analysis Of The Skype Worm By packetstormsecurity.com Published On :: Wed, 10 Oct 2012 01:56:17 GMT Full Article headline worm skype
al Stuxnet Tricks Will Aid Cybercriminals, Warns Microsoft By packetstormsecurity.com Published On :: Fri, 14 Dec 2012 16:27:23 GMT Full Article headline malware microsoft cybercrime fraud worm
al Windows 2000/XP/2003 win32k.sys SfnLOGONNOTIFY Denial Of Service By packetstormsecurity.com Published On :: Fri, 23 Apr 2010 04:26:43 GMT win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnLOGONNOTIFY. Full Article
al Windows 2000/XP/2003 win32k.sys SfnINSTRING Denial Of Service By packetstormsecurity.com Published On :: Fri, 23 Apr 2010 04:29:00 GMT win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnINSTRING. Full Article
al Microsoft SMB Server Zero Size Pool Allocation By packetstormsecurity.com Published On :: Fri, 13 Aug 2010 00:01:59 GMT A vulnerability in the Windows kernel can be triggered via SMB in Microsoft Windows versions ranging from Windows 2000 through to Windows 7. This vulnerability allows an attacker to trigger a kernel pool corruption by sending a specially crafted SMB_COM_TRANSACTION2 request. Successful exploitation of this issue may result in remote code execution with kernel privileges, while failed attempts will result in a denial of service condition. Full Article
al del2info Windows Analyzer 0.1 By packetstormsecurity.com Published On :: Thu, 30 Jun 2011 06:03:26 GMT The del2info utility was written to analyze Windows Recycle Bin INFO2 and $I?????? files. It can extract file deletion time, original path, and size of deleted files and whether they have been moved from the Recycle Bin. It supports files from Windows 2000 to 7. Full Article
al del2info Windows Analyzer 0.1.2 By packetstormsecurity.com Published On :: Mon, 04 Jul 2011 01:01:01 GMT The del2info utility was written to analyze Windows Recycle Bin INFO2 and $I?????? files. It can extract file deletion time, original path, and size of deleted files and whether they have been moved from the Recycle Bin. It supports files from Windows 2000 to 7. Full Article
al Mexican Hackers Hit Official Websites In Cyber Protest By packetstormsecurity.com Published On :: Mon, 17 Sep 2012 14:58:01 GMT Full Article headline hacker government mexico
al Mexico Spied On Journalists, Lawyers, And Activists By packetstormsecurity.com Published On :: Tue, 20 Jun 2017 14:28:01 GMT Full Article headline privacy phone spyware mexico
al ICE Forces Software To Automatically Recommend Detention By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:27 GMT Full Article headline government usa mexico
al Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Anomalous Payloadbased Worm Detection and Signature Generation. Full Article
al Technical Cyber Security Alert 2007-59A By packetstormsecurity.com Published On :: Tue, 06 Mar 2007 04:37:19 GMT Technical Cyber Security Alert TA07-059A - A worm is exploiting a vulnerability in the telnet daemon (in.telnetd) on unpatched Sun Solaris systems. The vulnerability allows the worm (or any attacker) to log in via telnet (23/tcp) with elevated privileges. Full Article
al Exploit Web 2.0, Real Life XSS-Worm By packetstormsecurity.com Published On :: Thu, 05 Feb 2009 22:08:04 GMT Whitepaper called Exploiting Web 2.0, Real Life XSS-Worm. Full Article
al Technical Cyber Security Alert 2009-88A By packetstormsecurity.com Published On :: Mon, 30 Mar 2009 19:50:26 GMT Technical Cyber Security Alert TA09-088A - US-CERT is aware of public reports indicating a widespread infection of the Conficker worm, which can infect a Microsoft Windows system from a thumb drive, a network share, or directly across a network if the host is not patched with MS08-067. Full Article
al Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
al Opera Sings Anti-Malware Tune By packetstormsecurity.com Published On :: Fri, 06 Jun 2008 02:27:59 GMT Full Article malware opera
al Opera 9.64 Update Fixes Several Security Issues By packetstormsecurity.com Published On :: Wed, 04 Mar 2009 10:27:33 GMT Full Article opera
al Hackers Use Opera As Defense Against Other Cybercriminals By packetstormsecurity.com Published On :: Fri, 21 Aug 2009 05:18:26 GMT Full Article hacker privacy cybercrime opera
al Opera Fixes Critical Form-Handling Flaw By packetstormsecurity.com Published On :: Fri, 28 Jan 2011 16:43:24 GMT Full Article headline opera
al Book Review: 'The Tangled Web' By Michal Zalewski By packetstormsecurity.com Published On :: Sat, 11 Feb 2012 06:59:09 GMT No Starch Press: $49.95 If you are a security engineer, a researcher, a hacker or just someone who keeps your ear to the ground when it comes to computer security, chances are you have seen the name Michal Zalewski. He has been responsible for an abundance of tools, research, proof of concepts and helpful insight to many over the years. He recently released a book called "The Tangled Web - A Guide To Securing Modern Web Applications". Normally, when I read books about securing web applications, I find many parallels where authors will give an initial lay of the land, dictating what technologies they will address, what programming languages they will encompass and a decent amount of detail on vulnerabilities that exist along with some remediation tactics. Such books are invaluable for people in this line of work, but there is a bigger picture that needs to be addressed and it includes quite a bit of secret knowledge rarely divulged in the security community. You hear it in passing conversation over beers with colleagues or discover it through random tests on your own. But rarely are the oddities documented anywhere in a thorough manner. Before we go any further, let us take a step back in time. Well over a decade ago, the web was still in its infancy and an amusing vulnerability known as the phf exploit surfaced. It was nothing more than a simple input validation bug that resulted in arbitrary code execution. The average hacker enjoyed this (and many more bugs like it) during this golden age. At the time, developers of web applications had a hard enough time getting their code to work and rarely took security implications into account. Years later, cross site scripting was discovered and there was much debate about whether or not a cross site scripting vulnerability was that important. After all, it was an issue that restricted itself to the web ecosystem and did not give us a shell on the server. Rhetoric on mailing lists mocked such findings and we (Packet Storm) received many emails saying that by archiving these issues we were degrading the quality of the site. But as the web evolved, people starting banking online, their credit records were online and before you knew it, people were checking their social network updates on their phone every five minutes. All of a sudden, something as small as a cross site scripting vulnerability mattered greatly. To make the situation worse, many programs were developed to support web-related technologies. In the corporate world, being first to market or putting out a new feature in a timely fashion trumphs security. Backwards compatibility that feeds poor design became a must for any of the larger browser vendors. The "browser wars" began and everyone had different ideas on how to solve different issues. To say web-related technologies brought many levels of complexity to the modern computing experience is a great understatement. Browser-side programming languages, such as JavaScript, became a playground for hackers. Understanding the Document Object Model (DOM) and the implications of poorly coded applications became one of those lunch discussions that could cause you to put your face into your mashed potatoes. Enter "The Tangled Web". This book puts some very complicated nuances in plain (enough) english. It starts out with Zalewski giving a brief synopsis of the security industry and the web. Breakdowns of the basics are provided and it is written in a way that is inviting for anyone to read. It goes on to cover a wide array of topics inclusive to the operation of browsers, the protocols involved, the various types of documents handled and the languages supported. Armed with this knowledge, the reader is enabled to tackle the next section detailing browser security features. As the author puts it, it covers "everything from the well-known but often misunderstood same-origin policy to the obscure and proprietary zone settings of Internet Explorer". Browsers, it ends up, have a ridiculous amount of odd dynamics for even the simplest acts. The last section wraps things up with upcoming security features and various browser mechanisms to note. I found it a credit to the diversity of the book that technical discussion could also trail off to give historical notes on poor industry behavior. When it noted DNS hijacking by various providers it reminded me of the very distinct and constantly apparent disconnect between business and knowledge of technology. When noting how non-HTTP servers were being leveraged to commit cross site scripting attacks, Zalewski also made it a point to note how the Internet Explorer releases only have a handful of prohibited ports but all other browsers have dozens that they block. The delicate balance of understanding alongside context is vital when using information from this book and applying it to design. Every page offers some bit of interesting knowledge that dives deep. It takes the time to note the odd behaviors small mistakes can cause and also points out where flawed security implementations exist. This book touches on the old and the new and many things other security books have overlooked. Another nice addition is that it provides security engineering cheatsheets at the end of each chapter. To be thorough, it explains both the initiatives set out by RFCs while it also documents different paths various browser vendors have taken in tackling tricky security issues. Google's Chrome, Mozilla's Firefox, Microsoft's Internet Explorer, Apple's Safari and Opera are compared and contrasted greatly throughout this book. In my opinion, the web has become a layer cake over the years. New shiny technologies and add-ons have been thrown into the user experience and with each of them comes a new set of security implications. One-off findings are constantly discovered and documented (and at Packet Storm we try to archive every one of them), but this is the first time I have seen a comprehensive guide that focuses on everything from cross-domain content inclusion to content-sniffing. It is the sort of book that should be required reading for every web developer. -Todd Full Article headline microsoft flaw google mozilla opera apple firefox chrome
al Firefox, Opera Allow Crooks To Hide An Entire Phish Site In A Link By packetstormsecurity.com Published On :: Tue, 04 Sep 2012 15:05:05 GMT Full Article headline flaw opera phish firefox
al Opera Reveals Security Breach By packetstormsecurity.com Published On :: Thu, 27 Jun 2013 15:00:49 GMT Full Article headline hacker data loss flaw opera backdoor
al Opera Brings Standalone VPN App To Android Devices By packetstormsecurity.com Published On :: Tue, 23 Aug 2016 14:12:16 GMT Full Article headline privacy phone google opera cryptography
al xdial.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
al wdial20.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
al wdial.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
al ShokDial4-1.tgz By packetstormsecurity.com Published On :: Mon, 27 Sep 1999 20:27:04 GMT ShokDial 4.1, an excellent war dialer for linux. Another great tool from w00w00. ( Full Article
al tcdial-1.0.tar.gz By packetstormsecurity.com Published On :: Tue, 19 Oct 1999 18:36:40 GMT DTMF dialer for X. Uses sound card. Screenshot. Full Article
al Kalimba.zip By packetstormsecurity.com Published On :: Sun, 02 Jan 2005 20:56:47 GMT Win32 based wardialer called Kalimba. Included Blue Box capabilities, such as 0 - 9 dialing, quarter, dime, nickel tones, Operator tones, conference capabilities. Source included. Full Article
al Asif Ali Zardari Website Hacker Nabbed By packetstormsecurity.com Published On :: Mon, 06 Dec 2010 23:45:14 GMT Full Article headline pakistan
al CIA's Most Senior Official In Pakistan 'Unmasked' By Khan's Party By packetstormsecurity.com Published On :: Wed, 27 Nov 2013 16:06:38 GMT Full Article headline government usa cyberwar pakistan cia
al Pakistan Military Hit By Operation Shaheen Malware By packetstormsecurity.com Published On :: Tue, 13 Nov 2018 16:43:38 GMT Full Article headline government malware cyberwar pakistan
al Kim Dotcom Sues New Zealand Government For Damages By packetstormsecurity.com Published On :: Mon, 22 Jan 2018 15:03:58 GMT Full Article headline government fraud mpaa new zealand