y Mexico Spied On Journalists, Lawyers, And Activists By packetstormsecurity.com Published On :: Tue, 20 Jun 2017 14:28:01 GMT Full Article headline privacy phone spyware mexico
y ICE Forces Software To Automatically Recommend Detention By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:27 GMT Full Article headline government usa mexico
y Hacker Dumps Thousands Of Sensitive Mexican Embassy Documents Online By packetstormsecurity.com Published On :: Sun, 21 Apr 2019 15:59:17 GMT Full Article headline hacker government privacy data loss mexico
y Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Anomalous Payloadbased Worm Detection and Signature Generation. Full Article
y Advanced-Polymorphic-Worms.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic. Full Article
y Technical Cyber Security Alert 2007-59A By packetstormsecurity.com Published On :: Tue, 06 Mar 2007 04:37:19 GMT Technical Cyber Security Alert TA07-059A - A worm is exploiting a vulnerability in the telnet daemon (in.telnetd) on unpatched Sun Solaris systems. The vulnerability allows the worm (or any attacker) to log in via telnet (23/tcp) with elevated privileges. Full Article
y Technical Cyber Security Alert 2009-88A By packetstormsecurity.com Published On :: Mon, 30 Mar 2009 19:50:26 GMT Technical Cyber Security Alert TA09-088A - US-CERT is aware of public reports indicating a widespread infection of the Conficker worm, which can infect a Microsoft Windows system from a thumb drive, a network share, or directly across a network if the host is not patched with MS08-067. Full Article
y LPRng use_syslog Remote Format String Vulnerability By packetstormsecurity.com Published On :: Wed, 17 Feb 2010 23:45:41 GMT This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". Full Article
y Linksys E-Series Remote Code Execution By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 03:33:33 GMT Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm. Full Article
y Linksys Worm Remote Root By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 20:02:22 GMT Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi. Full Article
y Linksys E-Series TheMoon Remote Command Injection By packetstormsecurity.com Published On :: Sat, 05 Apr 2014 03:11:21 GMT Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5. Full Article
y Metamorphic Worms: Can They Remain Hidden? By packetstormsecurity.com Published On :: Mon, 02 Feb 2015 10:22:22 GMT Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest. Full Article
y Linux Security Checklist Tool 2.0.3 By packetstormsecurity.com Published On :: Thu, 03 Feb 2011 15:31:32 GMT Linux Security Checklist is a perl script that audits a given Linux host and provides recommendations for security enhancements. Full Article
y Microsoft Is Accused Of Giving Misguided Security Advice By packetstormsecurity.com Published On :: Fri, 27 May 2011 13:41:39 GMT Full Article headline microsoft cookiejacking
y CA-92:04.ATT.rexecd.vulnerability By packetstormsecurity.com Published On :: Tue, 14 Sep 1999 05:47:01 GMT A vulnerability is present in AT&T TCP/IP Release 4.0 running on SVR4 systems for both the 386/486 and 3B2 RISC platforms. The problem is in the remote execution server /usr/etc/rexecd and a new version of rexecd is available from AT&T. Full Article
y HP Security Bulletin 2007-14.84 By packetstormsecurity.com Published On :: Thu, 08 Nov 2007 23:36:19 GMT HP Security Bulletin - A potential security vulnerability has been identified in the Aries PA-RISC emulation software running on HP-UX IA-64 platforms only. This vulnerability may allow local unauthorized access. Full Article
y Ubuntu Security Notice 715-1 By packetstormsecurity.com Published On :: Fri, 30 Jan 2009 19:58:41 GMT Ubuntu Security Notice USN-715-1 - Hugo Dias discovered that the ATM subsystem did not correctly manage socket counts. It was discovered that the inotify subsystem contained watch removal race conditions. Dann Frazier discovered that in certain situations sendmsg did not correctly release allocated memory. Helge Deller discovered that PA-RISC stack unwinding was not handled correctly. It was discovered that the ATA subsystem did not correctly set timeouts. It was discovered that the ib700 watchdog timer did not correctly check buffer sizes. Full Article
y Anonymous Takes Down Greek Sites In Support Of Athens Protests By packetstormsecurity.com Published On :: Tue, 14 Feb 2012 00:46:29 GMT Full Article headline denial of service anonymous greece
y Greek Hackers Are Arrested Over Anonymous Attacks By packetstormsecurity.com Published On :: Mon, 20 Feb 2012 17:27:28 GMT Full Article headline hacker anonymous greece
y Opera Adds Security, Firefox Coming By packetstormsecurity.com Published On :: Thu, 12 Jun 2008 08:08:45 GMT Full Article mozilla opera firefox
y Opera Update Draws The Curtain On Seven Security Vulns By packetstormsecurity.com Published On :: Thu, 21 Aug 2008 11:31:43 GMT Full Article opera
y Opera Bitten By Extremely Severe Browser Bug By packetstormsecurity.com Published On :: Thu, 09 Oct 2008 00:05:50 GMT Full Article opera
y Opera Scrambles To Quash Zero-Day Bug In Freshly Patched Browser By packetstormsecurity.com Published On :: Mon, 27 Oct 2008 00:26:27 GMT Full Article patch opera zero day
y Opera Releases Update For Extremely Severe Vulns By packetstormsecurity.com Published On :: Tue, 16 Dec 2008 09:27:24 GMT Full Article opera
y Opera 9.64 Update Fixes Several Security Issues By packetstormsecurity.com Published On :: Wed, 04 Mar 2009 10:27:33 GMT Full Article opera
y Opera CEO - Unite Not A Security Risk By packetstormsecurity.com Published On :: Tue, 07 Jul 2009 15:28:13 GMT Full Article opera
y Hackers Use Opera As Defense Against Other Cybercriminals By packetstormsecurity.com Published On :: Fri, 21 Aug 2009 05:18:26 GMT Full Article hacker privacy cybercrime opera
y Opera Browser Dinged By Code Execution Flaw By packetstormsecurity.com Published On :: Wed, 28 Oct 2009 17:08:56 GMT Full Article flaw opera
y Opera Says Bug Probably Can't Commandeer Machines By packetstormsecurity.com Published On :: Fri, 05 Mar 2010 22:35:14 GMT Full Article opera
y Opera Users Baffled By Vulnerability Warnings By packetstormsecurity.com Published On :: Tue, 09 Mar 2010 04:55:46 GMT Full Article opera
y Book Review: 'The Tangled Web' By Michal Zalewski By packetstormsecurity.com Published On :: Sat, 11 Feb 2012 06:59:09 GMT No Starch Press: $49.95 If you are a security engineer, a researcher, a hacker or just someone who keeps your ear to the ground when it comes to computer security, chances are you have seen the name Michal Zalewski. He has been responsible for an abundance of tools, research, proof of concepts and helpful insight to many over the years. He recently released a book called "The Tangled Web - A Guide To Securing Modern Web Applications". Normally, when I read books about securing web applications, I find many parallels where authors will give an initial lay of the land, dictating what technologies they will address, what programming languages they will encompass and a decent amount of detail on vulnerabilities that exist along with some remediation tactics. Such books are invaluable for people in this line of work, but there is a bigger picture that needs to be addressed and it includes quite a bit of secret knowledge rarely divulged in the security community. You hear it in passing conversation over beers with colleagues or discover it through random tests on your own. But rarely are the oddities documented anywhere in a thorough manner. Before we go any further, let us take a step back in time. Well over a decade ago, the web was still in its infancy and an amusing vulnerability known as the phf exploit surfaced. It was nothing more than a simple input validation bug that resulted in arbitrary code execution. The average hacker enjoyed this (and many more bugs like it) during this golden age. At the time, developers of web applications had a hard enough time getting their code to work and rarely took security implications into account. Years later, cross site scripting was discovered and there was much debate about whether or not a cross site scripting vulnerability was that important. After all, it was an issue that restricted itself to the web ecosystem and did not give us a shell on the server. Rhetoric on mailing lists mocked such findings and we (Packet Storm) received many emails saying that by archiving these issues we were degrading the quality of the site. But as the web evolved, people starting banking online, their credit records were online and before you knew it, people were checking their social network updates on their phone every five minutes. All of a sudden, something as small as a cross site scripting vulnerability mattered greatly. To make the situation worse, many programs were developed to support web-related technologies. In the corporate world, being first to market or putting out a new feature in a timely fashion trumphs security. Backwards compatibility that feeds poor design became a must for any of the larger browser vendors. The "browser wars" began and everyone had different ideas on how to solve different issues. To say web-related technologies brought many levels of complexity to the modern computing experience is a great understatement. Browser-side programming languages, such as JavaScript, became a playground for hackers. Understanding the Document Object Model (DOM) and the implications of poorly coded applications became one of those lunch discussions that could cause you to put your face into your mashed potatoes. Enter "The Tangled Web". This book puts some very complicated nuances in plain (enough) english. It starts out with Zalewski giving a brief synopsis of the security industry and the web. Breakdowns of the basics are provided and it is written in a way that is inviting for anyone to read. It goes on to cover a wide array of topics inclusive to the operation of browsers, the protocols involved, the various types of documents handled and the languages supported. Armed with this knowledge, the reader is enabled to tackle the next section detailing browser security features. As the author puts it, it covers "everything from the well-known but often misunderstood same-origin policy to the obscure and proprietary zone settings of Internet Explorer". Browsers, it ends up, have a ridiculous amount of odd dynamics for even the simplest acts. The last section wraps things up with upcoming security features and various browser mechanisms to note. I found it a credit to the diversity of the book that technical discussion could also trail off to give historical notes on poor industry behavior. When it noted DNS hijacking by various providers it reminded me of the very distinct and constantly apparent disconnect between business and knowledge of technology. When noting how non-HTTP servers were being leveraged to commit cross site scripting attacks, Zalewski also made it a point to note how the Internet Explorer releases only have a handful of prohibited ports but all other browsers have dozens that they block. The delicate balance of understanding alongside context is vital when using information from this book and applying it to design. Every page offers some bit of interesting knowledge that dives deep. It takes the time to note the odd behaviors small mistakes can cause and also points out where flawed security implementations exist. This book touches on the old and the new and many things other security books have overlooked. Another nice addition is that it provides security engineering cheatsheets at the end of each chapter. To be thorough, it explains both the initiatives set out by RFCs while it also documents different paths various browser vendors have taken in tackling tricky security issues. Google's Chrome, Mozilla's Firefox, Microsoft's Internet Explorer, Apple's Safari and Opera are compared and contrasted greatly throughout this book. In my opinion, the web has become a layer cake over the years. New shiny technologies and add-ons have been thrown into the user experience and with each of them comes a new set of security implications. One-off findings are constantly discovered and documented (and at Packet Storm we try to archive every one of them), but this is the first time I have seen a comprehensive guide that focuses on everything from cross-domain content inclusion to content-sniffing. It is the sort of book that should be required reading for every web developer. -Todd Full Article headline microsoft flaw google mozilla opera apple firefox chrome
y Opera Updates Browser With Slew Of Security Fixes By packetstormsecurity.com Published On :: Thu, 31 Jan 2013 15:45:54 GMT Full Article headline flaw patch opera
y Opera Reveals Security Breach By packetstormsecurity.com Published On :: Thu, 27 Jun 2013 15:00:49 GMT Full Article headline hacker data loss flaw opera backdoor
y Opera Resets Passwords After Sync Server Hacked By packetstormsecurity.com Published On :: Mon, 29 Aug 2016 13:45:36 GMT Full Article headline hacker data loss flaw password opera
y Jenny.htm By packetstormsecurity.com Published On :: Tue, 11 Jan 2005 07:29:33 GMT Results from a national wardial against Jenny 867-5309. This is hilarious. Full Article
y WarVOX Telephony Auditing Tool By packetstormsecurity.com Published On :: Fri, 06 Mar 2009 18:58:11 GMT WarVOX is a suite of tools for exploring, classifying, and auditing telephone systems. Unlike normal wardialing tools, WarVOX works with the actual audio from each call and does not use a modem directly. This model allows WarVOX to find and classify a wide range of interesting lines, including modems, faxes, voice mail boxes, PBXs, loops, dial tones, IVRs, and forwarders. WarVOX provides the unique ability to classify all telephone lines in a given range, not just those connected to modems, allowing for a comprehensive audit of a telephone system. Full Article
y Pakistan Briefly Lifts Block On YouTube By packetstormsecurity.com Published On :: Mon, 31 Dec 2012 16:53:43 GMT Full Article headline government google pakistan censorship
y CIA's Most Senior Official In Pakistan 'Unmasked' By Khan's Party By packetstormsecurity.com Published On :: Wed, 27 Nov 2013 16:06:38 GMT Full Article headline government usa cyberwar pakistan cia
y Pakistan Mulls Cyber Security Bill To Keep NSA At Bay By packetstormsecurity.com Published On :: Tue, 15 Apr 2014 15:17:02 GMT Full Article headline government usa spyware pakistan nsa
y Pakistan Military Hit By Operation Shaheen Malware By packetstormsecurity.com Published On :: Tue, 13 Nov 2018 16:43:38 GMT Full Article headline government malware cyberwar pakistan
y Researcher Raids Browser History For Webmail Login Tokens By packetstormsecurity.com Published On :: Mon, 20 Jul 2009 18:12:43 GMT Full Article csrf
y Warners Bros. Flagged Own Site For Piracy, Orders Google To Censor Pages By packetstormsecurity.com Published On :: Tue, 06 Sep 2016 14:24:02 GMT Full Article headline google mpaa
y HBO Hackers Leak Curb Your Enthusiasm By packetstormsecurity.com Published On :: Mon, 14 Aug 2017 14:13:34 GMT Full Article headline hacker data loss mpaa
y Anonymous Runs Amock In Israel, Finland, Portugal By packetstormsecurity.com Published On :: Mon, 07 Nov 2011 15:22:29 GMT Full Article headline denial of service israel anonymous finland portugal
y iXKeyLog 0.1 By packetstormsecurity.com Published On :: Sun, 06 Nov 2011 23:40:52 GMT iXKeylog is an X11 keylogger for Unix that basically uses xlib to interact with the users keyboard. It will listen for certain X11 events and then trigger specific routines to handle these events. Full Article
y Xenotix Python Keylogger For Windows By packetstormsecurity.com Published On :: Tue, 07 May 2013 13:33:33 GMT Xenotix is a keylogger for windows that is written in Python. It has the ability to send logs remotely. Full Article
y Spear Phisher Targeted eBay Employees By packetstormsecurity.com Published On :: Fri, 24 Sep 2010 11:33:09 GMT Full Article ebay phish
y Notorious eBay Hacker Gets 3-Year Suspended Sentence By packetstormsecurity.com Published On :: Thu, 03 Nov 2011 06:37:18 GMT Full Article headline hacker ebay
y Amazon, eBay, Banks Snub Anti-DNS Fraud Tech By packetstormsecurity.com Published On :: Mon, 18 Feb 2013 15:19:51 GMT Full Article headline bank amazon dns fraud ebay
y Teen Drops $33K On Wikileaks Server Using Dad's Ebay Account By packetstormsecurity.com Published On :: Fri, 13 Sep 2013 02:17:27 GMT Full Article headline data loss ebay sweden