in Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
in LPRng use_syslog Remote Format String Vulnerability By packetstormsecurity.com Published On :: Wed, 17 Feb 2010 23:45:41 GMT This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". Full Article
in Linksys E-Series Remote Code Execution By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 03:33:33 GMT Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm. Full Article
in Linksys Worm Remote Root By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 20:02:22 GMT Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi. Full Article
in Linksys E-Series TheMoon Remote Command Injection By packetstormsecurity.com Published On :: Sat, 05 Apr 2014 03:11:21 GMT Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5. Full Article
in Metamorphic Worms: Can They Remain Hidden? By packetstormsecurity.com Published On :: Mon, 02 Feb 2015 10:22:22 GMT Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest. Full Article
in Hak5 WiFi Pineapple Preconfiguration Command Injection 2 By packetstormsecurity.com Published On :: Wed, 19 Oct 2016 01:02:21 GMT This Metasploit module exploits a command injection vulnerability on WiFi Pineapples versions 2.0 and below and pineapple versions prior to 2.4. We use a combination of default credentials with a weakness in the anti-csrf generation to achieve command injection on fresh pineapple devices prior to configuration. Additionally if default credentials fail, you can enable a brute force solver for the proof-of-ownership challenge. This will reset the password to a known password if successful and may interrupt the user experience. These devices may typically be identified by their SSID beacons of 'Pineapple5_....'; details derived from the TospoVirus, a WiFi Pineapple infecting worm. Full Article
in Morris Worm fingerd Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 05 Nov 2018 21:05:50 GMT This Metasploit module exploits a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Full Article
in Linux Security Checklist Tool 2.0.3 By packetstormsecurity.com Published On :: Thu, 03 Feb 2011 15:31:32 GMT Linux Security Checklist is a perl script that audits a given Linux host and provides recommendations for security enhancements. Full Article
in Microsoft Is Accused Of Giving Misguided Security Advice By packetstormsecurity.com Published On :: Fri, 27 May 2011 13:41:39 GMT Full Article headline microsoft cookiejacking
in HP Security Bulletin 2007-14.84 By packetstormsecurity.com Published On :: Thu, 08 Nov 2007 23:36:19 GMT HP Security Bulletin - A potential security vulnerability has been identified in the Aries PA-RISC emulation software running on HP-UX IA-64 platforms only. This vulnerability may allow local unauthorized access. Full Article
in Anonymous Takes Down Greek Sites In Support Of Athens Protests By packetstormsecurity.com Published On :: Tue, 14 Feb 2012 00:46:29 GMT Full Article headline denial of service anonymous greece
in Opera Boosts Its Anti-Phishing Defenses By packetstormsecurity.com Published On :: Fri, 25 Apr 2008 12:12:07 GMT Full Article opera phish
in Opera Sings Anti-Malware Tune By packetstormsecurity.com Published On :: Fri, 06 Jun 2008 02:27:59 GMT Full Article malware opera
in Opera Adds Security, Firefox Coming By packetstormsecurity.com Published On :: Thu, 12 Jun 2008 08:08:45 GMT Full Article mozilla opera firefox
in Opera Update Draws The Curtain On Seven Security Vulns By packetstormsecurity.com Published On :: Thu, 21 Aug 2008 11:31:43 GMT Full Article opera
in Opera Scrambles To Quash Zero-Day Bug In Freshly Patched Browser By packetstormsecurity.com Published On :: Mon, 27 Oct 2008 00:26:27 GMT Full Article patch opera zero day
in Hackers Use Opera As Defense Against Other Cybercriminals By packetstormsecurity.com Published On :: Fri, 21 Aug 2009 05:18:26 GMT Full Article hacker privacy cybercrime opera
in Opera Browser Dinged By Code Execution Flaw By packetstormsecurity.com Published On :: Wed, 28 Oct 2009 17:08:56 GMT Full Article flaw opera
in Opera Says Bug Probably Can't Commandeer Machines By packetstormsecurity.com Published On :: Fri, 05 Mar 2010 22:35:14 GMT Full Article opera
in Opera Users Baffled By Vulnerability Warnings By packetstormsecurity.com Published On :: Tue, 09 Mar 2010 04:55:46 GMT Full Article opera
in Opera Fixes Critical Form-Handling Flaw By packetstormsecurity.com Published On :: Fri, 28 Jan 2011 16:43:24 GMT Full Article headline opera
in Firefox, Opera Allow Crooks To Hide An Entire Phish Site In A Link By packetstormsecurity.com Published On :: Tue, 04 Sep 2012 15:05:05 GMT Full Article headline flaw opera phish firefox
in Opera Brings Standalone VPN App To Android Devices By packetstormsecurity.com Published On :: Tue, 23 Aug 2016 14:12:16 GMT Full Article headline privacy phone google opera cryptography
in Opera Just Added A Bitcoin-Mining Blocker By packetstormsecurity.com Published On :: Fri, 22 Dec 2017 16:12:26 GMT Full Article headline opera
in WarVOX Telephony Auditing Tool By packetstormsecurity.com Published On :: Fri, 06 Mar 2009 18:58:11 GMT WarVOX is a suite of tools for exploring, classifying, and auditing telephone systems. Unlike normal wardialing tools, WarVOX works with the actual audio from each call and does not use a modem directly. This model allows WarVOX to find and classify a wide range of interesting lines, including modems, faxes, voice mail boxes, PBXs, loops, dial tones, IVRs, and forwarders. WarVOX provides the unique ability to classify all telephone lines in a given range, not just those connected to modems, allowing for a comprehensive audit of a telephone system. Full Article
in After Hacking Of CBI Website, India Hits Back By packetstormsecurity.com Published On :: Mon, 06 Dec 2010 16:05:35 GMT Full Article headline india cyberwar pakistan
in CIA Contractor Released After Pakistan Killings By packetstormsecurity.com Published On :: Wed, 16 Mar 2011 14:21:32 GMT Full Article headline government usa pakistan cia
in Osama bin Laden, The Face Of Terror, Killed In Pakistan By packetstormsecurity.com Published On :: Mon, 02 May 2011 03:28:24 GMT Full Article headline pakistan terror
in How The U.S. Tracked Down bin Laden By packetstormsecurity.com Published On :: Mon, 02 May 2011 14:35:35 GMT Full Article headline usa pakistan terror
in Google And Apple Among Hundreds Hit In High-Profile Pakistan Hack By packetstormsecurity.com Published On :: Mon, 26 Nov 2012 15:17:30 GMT Full Article headline hacker dns google yahoo apple pakistan
in Hacker Hits Over 400 Chinese Government Sites By packetstormsecurity.com Published On :: Sat, 08 Dec 2012 04:09:16 GMT Full Article headline hacker government china pakistan
in Deep Inside The CIA's Targeted Killings By packetstormsecurity.com Published On :: Wed, 10 Apr 2013 02:18:37 GMT Full Article headline government usa pakistan terror cia
in CIA's Most Senior Official In Pakistan 'Unmasked' By Khan's Party By packetstormsecurity.com Published On :: Wed, 27 Nov 2013 16:06:38 GMT Full Article headline government usa cyberwar pakistan cia
in Interweb Chuck Norris Infiltrates Netflix, Tivo By packetstormsecurity.com Published On :: Fri, 27 Mar 2009 10:33:28 GMT Full Article csrf
in Researcher Raids Browser History For Webmail Login Tokens By packetstormsecurity.com Published On :: Mon, 20 Jul 2009 18:12:43 GMT Full Article csrf
in Kim Dotcom Loses Latest Appeal Against US Extradition By packetstormsecurity.com Published On :: Thu, 05 Jul 2018 16:09:00 GMT Full Article headline government usa fraud mpaa new zealand
in Researchers Compromise Netflix Content In Widevine DRM Hack By packetstormsecurity.com Published On :: Wed, 01 May 2019 14:26:33 GMT Full Article headline flaw mpaa cryptography
in Anonymous Runs Amock In Israel, Finland, Portugal By packetstormsecurity.com Published On :: Mon, 07 Nov 2011 15:22:29 GMT Full Article headline denial of service israel anonymous finland portugal
in Tenshi Log Monitoring Program 0.12 By packetstormsecurity.com Published On :: Sat, 18 Sep 2010 19:43:42 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
in NIELD (Network Interface Events Logging Daemon) 0.10 By packetstormsecurity.com Published On :: Sat, 29 Jan 2011 20:07:48 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules. Full Article
in NIELD (Network Interface Events Logging Daemon) 0.11 By packetstormsecurity.com Published On :: Sun, 26 Jun 2011 07:41:52 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules. Full Article
in Tenshi Log Monitoring Program 0.13 By packetstormsecurity.com Published On :: Thu, 14 Jul 2011 00:33:12 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
in NIELD (Network Interface Events Logging Daemon) 0.20 By packetstormsecurity.com Published On :: Wed, 17 Aug 2011 14:31:42 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
in NIELD (Network Interface Events Logging Daemon) 0.21 By packetstormsecurity.com Published On :: Tue, 27 Dec 2011 17:28:33 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
in NIELD (Network Interface Events Logging Daemon) 0.22 By packetstormsecurity.com Published On :: Fri, 10 Feb 2012 22:31:56 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
in NIELD (Network Interface Events Logging Daemon) 0.23 By packetstormsecurity.com Published On :: Wed, 11 Apr 2012 15:17:25 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
in Tenshi Log Monitoring Program 0.14 By packetstormsecurity.com Published On :: Sun, 03 Jun 2012 17:11:51 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
in NIELD (Network Interface Events Logging Daemon) 0.3.0 By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 00:48:42 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
in Xenotix Python Keylogger For Windows By packetstormsecurity.com Published On :: Tue, 07 May 2013 13:33:33 GMT Xenotix is a keylogger for windows that is written in Python. It has the ability to send logs remotely. Full Article