cr Hacker Creates Full-Sized Guitar Rig For Guitar Hero DS By packetstormsecurity.com Published On :: Thu, 21 Aug 2008 19:20:17 GMT Full Article hacker nintendo
cr Hackers Create Super Mario Bros Wii Level Editors By packetstormsecurity.com Published On :: Tue, 17 Nov 2009 02:33:52 GMT Full Article hacker nintendo
cr Hacker Pleads Guilty To Stealing Nintendo Secrets By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:16 GMT Full Article headline hacker data loss fraud nintendo
cr Microsoft Windows 98/ME/2000/XP/2003 HTML Help File Hijack By packetstormsecurity.com Published On :: Fri, 05 Jul 2013 09:22:22 GMT Multiple Microsoft Windows 98/ME/2000/XP/2003 HTML Help file loading hijack vulnerabilities exist. Proof of concept included. Full Article
cr Botan C++ Crypto Algorithms Library 2.11.0 By packetstormsecurity.com Published On :: Mon, 01 Jul 2019 15:32:42 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
cr Botan C++ Crypto Algorithms Library 2.12.0 By packetstormsecurity.com Published On :: Mon, 07 Oct 2019 15:02:16 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
cr Botan C++ Crypto Algorithms Library 2.12.1 By packetstormsecurity.com Published On :: Mon, 14 Oct 2019 15:16:36 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
cr Botan C++ Crypto Algorithms Library 2.13.0 By packetstormsecurity.com Published On :: Mon, 06 Jan 2020 17:14:06 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
cr Botan C++ Crypto Algorithms Library 2.14.0 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:22:31 GMT Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release. Full Article
cr Amazon Engineer Leaks Encryption Keys To Public GitHub Repo By packetstormsecurity.com Published On :: Thu, 23 Jan 2020 16:22:30 GMT Full Article headline hacker amazon data loss password
cr T21-2020 Creating a Domain Index on BIOVIA Databases for Direct 2016, 2017 R2, 2018, or Direct 2020 By www.3ds.com Published On :: Wed, 01 Apr 2020 15:42:39 +0200 BIOVIA Direct Full Article BIOVIA Tech Notes BIOVIA Content
cr T22-2020 Creating a Domain Index on BIOVIA ACD Data Mart for Direct 2018 or Direct 2020 By www.3ds.com Published On :: Wed, 01 Apr 2020 15:43:07 +0200 BIOVIA Direct Full Article BIOVIA Tech Notes Collaborative Science
cr scram.ble By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= COMMUNICATIONS SECURITY OVERVIEW A Non-Technical Discussion of Modern Transmission Methods -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= written by Alan Hoffman ("Q") ============================= Full Article
cr Skype Squishes Cross-Zone Scripting Bug By packetstormsecurity.com Published On :: Wed, 06 Feb 2008 04:38:37 GMT Full Article voip skype
cr Chinese Skype Software Secretly Logs Political Chat Messages By packetstormsecurity.com Published On :: Thu, 02 Oct 2008 16:34:11 GMT Full Article government china voip skype
cr Reverse Engineer Extracts Skype Crypto Secret Recipe By packetstormsecurity.com Published On :: Fri, 09 Jul 2010 03:54:59 GMT Full Article voip skype
cr Hackers Crack Skype's Proprietary VOIP Protocol By packetstormsecurity.com Published On :: Mon, 12 Jul 2010 11:15:31 GMT Full Article hacker voip skype
cr Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:36 GMT Full Article headline hacker flaw
cr Australia's War On Encryption Potentially 'Reckless' By packetstormsecurity.com Published On :: Mon, 06 Nov 2017 14:22:57 GMT Full Article headline government privacy australia cryptography
cr Buy Second Hand Furniture To Learn Australian Govt Secrets By packetstormsecurity.com Published On :: Wed, 31 Jan 2018 17:01:23 GMT Full Article headline government privacy australia data loss
cr The Internet Reacts To Australia's Anti-Encryption Bill By packetstormsecurity.com Published On :: Thu, 06 Dec 2018 19:56:43 GMT Full Article headline government australia backdoor
cr Australia Passes Encryption-Breaking Laws By packetstormsecurity.com Published On :: Fri, 07 Dec 2018 17:30:55 GMT Full Article headline government privacy australia backdoor cryptography
cr Microsoft Is Not Comfortable Storing Data In Australia By packetstormsecurity.com Published On :: Wed, 27 Mar 2019 14:49:43 GMT Full Article headline government privacy microsoft australia cryptography
cr Creepy - The RFID Urn Retrieval System By packetstormsecurity.com Published On :: Tue, 19 Aug 2008 19:35:21 GMT Full Article rfid
cr Mythbusters RFID Episode Axed After Pressure From Credit Card Firms By packetstormsecurity.com Published On :: Wed, 03 Sep 2008 00:43:56 GMT Full Article bank rfid
cr Steel-Woven Wallet Pledges To Keep RFID Credit Cards Safe By packetstormsecurity.com Published On :: Fri, 11 Dec 2009 08:24:58 GMT Full Article bank rfid
cr Microsoft Windows WizardOpium Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 13:02:22 GMT Microsoft Windows WizardOpium local privilege escalation exploit. Full Article
cr CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 13:33:36 GMT CoronaBlue aka SMBGhost proof of concept exploit for Microsoft Windows 10 (1903/1909) SMB version 3.1.1. This script connects to the target host, and compresses the authentication request with a bad offset field set in the transformation header, causing the decompresser to buffer overflow and crash the target. Full Article
cr Microsoft Windows SMB 3.1.1 Remote Code Execution By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 13:39:33 GMT Microsoft Windows SMB version 3.1.1 suffers from a code execution vulnerability. Full Article
cr Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:38:04 GMT Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit. Full Article
cr Microsoft Windows Net Use Insufficent Authentication By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:08:47 GMT The Windows "net use" network logon type-3 command does not prompt for authentication when the built-in Administrator account is enabled and both remote and originating systems suffer from password reuse. This also works as "standard" user but unfortunately we do not gain high integrity privileges. However, it opens the door and increases the attack surface if the box we laterally move to has other vulnerabilities present. Full Article
cr Microsoft Windows NtFilterToken ParentTokenId Incorrect Setting Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:42:48 GMT Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges. Full Article
cr Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:44:19 GMT In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks. Full Article
cr Microsoft Windows Unquoted Service Path Privilege Escalation By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 20:01:59 GMT This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example: C:program fileshello.exe; The Windows API will try to interpret this as two possible paths: C:program.exe, and C:program fileshello.exe, and then execute all of them. To some software developers, this is an unexpected behavior, which becomes a security problem if an attacker is able to place a malicious executable in one of these unexpected paths, sometimes escalate privileges if run as SYSTEM. Some software such as OpenVPN 2.1.1, OpenSSH Server 5, and others have the same problem. Full Article
cr Microsoft Twitter Accounts Hit Again By Syrian Electronic Army By packetstormsecurity.com Published On :: Mon, 13 Jan 2014 15:33:03 GMT Full Article headline hacker microsoft twitter syria
cr Microsoft In More Hacking Misery By packetstormsecurity.com Published On :: Tue, 21 Jan 2014 16:24:20 GMT Full Article headline hacker microsoft flaw syria
cr SEA Screws With Facebook's WHOIS Via Mark Monitor By packetstormsecurity.com Published On :: Thu, 06 Feb 2014 16:07:44 GMT Full Article headline hacker dns facebook syria
cr Second Hacking Crew Joins Syrian Electronic Army On Team Assad By packetstormsecurity.com Published On :: Tue, 02 Sep 2014 06:15:46 GMT Full Article headline hacker government syria
cr Russian Plane Crash Possibly Fault Of ISIS Bomb By packetstormsecurity.com Published On :: Thu, 05 Nov 2015 00:55:41 GMT Full Article headline russia terror syria
cr Philippine Police Arrest 357 In Cyber Crime Raid By packetstormsecurity.com Published On :: Sun, 26 Aug 2012 05:44:59 GMT Full Article headline hacker government cybercrime fraud philippines
cr Hyperion Runtime Encrypter 2.0 By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 18:41:35 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
cr cryptmount Filesystem Manager 5.3.2 By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:37:05 GMT cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up. Full Article
cr Hyperion Runtime Encrypter 2.3 By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 20:32:22 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
cr ASP Dynamika 2.5 Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 08 Dec 2015 22:42:39 GMT ASP Dynamika version 2.5 suffers from a cross site scripting vulnerability. Full Article
cr Dutch Courts: Wi-Fi Hacking Is Not A Crime By packetstormsecurity.com Published On :: Mon, 21 Mar 2011 15:27:12 GMT Full Article headline hacker wireless netherlands
cr Microsoft And Mozilla Ban Dutch Government Root Certificate By packetstormsecurity.com Published On :: Wed, 07 Sep 2011 14:37:21 GMT Full Article headline microsoft ssl mozilla netherlands
cr Fortezza Pleads Not Guilty To Mass Credit Card Theft By packetstormsecurity.com Published On :: Tue, 12 Jun 2012 15:36:23 GMT Full Article headline hacker bank usa cybercrime scam netherlands
cr Cybercriminals Fill Up On Gas Pump Scams Ahead Of Oct. Deadline By packetstormsecurity.com Published On :: Sat, 04 Jan 2020 16:06:33 GMT Full Article headline bank cybercrime fraud
cr Naive IoT Botnet Wastes Its Time Mining Cryptocurrency By packetstormsecurity.com Published On :: Wed, 08 Jan 2020 16:25:55 GMT Full Article headline malware botnet cryptography
cr Adobe Patches Critical Vulnerabilities In Flash, InDesign By packetstormsecurity.com Published On :: Wed, 11 Apr 2018 15:54:51 GMT Full Article headline flaw adobe patch