mi Skype Trojan Forces Bitcoin Mining By packetstormsecurity.com Published On :: Mon, 08 Apr 2013 14:33:58 GMT Full Article headline bank trojan cybercrime fraud skype
mi German Publisher Accuses Microsoft Of URL Sniffing By packetstormsecurity.com Published On :: Wed, 15 May 2013 05:14:42 GMT Full Article headline privacy microsoft spyware skype
mi NSA's Access To Microsoft's Services Detailed By packetstormsecurity.com Published On :: Fri, 12 Jul 2013 14:20:17 GMT Full Article headline government privacy microsoft skype nsa
mi Microsoft Reveals No Skype Call Data Handed To Govt By packetstormsecurity.com Published On :: Mon, 30 Sep 2013 15:00:35 GMT Full Article headline government privacy microsoft usa phone skype nsa
mi Hackers Build A Skype That's Not Controlled By Microsoft By packetstormsecurity.com Published On :: Tue, 02 Sep 2014 06:15:57 GMT Full Article headline hacker microsoft skype
mi Supreme Court Dismisses Assange Bid To Reopen Extradition Case By packetstormsecurity.com Published On :: Thu, 14 Jun 2012 15:22:53 GMT Full Article headline government britain data loss sweden
mi Is Nokia Man-In-The-Middling SSL Traffic On Phones? By packetstormsecurity.com Published On :: Wed, 09 Jan 2013 15:59:52 GMT Full Article headline privacy bank fraud ssl nokia
mi Microsoft Buys Nokia For $7 Billion By packetstormsecurity.com Published On :: Tue, 03 Sep 2013 15:26:48 GMT Full Article headline microsoft phone nokia
mi Nokia Paid Millions To Software Blackmailers Six Years Ago By packetstormsecurity.com Published On :: Wed, 18 Jun 2014 15:25:27 GMT Full Article headline phone cybercrime data loss fraud cryptography finland nokia
mi Poisoned Websites Staying Contaminated Longer By packetstormsecurity.com Published On :: Mon, 31 Mar 2008 13:48:41 GMT Full Article survey
mi Data Breaches Cost $6.6 Million On Average, Survey Finds By packetstormsecurity.com Published On :: Sun, 01 Feb 2009 19:38:48 GMT Full Article survey data loss
mi Survey Reveals Culture Of IT Admin Snooping By packetstormsecurity.com Published On :: Thu, 11 Jun 2009 16:57:54 GMT Full Article privacy survey
mi Sysadmin Stole Co-Worker IDs For Amazon Survey Splurge By packetstormsecurity.com Published On :: Fri, 29 Oct 2010 09:35:52 GMT Full Article survey amazon scam
mi Jenkins Vuln Makes For Great Monero Mining Slaves By packetstormsecurity.com Published On :: Tue, 20 Feb 2018 13:57:33 GMT Full Article headline malware flaw cryptography java
mi Sega Loses Data For 1.3 Million Customers By packetstormsecurity.com Published On :: Sun, 19 Jun 2011 20:47:41 GMT Full Article headline hacker data loss sega
mi US Dodges The Question Of Whether Its Military Built Stuxnet By packetstormsecurity.com Published On :: Mon, 30 May 2011 07:42:50 GMT Full Article headline government usa worm
mi Stuxnet Tricks Will Aid Cybercriminals, Warns Microsoft By packetstormsecurity.com Published On :: Fri, 14 Dec 2012 16:27:23 GMT Full Article headline malware microsoft cybercrime fraud worm
mi Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue. Full Article
mi Microsoft Workstation Service NetpManageIPCConnect Overflow By packetstormsecurity.com Published On :: Thu, 31 Dec 2009 03:20:56 GMT This Metasploit module exploits a stack overflow in the NetApi32 NetpManageIPCConnect function using the Workstation service in Windows 2000 SP4 and Windows XP SP2. In order to exploit this vulnerability, you must specify a the name of a valid Windows DOMAIN. It may be possible to satisfy this condition by using a custom dns and ldap setup, however that method is not covered here. Although Windows XP SP2 is vulnerable, Microsoft reports that Administrator credentials are required to reach the vulnerable code. Windows XP SP1 only requires valid user credentials. Also, testing shows that a machine already joined to a domain is not exploitable. Full Article
mi Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow By packetstormsecurity.com Published On :: Mon, 26 Jul 2010 20:18:25 GMT This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue. Full Article
mi Microsoft SMB Server Zero Size Pool Allocation By packetstormsecurity.com Published On :: Fri, 13 Aug 2010 00:01:59 GMT A vulnerability in the Windows kernel can be triggered via SMB in Microsoft Windows versions ranging from Windows 2000 through to Windows 7. This vulnerability allows an attacker to trigger a kernel pool corruption by sending a specially crafted SMB_COM_TRANSACTION2 request. Successful exploitation of this issue may result in remote code execution with kernel privileges, while failed attempts will result in a denial of service condition. Full Article
mi Microsoft DHCP INFORM Configuration Overwrite By packetstormsecurity.com Published On :: Fri, 30 May 2014 04:49:27 GMT A vulnerability in Windows DHCP was found on Windows OS versions ranging from Windows 2000 through to Windows server 2003. This vulnerability allows an attacker to remotely overwrite DNS, Gateway, IP Addresses, routing, WINS server, WPAD, and server configuration with no user interaction. Successful exploitation of this issue will result in a remote network configuration overwrite. Microsoft acknowledged the issue but has indicated no plans to publish a patch to resolve it. Full Article
mi 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico
mi How Hackers Pulled Off A $20 Million Bank Heist By packetstormsecurity.com Published On :: Mon, 18 Mar 2019 14:48:17 GMT Full Article headline hacker bank cybercrime korea mexico
mi Worminator-bin.tgz By packetstormsecurity.com Published On :: Wed, 06 Dec 2006 02:38:14 GMT A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. This tarball is the binary executable version. Full Article
mi Worminator-src.tgz By packetstormsecurity.com Published On :: Wed, 06 Dec 2006 02:38:51 GMT A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. This tarball is the source version. Full Article
mi Microsoft Is Accused Of Giving Misguided Security Advice By packetstormsecurity.com Published On :: Fri, 27 May 2011 13:41:39 GMT Full Article headline microsoft cookiejacking
mi Opera Adds Security, Firefox Coming By packetstormsecurity.com Published On :: Thu, 12 Jun 2008 08:08:45 GMT Full Article mozilla opera firefox
mi Hackers Use Opera As Defense Against Other Cybercriminals By packetstormsecurity.com Published On :: Fri, 21 Aug 2009 05:18:26 GMT Full Article hacker privacy cybercrime opera
mi Book Review: 'The Tangled Web' By Michal Zalewski By packetstormsecurity.com Published On :: Sat, 11 Feb 2012 06:59:09 GMT No Starch Press: $49.95 If you are a security engineer, a researcher, a hacker or just someone who keeps your ear to the ground when it comes to computer security, chances are you have seen the name Michal Zalewski. He has been responsible for an abundance of tools, research, proof of concepts and helpful insight to many over the years. He recently released a book called "The Tangled Web - A Guide To Securing Modern Web Applications". Normally, when I read books about securing web applications, I find many parallels where authors will give an initial lay of the land, dictating what technologies they will address, what programming languages they will encompass and a decent amount of detail on vulnerabilities that exist along with some remediation tactics. Such books are invaluable for people in this line of work, but there is a bigger picture that needs to be addressed and it includes quite a bit of secret knowledge rarely divulged in the security community. You hear it in passing conversation over beers with colleagues or discover it through random tests on your own. But rarely are the oddities documented anywhere in a thorough manner. Before we go any further, let us take a step back in time. Well over a decade ago, the web was still in its infancy and an amusing vulnerability known as the phf exploit surfaced. It was nothing more than a simple input validation bug that resulted in arbitrary code execution. The average hacker enjoyed this (and many more bugs like it) during this golden age. At the time, developers of web applications had a hard enough time getting their code to work and rarely took security implications into account. Years later, cross site scripting was discovered and there was much debate about whether or not a cross site scripting vulnerability was that important. After all, it was an issue that restricted itself to the web ecosystem and did not give us a shell on the server. Rhetoric on mailing lists mocked such findings and we (Packet Storm) received many emails saying that by archiving these issues we were degrading the quality of the site. But as the web evolved, people starting banking online, their credit records were online and before you knew it, people were checking their social network updates on their phone every five minutes. All of a sudden, something as small as a cross site scripting vulnerability mattered greatly. To make the situation worse, many programs were developed to support web-related technologies. In the corporate world, being first to market or putting out a new feature in a timely fashion trumphs security. Backwards compatibility that feeds poor design became a must for any of the larger browser vendors. The "browser wars" began and everyone had different ideas on how to solve different issues. To say web-related technologies brought many levels of complexity to the modern computing experience is a great understatement. Browser-side programming languages, such as JavaScript, became a playground for hackers. Understanding the Document Object Model (DOM) and the implications of poorly coded applications became one of those lunch discussions that could cause you to put your face into your mashed potatoes. Enter "The Tangled Web". This book puts some very complicated nuances in plain (enough) english. It starts out with Zalewski giving a brief synopsis of the security industry and the web. Breakdowns of the basics are provided and it is written in a way that is inviting for anyone to read. It goes on to cover a wide array of topics inclusive to the operation of browsers, the protocols involved, the various types of documents handled and the languages supported. Armed with this knowledge, the reader is enabled to tackle the next section detailing browser security features. As the author puts it, it covers "everything from the well-known but often misunderstood same-origin policy to the obscure and proprietary zone settings of Internet Explorer". Browsers, it ends up, have a ridiculous amount of odd dynamics for even the simplest acts. The last section wraps things up with upcoming security features and various browser mechanisms to note. I found it a credit to the diversity of the book that technical discussion could also trail off to give historical notes on poor industry behavior. When it noted DNS hijacking by various providers it reminded me of the very distinct and constantly apparent disconnect between business and knowledge of technology. When noting how non-HTTP servers were being leveraged to commit cross site scripting attacks, Zalewski also made it a point to note how the Internet Explorer releases only have a handful of prohibited ports but all other browsers have dozens that they block. The delicate balance of understanding alongside context is vital when using information from this book and applying it to design. Every page offers some bit of interesting knowledge that dives deep. It takes the time to note the odd behaviors small mistakes can cause and also points out where flawed security implementations exist. This book touches on the old and the new and many things other security books have overlooked. Another nice addition is that it provides security engineering cheatsheets at the end of each chapter. To be thorough, it explains both the initiatives set out by RFCs while it also documents different paths various browser vendors have taken in tackling tricky security issues. Google's Chrome, Mozilla's Firefox, Microsoft's Internet Explorer, Apple's Safari and Opera are compared and contrasted greatly throughout this book. In my opinion, the web has become a layer cake over the years. New shiny technologies and add-ons have been thrown into the user experience and with each of them comes a new set of security implications. One-off findings are constantly discovered and documented (and at Packet Storm we try to archive every one of them), but this is the first time I have seen a comprehensive guide that focuses on everything from cross-domain content inclusion to content-sniffing. It is the sort of book that should be required reading for every web developer. -Todd Full Article headline microsoft flaw google mozilla opera apple firefox chrome
mi Opera Just Added A Bitcoin-Mining Blocker By packetstormsecurity.com Published On :: Fri, 22 Dec 2017 16:12:26 GMT Full Article headline opera
mi Pakistan Military Hit By Operation Shaheen Malware By packetstormsecurity.com Published On :: Tue, 13 Nov 2018 16:43:38 GMT Full Article headline government malware cyberwar pakistan
mi Researchers Compromise Netflix Content In Widevine DRM Hack By packetstormsecurity.com Published On :: Wed, 01 May 2019 14:26:33 GMT Full Article headline flaw mpaa cryptography
mi Feds Bust Man Selling $1.2m In Counterfeit Microsoft Software By packetstormsecurity.com Published On :: Sat, 10 Nov 2012 02:52:47 GMT Full Article headline microsoft cybercrime fraud ebay
mi The Three Amigos Offer Sanctuary To Cornered NSA Leaker Snowden By packetstormsecurity.com Published On :: Mon, 08 Jul 2013 15:10:18 GMT Full Article headline government privacy usa data loss spyware venezuela nsa
mi Tech Giants Spend Millions To Stop Another Heartbleed By packetstormsecurity.com Published On :: Fri, 25 Apr 2014 14:55:37 GMT Full Article headline microsoft flaw google ssl facebook cryptography
mi Heartbleed Used To Uncover Data From Cyber-Criminals By packetstormsecurity.com Published On :: Tue, 29 Apr 2014 23:43:22 GMT Full Article headline cybercrime data loss fraud flaw ssl cryptography
mi Silly Sysadmins Adding Heartbleed To Servers By packetstormsecurity.com Published On :: Fri, 09 May 2014 14:17:03 GMT Full Article headline privacy data loss flaw ssl cryptography
mi Many Sites Reusing Heartbleed Compromised Private Keys By packetstormsecurity.com Published On :: Fri, 09 May 2014 23:22:10 GMT Full Article headline privacy data loss flaw ssl cryptography
mi OpenSSL Man In The Middle Flaw Found After 16 Years By packetstormsecurity.com Published On :: Fri, 06 Jun 2014 12:47:38 GMT Full Article headline privacy flaw ssl cryptography
mi Microsoft Warns Of Bogus Google And Yahoo SSL Certificates By packetstormsecurity.com Published On :: Fri, 11 Jul 2014 14:38:37 GMT Full Article headline privacy microsoft cybercrime fraud google yahoo ssl
mi Lazy Sysadmins Rooted In Looming Mozilla Cert Wipeout By packetstormsecurity.com Published On :: Wed, 20 Aug 2014 15:06:42 GMT Full Article headline flaw ssl mozilla cryptography
mi IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution By packetstormsecurity.com Published On :: Tue, 22 Aug 2017 05:44:56 GMT This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP service does not properly validate user input in the 'new_home_page' parameter of the 'saveHomePage' method allowing arbitrary PHP code to be written to the config.php file. The config.php file is executed in most pages within the application, and accessible directly via the web root, resulting in code execution. This Metasploit module has been tested successfully on IBM OpenAdmin Tool 3.14 on Informix 12.10 Developer Edition (SUSE Linux 11) virtual appliance. Full Article
mi Microsoft Cites BBC, Wikipedia In Error-Filled DMCA Takedown By packetstormsecurity.com Published On :: Mon, 08 Oct 2012 17:12:00 GMT Full Article headline microsoft dmca
mi Libyan Rebels Are Flying Their Own Minidrone By packetstormsecurity.com Published On :: Wed, 24 Aug 2011 02:20:49 GMT Full Article headline libya
mi US Military Debated Hacking Libyan Air Defenses By packetstormsecurity.com Published On :: Mon, 17 Oct 2011 22:46:50 GMT Full Article headline government usa cyberwar libya
mi US Marine Unearths Nukes, Cocaine, And $25 Million By packetstormsecurity.com Published On :: Mon, 04 Sep 2006 22:16:23 GMT Full Article usa iraq
mi Jamming Systems Play Secret Role In Iraq By packetstormsecurity.com Published On :: Mon, 13 Aug 2007 10:26:34 GMT Full Article iraq
mi Special Forces Getting High-Tech Soldier Suits For Iraq Mission By packetstormsecurity.com Published On :: Wed, 22 Jul 2009 20:13:43 GMT Full Article iraq
mi Wikileaks Releases Indiscriminate Slaying Video From Iraq By packetstormsecurity.com Published On :: Tue, 06 Apr 2010 22:12:40 GMT Full Article iraq