science and technology TBA_v1_prc.zip By packetstormsecurity.com Published On :: Wed, 29 Mar 2000 01:56:31 GMT TBA is the first wardialer for the PalmOS platform. Using a Palm device with a modem, you can wardial from anywhere a phone line is available - throw it in a phone can to retrieve later, toss it up in the ceiling during a security audit - the possibilities are endless. Full Article
science and technology cc-pinextract.txt By packetstormsecurity.com Published On :: Wed, 12 Apr 2000 22:18:10 GMT CRYPTOCard's CRYPTOAdmin software is a challenge/response user authentication administration system. The PT-1 token, which runs on a PalmOS device, generates the one-time-password response. A PalmOS .PDB file is created for each user and loaded onto their Palm device. By gaining access to the .PDB file, the legitimate user's PIN can be determined through a series of DES decrypts-and-compares. Using the demonstration tool, the PIN can be determined in under 5 minutes on a Pentium III 450MHz. Full Article
science and technology A092600-1 By packetstormsecurity.com Published On :: Thu, 28 Sep 2000 21:37:22 GMT Atstake Security Advisory - PalmOS Password Retrieval and Decoding. Severity: Moderate. PalmOS offers a built-in Security application which is used for the legitimate user to protect and hide records from unauthorized users by means of a password. Passwords can easily be obtained and decoded allowing an attacker to access all private records on a Palm device. Full Article
science and technology PalmOShttpd.txt By packetstormsecurity.com Published On :: Mon, 09 Feb 2004 00:45:00 GMT A bug exists in the PalmOS httpd that causes a crash with a "Fatal Error". Full exploit included. Full Article
science and technology Android Banking Trojan Malware Disguises Itself As Super Mario Run By packetstormsecurity.com Published On :: Mon, 09 Jan 2017 14:58:50 GMT Full Article headline malware bank phone trojan cybercrime fraud google
science and technology Dridex Trojan Updated With AtomBombing Evasion Techniques By packetstormsecurity.com Published On :: Wed, 01 Mar 2017 15:18:00 GMT Full Article headline malware trojan
science and technology Ursnif Banking Trojan Spreading In Japan By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 17:45:54 GMT Full Article headline malware bank trojan cybercrime fraud japan
science and technology New IcedID Trojan Targets US Banks By packetstormsecurity.com Published On :: Mon, 13 Nov 2017 22:39:39 GMT Full Article headline malware bank usa trojan cybercrime fraud
science and technology Android Trojan Has Miner So Aggressive It Can Bork Your Battery By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:22:11 GMT Full Article headline malware phone trojan flaw google
science and technology Dridex Banking Trojan Compromises FTP Sites In New Campaign By packetstormsecurity.com Published On :: Fri, 19 Jan 2018 15:48:28 GMT Full Article headline malware bank trojan cybercrime fraud
science and technology Mac Trojan Coldroot Went Undetected For Years By packetstormsecurity.com Published On :: Tue, 20 Feb 2018 13:57:37 GMT Full Article headline malware trojan apple
science and technology Old Banking Trojan TrickBot Has Been Taught New Tricks By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 14:00:11 GMT Full Article headline malware bank trojan cybercrime fraud
science and technology Trojan Malware Campaign Expands With Attacks Against New Banks By packetstormsecurity.com Published On :: Thu, 23 Aug 2018 15:37:24 GMT Full Article headline malware bank trojan cybercrime fraud
science and technology GPlayed Trojan's Baby Brother Is After Your Bank Account By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 15:43:10 GMT Full Article headline malware bank trojan cybercrime fraud
science and technology Pied Piper Phishing Scheme Infests Victims With FlawedAmmyy, RMS RATs By packetstormsecurity.com Published On :: Sat, 01 Dec 2018 13:04:15 GMT Full Article headline malware trojan fraud backdoor
science and technology TA505 Is Distributing A Brand New Form Of Malware By packetstormsecurity.com Published On :: Thu, 10 Jan 2019 13:54:13 GMT Full Article headline malware bank trojan cybercrime fraud cyberwar
science and technology NanoCore Trojan Is Protected In Memory From Being Killed Off By packetstormsecurity.com Published On :: Wed, 16 Jan 2019 13:35:39 GMT Full Article headline malware trojan
science and technology MacOS Trojan Disables Gatekeeper To Deploy Malicious Payloads By packetstormsecurity.com Published On :: Thu, 14 Feb 2019 14:32:40 GMT Full Article headline malware trojan apple
science and technology Shifty New Variant Of Qbot Banking Trojan Spreads By packetstormsecurity.com Published On :: Fri, 01 Mar 2019 00:17:09 GMT Full Article headline malware bank trojan
science and technology Bank Hackers Team Up To Spread Financial Trojans Worldwide By packetstormsecurity.com Published On :: Wed, 20 Mar 2019 13:35:04 GMT Full Article headline hacker malware bank trojan cybercrime fraud
science and technology Retefe Banking Trojan Resurfaces, Says Goodbye To Tor By packetstormsecurity.com Published On :: Fri, 03 May 2019 22:59:33 GMT Full Article headline malware bank trojan cybercrime fraud
science and technology BianLian Banking Trojan Adds Screen Recorder By packetstormsecurity.com Published On :: Tue, 09 Jul 2019 15:04:20 GMT Full Article headline malware bank phone trojan cybercrime fraud google
science and technology Magecart Group Linked To Dridex Banking Trojan, Carbanak By packetstormsecurity.com Published On :: Tue, 22 Oct 2019 17:10:02 GMT Full Article headline hacker malware bank trojan cybercrime fraud
science and technology Lazarus Group Visits The Apple Orchard With New macOS Trojan By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 16:54:04 GMT Full Article headline malware trojan apple backdoor
science and technology JhoneRAT Exploits Cloud To Attack Middle Eastern Countries By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:27:18 GMT Full Article headline malware trojan cyberwar
science and technology TrickBot Switches To A New Win10 UAC Bypass To Evade Detection By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 15:59:32 GMT Full Article headline malware microsoft trojan fraud flaw
science and technology Emotet Trojan Evolves To Spread Via A WiFi Connection By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:34:01 GMT Full Article headline malware trojan wireless
science and technology Fake Coronavirus Emails Impersonate The WHO By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 12:56:27 GMT Full Article headline malware virus trojan fraud
science and technology IBM AIX HACMP Privlege Escalation By packetstormsecurity.com Published On :: Tue, 08 Sep 2015 23:33:33 GMT IBM AIX High Availability Cluster Multiprocessing (HACMP) suffers from a local privilege escalation vulnerability that results in root privileges. Full Article
science and technology Samhain File Integrity Checker 4.1.0 By packetstormsecurity.com Published On :: Thu, 24 Sep 2015 10:05:03 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.1.1 By packetstormsecurity.com Published On :: Sun, 01 Nov 2015 19:10:13 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.1.2 By packetstormsecurity.com Published On :: Mon, 21 Dec 2015 17:57:30 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.1.3 By packetstormsecurity.com Published On :: Tue, 19 Apr 2016 19:33:33 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.1.4 By packetstormsecurity.com Published On :: Thu, 02 Jun 2016 20:41:10 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.1.5 By packetstormsecurity.com Published On :: Tue, 09 Aug 2016 18:09:57 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.2.0 By packetstormsecurity.com Published On :: Tue, 01 Nov 2016 00:33:33 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology AIX 6.1 / 7.1 / 7.2.0.2 lsmcode Local Root By packetstormsecurity.com Published On :: Fri, 04 Nov 2016 13:33:33 GMT AIX versions 6.1, 7.1, and 7.2.0.2 lsmcode local root exploit. Full Article
science and technology AIX 5.3 / 6.1 / 7.1 / 7.2 lquerylv Local Root By packetstormsecurity.com Published On :: Fri, 04 Nov 2016 14:44:44 GMT This exploit takes advantage of known issues with debugging functions within the AIX linker library. It takes advantage of known functionality, and focuses on badly coded SUID binaries which do not adhere to proper security checks prior to seteuid/open/writes. Full Article
science and technology IBM AIX 6.1 / 7.1 / 7.2 Bellmail Privilege Escalation By packetstormsecurity.com Published On :: Thu, 22 Dec 2016 07:02:22 GMT IBM AIX versions 6.1, 7.1, and 7.2 suffer from a Bellmail privilege escalation vulnerability. Full Article
science and technology CA Common Services casrvc Privilege Escalation By packetstormsecurity.com Published On :: Sat, 28 Jan 2017 15:22:22 GMT CA Technologies support is alerting customers about a medium risk vulnerability that may allow a local attacker to gain additional privileges with products using CA Common Services running on the AIX, HP-UX, Linux, and Solaris platforms. The vulnerability, CVE-2016-9795, occurs due to insufficient validation by the casrvc program. A local unprivileged user can exploit the vulnerability to modify arbitrary files, which can potentially allow a local attacker to gain root level access. Full Article
science and technology Bull / IBM AIX Clusterwatch / Watchware File Write / Command Injection By packetstormsecurity.com Published On :: Tue, 07 Mar 2017 09:32:22 GMT Bull / IBM AIX Clusterwatch / Watchware suffers from having trivial admin credentials, system file writes, and OS command injection vulnerabilities. Full Article
science and technology Samhain File Integrity Checker 4.2.1 By packetstormsecurity.com Published On :: Thu, 06 Apr 2017 19:40:07 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.2.2 By packetstormsecurity.com Published On :: Mon, 03 Jul 2017 04:59:31 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.2.3 By packetstormsecurity.com Published On :: Wed, 01 Nov 2017 16:25:45 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.2.4 By packetstormsecurity.com Published On :: Thu, 21 Dec 2017 20:05:04 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.3.0 By packetstormsecurity.com Published On :: Mon, 10 Sep 2018 18:02:47 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Samhain File Integrity Checker 4.3.1 By packetstormsecurity.com Published On :: Tue, 25 Sep 2018 20:16:41 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Xorg X11 Server (AIX) Local Privilege Escalation By packetstormsecurity.com Published On :: Wed, 05 Dec 2018 05:22:22 GMT Xorg X11 server on AIX local privilege escalation exploit. Full Article
science and technology Samhain File Integrity Checker 4.3.2 By packetstormsecurity.com Published On :: Mon, 07 Jan 2019 18:54:17 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Xorg X11 Server Local Privilege Escalation By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 19:01:06 GMT This Metasploit module has been tested with AIX 7.1 and 7.2, and should also work with 6.1. Due to permission restrictions of the crontab in AIX, this module does not use cron, and instead overwrites /etc/passwd in order to create a new user with root privileges. All currently logged in users need to be included when /etc/passwd is overwritten, else AIX will throw 'Cannot get "LOGNAME" variable' when attempting to change user. The Xorg '-fp' parameter used in the OpenBSD exploit does not work on AIX, and is replaced by '-config', in conjuction with ANSI-C quotes to inject newlines when overwriting /etc/passwd. Full Article