science and technology Nmap Port Scanner 7.80 By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 17:43:45 GMT Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full Article
science and technology nullscan 1.0.0 By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:56:25 GMT nullscan is a modular framework designed to chain and automate security tests. It parses target definitions from the command line and runs corresponding modules and their nullscan-tools afterwards. It can also take hosts and start nmap first in order to perform a basic portscan and run the modules afterwards. Also, nullscan can parse a given nmap logfile for open tcp and udp ports and again run the modules afterwards. All results will be logged in specified directories with a clean structure and an HTML report can subsequently be generated. Full Article
science and technology Samhain File Integrity Checker 4.3.3 By packetstormsecurity.com Published On :: Thu, 11 Jul 2019 17:19:20 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Solaris 11.4 xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 15:03:23 GMT Solaris version 11.4 xscreensaver local privilege escalation exploit. Full Article
science and technology Solaris xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 20:15:30 GMT This Metasploit module exploits a vulnerability in xscreensaver versions since 5.06 on unpatched Solaris 11 systems which allows users to gain root privileges. xscreensaver allows users to create a user-owned file at any location on the filesystem using the -log command line argument introduced in version 5.06. This module uses xscreensaver to create a log file in /usr/lib/secure/, overwrites the log file with a shared object, and executes the shared object using the LD_PRELOAD environment variable. This module has been tested successfully on xscreensaver version 5.15 on Solaris 11.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 (x86). Full Article
science and technology Samhain File Integrity Checker 4.4.0 By packetstormsecurity.com Published On :: Thu, 31 Oct 2019 22:21:09 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology SunOS 5.10 Generic_147148-26 Local Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 23:33:33 GMT SunOS version 5.10 Generic_147148-26 local privilege escalation exploit. A buffer overflow in the CheckMonitor() function in the Common Desktop Environment versions 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Full Article
science and technology Solaris xlock Information Disclosure By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:38:33 GMT A low impact information disclosure vulnerability in the setuid root xlock binary distributed with Solaris may allow local users to read partial contents of sensitive files. Due to the fact that target files must be in a very specific format, exploitation of this flaw to escalate privileges in a realistic scenario is unlikely. Full Article
science and technology Common Desktop Environment 2.3.1 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:40:08 GMT A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Note that Oracle Solaris CDE is based on the original CDE 1.x train, which is different from the CDE 2.x codebase that was later open sourced. Most notably, the vulnerable buffer in the Oracle Solaris CDE is stack-based, while in the open source version it is heap-based. Full Article
science and technology Samhain File Integrity Checker 4.4.1 By packetstormsecurity.com Published On :: Thu, 27 Feb 2020 19:19:51 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
science and technology Common Desktop Environment 1.6 Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:34:40 GMT A buffer overflow in the _SanityCheck() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier allows local users to gain root privileges via a long calendar name or calendar owner passed to sdtcm_convert in a malicious calendar file. The open source version of CDE (based on the CDE 2.x codebase) is not affected, because it does not ship the vulnerable program. Versions 1.6 and below are affected. Full Article
science and technology Common Desktop Environment 2.3.1 / 1.6 libDtSvc Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:37:07 GMT A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name. The vulnerable function is located in the libDtSvc library and can be reached by executing the setuid program dtsession. Versions 2.3.1 and below as well as 1.6 and earlier are affected. Full Article
science and technology Oracle Solaris 11.x / 10 whodo / w Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:38:30 GMT A difficult to exploit heap-based buffer overflow in setuid root whodo and w binaries distributed with Solaris allows local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges. Full Article
science and technology VB-98.07.OpenVMS.LOGINOUT By packetstormsecurity.com Published On :: Tue, 14 Sep 1999 05:51:46 GMT A potential vulnerability with LOGINOUT for OpenVMS (VAX & ALPHA) V7.1 software has been discovered. Full Article
science and technology NetBSD-SA1999-012.vax.ptrace By packetstormsecurity.com Published On :: Thu, 23 Sep 1999 04:08:42 GMT NetBSD uses the ptrace(2) system call to trace and debug other processes. The debugging process can also modify the internal registers, including the status (PSL) register, for the process being debugged. Besides the normal user-accessible flags, the VAX hardware also stores information about privilege levels and used stacks in the PSL. Those flags are only altered via the instruction REI (return from interrupt) or LDPCTX (load process context) and cannot be modified while running in "user" mode. NetBSD security page here. Full Article
science and technology S-93-07.asc By packetstormsecurity.com Published On :: Mon, 10 Jan 2000 00:31:14 GMT Subject VAX/VMS failure to disable user accounts Date 13-Feb-93 Full Article
science and technology systemx.txt By packetstormsecurity.com Published On :: Sat, 15 Apr 2000 05:30:57 GMT bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces. Full Article
science and technology COVERT-2000-07.listserv By packetstormsecurity.com Published On :: Wed, 26 Jul 2000 00:22:33 GMT Network Associates COVERT Labs Security Advisory - The L-Soft LISTSERV web archive (wa,wa.exe) component contains an unchecked buffer allowing remote execution of arbitrary code with the privileges of the LISTSERV daemon. Vulnerable systems include L-Soft LISTSERV Web Archives 1.8d (confirmed) and 1.8c (inferred) for Windows 9x, Windows NT 3.5x, Windows NT 4.0, Windows 2000, UNIX (all vendors), and OpenVMS VAX. Full Article
science and technology vmshack.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT VAX/VMS hacking FAQ Full Article
science and technology vaxhack.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT How to hack VAX's. Full Article
science and technology vaxdeco.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT A VAX decoy script to grab some accunts. Full Article
science and technology password.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT Default passwords for VAX/VMS, DEC-10, TOPS 10, Full Article
science and technology cccvax.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT Pretty complete file on hacking VAX/VMS machines Full Article
science and technology nia-68.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:21:13 GMT DECnet, UNIX UUCP files, VAX - Tekno DCS help, Full Article
science and technology nia-66.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:21:13 GMT CERT Advisory - VAX/VMS Breakins Full Article
science and technology modern11.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:21:13 GMT Modernz #11. VMS / VAX Full Article
science and technology vmsguide.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:56:24 GMT User's Guide to VAX/VMS Full Article
science and technology sysuaf.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:56:24 GMT The VAX/VMS SYSUAF.DAT file Full Article
science and technology psibrute.com.txt By packetstormsecurity.com Published On :: Sun, 17 Nov 2002 03:04:53 GMT This DCL script abuses the old psi_mail trick on VAX/VMS systems to remotely find valid users. Full Article
science and technology SSRT4866.txt By packetstormsecurity.com Published On :: Thu, 03 Mar 2005 08:22:42 GMT HP Security Bulletin - A potential security vulnerability has been identified with HP OpenVMS VAX version 7.x and 6.x and OpenVMS Alpha Version 7.x or 6.x that may allow a local authorized user to gain unauthorized privileged access to data and system resources. Full Article
science and technology Android Trojan Switcher Infects Routers Via DNS Hijacking By packetstormsecurity.com Published On :: Fri, 30 Dec 2016 15:26:15 GMT Full Article headline malware phone dns google
science and technology Linux's systemd Vulnerable To DNS Server Attack By packetstormsecurity.com Published On :: Thu, 29 Jun 2017 14:03:10 GMT Full Article headline linux dns flaw
science and technology Another Day, Another Mass Domain Hijacking By packetstormsecurity.com Published On :: Sat, 15 Jul 2017 13:48:53 GMT Full Article headline hacker dns
science and technology The Internet Is Not Ready For DNS SEC By packetstormsecurity.com Published On :: Fri, 29 Sep 2017 14:32:04 GMT Full Article headline dns cryptography
science and technology DNS Resolver 9.9.9.9 Will Check Requests Against IBM Threat Database By packetstormsecurity.com Published On :: Mon, 20 Nov 2017 15:19:58 GMT Full Article headline malware dns
science and technology Hacker's Hijack Security Firm Fox-IT's Domain By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:21:52 GMT Full Article headline hacker dns
science and technology MaMi Malware Targets Mac OS X DNS Settings By packetstormsecurity.com Published On :: Mon, 15 Jan 2018 15:56:32 GMT Full Article headline malware dns fraud apple
science and technology BIND Comes Apart Thanks To Ancient Denial Of Service Vuln By packetstormsecurity.com Published On :: Wed, 17 Jan 2018 15:02:38 GMT Full Article headline dns denial of service flaw
science and technology Practical Attacks With DNS Rebinding By packetstormsecurity.com Published On :: Wed, 04 Apr 2018 20:57:19 GMT Full Article headline dns flaw
science and technology Scammers Abuse Multilingual Domain Names By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:32 GMT Full Article headline dns cybercrime fraud phish
science and technology DNS Requests Are Routinely Spied On By packetstormsecurity.com Published On :: Mon, 20 Aug 2018 15:50:44 GMT Full Article headline privacy dns spyware
science and technology Unprecedented DNS Hijacking Attacks Linked To Iran By packetstormsecurity.com Published On :: Sat, 12 Jan 2019 16:36:04 GMT Full Article headline dns iran
science and technology GoDaddy Weakness Let Domains Be Hijacked By packetstormsecurity.com Published On :: Wed, 23 Jan 2019 15:19:15 GMT Full Article headline privacy dns cybercrime fraud
science and technology A Deep Dive On The Recent Widespread DNS Hijacking Attacks By packetstormsecurity.com Published On :: Tue, 19 Feb 2019 15:23:06 GMT Full Article headline hacker privacy dns cyberwar phish
science and technology State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:29 GMT Full Article headline hacker government dns cyberwar
science and technology DNSpionage Actors Adjust Tactics, Debut New RAT By packetstormsecurity.com Published On :: Thu, 25 Apr 2019 15:52:44 GMT Full Article headline hacker government dns fraud cyberwar
science and technology ICS Patches Three Vulnerabilities In BIND By packetstormsecurity.com Published On :: Sat, 27 Apr 2019 16:45:53 GMT Full Article headline dns flaw patch
science and technology Vast Majority Of Newly Registered Domains Are Malicious By packetstormsecurity.com Published On :: Thu, 22 Aug 2019 15:44:39 GMT Full Article headline dns cybercrime fraud
science and technology Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:11 GMT Full Article headline privacy dns google
science and technology Over 28,000 Web Domains Suspended For Criminal Activity By packetstormsecurity.com Published On :: Fri, 22 Nov 2019 15:38:30 GMT Full Article headline dns cybercrime fraud