science and technology Red Hat Security Advisory 2020-0853-01 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:00:12 GMT Red Hat Security Advisory 2020-0853-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
science and technology Red Hat Security Advisory 2020-0892-01 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:21:53 GMT Red Hat Security Advisory 2020-0892-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
science and technology Centreon Poller Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:30:58 GMT This Metasploit module exploits a flaw where an authenticated user with sufficient administrative rights to manage pollers can use this functionality to execute arbitrary commands remotely. Usually, the miscellaneous commands are used by the additional modules (to perform certain actions), by the scheduler for data processing, etc. This module uses this functionality to obtain a remote shell on the target. Full Article
science and technology Red Hat Security Advisory 2020-0903-01 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:22:41 GMT Red Hat Security Advisory 2020-0903-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
science and technology Red Hat Security Advisory 2020-0978-01 By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:48:50 GMT Red Hat Security Advisory 2020-0978-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
science and technology Gentoo Linux Security Advisory 202003-57 By packetstormsecurity.com Published On :: Fri, 27 Mar 2020 13:06:15 GMT Gentoo Linux Security Advisory 202003-57 - Multiple vulnerabilities have been found in PHP, the worst of which could result in the execution of arbitrary shell commands. Versions less than 7.4.4 are affected. Full Article
science and technology Red Hat Security Advisory 2020-1113-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:16:42 GMT Red Hat Security Advisory 2020-1113-01 - The bash packages provide Bash, which is the default shell for Red Hat Enterprise Linux. Full Article
science and technology Red Hat Security Advisory 2020-1332-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:18:02 GMT Red Hat Security Advisory 2020-1332-01 - KornShell is a Unix shell developed by AT+T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability has been addressed. Full Article
science and technology Red Hat Security Advisory 2020-1333-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:18:52 GMT Red Hat Security Advisory 2020-1333-01 - KornShell is a Unix shell developed by AT+T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability has been addressed. Full Article
science and technology Metasploit Libnotify Arbitrary Command Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:36:46 GMT This Metasploit module exploits a shell command injection vulnerability in the libnotify plugin. This vulnerability affects Metasploit versions 5.0.79 and earlier. Full Article
science and technology Linux/x86 Reverse Shell Generator Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 18:32:22 GMT 80 bytes small Linux/x86 reverse shell generator shellcode with customizable TCP port and IP address. Full Article
science and technology Red Hat Security Advisory 2020-1933-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:44:21 GMT Red Hat Security Advisory 2020-1933-01 - The targetcli package contains an administration shell for configuring Internet Small Computer System Interface, Fibre Channel over Ethernet, and other SCSI targets, using the Target Core Mod/Linux-IO kernel target subsystem. FCoE users also need to install and use the fcoe-utils package. A command execution vulnerability was addressed. Full Article
science and technology TP-LINK Cloud Cameras NCXXX Bonjour Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 22:22:22 GMT TP-LINK Cloud Cameras including products NC200, NC210, NC220, NC230, NC250, NC260, and NC450 suffer from a command injection vulnerability. The issue is located in the swSystemSetProductAliasCheck method of the ipcamera binary (Called when setting a new alias for the device via /setsysname.fcgi), where despite a check on the name length, no other checks are in place in order to prevent shell metacharacters from being introduced. The system name would then be used in swBonjourStartHTTP as part of a shell command where arbitrary commands could be injected and executed as root. Full Article
science and technology IBM Data Risk Manager 2.0.3 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:12:14 GMT IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password. This module exploits all three vulnerabilities, giving the attacker a root shell. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too. Full Article
science and technology Linux Kernel Spectre V2 Defense Caused Massive Slowdown By packetstormsecurity.com Published On :: Tue, 20 Nov 2018 15:06:31 GMT Full Article headline linux flaw patch intel
science and technology ESET Discovers 21 New Linux Malware Variants By packetstormsecurity.com Published On :: Thu, 06 Dec 2018 19:56:34 GMT Full Article headline malware linux
science and technology Someone Defaced Linux.org With Goatse By packetstormsecurity.com Published On :: Fri, 07 Dec 2018 17:30:48 GMT Full Article headline hacker linux
science and technology New Hardware Agnostic Side Channel Attack By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 01:59:45 GMT Full Article headline microsoft linux flaw
science and technology Linux Kernel Quickly Patched To Mitigate New Vuln By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 15:08:31 GMT Full Article headline linux data loss flaw patch
science and technology Nasty Security Bug Found And Fixed In Linux apt By packetstormsecurity.com Published On :: Wed, 23 Jan 2019 15:12:03 GMT Full Article headline linux flaw patch
science and technology World's Favorite Open-Source PDF Interpreter Needs Patching Again By packetstormsecurity.com Published On :: Thu, 24 Jan 2019 15:33:14 GMT Full Article headline linux flaw
science and technology SpeakUp Linux Backdoor Sets Up For Major Attack By packetstormsecurity.com Published On :: Mon, 04 Feb 2019 15:20:15 GMT Full Article headline hacker linux botnet backdoor
science and technology Outlaw Shellbot Infects Linux Servers To Mine For Monero By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 15:02:47 GMT Full Article headline hacker malware linux botnet fraud cryptography
science and technology Container Escape Hack Targets Vulnerable Linux Kernel By packetstormsecurity.com Published On :: Mon, 04 Mar 2019 15:36:46 GMT Full Article headline linux flaw
science and technology Linux Variant Of Winnti Malware Spotted In Wild By packetstormsecurity.com Published On :: Tue, 21 May 2019 13:36:39 GMT Full Article headline malware linux
science and technology Linux Backdoor Found In The Wild Escaped AV Detection By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:40 GMT Full Article headline malware linux virus backdoor
science and technology Linux Command-Line Editors Vulnerable To High Severity Bug By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 15:27:56 GMT Full Article headline linux flaw
science and technology First-Ever Malware Strain Spotted Abusing New DoH Protocol By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 15:46:06 GMT Full Article headline malware linux dns denial of service
science and technology Canonical GitHub Account Hacked, Ubuntu Source Code Safe By packetstormsecurity.com Published On :: Sun, 07 Jul 2019 14:21:40 GMT Full Article headline hacker linux
science and technology Agent Smith Malware Infects 25 Million Android Phones By packetstormsecurity.com Published On :: Wed, 10 Jul 2019 18:50:09 GMT Full Article headline malware linux phone google
science and technology Researchers Find Security Flaws In 40 Kernel Drivers From 20 Vendors By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 18:14:44 GMT Full Article headline linux flaw conference
science and technology Thousands Of Servers Infected With Lilocked Ransomware By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 14:45:48 GMT Full Article headline malware linux
science and technology Critical Linux Wi-Fi Bug Allows System Compromise By packetstormsecurity.com Published On :: Sat, 19 Oct 2019 15:36:59 GMT Full Article headline linux wireless flaw
science and technology New Roboto Botnet Emerges Targeting Linux Servers Running Webmin By packetstormsecurity.com Published On :: Thu, 21 Nov 2019 15:02:01 GMT Full Article headline hacker malware linux botnet flaw
science and technology Linux Bug Opens Most VPNs To Hijacking By packetstormsecurity.com Published On :: Mon, 09 Dec 2019 15:12:01 GMT Full Article headline hacker privacy linux flaw cryptography
science and technology Lazarus Pivots To Linux Attacks Through Dacls Trojan By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:36:58 GMT Full Article headline malware linux trojan backdoor
science and technology OpenSMTPD Library RCE Impacts BSD And Linux By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:06 GMT Full Article headline linux flaw bsd
science and technology Windows, Ubuntu, macOS, VirtualBox Fall At Pwn2Own Hacking Contest By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 15:12:03 GMT Full Article headline microsoft linux flaw apple conference
science and technology Hackers Have Been Quietly Targeting Linux Servers By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:08 GMT Full Article headline hacker linux
science and technology Bluefog 0.0.3 By packetstormsecurity.com Published On :: Tue, 15 Jan 2013 03:05:48 GMT Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously. Full Article
science and technology Net-War Reaver Wrapper By packetstormsecurity.com Published On :: Tue, 12 Feb 2013 03:40:09 GMT This tool is a wrapper for the reaver WPS attack toolkit. As there is no automatic way to prescan, decide, and then start the attack, this wrapper takes care of it. Written in perl. Full Article
science and technology Bluefog 0.0.4 By packetstormsecurity.com Published On :: Tue, 12 Feb 2013 04:06:07 GMT Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously. Full Article
science and technology ChronIC RF Hacking Tool By packetstormsecurity.com Published On :: Tue, 12 Mar 2013 18:22:22 GMT ChronIC is the Chronos Integrated Commander, a wearable Sub-GHz RF hacking tool. Written in python. Full Article
science and technology Bluelog Bluetooth Scanner/Logger 1.1.1 By packetstormsecurity.com Published On :: Mon, 01 Apr 2013 20:22:22 GMT Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice. Full Article
science and technology Wireless Decoder 1.0 By packetstormsecurity.com Published On :: Fri, 19 Apr 2013 16:28:42 GMT Wireless Decoder is an application that demonstrates how to recover wireless passwords on Vista/Win7/Win8. Comes with source and the binary. Full Article
science and technology Wi-fEye Wireless Pentesting Tool 1.0 Beta By packetstormsecurity.com Published On :: Mon, 26 Aug 2013 14:43:33 GMT Wi-fEye is designed to help with network penetration testing. It allows the user to perform a number of powerful attack automatically including WEP/WPA cracking, session hijacking and more. Full Article
science and technology ARRIS DG860A WPS PIN Generator By packetstormsecurity.com Published On :: Tue, 15 Oct 2013 13:05:05 GMT This is a ruby script that will generate the default WPS PIN for the Arris DG860A providing you know the HFC MAC address. Full Article
science and technology HWK Wireless Auditing Tool 0.4 By packetstormsecurity.com Published On :: Fri, 18 Oct 2013 01:30:01 GMT hwk is an easy-to-use wireless authentication and de-authentication tool. Furthermore, it also supports probe response fuzzing, beacon injection flooding, antenna alignment and various injection testing modes. Information gathering is selected by default and shows the incoming traffic indicating the packet types. Full Article
science and technology Bluelog Bluetooth Scanner/Logger 1.1.2 By packetstormsecurity.com Published On :: Mon, 04 Nov 2013 23:40:27 GMT Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice. Full Article
science and technology SkyJack Drone Hijacker By packetstormsecurity.com Published On :: Wed, 04 Dec 2013 03:19:46 GMT Skyjack takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control. Full Article