science and technology Stuxnet-Like Attacks Beckon As 50 New SCADA Threats Discovered By packetstormsecurity.com Published On :: Thu, 21 Apr 2011 21:50:16 GMT Full Article headline malware worm
science and technology Iran Says It Was Attacked By Second Computer Worm By packetstormsecurity.com Published On :: Mon, 25 Apr 2011 23:49:54 GMT Full Article headline worm iran
science and technology Security Failings At Siemens Could Lead To An Attack Worse Than Stuxnet By packetstormsecurity.com Published On :: Thu, 26 May 2011 13:52:07 GMT Full Article headline worm scada
science and technology US Dodges The Question Of Whether Its Military Built Stuxnet By packetstormsecurity.com Published On :: Mon, 30 May 2011 07:42:50 GMT Full Article headline government usa worm
science and technology Stuxnet Clones May Target Critical US Systems, DHS Warns By packetstormsecurity.com Published On :: Wed, 27 Jul 2011 03:03:01 GMT Full Article headline government malware usa worm
science and technology Worm Spreading Via RDP By packetstormsecurity.com Published On :: Mon, 29 Aug 2011 14:01:07 GMT Full Article headline microsoft worm
science and technology New Worm By Creators Of Stuxnet Is Suspected By packetstormsecurity.com Published On :: Wed, 19 Oct 2011 04:22:00 GMT Full Article headline worm
science and technology Security Giants Split Over Stuxnet Lookalike Duqu By packetstormsecurity.com Published On :: Thu, 20 Oct 2011 23:21:56 GMT Full Article headline worm symantec mcafee
science and technology Worm Wriggles Through Year-Old Flaw, Builds Zombie-Net By packetstormsecurity.com Published On :: Wed, 26 Oct 2011 14:35:22 GMT Full Article headline flaw worm java
science and technology Stuxnet-Like Duqu Trojan Hits Iranian Systems By packetstormsecurity.com Published On :: Mon, 14 Nov 2011 15:32:49 GMT Full Article headline virus worm iran
science and technology Danger Worm Hijacks Facebook Accounts To Inject Banking Trojan By packetstormsecurity.com Published On :: Tue, 29 Nov 2011 16:49:19 GMT Full Article headline bank trojan worm facebook
science and technology Worm Steals 45,000 Facebook Passwords, Researchers Say By packetstormsecurity.com Published On :: Fri, 06 Jan 2012 00:31:34 GMT Full Article headline malware worm facebook social
science and technology Facebook Koobface Worm 'Hacker Gang Named' By packetstormsecurity.com Published On :: Tue, 17 Jan 2012 16:06:00 GMT Full Article headline hacker worm facebook
science and technology Massive Cyber-Attack Discovered, Researchers Say By packetstormsecurity.com Published On :: Tue, 29 May 2012 15:19:27 GMT Full Article headline hacker malware israel worm iran
science and technology 'Super-Powerful' Flame Worm Actually Boring Bloatware By packetstormsecurity.com Published On :: Thu, 31 May 2012 16:51:20 GMT Full Article headline malware worm
science and technology US Identified As Stuxnet Perpetrator With Obama's Backing By packetstormsecurity.com Published On :: Sat, 02 Jun 2012 06:43:15 GMT Full Article headline government malware usa cyberwar worm iran
science and technology Rare AutoCAD Worm Lifted Blueprints From Peru, Sent Them To China By packetstormsecurity.com Published On :: Fri, 22 Jun 2012 03:47:39 GMT Full Article headline malware china cybercrime flaw worm
science and technology Dorkbot Ransomware Worm Targets Skype Users By packetstormsecurity.com Published On :: Mon, 08 Oct 2012 17:12:07 GMT Full Article headline malware bank worm skype
science and technology Analysis Of The Skype Worm By packetstormsecurity.com Published On :: Wed, 10 Oct 2012 01:56:17 GMT Full Article headline worm skype
science and technology New Table-Munching Worm Ravages Iranian Biz Databases By packetstormsecurity.com Published On :: Mon, 26 Nov 2012 15:17:21 GMT Full Article headline database worm iran
science and technology Stuxnet Tricks Will Aid Cybercriminals, Warns Microsoft By packetstormsecurity.com Published On :: Fri, 14 Dec 2012 16:27:23 GMT Full Article headline malware microsoft cybercrime fraud worm
science and technology Eight-Year Nortel Hacking Operation Again Shows Enterprise Vulnerabilities By packetstormsecurity.com Published On :: Fri, 17 Feb 2012 16:09:48 GMT Full Article headline hacker china flaw nortel
science and technology FutureSoft TFTP Server 2000 Transfer-Mode Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This Metasploit module exploits a stack overflow in the FutureSoft TFTP Server 2000 product. By sending an overly long transfer-mode string, we were able to overwrite both the SEH and the saved EIP. A subsequent write-exception that will occur allows the transferring of execution to our shellcode via the overwritten SEH. This Metasploit module has been tested against Windows 2000 Professional and for some reason does not seem to work against Windows 2000 Server (could not trigger the overflow at all). Full Article
science and technology Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue. Full Article
science and technology MS03-046 Exchange 2000 XEXCH50 Heap Overflow By packetstormsecurity.com Published On :: Thu, 31 Dec 2009 02:27:04 GMT This is an exploit for the Exchange 2000 heap overflow. Due to the nature of the vulnerability, this exploit is not very reliable. This Metasploit module has been tested against Exchange 2000 SP0 and SP3 running a Windows 2000 system patched to SP4. It normally takes between one and 100 connection attempts to successfully obtain a shell. This exploit is *very* unreliable. Full Article
science and technology Microsoft Workstation Service NetpManageIPCConnect Overflow By packetstormsecurity.com Published On :: Thu, 31 Dec 2009 03:20:56 GMT This Metasploit module exploits a stack overflow in the NetApi32 NetpManageIPCConnect function using the Workstation service in Windows 2000 SP4 and Windows XP SP2. In order to exploit this vulnerability, you must specify a the name of a valid Windows DOMAIN. It may be possible to satisfy this condition by using a custom dns and ldap setup, however that method is not covered here. Although Windows XP SP2 is vulnerable, Microsoft reports that Administrator credentials are required to reach the vulnerable code. Windows XP SP1 only requires valid user credentials. Also, testing shows that a machine already joined to a domain is not exploitable. Full Article
science and technology Harden SSL/TLS Tool By packetstormsecurity.com Published On :: Thu, 18 Feb 2010 00:02:59 GMT "Harden SSL/TLS" hardens the default SSL/TLS settings of Windows 2000,2003,2008,2008R2, XP,Vista,7. It allows you to remotely set SSL/TLS policies allowing or denying certain ciphers/hashes or complete ciphersuites. Full Article
science and technology Windows Media Services ConnectFunnel Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 19 Apr 2010 22:46:07 GMT This Metasploit module exploits a stack buffer overflow in the Windows Media Unicast Service version 4.1.0.3930 (NUMS.exe). By sending a specially crafted FunnelConnect request, an attacker can execute arbitrary code under the "NetShowServices" user account. Windows Media Services 4.1 ships with Windows 2000 Server, but is not installed by default. NOTE: This service does NOT restart automatically. Successful, as well as unsuccessful exploitation attempts will kill the service which prevents additional attempts. Full Article
science and technology Windows 2000/XP/2003 win32k.sys SfnLOGONNOTIFY Denial Of Service By packetstormsecurity.com Published On :: Fri, 23 Apr 2010 04:26:43 GMT win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnLOGONNOTIFY. Full Article
science and technology Windows 2000/XP/2003 win32k.sys SfnINSTRING Denial Of Service By packetstormsecurity.com Published On :: Fri, 23 Apr 2010 04:29:00 GMT win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnINSTRING. Full Article
science and technology Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow By packetstormsecurity.com Published On :: Mon, 26 Jul 2010 20:18:25 GMT This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue. Full Article
science and technology Microsoft SMB Server Zero Size Pool Allocation By packetstormsecurity.com Published On :: Fri, 13 Aug 2010 00:01:59 GMT A vulnerability in the Windows kernel can be triggered via SMB in Microsoft Windows versions ranging from Windows 2000 through to Windows 7. This vulnerability allows an attacker to trigger a kernel pool corruption by sending a specially crafted SMB_COM_TRANSACTION2 request. Successful exploitation of this issue may result in remote code execution with kernel privileges, while failed attempts will result in a denial of service condition. Full Article
science and technology del2info Windows Analyzer 0.1 By packetstormsecurity.com Published On :: Thu, 30 Jun 2011 06:03:26 GMT The del2info utility was written to analyze Windows Recycle Bin INFO2 and $I?????? files. It can extract file deletion time, original path, and size of deleted files and whether they have been moved from the Recycle Bin. It supports files from Windows 2000 to 7. Full Article
science and technology del2info Windows Analyzer 0.1.2 By packetstormsecurity.com Published On :: Mon, 04 Jul 2011 01:01:01 GMT The del2info utility was written to analyze Windows Recycle Bin INFO2 and $I?????? files. It can extract file deletion time, original path, and size of deleted files and whether they have been moved from the Recycle Bin. It supports files from Windows 2000 to 7. Full Article
science and technology Oracle Weblogic Apache Connector POST Request Buffer Overflow By packetstormsecurity.com Published On :: Fri, 18 May 2012 14:58:27 GMT This Metasploit module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. The connector fails to properly handle specially crafted HTTP POST requests, resulting a buffer overflow due to the insecure usage of sprintf. Currently, this module works over Windows systems without DEP, and has been tested with Windows 2000 / XP. In addition, the Weblogic Apache plugin version is fingerprinted with a POST request containing a specially crafted Transfer-Encoding header. Full Article
science and technology Microsoft DHCP INFORM Configuration Overwrite By packetstormsecurity.com Published On :: Fri, 30 May 2014 04:49:27 GMT A vulnerability in Windows DHCP was found on Windows OS versions ranging from Windows 2000 through to Windows server 2003. This vulnerability allows an attacker to remotely overwrite DNS, Gateway, IP Addresses, routing, WINS server, WPAD, and server configuration with no user interaction. Successful exploitation of this issue will result in a remote network configuration overwrite. Microsoft acknowledged the issue but has indicated no plans to publish a patch to resolve it. Full Article
science and technology ECLIPSEDWING 1.5.2 Windows 2000 / 2003 / XP MS08-67 SMB Exploit By packetstormsecurity.com Published On :: Sat, 15 Apr 2017 01:44:59 GMT ECLIPSEDWING exploits the SMB vulnerability patched by MS08-67. It affects Microsoft Windows 2000, 2003, and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity. Full Article
science and technology MDKSA-2004:031.txt By packetstormsecurity.com Published On :: Mon, 19 Apr 2004 14:44:00 GMT Mandrake Linux Security Update Advisory - Problems lie in the utempter program versions 10.0, 9.2, 9.1, Corporate Server 2.1, and Multi Network Firewall 8.2 that allow for arbitrary file overwrites and denial of service attacks. Full Article
science and technology rpf-1.2.1.tar.gz By packetstormsecurity.com Published On :: Tue, 22 Jun 2004 22:48:01 GMT RPM Finder Project version 1.2 is a utility that works much like the rpmfind.net site. It supports RedHat and Mandrake Linux. Full Article
science and technology MDKSA-2004:091.txt By packetstormsecurity.com Published On :: Fri, 10 Sep 2004 05:00:15 GMT Mandrake Linux Security Update Advisory - The cdrecord program, which is suid root, fails to drop euid=0 when it exec()s a program specified by the user through the RSH environment variable. This can be abused by a local attacker to obtain root privileges. Full Article
science and technology MDKSA-2004:107.txt By packetstormsecurity.com Published On :: Wed, 20 Oct 2004 02:20:00 GMT Mandrake Linux Security Update Advisory - A number of vulnerabilities were fixed in mozilla 1.7.3, the following of which have been backported to mozilla packages for Mandrake Linux 10.0: "Send page" heap overrun, javascript clipboard access, buffer overflow when displaying VCard, BMP integer overflow, javascript: link dragging, Malicious POP3 server III. Full Article
science and technology MDKSA-2004:108.txt By packetstormsecurity.com Published On :: Wed, 20 Oct 2004 02:25:00 GMT Mandrake Linux Security Update Advisory - cvs 10.0, 92, Corporate Server 2.1. A flaw in CVS versions prior to 1.1.17 in an undocumented switch to the CVS history command allows for determining directory structure and the existance of files on a target machine. Full Article
science and technology MDKSA-2004:109.txt By packetstormsecurity.com Published On :: Wed, 20 Oct 2004 02:32:00 GMT Mandrake Linux Security Update Advisory - affected versions of MDK: 10.0, 92, Corporate Server 2.1, Multi Network Firewall 8.2. Several vulnerabilities have been discovered in the libtiff package that could lead to arbitrary code execution. Full Article
science and technology MDKSA-2004:113.txt By packetstormsecurity.com Published On :: Wed, 27 Oct 2004 03:15:56 GMT Mandrake Linux Security Update Advisory - Multiple integer overflow issues affecting xpdf-2.0 and xpdf-3.0. Also programs like cups which have embedded versions of xpdf. These can result in writing an arbitrary byte to an attacker controlled location which probably could lead to arbitrary code execution. Full Article
science and technology lsat-0.9.2.tgz By packetstormsecurity.com Published On :: Thu, 04 Nov 2004 06:40:28 GMT The Linux Security Auditing Tool (LSAT) is a post install security auditor for Linux/Unix. It checks many system configurations and local network settings on the system for common security/config errors and for packages that are not needed. It (for now) works under Linux (x86: Gentoo, RedHat, Debian, Mandrake; Sparc: SunOS (2.x), Redhat sparc, Mandrake Sparc; Apple OS X). Full Article
science and technology Bastille-2.1.6.tar.bz2 By packetstormsecurity.com Published On :: Sat, 20 Nov 2004 19:23:19 GMT The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here.. Full Article
science and technology MDKSA-2004:140.txt By packetstormsecurity.com Published On :: Sat, 11 Dec 2004 21:55:02 GMT Mandrake Linux Security Update Advisory - The GNU a2ps utility fails to properly sanitize filenames, which can be abused by a malicious user to execute arbitrary commands with the privileges of the user running the vulnerable application. Full Article
science and technology Mandriva Linux Security Advisory 2004.146 By packetstormsecurity.com Published On :: Sun, 12 Dec 2004 18:24:27 GMT Mandrake Linux Security Update Advisory - SGI developers discovered a remote DoS (Denial of Service) condition in the NFS statd server. rpc.statd did not ignore the SIGPIPE signal which would cause it to shutdown if a misconfigured or malicious peer terminated the TCP connection prematurely. Full Article
science and technology Mandriva Linux Security Advisory 2004.148 By packetstormsecurity.com Published On :: Thu, 30 Dec 2004 06:59:44 GMT Mandrake Linux Security Update Advisory - Herbert Xu discovered that iproute can accept spoofed messages sent via the kernel netlink interface by other users on the local machine. This could lead to a local Denial of Service attack. Full Article
science and technology Bastille-2.1.7.tar.bz2 By packetstormsecurity.com Published On :: Tue, 25 Jan 2005 08:06:52 GMT The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here.. Full Article