science and technology trn-test.txt By packetstormsecurity.com Published On :: Thu, 27 Jan 2005 03:58:35 GMT Local root exploit for /usr/bin/trn. Tested on Mandrake 9.2, Slackware 9.1.0/10.0.0. Full Article
science and technology Mandriva Linux Security Advisory 2005.029 By packetstormsecurity.com Published On :: Sat, 05 Feb 2005 20:49:38 GMT Mandrake Linux Security Update Advisory - Javier Fernandez-Sanguino Pena discovered two vulnerabilities in scripts included with the vim editor. The two scripts, tcltags and vimspell.sh created temporary files in an insecure manner which could allow a malicious user to execute a symbolic link attack or to create, or overwrite, arbitrary files with the privileges of the user invoking the scripts. Full Article
science and technology elog_unix_win.c By packetstormsecurity.com Published On :: Wed, 23 Feb 2005 05:39:59 GMT ELOG version 2.5.6 and below remote shell exploit. Includes targets for Slackware, Gentoo, FreeBSD, Mandrake, Fedora Core 1, Debian, Windows XP, and Redhat. Full Article
science and technology Bastille-2.2.5.tar.bz2 By packetstormsecurity.com Published On :: Tue, 22 Mar 2005 16:01:09 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
science and technology Bastille-2.2.8-1.0.noarch.rpm By packetstormsecurity.com Published On :: Sat, 26 Mar 2005 03:15:46 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
science and technology Bastille-3.0.4-1.0.noarch.rpm By packetstormsecurity.com Published On :: Wed, 01 Jun 2005 06:49:11 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
science and technology Bastille-3.0.6-1.0.noarch.rpm By packetstormsecurity.com Published On :: Sat, 09 Jul 2005 07:44:20 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
science and technology Bastille-3.0.7-1.0.noarch.rpm By packetstormsecurity.com Published On :: Fri, 05 Aug 2005 08:27:59 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
science and technology Secunia Security Advisory 18489 By packetstormsecurity.com Published On :: Thu, 19 Jan 2006 02:04:53 GMT Secunia Security Advisory - Mandrake has issued an update for hylafax. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to compromise a vulnerable system. Full Article
science and technology lesstif-advisory.pdf By packetstormsecurity.com Published On :: Fri, 18 Aug 2006 03:47:58 GMT Lesstif local root exploit for Mandrake Linux 2006 that makes use of the mtink binary which is setuid by default. Full Article
science and technology Samba Heap Overflow Exploit By packetstormsecurity.com Published On :: Fri, 09 Jan 2009 00:35:11 GMT Samba versions below 3.0.20 heap overflow exploit. Written for older versions of Debian, Slackware, and Mandrake. Full Article
science and technology Bastille Unix 3.2.1 By packetstormsecurity.com Published On :: Sun, 29 Jan 2012 11:11:10 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Full Article
science and technology Anonymous Threatens Mexican Drug Cartel By packetstormsecurity.com Published On :: Mon, 31 Oct 2011 15:49:05 GMT Full Article headline anonymous mexico
science and technology Is Mexican Cartel The Next 'Anonymous' Target? By packetstormsecurity.com Published On :: Wed, 02 Nov 2011 23:04:55 GMT Full Article headline anonymous mexico
science and technology Mexican Drug Runners Torture And Decaptitate Blogger By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 15:46:59 GMT Full Article headline anonymous mexico
science and technology Mexico Shuts Down Drug Gang's Antennas, Radios By packetstormsecurity.com Published On :: Mon, 05 Dec 2011 15:57:03 GMT Full Article headline phone science mexico
science and technology Mexican Hackers Hit Official Websites In Cyber Protest By packetstormsecurity.com Published On :: Mon, 17 Sep 2012 14:58:01 GMT Full Article headline hacker government mexico
science and technology Pro-Government Twitter Bots Try To Hush Mexican Activists By packetstormsecurity.com Published On :: Mon, 24 Aug 2015 13:43:19 GMT Full Article headline government botnet cyberwar spyware twitter mexico
science and technology 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico
science and technology A 'Hacker' Exposed A Drug Lord And Is Trying To Save His Own Life By packetstormsecurity.com Published On :: Thu, 18 May 2017 14:15:13 GMT Full Article headline government cyberwar mexico
science and technology Mexico Spied On Journalists, Lawyers, And Activists By packetstormsecurity.com Published On :: Tue, 20 Jun 2017 14:28:01 GMT Full Article headline privacy phone spyware mexico
science and technology Mexican Tax Refund Site Leaked 400GB Of Sensitive Customer Info By packetstormsecurity.com Published On :: Sat, 09 Sep 2017 16:22:32 GMT Full Article headline government privacy data loss fraud mexico
science and technology ICE Forces Software To Automatically Recommend Detention By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:27 GMT Full Article headline government usa mexico
science and technology How Hackers Pulled Off A $20 Million Bank Heist By packetstormsecurity.com Published On :: Mon, 18 Mar 2019 14:48:17 GMT Full Article headline hacker bank cybercrime korea mexico
science and technology Hacker Dumps Thousands Of Sensitive Mexican Embassy Documents Online By packetstormsecurity.com Published On :: Sun, 21 Apr 2019 15:59:17 GMT Full Article headline hacker government privacy data loss mexico
science and technology Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Anomalous Payloadbased Worm Detection and Signature Generation. Full Article
science and technology Advanced-Polymorphic-Worms.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic. Full Article
science and technology vthrottle-0.60.tar.gz By packetstormsecurity.com Published On :: Thu, 16 Nov 2006 16:52:49 GMT vthrottle is an implementation of an SMTP throttling engine for Sendmail servers, based upon M. Williamson's mechanisms, as described in his 2003 Usenix Security paper. It allows the administrator to control how much email users and hosts may send, hindering the rapid spread of viruses, worms, and spam. Exceptions can be made using a whitelist mechanism, which can be generated manually or with the included tool vmeasure. Full Article
science and technology Worminator-bin.tgz By packetstormsecurity.com Published On :: Wed, 06 Dec 2006 02:38:14 GMT A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. This tarball is the binary executable version. Full Article
science and technology Worminator-src.tgz By packetstormsecurity.com Published On :: Wed, 06 Dec 2006 02:38:51 GMT A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. This tarball is the source version. Full Article
science and technology blastersteg.tar.gz By packetstormsecurity.com Published On :: Tue, 06 Mar 2007 01:07:38 GMT This code shows how to send hidden data steganographed into a simulation of common (worm) traffic. Full Article
science and technology Technical Cyber Security Alert 2007-59A By packetstormsecurity.com Published On :: Tue, 06 Mar 2007 04:37:19 GMT Technical Cyber Security Alert TA07-059A - A worm is exploiting a vulnerability in the telnet daemon (in.telnetd) on unpatched Sun Solaris systems. The vulnerability allows the worm (or any attacker) to log in via telnet (23/tcp) with elevated privileges. Full Article
science and technology ACM-CFP2007.txt By packetstormsecurity.com Published On :: Wed, 20 Jun 2007 05:02:32 GMT The 5th ACM Workshop On Recurring Malcode (WORM) 2007 Call For Papers has been announced. It will be held on November 2, 2007 in Alexandria, VA, USA. Full Article
science and technology vbulletin-xssxsrf.txt By packetstormsecurity.com Published On :: Thu, 20 Nov 2008 22:44:51 GMT The Visitor Messages add-on for vBulletin version 3.7.3 suffers from cross site scripting and cross site request forgery vulnerabilities. This is a worm exploit that takes advantage of these issues. Full Article
science and technology Exploit Web 2.0, Real Life XSS-Worm By packetstormsecurity.com Published On :: Thu, 05 Feb 2009 22:08:04 GMT Whitepaper called Exploiting Web 2.0, Real Life XSS-Worm. Full Article
science and technology Technical Cyber Security Alert 2009-88A By packetstormsecurity.com Published On :: Mon, 30 Mar 2009 19:50:26 GMT Technical Cyber Security Alert TA09-088A - US-CERT is aware of public reports indicating a widespread infection of the Conficker worm, which can infect a Microsoft Windows system from a thumb drive, a network share, or directly across a network if the host is not patched with MS08-067. Full Article
science and technology Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
science and technology How Conficker Makes Use Of MS08-067 By packetstormsecurity.com Published On :: Wed, 15 Apr 2009 00:06:50 GMT Whitepaper called How Conficker makes use of MS08-067. Full Article
science and technology Sasser Worm avserve FTP PORT Buffer Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This Metasploit module exploits the FTP server component of the Sasser worm. By sending an overly long PORT command the stack can be overwritten. Full Article
science and technology LPRng use_syslog Remote Format String Vulnerability By packetstormsecurity.com Published On :: Wed, 17 Feb 2010 23:45:41 GMT This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". Full Article
science and technology PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution By packetstormsecurity.com Published On :: Wed, 05 May 2010 00:53:06 GMT PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit. Full Article
science and technology Wormtrack Network IDS 0.1 By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 02:38:15 GMT Wormtrack is a network IDS that helps detect scanning worms on a local area network by monitoring anomalous ARP traffic. This allows detection of scanning threats on the network, without having privileged access on a switch to set up a dedicated monitor port, nor does it require a constant updating of the rules engine to address new threats. Full Article
science and technology To Kill A Centrifuge By packetstormsecurity.com Published On :: Thu, 21 Nov 2013 15:57:18 GMT Whitepaper called To Kill a Centrifuge - A Technical Analysis of What Stuxnet's Creators Tried to Achieve. Full Article
science and technology Linksys E-Series Remote Code Execution By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 03:33:33 GMT Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm. Full Article
science and technology Linksys Worm Remote Root By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 20:02:22 GMT Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi. Full Article
science and technology Linksys E-Series TheMoon Remote Command Injection By packetstormsecurity.com Published On :: Sat, 05 Apr 2014 03:11:21 GMT Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5. Full Article
science and technology Metamorphic Worms: Can They Remain Hidden? By packetstormsecurity.com Published On :: Mon, 02 Feb 2015 10:22:22 GMT Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest. Full Article
science and technology Hak5 WiFi Pineapple Preconfiguration Command Injection 2 By packetstormsecurity.com Published On :: Wed, 19 Oct 2016 01:02:21 GMT This Metasploit module exploits a command injection vulnerability on WiFi Pineapples versions 2.0 and below and pineapple versions prior to 2.4. We use a combination of default credentials with a weakness in the anti-csrf generation to achieve command injection on fresh pineapple devices prior to configuration. Additionally if default credentials fail, you can enable a brute force solver for the proof-of-ownership challenge. This will reset the password to a known password if successful and may interrupt the user experience. These devices may typically be identified by their SSID beacons of 'Pineapple5_....'; details derived from the TospoVirus, a WiFi Pineapple infecting worm. Full Article
science and technology Morris Worm fingerd Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 05 Nov 2018 21:05:50 GMT This Metasploit module exploits a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Full Article
science and technology Morris Worm sendmail Debug Mode Shell Escape By packetstormsecurity.com Published On :: Mon, 05 Nov 2018 21:09:02 GMT This Metasploit module exploits sendmail's well-known historical debug mode to escape to a shell and execute commands in the SMTP RCPT TO command. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Currently only cmd/unix/reverse and cmd/unix/generic are supported. Full Article