de

Survey - Identity Fraud Climbs, But Costs Less





de

Whisper This, But Java Deserialization Vulnerability Affects More Libraries






de

Scientologist Overlord Declares Victory Over Anonymous





de

Surveillance Footage And Code Clues Indicate Stuxnet Hit Iran





de

FutureSoft TFTP Server 2000 Transfer-Mode Overflow

This Metasploit module exploits a stack overflow in the FutureSoft TFTP Server 2000 product. By sending an overly long transfer-mode string, we were able to overwrite both the SEH and the saved EIP. A subsequent write-exception that will occur allows the transferring of execution to our shellcode via the overwritten SEH. This Metasploit module has been tested against Windows 2000 Professional and for some reason does not seem to work against Windows 2000 Server (could not trigger the overflow at all).




de

Harden SSL/TLS Tool

"Harden SSL/TLS" hardens the default SSL/TLS settings of Windows 2000,2003,2008,2008R2, XP,Vista,7. It allows you to remotely set SSL/TLS policies allowing or denying certain ciphers/hashes or complete ciphersuites.




de

Windows 2000/XP/2003 win32k.sys SfnLOGONNOTIFY Denial Of Service

win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnLOGONNOTIFY.




de

Windows 2000/XP/2003 win32k.sys SfnINSTRING Denial Of Service

win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnINSTRING.




de

del2info Windows Analyzer 0.1

The del2info utility was written to analyze Windows Recycle Bin INFO2 and $I?????? files. It can extract file deletion time, original path, and size of deleted files and whether they have been moved from the Recycle Bin. It supports files from Windows 2000 to 7.




de

del2info Windows Analyzer 0.1.2

The del2info utility was written to analyze Windows Recycle Bin INFO2 and $I?????? files. It can extract file deletion time, original path, and size of deleted files and whether they have been moved from the Recycle Bin. It supports files from Windows 2000 to 7.






de

Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf

Anomalous Payloadbased Worm Detection and Signature Generation.




de

PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution

PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit.




de

Linksys E-Series Remote Code Execution

Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm.




de

Metamorphic Worms: Can They Remain Hidden?

Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest.




de

Morris Worm sendmail Debug Mode Shell Escape

This Metasploit module exploits sendmail's well-known historical debug mode to escape to a shell and execute commands in the SMTP RCPT TO command. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Currently only cmd/unix/reverse and cmd/unix/generic are supported.





de

Opera Boosts Its Anti-Phishing Defenses





de

Opera Browser Dinged By Code Execution Flaw




de

Opera Says Bug Probably Can't Commandeer Machines






de

Opera Just Added A Bitcoin-Mining Blocker




de

10code.tgz

10xxx Phone Code Lookup (no 10-10-xxx yet). From Attrition




de

areacode.tgz

Area code lookup program. From Attrition




de

Osama bin Laden, The Face Of Terror, Killed In Pakistan






de

Warners Bros. Flagged Own Site For Piracy, Orders Google To Censor Pages





de

Notorious eBay Hacker Gets 3-Year Suspended Sentence





de

eBay Redirect Attack Puts Buyers' Credentials At Risk








de

IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution

This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP service does not properly validate user input in the 'new_home_page' parameter of the 'saveHomePage' method allowing arbitrary PHP code to be written to the config.php file. The config.php file is executed in most pages within the application, and accessible directly via the web root, resulting in code execution. This Metasploit module has been tested successfully on IBM OpenAdmin Tool 3.14 on Informix 12.10 Developer Edition (SUSE Linux 11) virtual appliance.




de

Security Research Exception To DMCA Considered




de

Demonoid Still Down One Week After Massive DDoS Attack




de

Satellite Photos Take You Inside Gadhafi's Compound





de

Gaddafi Death Reports Likely To Spawn Multiple Scams