pr Emotet Trojan Evolves To Spread Via A WiFi Connection By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:34:01 GMT Full Article headline malware trojan wireless
pr IBM AIX HACMP Privlege Escalation By packetstormsecurity.com Published On :: Tue, 08 Sep 2015 23:33:33 GMT IBM AIX High Availability Cluster Multiprocessing (HACMP) suffers from a local privilege escalation vulnerability that results in root privileges. Full Article
pr IBM AIX 6.1 / 7.1 / 7.2 Bellmail Privilege Escalation By packetstormsecurity.com Published On :: Thu, 22 Dec 2016 07:02:22 GMT IBM AIX versions 6.1, 7.1, and 7.2 suffer from a Bellmail privilege escalation vulnerability. Full Article
pr CA Common Services casrvc Privilege Escalation By packetstormsecurity.com Published On :: Sat, 28 Jan 2017 15:22:22 GMT CA Technologies support is alerting customers about a medium risk vulnerability that may allow a local attacker to gain additional privileges with products using CA Common Services running on the AIX, HP-UX, Linux, and Solaris platforms. The vulnerability, CVE-2016-9795, occurs due to insufficient validation by the casrvc program. A local unprivileged user can exploit the vulnerability to modify arbitrary files, which can potentially allow a local attacker to gain root level access. Full Article
pr Xorg X11 Server (AIX) Local Privilege Escalation By packetstormsecurity.com Published On :: Wed, 05 Dec 2018 05:22:22 GMT Xorg X11 server on AIX local privilege escalation exploit. Full Article
pr Xorg X11 Server Local Privilege Escalation By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 19:01:06 GMT This Metasploit module has been tested with AIX 7.1 and 7.2, and should also work with 6.1. Due to permission restrictions of the crontab in AIX, this module does not use cron, and instead overwrites /etc/passwd in order to create a new user with root privileges. All currently logged in users need to be included when /etc/passwd is overwritten, else AIX will throw 'Cannot get "LOGNAME" variable' when attempting to change user. The Xorg '-fp' parameter used in the OpenBSD exploit does not work on AIX, and is replaced by '-config', in conjuction with ANSI-C quotes to inject newlines when overwriting /etc/passwd. Full Article
pr US Says It Can Prove Huawei Has Backdoor Access To Mobile Phone Networks By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:47 GMT Full Article headline government usa phone china cyberwar backdoor
pr FSB Contractor Breach Exposes Secret Cyber Weapons Program By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 14:15:28 GMT Full Article headline government russia cyberwar
pr Spy Campaign Spams Pro-Tibet Group With ExileRAT By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 15:02:59 GMT Full Article headline malware email fraud cyberwar spyware phish
pr India's Wipro Investigating Phishing Of Employee Accounts By packetstormsecurity.com Published On :: Tue, 16 Apr 2019 22:07:35 GMT Full Article headline india password phish
pr Further Details On Wipro Phishing Attack Revealed By packetstormsecurity.com Published On :: Thu, 02 May 2019 01:38:59 GMT Full Article headline hacker india cyberwar phish
pr Coronavirus: How Hackers Are Preying On Fears Of Covid-19 By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:24 GMT Full Article headline hacker virus phish
pr Hackers Target Oil Producers With Attacks By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:43:00 GMT Full Article headline hacker phish
pr Spear-Phishing Campaign Compromises Executives At 150+ Companies By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:50 GMT Full Article headline hacker africa password phish
pr Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework By packetstormsecurity.com Published On :: Tue, 24 Apr 2018 23:51:18 GMT Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework. Full Article
pr ISO-8385 Protocol Fuzzer By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:22:40 GMT This python script is a fuzzer for the ISO-8385 financial protocol. It is compatible with sulley and bofuzz and is now part of the official bofuzz release. Full Article
pr Probe Into Hacker Attack On FG Website By packetstormsecurity.com Published On :: Mon, 10 Jan 2011 16:30:35 GMT Full Article headline hacker ireland
pr Irish Data Protection Authority Rules On Facebook By packetstormsecurity.com Published On :: Thu, 22 Dec 2011 19:57:14 GMT Full Article headline privacy facebook social ireland
pr Ireland Passes SOPA-Like Anti-Piracy Legislation Despite Protests By packetstormsecurity.com Published On :: Thu, 01 Mar 2012 16:22:30 GMT Full Article headline government riaa mpaa pirate ireland
pr Ireland Sides With Microsoft In Email Privacy Case By packetstormsecurity.com Published On :: Fri, 26 Dec 2014 15:39:00 GMT Full Article headline government privacy microsoft email usa ireland
pr Irish Data Watchdog Is Probing Facebook Transfers To US By packetstormsecurity.com Published On :: Tue, 20 Oct 2015 15:43:57 GMT Full Article headline government privacy usa data loss facebook social ireland
pr Irish Broadband Provider Bluebox Hacked By packetstormsecurity.com Published On :: Mon, 30 Nov 2015 17:01:14 GMT Full Article headline hacker privacy data loss ireland
pr Irish Supreme Court Rejects Facebook Bid To Block ECJ Data Case By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:52 GMT Full Article headline government privacy data loss facebook ireland
pr Hackers Deface Indonesian President's Website By packetstormsecurity.com Published On :: Fri, 11 Jan 2013 15:54:11 GMT Full Article headline hacker indonesia
pr Australia Makes Pinkie-Promise To End Indonesia Spying By packetstormsecurity.com Published On :: Fri, 29 Aug 2014 15:36:15 GMT Full Article headline government australia spyware indonesia
pr sshprank 1.1.1 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:17:27 GMT sshprank is a fast SSH mass-scanner, login cracker, and banner grabber tool using the python-masscan and shodan modules. Full Article
pr Google Taking New Steps To Prevent Malicious Chrome Extensions By packetstormsecurity.com Published On :: Wed, 03 Oct 2018 14:03:54 GMT Full Article headline malware google chrome
pr Chrome In Android Leaks Device Fingerprinting Info By packetstormsecurity.com Published On :: Thu, 03 Jan 2019 15:12:09 GMT Full Article headline privacy phone flaw google chrome
pr CursedChrome Turns Your Browser Into A Hacker's Proxy By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:12 GMT Full Article headline hacker flaw google chrome
pr HPP Protection Patch For ModSecurity 2.5.9 By packetstormsecurity.com Published On :: Mon, 06 Jul 2009 18:09:02 GMT HPP (HTTP Parameter Pollution) protection patch for ModSecurity version 2.5.9. Full Article
pr Iranians Resist Internet Censorship Amid Deadly Street Protests By packetstormsecurity.com Published On :: Tue, 02 Jan 2018 17:50:31 GMT Full Article headline government iran twitter censorship
pr Google's China Search Project Concerns US Lawmakers By packetstormsecurity.com Published On :: Sun, 16 Sep 2018 03:38:39 GMT Full Article headline government usa china google censorship
pr Protests In Russia Target Internet Iron Curtain Legislation By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 14:35:35 GMT Full Article headline government russia cyberwar censorship
pr Microsoft's GitHub Blocks Catalan Protest App By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 15:36:48 GMT Full Article headline government microsoft spain censorship
pr Bruce Schneier Proposes Hacking Society For A Better Tomorrow By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:23 GMT Full Article headline hacker conference cryptography rsa
pr Tor Project Loses A Third Of Staff In Coronavirus Cuts By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:31 GMT Full Article headline privacy virus cryptography
pr Major European Private Hospital Operator Struck By Ransomware By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:13:51 GMT Full Article headline malware cryptography
pr Create-Project Manager 1.07 Cross Site Scripting / HTML Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:30:17 GMT Create-Project Manager version 1.07 suffers from cross site scripting and html injection vulnerabilities. Full Article
pr Facebook And Twitter Profiles Silently Slurped By Shady Code By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:06 GMT Full Article headline privacy malware phone data loss fraud facebook social twitter
pr Federal Data Privacy Bill Takes Aim At Tech Giants By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:10 GMT Full Article headline government privacy usa facebook social twitter
pr Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service By packetstormsecurity.com Published On :: Wed, 18 May 2011 09:09:09 GMT Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit. Full Article
pr Meterpreter Swaparoo Windows Backdoor Method By packetstormsecurity.com Published On :: Mon, 20 May 2013 20:50:36 GMT Swaparoo - Windows backdoor method for Windows Vista/7/8. This code sneaks a backdoor command shell in place of Sticky Keys prompt or Utilman assistant at login screen. Full Article
pr MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation By packetstormsecurity.com Published On :: Mon, 29 Jul 2013 22:14:06 GMT The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete. Full Article
pr HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
pr 160,000 Nintendo Accounts Were Compromised By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:32:18 GMT Full Article headline hacker privacy data loss nintendo password
pr Search Provider Algolia Discloses Security Incident By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:31:10 GMT Full Article headline hacker privacy data loss flaw
pr Hacker Gains Access To Some Private Microsoft GitHub Repos By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:12 GMT Full Article headline hacker microsoft data loss
pr Turkey Approves Legislation To Block Internet Sites By packetstormsecurity.com Published On :: Thu, 06 Feb 2014 16:07:49 GMT Full Article headline government turkey facebook twitter anonymous censorship
pr Turkish Hacker Receives Record 334 Years In Prison Over Data Theft By packetstormsecurity.com Published On :: Wed, 13 Jan 2016 02:42:42 GMT Full Article headline hacker cybercrime fraud identity theft turkey
pr Turkey's Government Tried To Hack Protestors Over Twitter By packetstormsecurity.com Published On :: Tue, 15 May 2018 09:38:18 GMT Full Article headline hacker government fraud turkey twitter