3 Zeek 3.1.2 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:53:26 GMT Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
3 Suricata IDPE 5.0.3 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:56:56 GMT Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools. Full Article
3 Zeek 3.1.3 By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:03:43 GMT Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
3 Google Pays $65k To Shutter 23 Chrome Bugs By packetstormsecurity.com Published On :: Mon, 30 May 2016 16:57:54 GMT Full Article headline flaw google chrome
3 CursedChrome Turns Your Browser Into A Hacker's Proxy By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:12 GMT Full Article headline hacker flaw google chrome
3 openssh-3.6.1p2-backdoor.patch.gz By packetstormsecurity.com Published On :: Mon, 14 Jul 2003 22:48:44 GMT OpenSSH 3.6.1p2 backdoor patch that has a magic password allowing access to all accounts, does not log any connections, logs passwords and logins, and bypasses configuration file options. Full Article
3 apatch-ssh-3.2.9.1 By packetstormsecurity.com Published On :: Thu, 23 Sep 2004 06:46:27 GMT Apatch for ssh v3.2.9.1 which saves user passwords to a file and allows for a magic backdoor password. Full Article
3 apatch-ssh-3.8.1p1.tar.gz By packetstormsecurity.com Published On :: Thu, 23 Sep 2004 06:50:16 GMT OpenSSH v3.8.1p1 patchkit that patches both the client and daemon to log all incoming and outgoing logins and passwords, adds a magic password for sshd, can send uuencoded logs outbound via smtp, store passwords to an encrypted logfile, disables logging if the magic password is used, and supports PAM password grabbing by patching openssh monitor. Full Article
3 bash-3.1-perassi.patch By packetstormsecurity.com Published On :: Sat, 29 Apr 2006 10:36:12 GMT bup is a patch for bash that modifies the shell to send all user keystrokes via UDP over the network for collection by a sniffer or a syslogd server. It does not depend on syslogd to send the packets. It is part of the Tools/Data_Capture section of The Honeynet Project. Full Article
3 Linux 32bit Vulnerability Workaround By packetstormsecurity.com Published On :: Fri, 17 Sep 2010 00:37:12 GMT Information regarding a simple mitigation to disable 32bit binaries in Linux. Full Article
3 Dovecot 2.3 Denial Of Service By packetstormsecurity.com Published On :: Thu, 02 May 2019 01:17:04 GMT Dovecot version 2.3 suffers from multiple denial of service conditions. Included in this archive is the advisory as well as patches to address the issue. Full Article
3 UK Student's Research A Wassenaar Casualty By packetstormsecurity.com Published On :: Tue, 07 Jul 2015 13:31:30 GMT Full Article headline government censorship
3 Google's China Search Project Concerns US Lawmakers By packetstormsecurity.com Published On :: Sun, 16 Sep 2018 03:38:39 GMT Full Article headline government usa china google censorship
3 Microsoft's Bing Search Engine Inaccessible In China By packetstormsecurity.com Published On :: Thu, 24 Jan 2019 15:33:05 GMT Full Article headline government microsoft china censorship
3 Microsoft's GitHub Blocks Catalan Protest App By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 15:36:48 GMT Full Article headline government microsoft spain censorship
3 Let's Encrypt Reaches One Billion Certificates Issued By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:05:24 GMT Full Article headline privacy cryptography
3 Let's Encrypt To Revoke 3 Million Certificates On March 4 By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:42:34 GMT Full Article headline privacy flaw cryptography
3 Zoom's End-To-End Encryption Isn't Actually End-To-End By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:26:25 GMT Full Article headline privacy flaw cryptography
3 netsec36.txt By packetstormsecurity.com Published On :: Tue, 31 Oct 2000 18:47:41 GMT Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: The phpinfo() function in PHP gives out lots of server information, NAV misses certain folers, JRun problems with web-inf directory, JRun 2.3 arbitrary file retrieval and command execution, Microsoft Session ID cookie marking bug patch, Hotjava Browser 3.0 Javascript bug, Windows ME printer sharing vulnerability, SuSE ncurses vulnerability, NetBSD global 3.55 vulnerability, NetBSD GNU CFEngine remote vulnerability, Cisco VCO/4000 SNMP bug, PAM_MYSQL local and remote bugs, cisco catalyst 3500 xl remote command execution. Security news: Virus threats getting worse, final vote on secret searches expected, protecting freedom of expression, islamic attackers crash israeli web sites, global hacker agreement could affect bug hunters, and more. Full Article
3 lc3setup.exe By packetstormsecurity.com Published On :: Thu, 12 Apr 2001 20:47:26 GMT L0phtCrack 3 15 day trial - L0phtCrack is an NT password auditing tool. It will compute NT user passwords from the cryptographic hashes that are stored by the NT operation system. L0phtCrack computes the password from a variety of sources using a variety of methods. Uses include recovering a forgotten password, ensuring that users use strong passwords, retrieving the password of a user in order to impersonate them, or migrating NT users to another platform such as Unix. Tested on Windows 98SE, Windows ME, Windows NT, and Windows 2000. Full Article
3 The CIA's Infamous, Unsolved Cryptographic Puzzle Gets A Final Clue By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 15:59:36 GMT Full Article headline government usa spyware cryptography cia
3 The CIA's Password For Their Hacking Tools Was 123ABCdef By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 14:35:20 GMT Full Article headline hacker government data loss password cia
3 DDoS Kingpin Gets 13 Months, Massive Fine By packetstormsecurity.com Published On :: Sat, 16 Nov 2019 15:34:54 GMT Full Article headline usa canada cybercrime denial of service fraud
3 Pwn2Own Contest Yields 13 Bugs, As Virtual Format Expands Talent Pool By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:38 GMT Full Article headline hacker canada conference
3 Red Hat Security Advisory 2019-1833-01 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 14:44:44 GMT Red Hat Security Advisory 2019-1833-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. This update fixes various bugs and adds enhancements. Full Article
3 Red Hat Security Advisory 2020-0663-01 By packetstormsecurity.com Published On :: Tue, 03 Mar 2020 16:33:42 GMT Red Hat Security Advisory 2020-0663-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and traversal vulnerabilities. Full Article
3 Gentoo Linux Security Advisory 202003-06 By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:58:36 GMT Gentoo Linux Security Advisory 202003-6 - Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. Versions less than 2.4.9:2.4 are affected. Full Article
3 Gentoo Linux Security Advisory 202003-09 By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:08:19 GMT Gentoo Linux Security Advisory 202003-9 - A vulnerability in OpenID library for Ruby at worst might allow an attacker to bypass authentication. Versions less than 2.9.2 are affected. Full Article
3 Tampa Mayor's Twitter Hacked, Used To Send Missile Threats By packetstormsecurity.com Published On :: Fri, 22 Feb 2019 01:03:30 GMT Full Article headline hacker government twitter terror
3 Swedish Social Democrats' Twitter Account Hacked By packetstormsecurity.com Published On :: Tue, 16 Apr 2019 22:07:32 GMT Full Article headline hacker government sweden social twitter
3 US Navy Wants 350 Billion Social Media Posts By packetstormsecurity.com Published On :: Tue, 28 May 2019 14:59:52 GMT Full Article headline government usa cyberwar facebook social twitter military
3 Jack Dorsey's Twitter Account Got Hacked By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 17:15:14 GMT Full Article headline hacker password twitter
3 Hackers Deface Facebook's Official Twitter And Instagram Accounts By packetstormsecurity.com Published On :: Sun, 09 Feb 2020 16:25:27 GMT Full Article headline hacker facebook social twitter
3 Why Rudy Giuliani's Twitter Typos Are A Security Fail By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 14:57:16 GMT Full Article headline government malware usa twitter
3 phrack63.tar.gz By packetstormsecurity.com Published On :: Fri, 05 Aug 2005 07:21:30 GMT Phrack Magazine Issue 63 - The last issue of Phrack! In this issue: Phrack Prophile on Tiago, OSX heap exploitation techniques, Hacking Windows CE, Games with kernel Memory...FreeBSD Style, Raising The Bar For Windows Rootkit Detection, Embedded ELF Debugging, Hacking Grub for Fun and Profit, Advanced antiforensics : SELF, Process Dump and Binary Reconstruction, Next-Gen. Runtime Binary Encryption, Shifting the Stack Pointer, NT Shellcode Prevention Demystified, PowerPC Cracking on OSX with GDB, Hacking with Embedded Systems, Process Hiding and The Linux Scheduler, Breaking Through a Firewall, Phrack World News. Full Article
3 Secunia Security Advisory 30197 By packetstormsecurity.com Published On :: Mon, 12 May 2008 22:24:40 GMT Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Windows CE, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Article
3 MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation By packetstormsecurity.com Published On :: Mon, 29 Jul 2013 22:14:06 GMT The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete. Full Article
3 Hacker Selling Data Of 538 Million Weibo Users By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:53 GMT Full Article headline hacker china cybercrime data loss fraud
3 Hacker Leaks 23 Million Accounts From Webkinz Children's Game By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:35 GMT Full Article headline hacker privacy data loss password
3 Turkish Hacker Receives Record 334 Years In Prison Over Data Theft By packetstormsecurity.com Published On :: Wed, 13 Jan 2016 02:42:42 GMT Full Article headline hacker cybercrime fraud identity theft turkey
3 Turkey's Entire Citizenship Database May Have Been Leaked By packetstormsecurity.com Published On :: Mon, 04 Apr 2016 14:25:45 GMT Full Article headline government privacy cybercrime data loss fraud identity theft turkey
3 Turkey's Government Tried To Hack Protestors Over Twitter By packetstormsecurity.com Published On :: Tue, 15 May 2018 09:38:18 GMT Full Article headline hacker government fraud turkey twitter
3 Trump's Syria Move Blindsides National Security Leaders By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 13:55:30 GMT Full Article headline government usa turkey terror syria
3 Samhain File Integrity Checker 4.3.3 By packetstormsecurity.com Published On :: Thu, 11 Jul 2019 17:19:20 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
3 Common Desktop Environment 2.3.1 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:40:08 GMT A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Note that Oracle Solaris CDE is based on the original CDE 1.x train, which is different from the CDE 2.x codebase that was later open sourced. Most notably, the vulnerable buffer in the Oracle Solaris CDE is stack-based, while in the open source version it is heap-based. Full Article
3 Common Desktop Environment 2.3.1 / 1.6 libDtSvc Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:37:07 GMT A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name. The vulnerable function is located in the libDtSvc library and can be reached by executing the setuid program dtsession. Versions 2.3.1 and below as well as 1.6 and earlier are affected. Full Article
3 S-93-07.asc By packetstormsecurity.com Published On :: Mon, 10 Jan 2000 00:31:14 GMT Subject VAX/VMS failure to disable user accounts Date 13-Feb-93 Full Article
3 Linux's systemd Vulnerable To DNS Server Attack By packetstormsecurity.com Published On :: Thu, 29 Jun 2017 14:03:10 GMT Full Article headline linux dns flaw
3 Hacker's Hijack Security Firm Fox-IT's Domain By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:21:52 GMT Full Article headline hacker dns
3 Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 13:50:11 GMT Full Article headline privacy dns google