as Irish Supreme Court Rejects Facebook Bid To Block ECJ Data Case By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:52 GMT Full Article headline government privacy data loss facebook ireland
as This Bank Had The Worst Password Policy We've Ever Seen By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:40:43 GMT Full Article headline bank google password italy
as nfacct Bash Completion 1.1 By packetstormsecurity.com Published On :: Mon, 18 Apr 2016 03:33:33 GMT This is bash programmable completion for the netfilter.org accounting tool nfacct. Full Article
as conntrack-tools Bash Completion 1.0 By packetstormsecurity.com Published On :: Mon, 18 Apr 2016 04:44:44 GMT This is bash programmable completion for the conntrack-tools from netfilter.org. The package contains completions for conntrack, conntrackd, and nfct. Full Article
as Web-Based Firewall Logging Tool 1.1.0 By packetstormsecurity.com Published On :: Sat, 06 Aug 2016 18:50:51 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
as IPTables Bash Completion 1.7 By packetstormsecurity.com Published On :: Mon, 27 Nov 2017 17:22:22 GMT iptables-bash_completion provides programmable completion for the iptables and ip6tables programs from netfilter.org. Following the logic of iptables, options are shown only if they are valid at the current context. Additionally to the completion on options, matches and targets, it supports dynamic retrieval of data from the system i.e: chain-, set-names, interfaces, hostnames, etc. Environment variables allow to fine grade completion options. IP and MAC addresses can be fed by file. Full Article
as Web-Based Firewall Logging Tool 1.1.1 By packetstormsecurity.com Published On :: Fri, 09 Nov 2018 17:59:24 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
as Web-Based Firewall Logging Tool 1.1.2 By packetstormsecurity.com Published On :: Fri, 20 Sep 2019 22:17:54 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
as Chrome On Windows Has Credential Theft Bug By packetstormsecurity.com Published On :: Wed, 17 May 2017 13:13:15 GMT Full Article headline flaw google password chrome
as NoScript Extension Officially Released For Google Chrome By packetstormsecurity.com Published On :: Fri, 12 Apr 2019 15:13:28 GMT Full Article headline google chrome
as Clickjacking Counter Measures Appear In Chrome By packetstormsecurity.com Published On :: Mon, 19 Aug 2019 15:05:57 GMT Full Article headline fraud google chrome
as Chrome 79 Checks Your Passwords Against Public Data Breaches By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 15:07:12 GMT Full Article headline hacker data loss google password chrome
as Google Squashes High Severity Flaws In Chrome Browser By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:16 GMT Full Article headline flaw google patch chrome
as bash-perassi.patch By packetstormsecurity.com Published On :: Tue, 25 May 2004 22:59:48 GMT bup is a patch for bash that modifies the shell to send all user keystrokes via UDP over the network for collection by a sniffer or a syslogd server. It does not depend on syslogd to send the packets. It is part of the Tools/Data_Capture section of The Honeynet Project. Full Article
as aspjarPatch.txt By packetstormsecurity.com Published On :: Thu, 24 Feb 2005 17:11:34 GMT Unofficial patch for the ASPjar Guestbook login.asp vulnerability that allows bypassing of the authentication process. Full Article
as bash-3.1-perassi.patch By packetstormsecurity.com Published On :: Sat, 29 Apr 2006 10:36:12 GMT bup is a patch for bash that modifies the shell to send all user keystrokes via UDP over the network for collection by a sniffer or a syslogd server. It does not depend on syslogd to send the packets. It is part of the Tools/Data_Capture section of The Honeynet Project. Full Article
as OpenSSH 6.0p1 Magic Password Patch By packetstormsecurity.com Published On :: Thu, 28 Jun 2012 15:13:19 GMT This patch for OpenSSH 6.0 Portable is a lightweight version of the full patch. This version strictly allows for the addition of a hard-coded password. Full Article
as Bash Root Shell Backdoor By packetstormsecurity.com Published On :: Thu, 28 Jun 2012 15:13:21 GMT This patch is a backdoor to bash that will create a setuid backdoor shell in /tmp if run as root. Full Article
as UK Student's Research A Wassenaar Casualty By packetstormsecurity.com Published On :: Tue, 07 Jul 2015 13:31:30 GMT Full Article headline government censorship
as Russia To Disconnect From The Internet As Part Of A Test By packetstormsecurity.com Published On :: Mon, 11 Feb 2019 15:58:06 GMT Full Article headline government russia censorship
as Signal Is Finally Bringing Its Secure Messaging To The Masses By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:25:07 GMT Full Article headline privacy phone cryptography
as With Everyone WFH, VPN Security Has Become Paramount By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:38:00 GMT Full Article headline privacy cryptography
as Zoom Tackles Hackers With New Security Measures By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:30:55 GMT Full Article headline privacy phone flaw cryptography
as The CIA's Password For Their Hacking Tools Was 123ABCdef By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 14:35:20 GMT Full Article headline hacker government data loss password cia
as DDoS Kingpin Gets 13 Months, Massive Fine By packetstormsecurity.com Published On :: Sat, 16 Nov 2019 15:34:54 GMT Full Article headline usa canada cybercrime denial of service fraud
as Pwn2Own Contest Yields 13 Bugs, As Virtual Format Expands Talent Pool By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:38 GMT Full Article headline hacker canada conference
as Russia Opens Case Against Facebook, Twitter Over Data Laws By packetstormsecurity.com Published On :: Tue, 22 Jan 2019 14:26:52 GMT Full Article headline government privacy russia spyware facebook twitter
as Twitter Bot Activity Spiked After The Release Of The Mueller Report By packetstormsecurity.com Published On :: Sun, 21 Apr 2019 15:49:57 GMT Full Article headline government usa russia fraud cyberwar twitter fbi
as FBI Seeks To Monitor Facebook, Oversee Mass Social Media Data Collection By packetstormsecurity.com Published On :: Mon, 12 Aug 2019 16:45:16 GMT Full Article headline government privacy usa facebook social twitter fbi
as Social Media Giants Warn Of AI Moderation Errors As Coronavirus Empties Offices By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:06:52 GMT Full Article headline virus google facebook twitter
as Windows Vista/7 UAC Bypass Exploit By packetstormsecurity.com Published On :: Wed, 24 Nov 2010 22:52:18 GMT Microsoft Windows Vista / 7 privilege escalation exploit that has UAC bypass. Full Article
as MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation By packetstormsecurity.com Published On :: Mon, 29 Jul 2013 22:14:06 GMT The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete. Full Article
as NPS Datastore Server DLL Hijacking By packetstormsecurity.com Published On :: Thu, 11 Feb 2016 13:02:22 GMT A DLL side loading vulnerability was found in the NPS Datastore server DLL that ships with Windows Vista. This issue can be exploited by loading the affected DLL as an embedded OLE object. When instantiating the object Windows will try to load the DLL iasdatastore2.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. Full Article
as GOP Canvassing App Credentials Exposed In Code Repository By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:09:13 GMT Full Article headline government privacy usa data loss
as 14 Million Key Ring Users Exposed In Open Database By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:25 GMT Full Article headline privacy database data loss
as SEC Settles With Two Suspects In EDGAR Hacking Case By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:09:59 GMT Full Article headline hacker government usa data loss
as Ransomware Scumbags Release Confidential Docs By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:10:02 GMT Full Article headline hacker malware data loss
as LulzSec Supergrass Sabu Led Attacks Against Turkey By packetstormsecurity.com Published On :: Wed, 13 Aug 2014 14:33:50 GMT Full Article headline hacker government usa turkey fbi anonymous
as Turkey's Entire Citizenship Database May Have Been Leaked By packetstormsecurity.com Published On :: Mon, 04 Apr 2016 14:25:45 GMT Full Article headline government privacy cybercrime data loss fraud identity theft turkey
as Turkish Authorities Block Wikipedia Without Giving Reason By packetstormsecurity.com Published On :: Mon, 01 May 2017 15:47:57 GMT Full Article headline government turkey censorship
as S-93-07.asc By packetstormsecurity.com Published On :: Mon, 10 Jan 2000 00:31:14 GMT Subject VAX/VMS failure to disable user accounts Date 13-Feb-93 Full Article
as password.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:20:43 GMT Default passwords for VAX/VMS, DEC-10, TOPS 10, Full Article
as Another Day, Another Mass Domain Hijacking By packetstormsecurity.com Published On :: Sat, 15 Jul 2017 13:48:53 GMT Full Article headline hacker dns
as DNS Resolver 9.9.9.9 Will Check Requests Against IBM Threat Database By packetstormsecurity.com Published On :: Mon, 20 Nov 2017 15:19:58 GMT Full Article headline malware dns
as Vast Majority Of Newly Registered Domains Are Malicious By packetstormsecurity.com Published On :: Thu, 22 Aug 2019 15:44:39 GMT Full Article headline dns cybercrime fraud
as Google Invisible RECAPTCHA 3 Spoof Bypass By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 15:23:32 GMT Google Invisible RECAPTCHA version 3 suffers from a spoofing bypass vulnerability. Full Article
as Hashcat Advanced Password Recovery 4.0.0 Binary Release By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 18:18:09 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.. Full Article
as Hashcat Advanced Password Recovery 4.0.0 Source Code By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 18:18:15 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
as Hashcat Advanced Password Recovery 4.0.1 Binary Release By packetstormsecurity.com Published On :: Tue, 07 Nov 2017 16:20:17 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
as Hashcat Advanced Password Recovery 4.0.1 Source Code By packetstormsecurity.com Published On :: Tue, 07 Nov 2017 16:20:23 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article