re Metamorphic Worms: Can They Remain Hidden? By packetstormsecurity.com Published On :: Mon, 02 Feb 2015 10:22:22 GMT Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest. Full Article
re Hak5 WiFi Pineapple Preconfiguration Command Injection 2 By packetstormsecurity.com Published On :: Wed, 19 Oct 2016 01:02:21 GMT This Metasploit module exploits a command injection vulnerability on WiFi Pineapples versions 2.0 and below and pineapple versions prior to 2.4. We use a combination of default credentials with a weakness in the anti-csrf generation to achieve command injection on fresh pineapple devices prior to configuration. Additionally if default credentials fail, you can enable a brute force solver for the proof-of-ownership challenge. This will reset the password to a known password if successful and may interrupt the user experience. These devices may typically be identified by their SSID beacons of 'Pineapple5_....'; details derived from the TospoVirus, a WiFi Pineapple infecting worm. Full Article
re CA-92:04.ATT.rexecd.vulnerability By packetstormsecurity.com Published On :: Tue, 14 Sep 1999 05:47:01 GMT A vulnerability is present in AT&T TCP/IP Release 4.0 running on SVR4 systems for both the 386/486 and 3B2 RISC platforms. The problem is in the remote execution server /usr/etc/rexecd and a new version of rexecd is available from AT&T. Full Article
re Anonymous Takes Down Greek Sites In Support Of Athens Protests By packetstormsecurity.com Published On :: Tue, 14 Feb 2012 00:46:29 GMT Full Article headline denial of service anonymous greece
re Greek Hackers Are Arrested Over Anonymous Attacks By packetstormsecurity.com Published On :: Mon, 20 Feb 2012 17:27:28 GMT Full Article headline hacker anonymous greece
re Opera Accuses Mozilla Of Irresponsible Disclosure By packetstormsecurity.com Published On :: Fri, 15 Feb 2008 12:53:02 GMT Full Article mozilla opera
re Opera Sings Anti-Malware Tune By packetstormsecurity.com Published On :: Fri, 06 Jun 2008 02:27:59 GMT Full Article malware opera
re Opera Adds Security, Firefox Coming By packetstormsecurity.com Published On :: Thu, 12 Jun 2008 08:08:45 GMT Full Article mozilla opera firefox
re Opera Bitten By Extremely Severe Browser Bug By packetstormsecurity.com Published On :: Thu, 09 Oct 2008 00:05:50 GMT Full Article opera
re Opera Scrambles To Quash Zero-Day Bug In Freshly Patched Browser By packetstormsecurity.com Published On :: Mon, 27 Oct 2008 00:26:27 GMT Full Article patch opera zero day
re Opera Releases Update For Extremely Severe Vulns By packetstormsecurity.com Published On :: Tue, 16 Dec 2008 09:27:24 GMT Full Article opera
re Opera Plugs Severe Browser Hole By packetstormsecurity.com Published On :: Sat, 20 Dec 2008 00:12:13 GMT Full Article opera
re Book Review: 'The Tangled Web' By Michal Zalewski By packetstormsecurity.com Published On :: Sat, 11 Feb 2012 06:59:09 GMT No Starch Press: $49.95 If you are a security engineer, a researcher, a hacker or just someone who keeps your ear to the ground when it comes to computer security, chances are you have seen the name Michal Zalewski. He has been responsible for an abundance of tools, research, proof of concepts and helpful insight to many over the years. He recently released a book called "The Tangled Web - A Guide To Securing Modern Web Applications". Normally, when I read books about securing web applications, I find many parallels where authors will give an initial lay of the land, dictating what technologies they will address, what programming languages they will encompass and a decent amount of detail on vulnerabilities that exist along with some remediation tactics. Such books are invaluable for people in this line of work, but there is a bigger picture that needs to be addressed and it includes quite a bit of secret knowledge rarely divulged in the security community. You hear it in passing conversation over beers with colleagues or discover it through random tests on your own. But rarely are the oddities documented anywhere in a thorough manner. Before we go any further, let us take a step back in time. Well over a decade ago, the web was still in its infancy and an amusing vulnerability known as the phf exploit surfaced. It was nothing more than a simple input validation bug that resulted in arbitrary code execution. The average hacker enjoyed this (and many more bugs like it) during this golden age. At the time, developers of web applications had a hard enough time getting their code to work and rarely took security implications into account. Years later, cross site scripting was discovered and there was much debate about whether or not a cross site scripting vulnerability was that important. After all, it was an issue that restricted itself to the web ecosystem and did not give us a shell on the server. Rhetoric on mailing lists mocked such findings and we (Packet Storm) received many emails saying that by archiving these issues we were degrading the quality of the site. But as the web evolved, people starting banking online, their credit records were online and before you knew it, people were checking their social network updates on their phone every five minutes. All of a sudden, something as small as a cross site scripting vulnerability mattered greatly. To make the situation worse, many programs were developed to support web-related technologies. In the corporate world, being first to market or putting out a new feature in a timely fashion trumphs security. Backwards compatibility that feeds poor design became a must for any of the larger browser vendors. The "browser wars" began and everyone had different ideas on how to solve different issues. To say web-related technologies brought many levels of complexity to the modern computing experience is a great understatement. Browser-side programming languages, such as JavaScript, became a playground for hackers. Understanding the Document Object Model (DOM) and the implications of poorly coded applications became one of those lunch discussions that could cause you to put your face into your mashed potatoes. Enter "The Tangled Web". This book puts some very complicated nuances in plain (enough) english. It starts out with Zalewski giving a brief synopsis of the security industry and the web. Breakdowns of the basics are provided and it is written in a way that is inviting for anyone to read. It goes on to cover a wide array of topics inclusive to the operation of browsers, the protocols involved, the various types of documents handled and the languages supported. Armed with this knowledge, the reader is enabled to tackle the next section detailing browser security features. As the author puts it, it covers "everything from the well-known but often misunderstood same-origin policy to the obscure and proprietary zone settings of Internet Explorer". Browsers, it ends up, have a ridiculous amount of odd dynamics for even the simplest acts. The last section wraps things up with upcoming security features and various browser mechanisms to note. I found it a credit to the diversity of the book that technical discussion could also trail off to give historical notes on poor industry behavior. When it noted DNS hijacking by various providers it reminded me of the very distinct and constantly apparent disconnect between business and knowledge of technology. When noting how non-HTTP servers were being leveraged to commit cross site scripting attacks, Zalewski also made it a point to note how the Internet Explorer releases only have a handful of prohibited ports but all other browsers have dozens that they block. The delicate balance of understanding alongside context is vital when using information from this book and applying it to design. Every page offers some bit of interesting knowledge that dives deep. It takes the time to note the odd behaviors small mistakes can cause and also points out where flawed security implementations exist. This book touches on the old and the new and many things other security books have overlooked. Another nice addition is that it provides security engineering cheatsheets at the end of each chapter. To be thorough, it explains both the initiatives set out by RFCs while it also documents different paths various browser vendors have taken in tackling tricky security issues. Google's Chrome, Mozilla's Firefox, Microsoft's Internet Explorer, Apple's Safari and Opera are compared and contrasted greatly throughout this book. In my opinion, the web has become a layer cake over the years. New shiny technologies and add-ons have been thrown into the user experience and with each of them comes a new set of security implications. One-off findings are constantly discovered and documented (and at Packet Storm we try to archive every one of them), but this is the first time I have seen a comprehensive guide that focuses on everything from cross-domain content inclusion to content-sniffing. It is the sort of book that should be required reading for every web developer. -Todd Full Article headline microsoft flaw google mozilla opera apple firefox chrome
re Firefox, Opera Allow Crooks To Hide An Entire Phish Site In A Link By packetstormsecurity.com Published On :: Tue, 04 Sep 2012 15:05:05 GMT Full Article headline flaw opera phish firefox
re Opera Reveals Security Breach By packetstormsecurity.com Published On :: Thu, 27 Jun 2013 15:00:49 GMT Full Article headline hacker data loss flaw opera backdoor
re Opera Resets Passwords After Sync Server Hacked By packetstormsecurity.com Published On :: Mon, 29 Aug 2016 13:45:36 GMT Full Article headline hacker data loss flaw password opera
re areacode.tgz By packetstormsecurity.com Published On :: Tue, 21 Sep 1999 18:25:58 GMT Area code lookup program. From Attrition Full Article
re CIA Contractor Released After Pakistan Killings By packetstormsecurity.com Published On :: Wed, 16 Mar 2011 14:21:32 GMT Full Article headline government usa pakistan cia
re Google And Apple Among Hundreds Hit In High-Profile Pakistan Hack By packetstormsecurity.com Published On :: Mon, 26 Nov 2012 15:17:30 GMT Full Article headline hacker dns google yahoo apple pakistan
re Godzilla Wreaks Revenge On Pakistani Government Web Sites By packetstormsecurity.com Published On :: Tue, 12 Mar 2013 15:02:09 GMT Full Article headline hacker government data loss pakistan
re Pakistan Military Hit By Operation Shaheen Malware By packetstormsecurity.com Published On :: Tue, 13 Nov 2018 16:43:38 GMT Full Article headline government malware cyberwar pakistan
re Researcher Raids Browser History For Webmail Login Tokens By packetstormsecurity.com Published On :: Mon, 20 Jul 2009 18:12:43 GMT Full Article csrf
re Researchers Compromise Netflix Content In Widevine DRM Hack By packetstormsecurity.com Published On :: Wed, 01 May 2019 14:26:33 GMT Full Article headline flaw mpaa cryptography
re Researchers Find Irreparable Flaw In Popular CAPTCHAs By packetstormsecurity.com Published On :: Tue, 24 May 2011 01:29:03 GMT Full Article headline microsoft yahoo ebay
re Feds Bust Man Selling $1.2m In Counterfeit Microsoft Software By packetstormsecurity.com Published On :: Sat, 10 Nov 2012 02:52:47 GMT Full Article headline microsoft cybercrime fraud ebay
re eBay ProStores Suffered From Full Credit Card Disclosure Vulnerability By packetstormsecurity.com Published On :: Wed, 02 Apr 2014 02:27:15 GMT Full Article headline privacy bank cybercrime data loss fraud ebay
re eBay Says Database Leak Dump Offers Are Fake By packetstormsecurity.com Published On :: Thu, 22 May 2014 23:30:20 GMT Full Article headline hacker database data loss flaw password ebay
re eBay Faces Investigations Over Massive Data Breach By packetstormsecurity.com Published On :: Fri, 23 May 2014 13:11:24 GMT Full Article headline hacker database data loss password ebay
re Half Of eBay Users No Longer Trust It After Breach By packetstormsecurity.com Published On :: Wed, 28 May 2014 16:26:42 GMT Full Article headline hacker privacy data loss flaw password ebay
re Top 10 Data Breach Survival Tips After eBay, Spotify, And Office Breaches By packetstormsecurity.com Published On :: Mon, 02 Jun 2014 02:31:54 GMT Full Article headline hacker privacy data loss ebay
re eBay Pulls N9500 Chinese Spyware Phone From Auction Website By packetstormsecurity.com Published On :: Thu, 19 Jun 2014 13:30:15 GMT Full Article headline phone china cybercrime fraud spyware ebay backdoor
re eBay Redirect Attack Puts Buyers' Credentials At Risk By packetstormsecurity.com Published On :: Wed, 17 Sep 2014 23:27:59 GMT Full Article headline hacker flaw ebay
re eBay Under Pressure As Hacks Continue By packetstormsecurity.com Published On :: Mon, 22 Sep 2014 15:20:27 GMT Full Article headline hacker data loss ebay
re Massive Vulnerability Discovered In eBay's Magento By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 02:57:43 GMT Full Article headline cybercrime fraud flaw ebay
re Data Easily Recovered From eBayed Smartphones, Disks By packetstormsecurity.com Published On :: Thu, 08 Oct 2015 00:35:15 GMT Full Article headline privacy phone data loss google ebay apple
re eBay Refuses To Fix Flaw Exposing Users To Malware And Phishing Attacks By packetstormsecurity.com Published On :: Tue, 02 Feb 2016 16:48:11 GMT Full Article headline malware flaw ebay phish
re Chavez Criticises Internet Freedom By packetstormsecurity.com Published On :: Mon, 15 Mar 2010 21:39:36 GMT Full Article venezuela
re The Three Amigos Offer Sanctuary To Cornered NSA Leaker Snowden By packetstormsecurity.com Published On :: Mon, 08 Jul 2013 15:10:18 GMT Full Article headline government privacy usa data loss spyware venezuela nsa
re It's Time To Encrypt The Entire Internet By packetstormsecurity.com Published On :: Thu, 17 Apr 2014 22:32:08 GMT Full Article headline privacy data loss ssl cryptography
re Chrome Has A Different Take On Certificate Revocation By packetstormsecurity.com Published On :: Tue, 22 Apr 2014 15:09:19 GMT Full Article headline privacy flaw google ssl chrome cryptography
re Many Sites Reusing Heartbleed Compromised Private Keys By packetstormsecurity.com Published On :: Fri, 09 May 2014 23:22:10 GMT Full Article headline privacy data loss flaw ssl cryptography
re EFF Sues NSA For Heartbleed Records By packetstormsecurity.com Published On :: Sun, 06 Jul 2014 19:02:39 GMT Full Article headline government privacy usa flaw ssl nsa cryptography
re Mozilla Certificate Revocation Tanks 107,000 Sites By packetstormsecurity.com Published On :: Mon, 08 Sep 2014 21:28:21 GMT Full Article headline flaw ssl mozilla cryptography
re Novell ZENworks Configuration Management Remote Execution By packetstormsecurity.com Published On :: Tue, 02 Apr 2013 15:07:51 GMT This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3. Full Article
re Adobe Urges More DMCA Busts By packetstormsecurity.com Published On :: Fri, 20 Dec 2002 12:02:28 GMT Full Article adobe dmca
re DMCA Blocks Tech Progress By packetstormsecurity.com Published On :: Thu, 20 Feb 2003 04:22:07 GMT Full Article dmca
re Security Research Exception To DMCA Considered By packetstormsecurity.com Published On :: Tue, 13 May 2003 07:52:12 GMT Full Article dmca
re Jury Convicts DirecTV Pirate On DMCA Charges By packetstormsecurity.com Published On :: Tue, 23 Sep 2003 14:42:48 GMT Full Article government dmca
re Diebold Retracts DMCA Threats By packetstormsecurity.com Published On :: Tue, 02 Dec 2003 06:19:58 GMT Full Article dmca
re Kazaa Threatens Google with DMCA Letter By packetstormsecurity.com Published On :: Mon, 08 Dec 2003 12:51:49 GMT Full Article google dmca