en Grub2 grub2-set-bootflag Environment Corruption By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 23:02:22 GMT Grub2 has grub2-set-bootflag setuid in the new Fedora release and has the ability to corrupt the environment. Full Article
en Russia Denies Role In Israeli Airport GPS Jamming By packetstormsecurity.com Published On :: Thu, 27 Jun 2019 14:09:18 GMT Full Article headline government russia cyberwar israel
en Google, Apple Tighten Protections On Contact Tracing By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:39:38 GMT Full Article headline privacy virus phone google apple
en British Spooks Seize Tech From Snowden Journo's Boyfriend At Airport By packetstormsecurity.com Published On :: Mon, 19 Aug 2013 15:00:14 GMT Full Article headline government privacy usa britain data loss brazil nsa
en Edward Snowden Pens An Open Letter To The People Of Brazil By packetstormsecurity.com Published On :: Tue, 17 Dec 2013 16:10:05 GMT Full Article headline government usa russia spyware brazil nsa
en Brazilian President Signs Internet Bill Of Rights Into Law By packetstormsecurity.com Published On :: Wed, 23 Apr 2014 22:18:07 GMT Full Article headline government privacy spyware brazil
en World Cup Security Center Leaks Own WiFi Password By packetstormsecurity.com Published On :: Wed, 25 Jun 2014 13:30:32 GMT Full Article headline wireless data loss brazil
en Brazilian Judge Orders Another WhatsApp Block Over Message Encryption By packetstormsecurity.com Published On :: Wed, 20 Jul 2016 00:57:38 GMT Full Article headline government privacy spyware facebook brazil cryptography
en Presidential Race In Brazil Marred By WhatsApp Scandal By packetstormsecurity.com Published On :: Fri, 19 Oct 2018 13:04:45 GMT Full Article headline government privacy phone facebook brazil
en Over Half Of Brazil's Population Exposed In Security Incident By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 17:18:47 GMT Full Article headline privacy amazon data loss brazil
en Telegram Voicemail Hack Used Against Brazil's President, Ministers By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 15:54:32 GMT Full Article headline hacker government phone spyware brazil
en Brazil Prosecutes Greenwald In Attack On Press Freedom By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:40 GMT Full Article headline government data loss brazil
en Phrack - Attacking JavaScript Engines By packetstormsecurity.com Published On :: Tue, 26 Sep 2017 03:33:33 GMT Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622. Full Article
en .NET Instrumentation Via MSIL Bytecode Injection By packetstormsecurity.com Published On :: Fri, 12 Jan 2018 14:44:44 GMT Whitepaper from Phrack called .NET Instrumentation via MSIL bytecode injection. Full Article
en FreeSWITCH Event Socket Command Execution By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 16:05:59 GMT This Metasploit module uses the FreeSWITCH event socket interface to execute system commands using the system API command. The event socket service is enabled by default and listens on TCP port 8021 on the local network interface. This module has been tested successfully on FreeSWITCH versions: 1.6.10-17-726448d~44bit on FreeSWITCH-Deb8-TechPreview virtual machine; 1.8.4~64bit on Ubuntu 19.04 (x64); and 1.10.1~64bit on Windows 7 SP1 (EN) (x64). Full Article
en Denial Of Service Event Impacted U.S. Power Utility Last Month By packetstormsecurity.com Published On :: Fri, 03 May 2019 22:59:30 GMT Full Article headline usa denial of service cyberwar scada
en U.S. Defense, Intelligence Ramps Up Efforts To Insert Malware In Russia's Grid By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 14:40:45 GMT Full Article headline government usa russia cyberwar scada
en Senate Passes King Bill To Secure Energy Grid By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 15:45:57 GMT Full Article headline government usa cyberwar scada
en Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices By packetstormsecurity.com Published On :: Mon, 29 Jul 2019 16:35:51 GMT Full Article headline hacker flaw scada
en New Ransomware Doesn't Just Encrypt Data. It Also Meddles With Critical Infrastructure By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:39:11 GMT Full Article headline malware scada cryptography
en Bitdefender USSD Wipe Stopper By packetstormsecurity.com Published On :: Mon, 01 Oct 2012 21:16:15 GMT The operating system your smartphone is running may be vulnerable to USSD commands that could wipe your entire phone. Tapping on a link to a cleverly coded web page could order you phone to reset itself to factory settings and disintegrate all your private data with it. Any Android phone running Phone.apk version 4.1 or lower is at risk and that's the broader base of them. Install Bitdefender's USSD Wipe Stopper to protect against such attacks. Now, once you would tap on a exploiting link, Bitdefender will intercept the wipe command and ask you to decide what to do next. You may, if unsure, dismiss the USSD command. Full Article
en Design And Implementation Of A Voice Encryption System For Telephone Networks By packetstormsecurity.com Published On :: Mon, 01 Sep 2014 14:02:22 GMT This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish. Full Article
en Juniper SRX Critical Denial Of Service By packetstormsecurity.com Published On :: Thu, 01 Apr 2010 23:28:06 GMT The Juniper SRX suffers from a dual-homed swapfile overflow error that can cause denial of service conditions. Full Article
en Juniper VPN Client rdesktop Click Hack By packetstormsecurity.com Published On :: Mon, 22 Nov 2010 12:43:33 GMT Juniper VPN client with remote desktop lets an attacking spawn Internet Explorer prior to authentication. Full Article
en ICMPv6 Router Announcement Flooding Denial Of Service By packetstormsecurity.com Published On :: Wed, 06 Apr 2011 16:29:18 GMT An ICMPv6 router announcement flooding denial of service vulnerability affects multiple systems including Cisco, Juniper, Microsoft, and FreeBSD. Cisco has addressed the issue but Microsoft has decided to ignore it. Full Article
en Juniper SSG20 Denial Of Service By packetstormsecurity.com Published On :: Thu, 23 Jan 2014 00:22:22 GMT A special crafted ICMP ECHO REQUEST can cause a denial of service condition on the Juniper SSG20. Full Article
en Hackers Hit US Health Agency During Coronavirus Crisis By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:12 GMT Full Article headline hacker government usa virus
en COVID-19: Bay Area Requires All 7 Million Residents To Shelter In Place By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 22:34:52 GMT Full Article headline government usa virus
en Trump Administration's Lack Of A Unified Coronavirus Strategy Will Cost Lives, A Dozen Experts Say By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:05 GMT Full Article headline government usa virus
en Facebook Must Face Renewed Privacy Lawsuit Over User Tracking By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:10:11 GMT Full Article headline government privacy usa facebook
en Georgia Reopens Businesses As Death Toll Rises By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:32:10 GMT Full Article headline government usa virus
en Trump Admin Threatens To Sue States That Don't Lift Orders By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:39 GMT Full Article headline government usa virus
en Running Encrypted ELF Binaries In Memory By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:45:14 GMT Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project. Full Article
en Skippipe: Skipping The Watermark In Digital Content By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 14:02:22 GMT Whitepaper called Skippipe: Skipping the watermark in digital content. Full Article
en Windows User Accounts Penetration Testing By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 16:58:45 GMT Whitepaper called Windows User Accounts Penetration Testing. Written in Persian. Full Article
en CarolinaCon Has Been Postponed By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:12:21 GMT CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19. Full Article
en Solving Computer Forensic Case Using Autopsy By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:08:11 GMT Whitepaper called Solving Computer Forensic Case Using Autopsy. Full Article
en Hackers 2 Hackers Conference 17th Edition Call For Papers By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 19:22:22 GMT The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020. Full Article
en Pentesting Zen Load Balancer By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:35:21 GMT This whitepaper is a quick tutorial on pentesting the Zen load balancer. Full Article
en From Zero Credentials To Full Domain Compromise By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 14:19:17 GMT Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials. Full Article
en ManageEngine 14 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:39:26 GMT This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14. Full Article
en Centreon 19.10-3.el7 SQL Injection By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:50:00 GMT This is a whitepaper tutorial that describes steps taken to identify post-authentication remote SQL injection vulnerabilities in Centreon version 19.10-3.el7. Full Article
en Azure Cloud Penetration Testing By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 21:29:55 GMT Whitepaper called Azure Cloud Penetration Testing. Full Article
en Exploiting CAN-Bus Using Instrument Cluster Simulator By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:21:38 GMT Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator. Full Article
en Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:58:22 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
en Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 27 Aug 2013 23:59:52 GMT The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
en Packet Storm Exploit 2013-0917-1 - Oracle Java ShortComponentRaster.verify() Memory Corruption By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:45:32 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
en Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:50:06 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
en Druva inSync Windows Client 6.5.2 Privilege Escalation By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:00:54 GMT Druva inSync Windows Client version 6.5.2 suffers from a local privilege escalation vulnerability. Full Article
en Microsoft Windows Kernel REG_RESOURCE_REQUIREMENTS_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:14:27 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_REQUIREMENTS_LIST registry values. Full Article