c Hackers Plan Attacks To Protest Iraq War By packetstormsecurity.com Published On :: Mon, 31 Mar 2003 11:16:53 GMT Full Article hacker iraq
c US Marine Unearths Nukes, Cocaine, And $25 Million By packetstormsecurity.com Published On :: Mon, 04 Sep 2006 22:16:23 GMT Full Article usa iraq
c Iraq Collapse May Pose New WMD Threat, Say UN Monitors By packetstormsecurity.com Published On :: Thu, 21 Jun 2007 09:47:19 GMT Full Article privacy iraq
c Jamming Systems Play Secret Role In Iraq By packetstormsecurity.com Published On :: Mon, 13 Aug 2007 10:26:34 GMT Full Article iraq
c Hackers Attack Iraq's Vulnerable Computers By packetstormsecurity.com Published On :: Fri, 29 Aug 2008 02:42:49 GMT Full Article hacker iraq
c Special Forces Getting High-Tech Soldier Suits For Iraq Mission By packetstormsecurity.com Published On :: Wed, 22 Jul 2009 20:13:43 GMT Full Article iraq
c Iraq Government Launches Its Own Channel On YouTube By packetstormsecurity.com Published On :: Wed, 25 Nov 2009 01:58:19 GMT Full Article government iraq
c Wikileaks Releases Indiscriminate Slaying Video From Iraq By packetstormsecurity.com Published On :: Tue, 06 Apr 2010 22:12:40 GMT Full Article iraq
c WikiLeaks Set To Release Iraq War Records By packetstormsecurity.com Published On :: Sat, 11 Sep 2010 19:25:39 GMT Full Article iraq
c Will 400,000 Secret Iraq War Document Restore WikiLeaks' Sheen? By packetstormsecurity.com Published On :: Fri, 15 Oct 2010 15:05:16 GMT Full Article iraq
c ISIS Stole $425 Million Becoming The World's Richest Terrorist Group By packetstormsecurity.com Published On :: Fri, 13 Jun 2014 13:28:56 GMT Full Article headline government iraq terror
c Social-Media Battle Augments Iraq Bloodshed By packetstormsecurity.com Published On :: Wed, 18 Jun 2014 01:32:47 GMT Full Article headline iraq facebook social twitter terror
c Chinese Deep Panda Hackers Focus On Iraq Oil Interests By packetstormsecurity.com Published On :: Tue, 08 Jul 2014 11:58:10 GMT Full Article headline hacker china iraq
c Iraq Conflict Breeds Cyberwar Among Rival Factions By packetstormsecurity.com Published On :: Tue, 22 Jul 2014 15:10:51 GMT Full Article headline government cyberwar iraq
c Diaspora Social Network Cannot Stop IS Posts By packetstormsecurity.com Published On :: Thu, 21 Aug 2014 14:57:06 GMT Full Article headline government usa cyberwar iraq social terror
c Thai Police Shutter 5,000+ Sites Insulting Royals By packetstormsecurity.com Published On :: Thu, 15 Mar 2012 15:25:12 GMT Full Article headline government thailand censorship
c Three-Year Hunt Nabs Hacker Who Popularized Cybercrime By packetstormsecurity.com Published On :: Sat, 04 May 2013 15:46:54 GMT Full Article headline hacker government usa thailand
c Zotob Hacker Diabl0 Arrested In Bangkok After Three Year Hunt By packetstormsecurity.com Published On :: Wed, 19 Mar 2014 15:12:34 GMT Full Article headline hacker malware thailand
c Thailand: Nine Young, Alleged Hackers Detained By Military By packetstormsecurity.com Published On :: Mon, 26 Dec 2016 13:50:51 GMT Full Article headline hacker government data loss thailand
c Microsoft Is Helping Thai Military Government Spy On Web Users By packetstormsecurity.com Published On :: Thu, 26 Jan 2017 15:08:13 GMT Full Article headline government privacy microsoft spyware thailand
c Thailand Seizes Server Linked To North Korean Attack Gang By packetstormsecurity.com Published On :: Mon, 30 Apr 2018 12:03:06 GMT Full Article headline hacker government cyberwar korea thailand
c Hackers Disrupt 51 Malaysian Government Websites By packetstormsecurity.com Published On :: Thu, 16 Jun 2011 10:52:16 GMT Full Article headline hacker government malaysia
c Cert Stolen From Malaysian Government Used To Sign Malware By packetstormsecurity.com Published On :: Tue, 15 Nov 2011 06:02:04 GMT Full Article headline government malware ssl malaysia
c Malaysian Election Sparks Denial Of Service By packetstormsecurity.com Published On :: Thu, 09 May 2013 15:07:38 GMT Full Article headline government denial of service malaysia
c Google Malaysia Site DNS Hacked By packetstormsecurity.com Published On :: Fri, 11 Oct 2013 15:24:13 GMT Full Article headline hacker dns google malaysia
c Malaysia-Based Credit Card Fraud Ring Broken, 105 Arrested By packetstormsecurity.com Published On :: Sat, 09 Jul 2016 02:56:15 GMT Full Article headline bank cybercrime fraud malaysia
c efilter.c By packetstormsecurity.com Published On :: Wed, 17 Aug 2005 05:08:33 GMT Efilter is an automatic exception reporting utility. It is very useful and handy while doing vulnerability research on any software designed to work under Windows NT platforms. Due to that it hooks KiUserExceptionDispatcher function, it acts BEFORE any of program's active SEH frames take over the exception. In short words it reports programs exceptions even if they are handled by original program. Full Article
c HP Security Bulletin 2005-10.23 By packetstormsecurity.com Published On :: Sun, 28 Aug 2005 19:14:10 GMT HP Security Bulletin - A potential vulnerability has been identified with Openview Network Node Manager (OV NNM). This vulnerability could be exploited remotely by an unauthorized user to gain privileged access. Affected versions: Openview Network Node Manager (OV NNM) 6.2, 6.4, 7.01, 7.50 running on HP-UX, Solaris, Windows NT, Windows 2000, Windows XP, and Linux. Full Article
c prott_packV01A.zip By packetstormsecurity.com Published On :: Fri, 23 Sep 2005 07:32:28 GMT Protty is a ring 3 library developed to protect against shellcode execution on Windows NT based systems. Full Article
c Debian Linux Security Advisory 830-1 By packetstormsecurity.com Published On :: Tue, 04 Oct 2005 03:09:21 GMT Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users. Full Article
c win-useradd.c By packetstormsecurity.com Published On :: Sun, 30 Oct 2005 23:33:42 GMT 318 byte useradd shellcode for Russian Windows NT/2k/XP variants. Full Article
c un-D_0WNED.c By packetstormsecurity.com Published On :: Wed, 02 Nov 2005 06:20:13 GMT GoodTech Telnet Server for Windows NT/2000. Full Article
c winntcomp.txt By packetstormsecurity.com Published On :: Thu, 04 Jan 2007 02:53:42 GMT A critical security vulnerability has been found in the Windows NT Message compiler. Arbitrary code execution might be possible. Full Article
c Cisco Security Advisory 20081022-asa By packetstormsecurity.com Published On :: Wed, 22 Oct 2008 22:50:17 GMT Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. These include Windows NT domain authentication bypass, IPv6 denial of service, and a Crypto Accelerator memory leak. Full Article
c Microsoft Server Service NetpwPathCanonicalize Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This Metasploit module exploits a stack overflow in the NetApi32 CanonicalizePathName() function using the NetpwPathCanonicalize RPC call in the Server Service. It is likely that other RPC calls could be used to exploit this service. This exploit will result in a denial of service on on Windows XP SP2 or Windows 2003 SP1. A failed exploit attempt will likely result in a complete reboot on Windows 2000 and the termination of all SMB-related services on Windows XP. The default target for this exploit should succeed on Windows NT 4.0, Windows 2000 SP0-SP4+, Windows XP SP0-SP1 and Windows 2003 SP0. Full Article
c Microsoft RPC DCOM Interface Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This Metasploit module exploits a stack overflow in the RPCSS service, this vulnerability was originally found by the Last Stage of Delirium research group and has bee widely exploited ever since. This Metasploit module can exploit the English versions of Windows NT 4.0 SP3-6a, Windows 2000, Windows XP, and Windows 2003 all in one request :) Full Article
c Microsoft IIS 4.0 .HTR Path Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This exploits a buffer overflow in the ISAPI ISM.DLL used to process HTR scripting in IIS 4.0. This Metasploit module works against Windows NT 4 Service Packs 3, 4, and 5. The server will continue to process requests until the payload being executed has exited. If you've set EXITFUNC to 'seh', the server will continue processing requests, but you will have trouble terminating a bind shell. If you set EXITFUNC to thread, the server will crash upon exit of the bind shell. The payload is alpha-numerically encoded without a NOP sled because otherwise the data gets mangled by the filters. Full Article
c Terminal Server License Bypass By packetstormsecurity.com Published On :: Mon, 11 Jan 2010 22:21:23 GMT This registry code allows any terminal client access to a Terminal Server. It bypasses the Microsoft "Terminal Server License" and allows the client to create a session on the server without a CAL (Client Access License) or MS Open License. It works on WinNT, Win2000, Win2003 server and Win2008 server. Full Article
c Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()- By packetstormsecurity.com Published On :: Thu, 21 Jan 2010 00:12:04 GMT Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()->KiTrap0d local ring0 exploit. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected". Full Article
c Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ Local ring0 By packetstormsecurity.com Published On :: Mon, 03 Jun 2013 16:28:24 GMT There is a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the PATHREC object returned by win32k!EPATHOBJ::newpathrec does not initialize the next list pointer. This is a local ring0 exploit for Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7/8. Full Article
c SyncBreeze 10.1.16 SEH GET Overflow By packetstormsecurity.com Published On :: Fri, 13 Oct 2017 13:42:47 GMT There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs. Full Article
c South Africa Seeks to Improve Process for Renewable Energy Deals By feedproxy.google.com Published On :: 2014-08-27T15:53:00Z South African Energy Minister Tina Joemat-Pettersson said her department wants to address weaknesses in the process of commissioning renewable-power projects. Full Article Hydropower Baseload Bioenergy Wind Power Solar Geothermal
c Expect $1.6 Trillion in Clean Energy Investments Through 2020, Says IEA By feedproxy.google.com Published On :: 2014-08-28T14:32:00Z Investments in new clean-energy capacity will total $1.61 trillion through 2020 even as the expansion of renewables is expected to slow, the International Energy Agency said. Full Article Wind Power Solar
c Eco Wave to Raise $5 Million to Accelerate Ocean Energy Plans By feedproxy.google.com Published On :: 2014-09-03T10:59:00Z Eco Wave Power, based in Israel, plans to raise $5 million by the end of the year to further develop its technology and projects that harness the power of the ocean to generate electricity. Full Article
c Ten Clean Energy Stocks for 2014: September Update and Thoughts on the Finavera Deal By feedproxy.google.com Published On :: 2014-09-08T15:00:00Z Clean energy stocks and the market in general rebounded strongly in August. My broad market benchmark of small cap stocks, IWM, rose 4.5 percent, returning to positive territory up 1.7 percent for the year. My clean energy benchmark PBW also jumped back into the black with an 11.1 percent gain for the month and 10.8 percent for the year to date. Full Article Hydropower Baseload Storage Bioenergy Wind Power Opinion & Commentary Solar Geothermal
c Obama’s International Climate Strategy: More Grease for Renewables By feedproxy.google.com Published On :: 2014-09-10T13:58:00Z It was good news for renewable energy when President Barack Obama in June proposed carbon dioxide restrictions on existing power plants. It is even better news now that he may use the plan to leverage an international climate accord. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Policy Wind Power Solar Geothermal
c Siemens Tidal Energy Project Suspended By feedproxy.google.com Published On :: 2014-09-11T16:31:00Z Marine Current Turbines (MCT), the tidal energy company owned by German engineering giant Siemens has announced that it has suspended development of a planned 10 MW tidal array in Wales. Full Article Baseload Hydropower
c Exploring Finance Options: Yield-cos Don’t Fit the Bill for Many Renewable Energy Companies By feedproxy.google.com Published On :: 2014-09-12T18:34:00Z Yield-cos have been grabbing headlines lately. Typically, large utilities spin off their high-yield alternative energy operations into separate smaller companies called yield-cos. These new companies are then taken public to attract individual and institutional investors. Full Article Hydropower Baseload Bioenergy Wind Power Opinion & Commentary Solar Geothermal
c US-China Rifts Put Aside for Clean Energy Research By feedproxy.google.com Published On :: 2014-09-22T15:16:00Z The threat of climate change is driving China and the U.S. — frequent rivals and the world’s two largest greenhouse-gas emitters — to collaborate on dozens of potential clean-energy breakthroughs. Full Article Storage Energy Efficiency Wind Power Solar
c UN Climate Summit Heats Up Discussion on Global Warming, Carbon Emissions By feedproxy.google.com Published On :: 2014-09-24T11:12:00Z More than 100 world leaders converged upon New York City today to discuss international efforts to reduce carbon emissions and combat climate change. The list of speakers at the UN Climate Summit included U.S. President Barack Obama, UK Prime Minister David Cameron, Brazilian President Dilma Rousseff, French President François Hollande, and Chinese Vice Premier Zhang Gaoli. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Wind Power Solar Geothermal