i US Dodges The Question Of Whether Its Military Built Stuxnet By packetstormsecurity.com Published On :: Mon, 30 May 2011 07:42:50 GMT Full Article headline government usa worm
i Stuxnet Clones May Target Critical US Systems, DHS Warns By packetstormsecurity.com Published On :: Wed, 27 Jul 2011 03:03:01 GMT Full Article headline government malware usa worm
i Worm Spreading Via RDP By packetstormsecurity.com Published On :: Mon, 29 Aug 2011 14:01:07 GMT Full Article headline microsoft worm
i New Worm By Creators Of Stuxnet Is Suspected By packetstormsecurity.com Published On :: Wed, 19 Oct 2011 04:22:00 GMT Full Article headline worm
i Security Giants Split Over Stuxnet Lookalike Duqu By packetstormsecurity.com Published On :: Thu, 20 Oct 2011 23:21:56 GMT Full Article headline worm symantec mcafee
i Worm Wriggles Through Year-Old Flaw, Builds Zombie-Net By packetstormsecurity.com Published On :: Wed, 26 Oct 2011 14:35:22 GMT Full Article headline flaw worm java
i Stuxnet-Like Duqu Trojan Hits Iranian Systems By packetstormsecurity.com Published On :: Mon, 14 Nov 2011 15:32:49 GMT Full Article headline virus worm iran
i Danger Worm Hijacks Facebook Accounts To Inject Banking Trojan By packetstormsecurity.com Published On :: Tue, 29 Nov 2011 16:49:19 GMT Full Article headline bank trojan worm facebook
i Massive Cyber-Attack Discovered, Researchers Say By packetstormsecurity.com Published On :: Tue, 29 May 2012 15:19:27 GMT Full Article headline hacker malware israel worm iran
i 'Super-Powerful' Flame Worm Actually Boring Bloatware By packetstormsecurity.com Published On :: Thu, 31 May 2012 16:51:20 GMT Full Article headline malware worm
i US Identified As Stuxnet Perpetrator With Obama's Backing By packetstormsecurity.com Published On :: Sat, 02 Jun 2012 06:43:15 GMT Full Article headline government malware usa cyberwar worm iran
i Rare AutoCAD Worm Lifted Blueprints From Peru, Sent Them To China By packetstormsecurity.com Published On :: Fri, 22 Jun 2012 03:47:39 GMT Full Article headline malware china cybercrime flaw worm
i Analysis Of The Skype Worm By packetstormsecurity.com Published On :: Wed, 10 Oct 2012 01:56:17 GMT Full Article headline worm skype
i New Table-Munching Worm Ravages Iranian Biz Databases By packetstormsecurity.com Published On :: Mon, 26 Nov 2012 15:17:21 GMT Full Article headline database worm iran
i Stuxnet Tricks Will Aid Cybercriminals, Warns Microsoft By packetstormsecurity.com Published On :: Fri, 14 Dec 2012 16:27:23 GMT Full Article headline malware microsoft cybercrime fraud worm
i Eight-Year Nortel Hacking Operation Again Shows Enterprise Vulnerabilities By packetstormsecurity.com Published On :: Fri, 17 Feb 2012 16:09:48 GMT Full Article headline hacker china flaw nortel
i Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue. Full Article
i Microsoft Workstation Service NetpManageIPCConnect Overflow By packetstormsecurity.com Published On :: Thu, 31 Dec 2009 03:20:56 GMT This Metasploit module exploits a stack overflow in the NetApi32 NetpManageIPCConnect function using the Workstation service in Windows 2000 SP4 and Windows XP SP2. In order to exploit this vulnerability, you must specify a the name of a valid Windows DOMAIN. It may be possible to satisfy this condition by using a custom dns and ldap setup, however that method is not covered here. Although Windows XP SP2 is vulnerable, Microsoft reports that Administrator credentials are required to reach the vulnerable code. Windows XP SP1 only requires valid user credentials. Also, testing shows that a machine already joined to a domain is not exploitable. Full Article
i Windows Media Services ConnectFunnel Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 19 Apr 2010 22:46:07 GMT This Metasploit module exploits a stack buffer overflow in the Windows Media Unicast Service version 4.1.0.3930 (NUMS.exe). By sending a specially crafted FunnelConnect request, an attacker can execute arbitrary code under the "NetShowServices" user account. Windows Media Services 4.1 ships with Windows 2000 Server, but is not installed by default. NOTE: This service does NOT restart automatically. Successful, as well as unsuccessful exploitation attempts will kill the service which prevents additional attempts. Full Article
i Windows 2000/XP/2003 win32k.sys SfnLOGONNOTIFY Denial Of Service By packetstormsecurity.com Published On :: Fri, 23 Apr 2010 04:26:43 GMT win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnLOGONNOTIFY. Full Article
i Windows 2000/XP/2003 win32k.sys SfnINSTRING Denial Of Service By packetstormsecurity.com Published On :: Fri, 23 Apr 2010 04:29:00 GMT win32k.sys in Microsoft Windows 2000 / XP / 2003 suffers from a local kernel denial of service vulnerability related to SfnINSTRING. Full Article
i Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow By packetstormsecurity.com Published On :: Mon, 26 Jul 2010 20:18:25 GMT This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue. Full Article
i Microsoft SMB Server Zero Size Pool Allocation By packetstormsecurity.com Published On :: Fri, 13 Aug 2010 00:01:59 GMT A vulnerability in the Windows kernel can be triggered via SMB in Microsoft Windows versions ranging from Windows 2000 through to Windows 7. This vulnerability allows an attacker to trigger a kernel pool corruption by sending a specially crafted SMB_COM_TRANSACTION2 request. Successful exploitation of this issue may result in remote code execution with kernel privileges, while failed attempts will result in a denial of service condition. Full Article
i del2info Windows Analyzer 0.1 By packetstormsecurity.com Published On :: Thu, 30 Jun 2011 06:03:26 GMT The del2info utility was written to analyze Windows Recycle Bin INFO2 and $I?????? files. It can extract file deletion time, original path, and size of deleted files and whether they have been moved from the Recycle Bin. It supports files from Windows 2000 to 7. Full Article
i del2info Windows Analyzer 0.1.2 By packetstormsecurity.com Published On :: Mon, 04 Jul 2011 01:01:01 GMT The del2info utility was written to analyze Windows Recycle Bin INFO2 and $I?????? files. It can extract file deletion time, original path, and size of deleted files and whether they have been moved from the Recycle Bin. It supports files from Windows 2000 to 7. Full Article
i Oracle Weblogic Apache Connector POST Request Buffer Overflow By packetstormsecurity.com Published On :: Fri, 18 May 2012 14:58:27 GMT This Metasploit module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. The connector fails to properly handle specially crafted HTTP POST requests, resulting a buffer overflow due to the insecure usage of sprintf. Currently, this module works over Windows systems without DEP, and has been tested with Windows 2000 / XP. In addition, the Weblogic Apache plugin version is fingerprinted with a POST request containing a specially crafted Transfer-Encoding header. Full Article
i Microsoft DHCP INFORM Configuration Overwrite By packetstormsecurity.com Published On :: Fri, 30 May 2014 04:49:27 GMT A vulnerability in Windows DHCP was found on Windows OS versions ranging from Windows 2000 through to Windows server 2003. This vulnerability allows an attacker to remotely overwrite DNS, Gateway, IP Addresses, routing, WINS server, WPAD, and server configuration with no user interaction. Successful exploitation of this issue will result in a remote network configuration overwrite. Microsoft acknowledged the issue but has indicated no plans to publish a patch to resolve it. Full Article
i ECLIPSEDWING 1.5.2 Windows 2000 / 2003 / XP MS08-67 SMB Exploit By packetstormsecurity.com Published On :: Sat, 15 Apr 2017 01:44:59 GMT ECLIPSEDWING exploits the SMB vulnerability patched by MS08-67. It affects Microsoft Windows 2000, 2003, and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity. Full Article
i Bastille-2.1.6.tar.bz2 By packetstormsecurity.com Published On :: Sat, 20 Nov 2004 19:23:19 GMT The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here.. Full Article
i Mandriva Linux Security Advisory 2004.146 By packetstormsecurity.com Published On :: Sun, 12 Dec 2004 18:24:27 GMT Mandrake Linux Security Update Advisory - SGI developers discovered a remote DoS (Denial of Service) condition in the NFS statd server. rpc.statd did not ignore the SIGPIPE signal which would cause it to shutdown if a misconfigured or malicious peer terminated the TCP connection prematurely. Full Article
i Mandriva Linux Security Advisory 2004.148 By packetstormsecurity.com Published On :: Thu, 30 Dec 2004 06:59:44 GMT Mandrake Linux Security Update Advisory - Herbert Xu discovered that iproute can accept spoofed messages sent via the kernel netlink interface by other users on the local machine. This could lead to a local Denial of Service attack. Full Article
i Bastille-2.1.7.tar.bz2 By packetstormsecurity.com Published On :: Tue, 25 Jan 2005 08:06:52 GMT The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here.. Full Article
i Mandriva Linux Security Advisory 2005.029 By packetstormsecurity.com Published On :: Sat, 05 Feb 2005 20:49:38 GMT Mandrake Linux Security Update Advisory - Javier Fernandez-Sanguino Pena discovered two vulnerabilities in scripts included with the vim editor. The two scripts, tcltags and vimspell.sh created temporary files in an insecure manner which could allow a malicious user to execute a symbolic link attack or to create, or overwrite, arbitrary files with the privileges of the user invoking the scripts. Full Article
i elog_unix_win.c By packetstormsecurity.com Published On :: Wed, 23 Feb 2005 05:39:59 GMT ELOG version 2.5.6 and below remote shell exploit. Includes targets for Slackware, Gentoo, FreeBSD, Mandrake, Fedora Core 1, Debian, Windows XP, and Redhat. Full Article
i Bastille-2.2.5.tar.bz2 By packetstormsecurity.com Published On :: Tue, 22 Mar 2005 16:01:09 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
i Bastille-2.2.8-1.0.noarch.rpm By packetstormsecurity.com Published On :: Sat, 26 Mar 2005 03:15:46 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
i Bastille-3.0.4-1.0.noarch.rpm By packetstormsecurity.com Published On :: Wed, 01 Jun 2005 06:49:11 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
i Bastille-3.0.6-1.0.noarch.rpm By packetstormsecurity.com Published On :: Sat, 09 Jul 2005 07:44:20 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
i Bastille-3.0.7-1.0.noarch.rpm By packetstormsecurity.com Published On :: Fri, 05 Aug 2005 08:27:59 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
i Secunia Security Advisory 18489 By packetstormsecurity.com Published On :: Thu, 19 Jan 2006 02:04:53 GMT Secunia Security Advisory - Mandrake has issued an update for hylafax. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to compromise a vulnerable system. Full Article
i lesstif-advisory.pdf By packetstormsecurity.com Published On :: Fri, 18 Aug 2006 03:47:58 GMT Lesstif local root exploit for Mandrake Linux 2006 that makes use of the mtink binary which is setuid by default. Full Article
i Samba Heap Overflow Exploit By packetstormsecurity.com Published On :: Fri, 09 Jan 2009 00:35:11 GMT Samba versions below 3.0.20 heap overflow exploit. Written for older versions of Debian, Slackware, and Mandrake. Full Article
i Bastille Unix 3.2.1 By packetstormsecurity.com Published On :: Sun, 29 Jan 2012 11:11:10 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Full Article
i Anonymous Threatens Mexican Drug Cartel By packetstormsecurity.com Published On :: Mon, 31 Oct 2011 15:49:05 GMT Full Article headline anonymous mexico
i Is Mexican Cartel The Next 'Anonymous' Target? By packetstormsecurity.com Published On :: Wed, 02 Nov 2011 23:04:55 GMT Full Article headline anonymous mexico
i Mexican Drug Runners Torture And Decaptitate Blogger By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 15:46:59 GMT Full Article headline anonymous mexico
i Mexico Shuts Down Drug Gang's Antennas, Radios By packetstormsecurity.com Published On :: Mon, 05 Dec 2011 15:57:03 GMT Full Article headline phone science mexico
i Mexican Hackers Hit Official Websites In Cyber Protest By packetstormsecurity.com Published On :: Mon, 17 Sep 2012 14:58:01 GMT Full Article headline hacker government mexico
i Pro-Government Twitter Bots Try To Hush Mexican Activists By packetstormsecurity.com Published On :: Mon, 24 Aug 2015 13:43:19 GMT Full Article headline government botnet cyberwar spyware twitter mexico
i 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico