o Mandriva Linux Security Advisory 2005.029 By packetstormsecurity.com Published On :: Sat, 05 Feb 2005 20:49:38 GMT Mandrake Linux Security Update Advisory - Javier Fernandez-Sanguino Pena discovered two vulnerabilities in scripts included with the vim editor. The two scripts, tcltags and vimspell.sh created temporary files in an insecure manner which could allow a malicious user to execute a symbolic link attack or to create, or overwrite, arbitrary files with the privileges of the user invoking the scripts. Full Article
o elog_unix_win.c By packetstormsecurity.com Published On :: Wed, 23 Feb 2005 05:39:59 GMT ELOG version 2.5.6 and below remote shell exploit. Includes targets for Slackware, Gentoo, FreeBSD, Mandrake, Fedora Core 1, Debian, Windows XP, and Redhat. Full Article
o Bastille-2.2.8-1.0.noarch.rpm By packetstormsecurity.com Published On :: Sat, 26 Mar 2005 03:15:46 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
o Bastille-3.0.4-1.0.noarch.rpm By packetstormsecurity.com Published On :: Wed, 01 Jun 2005 06:49:11 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
o Bastille-3.0.6-1.0.noarch.rpm By packetstormsecurity.com Published On :: Sat, 09 Jul 2005 07:44:20 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
o Bastille-3.0.7-1.0.noarch.rpm By packetstormsecurity.com Published On :: Fri, 05 Aug 2005 08:27:59 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
o Secunia Security Advisory 18489 By packetstormsecurity.com Published On :: Thu, 19 Jan 2006 02:04:53 GMT Secunia Security Advisory - Mandrake has issued an update for hylafax. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to compromise a vulnerable system. Full Article
o lesstif-advisory.pdf By packetstormsecurity.com Published On :: Fri, 18 Aug 2006 03:47:58 GMT Lesstif local root exploit for Mandrake Linux 2006 that makes use of the mtink binary which is setuid by default. Full Article
o Samba Heap Overflow Exploit By packetstormsecurity.com Published On :: Fri, 09 Jan 2009 00:35:11 GMT Samba versions below 3.0.20 heap overflow exploit. Written for older versions of Debian, Slackware, and Mandrake. Full Article
o Anonymous Threatens Mexican Drug Cartel By packetstormsecurity.com Published On :: Mon, 31 Oct 2011 15:49:05 GMT Full Article headline anonymous mexico
o Is Mexican Cartel The Next 'Anonymous' Target? By packetstormsecurity.com Published On :: Wed, 02 Nov 2011 23:04:55 GMT Full Article headline anonymous mexico
o Mexican Drug Runners Torture And Decaptitate Blogger By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 15:46:59 GMT Full Article headline anonymous mexico
o Mexico Shuts Down Drug Gang's Antennas, Radios By packetstormsecurity.com Published On :: Mon, 05 Dec 2011 15:57:03 GMT Full Article headline phone science mexico
o Mexican Hackers Hit Official Websites In Cyber Protest By packetstormsecurity.com Published On :: Mon, 17 Sep 2012 14:58:01 GMT Full Article headline hacker government mexico
o Pro-Government Twitter Bots Try To Hush Mexican Activists By packetstormsecurity.com Published On :: Mon, 24 Aug 2015 13:43:19 GMT Full Article headline government botnet cyberwar spyware twitter mexico
o 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico
o A 'Hacker' Exposed A Drug Lord And Is Trying To Save His Own Life By packetstormsecurity.com Published On :: Thu, 18 May 2017 14:15:13 GMT Full Article headline government cyberwar mexico
o Mexico Spied On Journalists, Lawyers, And Activists By packetstormsecurity.com Published On :: Tue, 20 Jun 2017 14:28:01 GMT Full Article headline privacy phone spyware mexico
o Mexican Tax Refund Site Leaked 400GB Of Sensitive Customer Info By packetstormsecurity.com Published On :: Sat, 09 Sep 2017 16:22:32 GMT Full Article headline government privacy data loss fraud mexico
o ICE Forces Software To Automatically Recommend Detention By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:27 GMT Full Article headline government usa mexico
o How Hackers Pulled Off A $20 Million Bank Heist By packetstormsecurity.com Published On :: Mon, 18 Mar 2019 14:48:17 GMT Full Article headline hacker bank cybercrime korea mexico
o Hacker Dumps Thousands Of Sensitive Mexican Embassy Documents Online By packetstormsecurity.com Published On :: Sun, 21 Apr 2019 15:59:17 GMT Full Article headline hacker government privacy data loss mexico
o Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Anomalous Payloadbased Worm Detection and Signature Generation. Full Article
o Advanced-Polymorphic-Worms.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic. Full Article
o vthrottle-0.60.tar.gz By packetstormsecurity.com Published On :: Thu, 16 Nov 2006 16:52:49 GMT vthrottle is an implementation of an SMTP throttling engine for Sendmail servers, based upon M. Williamson's mechanisms, as described in his 2003 Usenix Security paper. It allows the administrator to control how much email users and hosts may send, hindering the rapid spread of viruses, worms, and spam. Exceptions can be made using a whitelist mechanism, which can be generated manually or with the included tool vmeasure. Full Article
o Worminator-bin.tgz By packetstormsecurity.com Published On :: Wed, 06 Dec 2006 02:38:14 GMT A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. This tarball is the binary executable version. Full Article
o Worminator-src.tgz By packetstormsecurity.com Published On :: Wed, 06 Dec 2006 02:38:51 GMT A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. This tarball is the source version. Full Article
o Exploit Web 2.0, Real Life XSS-Worm By packetstormsecurity.com Published On :: Thu, 05 Feb 2009 22:08:04 GMT Whitepaper called Exploiting Web 2.0, Real Life XSS-Worm. Full Article
o Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
o How Conficker Makes Use Of MS08-067 By packetstormsecurity.com Published On :: Wed, 15 Apr 2009 00:06:50 GMT Whitepaper called How Conficker makes use of MS08-067. Full Article
o Sasser Worm avserve FTP PORT Buffer Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This Metasploit module exploits the FTP server component of the Sasser worm. By sending an overly long PORT command the stack can be overwritten. Full Article
o LPRng use_syslog Remote Format String Vulnerability By packetstormsecurity.com Published On :: Wed, 17 Feb 2010 23:45:41 GMT This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". Full Article
o PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution By packetstormsecurity.com Published On :: Wed, 05 May 2010 00:53:06 GMT PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit. Full Article
o Wormtrack Network IDS 0.1 By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 02:38:15 GMT Wormtrack is a network IDS that helps detect scanning worms on a local area network by monitoring anomalous ARP traffic. This allows detection of scanning threats on the network, without having privileged access on a switch to set up a dedicated monitor port, nor does it require a constant updating of the rules engine to address new threats. Full Article
o To Kill A Centrifuge By packetstormsecurity.com Published On :: Thu, 21 Nov 2013 15:57:18 GMT Whitepaper called To Kill a Centrifuge - A Technical Analysis of What Stuxnet's Creators Tried to Achieve. Full Article
o Linksys E-Series Remote Code Execution By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 03:33:33 GMT Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm. Full Article
o Linksys Worm Remote Root By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 20:02:22 GMT Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi. Full Article
o Linksys E-Series TheMoon Remote Command Injection By packetstormsecurity.com Published On :: Sat, 05 Apr 2014 03:11:21 GMT Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5. Full Article
o Metamorphic Worms: Can They Remain Hidden? By packetstormsecurity.com Published On :: Mon, 02 Feb 2015 10:22:22 GMT Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest. Full Article
o Hak5 WiFi Pineapple Preconfiguration Command Injection 2 By packetstormsecurity.com Published On :: Wed, 19 Oct 2016 01:02:21 GMT This Metasploit module exploits a command injection vulnerability on WiFi Pineapples versions 2.0 and below and pineapple versions prior to 2.4. We use a combination of default credentials with a weakness in the anti-csrf generation to achieve command injection on fresh pineapple devices prior to configuration. Additionally if default credentials fail, you can enable a brute force solver for the proof-of-ownership challenge. This will reset the password to a known password if successful and may interrupt the user experience. These devices may typically be identified by their SSID beacons of 'Pineapple5_....'; details derived from the TospoVirus, a WiFi Pineapple infecting worm. Full Article
o Morris Worm fingerd Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 05 Nov 2018 21:05:50 GMT This Metasploit module exploits a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Full Article
o Morris Worm sendmail Debug Mode Shell Escape By packetstormsecurity.com Published On :: Mon, 05 Nov 2018 21:09:02 GMT This Metasploit module exploits sendmail's well-known historical debug mode to escape to a shell and execute commands in the SMTP RCPT TO command. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Currently only cmd/unix/reverse and cmd/unix/generic are supported. Full Article
o Linux Security Checklist Tool 2.0.3 By packetstormsecurity.com Published On :: Thu, 03 Feb 2011 15:31:32 GMT Linux Security Checklist is a perl script that audits a given Linux host and provides recommendations for security enhancements. Full Article
o Microsoft Is Accused Of Giving Misguided Security Advice By packetstormsecurity.com Published On :: Fri, 27 May 2011 13:41:39 GMT Full Article headline microsoft cookiejacking
o Advertiser Settles Charges For Use Of Adobe Flash Cookies By packetstormsecurity.com Published On :: Wed, 09 Nov 2011 00:53:12 GMT Full Article headline adobe cookiejacking
o Ubuntu Security Notice 715-1 By packetstormsecurity.com Published On :: Fri, 30 Jan 2009 19:58:41 GMT Ubuntu Security Notice USN-715-1 - Hugo Dias discovered that the ATM subsystem did not correctly manage socket counts. It was discovered that the inotify subsystem contained watch removal race conditions. Dann Frazier discovered that in certain situations sendmsg did not correctly release allocated memory. Helge Deller discovered that PA-RISC stack unwinding was not handled correctly. It was discovered that the ATA subsystem did not correctly set timeouts. It was discovered that the ib700 watchdog timer did not correctly check buffer sizes. Full Article
o Anonymous Takes Down Greek Sites In Support Of Athens Protests By packetstormsecurity.com Published On :: Tue, 14 Feb 2012 00:46:29 GMT Full Article headline denial of service anonymous greece
o Greek Hackers Are Arrested Over Anonymous Attacks By packetstormsecurity.com Published On :: Mon, 20 Feb 2012 17:27:28 GMT Full Article headline hacker anonymous greece
o john-1.7.2.tar.gz By packetstormsecurity.com Published On :: Mon, 05 Jun 2006 03:03:35 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
o john-1.7.3.1.tar.gz By packetstormsecurity.com Published On :: Sat, 19 Jul 2008 00:43:09 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article