a

Why Iraq is Buying up Playstation 2's





a

Hackers Plan Attacks To Protest Iraq War




a

US Marine Unearths Nukes, Cocaine, And $25 Million




a

Iraq Collapse May Pose New WMD Threat, Say UN Monitors




a

Iraq Base Plans Left On Open Servers




a

Jamming Systems Play Secret Role In Iraq




a

Hackers Attack Iraq's Vulnerable Computers




a

Special Forces Getting High-Tech Soldier Suits For Iraq Mission




a

Iraq Government Launches Its Own Channel On YouTube




a

Wikileaks Releases Indiscriminate Slaying Video From Iraq




a

WikiLeaks Set To Release Iraq War Records




a

Unpublished Iraq War Logs Trigger Internal WikiLeaks Revolt




a

Will 400,000 Secret Iraq War Document Restore WikiLeaks' Sheen?












a

Variety Jones, Alleged Silk Road Mentor, Arrested In Thailand















a

prott_packV01A.zip

Protty is a ring 3 library developed to protect against shellcode execution on Windows NT based systems.




a

Debian Linux Security Advisory 830-1

Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users.




a

win-useradd.c

318 byte useradd shellcode for Russian Windows NT/2k/XP variants.




a

AD20060509a.txt

eEye Digital Security has discovered a second vulnerability in the Microsoft Distributed Transaction Coordinator that could allow an attacker to take complete control over a vulnerable system to which he has network or local access. The vulnerable MSDTC component is an RPC server which is network accessible by default on Windows NT 4.0 Server and Windows 2000 Server systems, over a dynamic high TCP port.




a

NTharden.pdf

Whitepaper discussing the hardening of Windows NT.




a

Cisco Security Advisory 20081022-asa

Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. These include Windows NT domain authentication bypass, IPv6 denial of service, and a Crypto Accelerator memory leak.




a

Microsoft Server Service NetpwPathCanonicalize Overflow

This Metasploit module exploits a stack overflow in the NetApi32 CanonicalizePathName() function using the NetpwPathCanonicalize RPC call in the Server Service. It is likely that other RPC calls could be used to exploit this service. This exploit will result in a denial of service on on Windows XP SP2 or Windows 2003 SP1. A failed exploit attempt will likely result in a complete reboot on Windows 2000 and the termination of all SMB-related services on Windows XP. The default target for this exploit should succeed on Windows NT 4.0, Windows 2000 SP0-SP4+, Windows XP SP0-SP1 and Windows 2003 SP0.




a

Microsoft RPC DCOM Interface Overflow

This Metasploit module exploits a stack overflow in the RPCSS service, this vulnerability was originally found by the Last Stage of Delirium research group and has bee widely exploited ever since. This Metasploit module can exploit the English versions of Windows NT 4.0 SP3-6a, Windows 2000, Windows XP, and Windows 2003 all in one request :)




a

Microsoft IIS 4.0 .HTR Path Overflow

This exploits a buffer overflow in the ISAPI ISM.DLL used to process HTR scripting in IIS 4.0. This Metasploit module works against Windows NT 4 Service Packs 3, 4, and 5. The server will continue to process requests until the payload being executed has exited. If you've set EXITFUNC to 'seh', the server will continue processing requests, but you will have trouble terminating a bind shell. If you set EXITFUNC to thread, the server will crash upon exit of the bind shell. The payload is alpha-numerically encoded without a NOP sled because otherwise the data gets mangled by the filters.




a

Terminal Server License Bypass

This registry code allows any terminal client access to a Terminal Server. It bypasses the Microsoft "Terminal Server License" and allows the client to create a session on the server without a CAL (Client Access License) or MS Open License. It works on WinNT, Win2000, Win2003 server and Win2008 server.




a

Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()-

Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()->KiTrap0d local ring0 exploit. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".




a

RegLookup Register Parser 0.12.0

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.




a

RegLookup Registry Parser 0.99.0

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.




a

RegLookup Registry Parser 1.0.0

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.




a

Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ Local ring0

There is a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the PATHREC object returned by win32k!EPATHOBJ::newpathrec does not initialize the next list pointer. This is a local ring0 exploit for Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7/8.