ge

Packet Storm T-Shirts Discontinued - Get Yours For Only $10




ge

Poisoned Websites Staying Contaminated Longer




ge

Data Breaches Cost $6.6 Million On Average, Survey Finds




ge

Sysadmin Stole Co-Worker IDs For Amazon Survey Splurge




ge

HP Study Finds Security Holes In Privilege Management






ge

Surveillance Footage And Code Clues Indicate Stuxnet Hit Iran









ge

Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow

This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.




ge

MS03-046 Exchange 2000 XEXCH50 Heap Overflow

This is an exploit for the Exchange 2000 heap overflow. Due to the nature of the vulnerability, this exploit is not very reliable. This Metasploit module has been tested against Exchange 2000 SP0 and SP3 running a Windows 2000 system patched to SP4. It normally takes between one and 100 connection attempts to successfully obtain a shell. This exploit is *very* unreliable.




ge

Microsoft Workstation Service NetpManageIPCConnect Overflow

This Metasploit module exploits a stack overflow in the NetApi32 NetpManageIPCConnect function using the Workstation service in Windows 2000 SP4 and Windows XP SP2. In order to exploit this vulnerability, you must specify a the name of a valid Windows DOMAIN. It may be possible to satisfy this condition by using a custom dns and ldap setup, however that method is not covered here. Although Windows XP SP2 is vulnerable, Microsoft reports that Administrator credentials are required to reach the vulnerable code. Windows XP SP1 only requires valid user credentials. Also, testing shows that a machine already joined to a domain is not exploitable.




ge

Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow

This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.






ge

Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf

Anomalous Payloadbased Worm Detection and Signature Generation.




ge

To Kill A Centrifuge

Whitepaper called To Kill a Centrifuge - A Technical Analysis of What Stuxnet's Creators Tried to Achieve.




ge

Morris Worm fingerd Stack Buffer Overflow

This Metasploit module exploits a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg.





ge

Opera Browser Dinged By Code Execution Flaw






ge

Warners Bros. Flagged Own Site For Piracy, Orders Google To Censor Pages





ge

Xenotix Python Keylogger For Windows

Xenotix is a keylogger for windows that is written in Python. It has the ability to send logs remotely.




ge

Spear Phisher Targeted eBay Employees




ge

Notorious eBay Hacker Gets 3-Year Suspended Sentence









ge

Novell ZENworks Configuration Management Remote Execution

This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3.




ge

Adobe Urges More DMCA Busts




ge

Jury Convicts DirecTV Pirate On DMCA Charges




ge

DMCA Fails to Stop Garage Door Opener




ge

Seeking Changes To The DMCA