3 Bastille-3.0.7-1.0.noarch.rpm By packetstormsecurity.com Published On :: Fri, 05 Aug 2005 08:27:59 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here.. Full Article
3 Bastille Unix 3.2.1 By packetstormsecurity.com Published On :: Sun, 29 Jan 2012 11:11:10 GMT The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Full Article
3 Is Mexican Cartel The Next 'Anonymous' Target? By packetstormsecurity.com Published On :: Wed, 02 Nov 2011 23:04:55 GMT Full Article headline anonymous mexico
3 Mexico Shuts Down Drug Gang's Antennas, Radios By packetstormsecurity.com Published On :: Mon, 05 Dec 2011 15:57:03 GMT Full Article headline phone science mexico
3 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico
3 A 'Hacker' Exposed A Drug Lord And Is Trying To Save His Own Life By packetstormsecurity.com Published On :: Thu, 18 May 2017 14:15:13 GMT Full Article headline government cyberwar mexico
3 PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution By packetstormsecurity.com Published On :: Wed, 05 May 2010 00:53:06 GMT PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit. Full Article
3 Linux Security Checklist Tool 2.0.3 By packetstormsecurity.com Published On :: Thu, 03 Feb 2011 15:31:32 GMT Linux Security Checklist is a perl script that audits a given Linux host and provides recommendations for security enhancements. Full Article
3 john-1.7.3.1.tar.gz By packetstormsecurity.com Published On :: Sat, 19 Jul 2008 00:43:09 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
3 John The Ripper 1.7.3.4 By packetstormsecurity.com Published On :: Mon, 21 Sep 2009 17:26:16 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
3 Opera Says Bug Probably Can't Commandeer Machines By packetstormsecurity.com Published On :: Fri, 05 Mar 2010 22:35:14 GMT Full Article opera
3 Book Review: 'The Tangled Web' By Michal Zalewski By packetstormsecurity.com Published On :: Sat, 11 Feb 2012 06:59:09 GMT No Starch Press: $49.95 If you are a security engineer, a researcher, a hacker or just someone who keeps your ear to the ground when it comes to computer security, chances are you have seen the name Michal Zalewski. He has been responsible for an abundance of tools, research, proof of concepts and helpful insight to many over the years. He recently released a book called "The Tangled Web - A Guide To Securing Modern Web Applications". Normally, when I read books about securing web applications, I find many parallels where authors will give an initial lay of the land, dictating what technologies they will address, what programming languages they will encompass and a decent amount of detail on vulnerabilities that exist along with some remediation tactics. Such books are invaluable for people in this line of work, but there is a bigger picture that needs to be addressed and it includes quite a bit of secret knowledge rarely divulged in the security community. You hear it in passing conversation over beers with colleagues or discover it through random tests on your own. But rarely are the oddities documented anywhere in a thorough manner. Before we go any further, let us take a step back in time. Well over a decade ago, the web was still in its infancy and an amusing vulnerability known as the phf exploit surfaced. It was nothing more than a simple input validation bug that resulted in arbitrary code execution. The average hacker enjoyed this (and many more bugs like it) during this golden age. At the time, developers of web applications had a hard enough time getting their code to work and rarely took security implications into account. Years later, cross site scripting was discovered and there was much debate about whether or not a cross site scripting vulnerability was that important. After all, it was an issue that restricted itself to the web ecosystem and did not give us a shell on the server. Rhetoric on mailing lists mocked such findings and we (Packet Storm) received many emails saying that by archiving these issues we were degrading the quality of the site. But as the web evolved, people starting banking online, their credit records were online and before you knew it, people were checking their social network updates on their phone every five minutes. All of a sudden, something as small as a cross site scripting vulnerability mattered greatly. To make the situation worse, many programs were developed to support web-related technologies. In the corporate world, being first to market or putting out a new feature in a timely fashion trumphs security. Backwards compatibility that feeds poor design became a must for any of the larger browser vendors. The "browser wars" began and everyone had different ideas on how to solve different issues. To say web-related technologies brought many levels of complexity to the modern computing experience is a great understatement. Browser-side programming languages, such as JavaScript, became a playground for hackers. Understanding the Document Object Model (DOM) and the implications of poorly coded applications became one of those lunch discussions that could cause you to put your face into your mashed potatoes. Enter "The Tangled Web". This book puts some very complicated nuances in plain (enough) english. It starts out with Zalewski giving a brief synopsis of the security industry and the web. Breakdowns of the basics are provided and it is written in a way that is inviting for anyone to read. It goes on to cover a wide array of topics inclusive to the operation of browsers, the protocols involved, the various types of documents handled and the languages supported. Armed with this knowledge, the reader is enabled to tackle the next section detailing browser security features. As the author puts it, it covers "everything from the well-known but often misunderstood same-origin policy to the obscure and proprietary zone settings of Internet Explorer". Browsers, it ends up, have a ridiculous amount of odd dynamics for even the simplest acts. The last section wraps things up with upcoming security features and various browser mechanisms to note. I found it a credit to the diversity of the book that technical discussion could also trail off to give historical notes on poor industry behavior. When it noted DNS hijacking by various providers it reminded me of the very distinct and constantly apparent disconnect between business and knowledge of technology. When noting how non-HTTP servers were being leveraged to commit cross site scripting attacks, Zalewski also made it a point to note how the Internet Explorer releases only have a handful of prohibited ports but all other browsers have dozens that they block. The delicate balance of understanding alongside context is vital when using information from this book and applying it to design. Every page offers some bit of interesting knowledge that dives deep. It takes the time to note the odd behaviors small mistakes can cause and also points out where flawed security implementations exist. This book touches on the old and the new and many things other security books have overlooked. Another nice addition is that it provides security engineering cheatsheets at the end of each chapter. To be thorough, it explains both the initiatives set out by RFCs while it also documents different paths various browser vendors have taken in tackling tricky security issues. Google's Chrome, Mozilla's Firefox, Microsoft's Internet Explorer, Apple's Safari and Opera are compared and contrasted greatly throughout this book. In my opinion, the web has become a layer cake over the years. New shiny technologies and add-ons have been thrown into the user experience and with each of them comes a new set of security implications. One-off findings are constantly discovered and documented (and at Packet Storm we try to archive every one of them), but this is the first time I have seen a comprehensive guide that focuses on everything from cross-domain content inclusion to content-sniffing. It is the sort of book that should be required reading for every web developer. -Todd Full Article headline microsoft flaw google mozilla opera apple firefox chrome
3 ultra-d3.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
3 Deep Inside The CIA's Targeted Killings By packetstormsecurity.com Published On :: Wed, 10 Apr 2013 02:18:37 GMT Full Article headline government usa pakistan terror cia
3 CIA's Most Senior Official In Pakistan 'Unmasked' By Khan's Party By packetstormsecurity.com Published On :: Wed, 27 Nov 2013 16:06:38 GMT Full Article headline government usa cyberwar pakistan cia
3 Tenshi Log Monitoring Program 0.13 By packetstormsecurity.com Published On :: Thu, 14 Jul 2011 00:33:12 GMT Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports. Full Article
3 NIELD (Network Interface Events Logging Daemon) 0.23 By packetstormsecurity.com Published On :: Wed, 11 Apr 2012 15:17:25 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
3 NIELD (Network Interface Events Logging Daemon) 0.3.0 By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 00:48:42 GMT Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules. Full Article
3 ZedLog 0.2 Beta 3 By packetstormsecurity.com Published On :: Mon, 15 Jul 2013 10:33:33 GMT ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding. Full Article
3 Notorious eBay Hacker Gets 3-Year Suspended Sentence By packetstormsecurity.com Published On :: Thu, 03 Nov 2011 06:37:18 GMT Full Article headline hacker ebay
3 Teen Drops $33K On Wikileaks Server Using Dad's Ebay Account By packetstormsecurity.com Published On :: Fri, 13 Sep 2013 02:17:27 GMT Full Article headline data loss ebay sweden
3 Cyber-Theft Hits eBay's Stubhub By packetstormsecurity.com Published On :: Wed, 23 Jul 2014 15:05:06 GMT Full Article headline cybercrime fraud ebay
3 eBay Redirect Attack Puts Buyers' Credentials At Risk By packetstormsecurity.com Published On :: Wed, 17 Sep 2014 23:27:59 GMT Full Article headline hacker flaw ebay
3 Massive Vulnerability Discovered In eBay's Magento By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 02:57:43 GMT Full Article headline cybercrime fraud flaw ebay
3 It's Time To Encrypt The Entire Internet By packetstormsecurity.com Published On :: Thu, 17 Apr 2014 22:32:08 GMT Full Article headline privacy data loss ssl cryptography
3 It's Crazy What Can Be Hacked Thanks To Heartbleed By packetstormsecurity.com Published On :: Mon, 28 Apr 2014 13:54:35 GMT Full Article headline hacker privacy flaw ssl cryptography
3 'Son Of Heartbleed' Hits Android And WiFi Networks By packetstormsecurity.com Published On :: Mon, 02 Jun 2014 02:31:59 GMT Full Article headline phone wireless flaw google ssl cryptography
3 US Hospital Hack 'Exploited Heartbleed Flaw' By packetstormsecurity.com Published On :: Wed, 20 Aug 2014 15:07:18 GMT Full Article headline hacker privacy china data loss flaw ssl cryptography
3 Secunia Security Advisory 51973 By packetstormsecurity.com Published On :: Fri, 25 Jan 2013 03:09:09 GMT Secunia Security Advisory - SUSE has issued an updated for libtiff. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. Full Article
3 Secunia Security Advisory 52039 By packetstormsecurity.com Published On :: Mon, 04 Feb 2013 04:57:58 GMT Secunia Security Advisory - SUSE has issued an update for chromium. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. Full Article
3 Secunia Security Advisory 52113 By packetstormsecurity.com Published On :: Thu, 07 Feb 2013 07:10:02 GMT Secunia Security Advisory - SUSE has issued an update for apache2. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
3 Secunia Security Advisory 52135 By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 11:12:21 GMT Secunia Security Advisory - SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to conduct clickjacking attacks. Full Article
3 Secunia Security Advisory 52153 By packetstormsecurity.com Published On :: Wed, 13 Feb 2013 11:12:33 GMT Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Article
3 WTF! It Should Not Be Illegal To Hack Your Own Car's Computer By packetstormsecurity.com Published On :: Fri, 23 Jan 2015 15:33:39 GMT Full Article headline hacker government usa dmca
3 Libya's Internet Goes Dark As Upheaval Spreads By packetstormsecurity.com Published On :: Sat, 05 Mar 2011 01:54:34 GMT Full Article headline government libya
3 Satellite Photos Take You Inside Gadhafi's Compound By packetstormsecurity.com Published On :: Sat, 27 Aug 2011 14:03:12 GMT Full Article headline libya
3 Libya's New Rulers Fire Up Gaddafi's Surveillance Tech By packetstormsecurity.com Published On :: Fri, 06 Jul 2012 13:55:09 GMT Full Article headline government privacy science libya
3 Why Iraq is Buying up Playstation 2's By packetstormsecurity.com Published On :: Tue, 19 Dec 2000 13:23:22 GMT Full Article iraq sony
3 Hackers Attack Iraq's Vulnerable Computers By packetstormsecurity.com Published On :: Fri, 29 Aug 2008 02:42:49 GMT Full Article hacker iraq
3 Will 400,000 Secret Iraq War Document Restore WikiLeaks' Sheen? By packetstormsecurity.com Published On :: Fri, 15 Oct 2010 15:05:16 GMT Full Article iraq
3 Anonymous Releases Law Firm's Emails About Haditha Killings By packetstormsecurity.com Published On :: Tue, 07 Feb 2012 01:26:16 GMT Full Article headline data loss iraq anonymous
3 ISIS Stole $425 Million Becoming The World's Richest Terrorist Group By packetstormsecurity.com Published On :: Fri, 13 Jun 2014 13:28:56 GMT Full Article headline government iraq terror
3 HP Security Bulletin 2005-10.23 By packetstormsecurity.com Published On :: Sun, 28 Aug 2005 19:14:10 GMT HP Security Bulletin - A potential vulnerability has been identified with Openview Network Node Manager (OV NNM). This vulnerability could be exploited remotely by an unauthorized user to gain privileged access. Affected versions: Openview Network Node Manager (OV NNM) 6.2, 6.4, 7.01, 7.50 running on HP-UX, Solaris, Windows NT, Windows 2000, Windows XP, and Linux. Full Article
3 Debian Linux Security Advisory 830-1 By packetstormsecurity.com Published On :: Tue, 04 Oct 2005 03:09:21 GMT Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users. Full Article
3 EEYEB-20050523.txt By packetstormsecurity.com Published On :: Wed, 14 Dec 2005 07:57:35 GMT eEye Security Advisory - eEye Digital Security has discovered a local privilege escalation vulnerability in the Windows kernel that could allow any code executing on a Windows NT 4.0 or Windows 2000 system to elevate itself to the highest possible local privilege level (kernel). Full Article
3 NBTEnum33.zip By packetstormsecurity.com Published On :: Wed, 29 Nov 2006 02:41:50 GMT NetBIOS Enumeration Utility (NBTEnum) is a utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. The enumerated information includes the network transports, NetBIOS name, account lockout threshold, logged on users, local groups and users, global groups and users, and shares. If run under the context of a valid user account additional information is enumerated including operating system information, services, installed programs, Auto Admin Logon information and encrypted WinVNC/RealVNC passwords. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP/2003. PERL source included. Full Article
3 Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()- By packetstormsecurity.com Published On :: Thu, 21 Jan 2010 00:12:04 GMT Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()->KiTrap0d local ring0 exploit. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected". Full Article
3 Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ Local ring0 By packetstormsecurity.com Published On :: Mon, 03 Jun 2013 16:28:24 GMT There is a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the PATHREC object returned by win32k!EPATHOBJ::newpathrec does not initialize the next list pointer. This is a local ring0 exploit for Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7/8. Full Article
3 Disk Pulse Enterprise 9.0.34 Login Buffer Overflow By packetstormsecurity.com Published On :: Mon, 14 Nov 2016 17:18:22 GMT This Metasploit module exploits a stack buffer overflow in Disk Pulse Enterprise 9.0.34. If a malicious user sends a malicious HTTP login request, it is possible to execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. Due to size constraints, this module uses the Egghunter technique. Full Article
3 Listen Up: Cap and Trade's Impact on Fuel Prices By feedproxy.google.com Published On :: 2014-10-01T13:14:00Z Over 95 percent of climate scientists have concluded that CO2 is the primary cause of global warming. Solving the problem requires a dramatic reduction in CO2 emissions. Some people are altruistic, but almost all businesses are bottom line oriented and will not reduce their CO2 emissions unless they have an economic incentive to do so. There are two realistic incentives: taxing CO2 emissions or setting up a cap and trade program for CO2. Since increasing taxes is politically unfeasible, the most practical approach is with a cap and trade program. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Policy Wind Power Opinion & Commentary Solar Geothermal