Copy Link
Add to Bookmark
Report

Net-Sec Issue 058

eZine's profile picture
Published in 
Net Sec newsletter
 · 26 Apr 2019

  

HNS Newsletter
Issue 58 - 09.04.2001
http://net-security.org
http://security-db.com

This is a newsletter delivered to you by Help Net Security. It covers weekly
roundups of security events that were in the news the past week. Visit Help
Net Security for the latest security news - http://www.net-security.org.

Subscribe to this weekly digest on:
http://www.net-security.org/text/newsletter

Archive of the newsletter in TXT and PDF format is available here:
http://www.net-security.org/news/archive/newsletter

Current subscriber count to this digest: 2204

Table of contents:

1) General security news
2) Security issues
3) Security world
4) Featured article
5) Security software
6) Defaced archives


========================================================
Advertisement - HNS Security Database
========================================================
HNS Security Database consists of a large database of security related
companies, their products, professional services and solutions. HNS
Security Database will provide a valuable asset to anyone interested in
implementing security measures and systems to their companies' networks.
Visit us at http://www.security-db.com
========================================================


General security news
---------------------

----------------------------------------------------------------------------

STANFORD LAW SCHOOL DEAN WILL ARGUE 2600 CASE
"In a major boost to our legal battle against the MPAA, Stanford Law School
Dean Kathleen Sullivan has joined our team and will be arguing the case in
front of the Second Circuit Court of Appeals on May 1. She joins Martin Garbus
and the team from the Electronic Frontier Foundation who worked on the initial
trial and continue to work diligently on the appeal. Sullivan brings an impressive
combination of legal expertise and technical knowledge to this critical point of
our case and it demonstrates not only that we intend to win, but that there
are many experts in the field who understand the importance of the DeCSS
case - and are willing to help."
Link: http://www.2600.com/news/display.shtml?id=211


WIN-NT/IIS ADMINS MADE APRIL FOOLS BY HACKERS
Several crews got busy on April Fools Day to make a mockery of Microsoft
security by targeting Web sites running MS' IIS server over Windows NT/2K
for defacement. Among the higher-profile victims were the Walt Disney
Company; the Wall Street Journal's WebWatch; British Telecomms; HSBC;
the US Navy's Center for Tactical Systems Interoperability (NCTSI); the US
Army Training and Doctrine Command (TRADOC); Ringling Bros and Barnum &
Bailey Circus; and the American Society for the Prevention of Cruelty to
Animals (ASPCA). None of the sites appeared to have been attacked for
any reason other than the fact that they were vulnerable.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/18029.html


HOW TO AVERT A VIRUS DISASTER
Vinny Gullotto, head of the McAfee Anti-Virus Emergency Response Team
(Avert), is a fast-talking techie who the Feds call when they're foxed by
the latest virus. "I get a lot of calls from the FBI looking for virus samples,"
said Gullotto. "They want to know how we rate a particular virus and what
threats they should look out for. We can deal with most viruses in
somewhere between two and six hours."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://thebusiness.vnunet.com/Features/1120000


THE NT LOCAL ADMINISTRATOR AND SHARED PASSWORDS
There is a Local Administrator account on every NT machine currently
deployed. It is extremely common to find many NT machines in an enterprise
sharing the same password for this Local Administrator account. This article
by SecurityFocus writer Daniel Marvin will establish that this shared password
constitutes a security vulnerability. It will subsequently discuss various steps
to mitigate the risk arising from the shared password, and make a case for
applying unique passwords to every Local Administrator account in your
enterprise.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/microsoft/nt/sharedpass.html


IT SECURITY PROFESSIONALS MAY BE LICENSED
IT security professionals may require a government licence to work in future,
Home Office minister Charles Clarke has warned, leaving the door open for
further regulation of the UK IT industry. Clarke has refused to rule out including
IT consultants in professions covered by the Private Security Industry (PSI) Bill,
which was originally intended to cover bouncers and wheel-clampers.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://thebusiness.vnunet.com/News/1120010


HACKER SPEAK
"Hackers and members of the Internet security industry, like workers in other
specialty trades, have their own form of shop talk. The following is an
abbreviated list of catch phrases and euphemisms used by hackers and
security professionals."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.pcworld.com/features/article/0,aid,44370,00.asp


TO TRAP A THIEF
If you want to break into a house, why spend time prying open the front door
if the back door is wide open? Same goes when breaking into computer networks.
Most networks and servers are set up with configuration errors that are well
known to hackers, who can download free tools that will scan many different
networks looking for those easy-open entry points. No genius-level code
manipulation or high IQ is needed.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computerworld.com/cwi/story/0,1199,NAV47_STO59072,00.html


CHINESE FEDS DEMAND COMPUTER VIRUS SAMPLES
China's Ministry of Public Security has been requiring Western anti-virus
vendors to supply samples of malicious code as a condition of doing business
with Mainland consumers, the Wall Street Journal reports. The official Chinese
explanation would have us believe that the secret police have lately gone into
the consumer protection business by claiming that the samples are necessary
to enable the Feds to test the effectiveness of the software being sold.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/18057.html


SECURITY INDUSTRY SLAMS VIRUS REWARD
The antivirus industry lambasted email firewall startup GateKeeper on Monday,
after the company announced a reward for any virus writer who can infect a
specific computer protected by its product. "It is probably one of the most
irresponsible things that someone could do," said Vincent Gullotto, director
of the Antivirus Emergency Response Team for security services company
Network Associates.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/13/ns-22031.html


PERSONAL FIREWALL TEST: TERMINET
This article is a part of a series of tests on Personal Firewalls/Intrusion
Detection Systems. TermiNET, by DANU Industries, is a relatively simple
firewall. It offers access control, stealth mode, web blocking, multiple user
profiles, intrusion detection with blocking notification, flexible web browsing
control, and restriction by by IP address, URL, port and protocol.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/articles/pf_terminet20010403.html


NEW CLOAKED-CODE THREAT TO SECURITY
During a seminar last week at the CanSecWest conference in Vancouver,
British Columbia, a hacker named "K2" revealed a program he created that
can camouflage the tiny programs that hackers generally use to crack
through system security. The cloaking technique is aimed at foiling the
pattern-recognition intelligence used by many intrusion detection systems,
or IDSes, known as the burglar alarms of the Internet. "Trust me, this will
blow away any pattern matching," said K2, who would not reveal his real
name because he also works as a security consultant.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/zdnn/stories/news/0,4586,5080532,00.html


DIRECTORS BLIND TO SECURITY WEAKNESSES
Financial and managing directors are dangerously unaware of the risks
surrounding digital business, according to a recent Mori poll. The survey,
commissioned by digital risk insurance specialist Safeonline, showed that
only 24 per cent of directors at small to medium sized enterprises could
identify a security risk without being prompted. Mori found that damage
caused by staff, whether by negligence or genuine error, is the most
feared risk. When prompted by pollsters, 47 per cent of respondents
said that innocent mistakes were the most likely cause of damage.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://thebusiness.vnunet.com/News/1120062


46,000 ADDR.COM STOLEN?
A computer criminal claims to have stolen personal information on 46,000
customers from Web hosting company ADDR.com. The data includes account
names and passwords that could be used to alter Web site content, as well
as credit card information. ADDR.com has so far not commented on the
alleged heist.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.msnbc.com/news/553615.asp


GOVERNMENT BACKTRACKS ON ENCRYPTION ENQUIRY
The Home Office has backtracked on a promise to commission an independent
enquiry into the effects of legislation that will give police and other authorities
the power to intercept data transmitted over private networks and demand
decryption keys from the place where data is encrypted.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/13/ns-22044.html


INTERVIEW WITH ELIAS LEVY (BUGTRAQ)
Bugtraq is probably the best security mailing list around. While the quasi
founder (I was surprised to find that Aleph1 didn't technically start Bugtraq)
is quite prominent online, I wasn't able to find any detailed information about
him or Bugtraq (except for one old interview). So, here for you to enjoy is an
interview with Aleph1.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/closet/closet20010405.html


ONE IN THREE UK COMPANIES HAVE BEEN HACKED
A survey of IT professionals released today indicates that one in three UK
businesses has been the victim of a major security break in. Almost half of
those who took part in the poll said that the future of their organisation
could be ruined by a serious hacker attack. The survey, commissioned by
the Communications Management Association (CMA) questioned 2000
senior IT professionals and guaranteed anonymity to participants.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/13/ns-22045.html


NEW TECHNOLOGY ENABLES PORTABLE SECURITY
Biocentric Solutions has unveiled its next generation of biometric technology for
authentication with portable computing devices. Biocentric also rolled out two
products based on its next generation technology, the BioSentry for the Compaq
iPAQ Pocket PC, and BioHub for portable computing devices that run in Windows
CE. A portable biometric fingerprint reader designed for the Compaq iPAQ Pocket
PC, BioSentry is used in place of the iPAQ expansion pack to prevent
unauthorised access to both the hardware and data on the Pocket PC.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://thebusiness.vnunet.com/News/1120091


HAVE MOVIES CREATED THE STEREOTYPE OF THE HACKER?
No doubt you remember Matthew Broderick's portrayal of a hacker in the movie
War Games. That film launched hacking as a popular pastime--at least for a
specific demographic of teenage males. But it wasn't the first film to feature
hacking, or the last. Movie hackers have had many faces: one-dimensional
clowns, nefarious villains, mischievous geniuses, anarchic heroes. And as
hackers and their motivations in the real world have changed, so have their
counterparts in the movies. In more recent films they're more unrealistic,
cartoonier, angrier, and able to perform completely impractical or
impossible acts.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.pcworld.com/features/article/0,aid,45804,00.asp


CHASING THE WIND, PART FIVE: THE DEVIL IN THE DETAILS
At long last, SecurityFocus is pleased to present the fifth installment of Robert
G. Ferrell's popular series, Chasing the Wind. As we left off last time, Ian, the
aspiring hacker, had just successfully defaced Acme Ailerons' web site. Jake,
Acme's new SysAdmin, slept peacefully, oblivious to the travails that awaited
him. Douglas, a Systems Engineer at Acme Ailerons, was busy trying to decipher
some the plans for a mysterious classified project. Meanwhile, Bob, the CIO of
the company, had travelled to the high-security C4I center for a very high-level,
top-secret meeting...
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/ih/articles/chasing5.html


WIRED REPORTER FORCED TO TESTIFY AT CYPHERPUNK TRIAL
Wired chief Washington correspondent Declan McCullagh isn't merely covering
the criminal trial of cypherpunk Jim Bell (who's in the dock accused of stalking
federal agents); he's also been made a reluctant participant. McCullagh had
sought to quash a subpoena requiring him to testify on concerns that he might
be forced to disclose information related to Bell's case given to him in
confidence, but his motion was denied. The Feds offered assurance that
they would question him only on the accuracy of reports he'd already published
so that they could be entered into evidence, which would of course be fair;
but once a witness is on the stand, there's nothing to prevent a prosecutor
asking whatever he or she might please.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/6/18104.html


BT HACKED TWICE IN THREE DAYS
BT has had two of its UK websites defaced by hackers over the last three
days. On Sunday hackers left a rant about ADSL on the search.bt.com site,
and yesterday btworldwide.com was defaced by Prime Suspectz.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.vnunet.com/News/1120110


MORE ON ADORE WORM
The third Linux worm in almost as many months hit the computer systems this
week. Known as the Adore worm, the program is designed to create back doors
in the security of Linux systems and send information identifying the compromised
systems to four different e-mail addresses hosted on servers in China and the
United State. If you have been noticing a large number of scans for port 515, it
is recommended you take the necessary steps to patch the vulnerabilities noted
below.

- Multiple Vendor LPRng User-Supplied Format String Vulnerability
- http://www.securityfocus.com/bid/1712

- Wu-Ftpd Remote Format String Stack Overwrite Vulnerability
- http://www.securityfocus.com/bid/1387

- ISC Bind 8 Transaction Signatures Buffer Overflow Vulnerability
- http://www.securityfocus.com/bid/2302

- Multiple Linux Vendor rpc.statd Remote Format String Vulnerability
- http://www.securityfocus.com/bid/1480


NEW NSW CYBER CRIME LAWS
SMH reported that New South Wales Government announced new laws dealing
with cyber crime. Virus writers could get up to 10 years for their creations and
maximum sentence of five years will be the result for online fraudsters.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.smh.com.au/news/0104/05/pageone/pageone4.html


LION INTERNET WORM ANALYSIS
This paper provides an introduction to the Lion (1i0n) Worm author and a
technical analysis of the Lion Internet Worm. Three unique variations of the
Lion Worm have been released on the Internet over the past month. All three
versions of the Lion Worm are unsophisticated unix shellscript worms. BTW
paper gives really comprehensive study on the mentioned worms.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://whitehats.com/library/worms/lion/


TURBOTAX SOFTWARE HAS PASSWORD GLITCH
A programming glitch in TurboTax software has posed a potential security
problem for as many as 150,000 users and may force them to change their
passwords, Intuit Inc. said Thursday.
Link: http://www.nandotimes.com/technology/story/0,1643,500470851-500721068-504029893-0,00.html


VIRUS PESSIMISM FROM MESSAGELABS?
Virus attacks may treble by the end of the year according to research from UK
antivirus firm MessageLabs, which suggests that government departments as
well as companies will collapse under the weight of malicious attachments and
executables. Sophos' Graham Cluley answered to that: "I don't think there is
any scientific evidence that the situation is going to get radically worse than
it is now."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/13/ns-22102.html


CURADOR 'TAKES CARE' OF BILL GATES
The Sun reported that 'Curador' (look a year back for more information), who
is awaiting sentence after pleading guilty to stealing credit card details from a
number of insecure Web sites, has reportedly claimed he sent a shipment of
Viagra to Bill Gates using the Microsoft boss's own credit card.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/18124.html


GOVERNMENT TARGETS
Unauthorized people gained complete control of at least 155 government
computer systems among 32 federal agencies last year, according to a
review made public Thursday during a congressional hearing.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cnn.com/2001/TECH/internet/04/05/computer.security.ap/index.html


BIOPASSWORD SECURITY CHECKS USER'S TYPING PATTERN
Call me paranoid, but I'm in good company. Most biometric security programs
- which identify a person through their biological traits -store details about a
user's unique physical characteristics on a hard drive, and Robert Flores, the
CIA's chief technology officer, says it's easy enough for a hacker to get at
the data. When I quoted Flores's statement to the five biometric vendors in
this review, four of them either changed the subject or essentially said, "Well,
nothing is foolproof." The representative of one company, Net Nanny Software
Inc., not only agreed with Flores but also said that vulnerability is what makes
the company's BioPassword effective.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.newsbytes.com/news/01/164151.html


IMPROVING APACHE
Unix admins swear by Apache's out-of-the-box robustness, but certain
configuration steps are needed to ensure the Web server's security." I'm
running Apache, not IIS. Therefore, I'm secure." When it comes to Web
server security, many systems admins automatically assume Microsoft's
Internet Information Server is the devil, while the open-source Apache is
God. Diehard Unix admins swear up and down that they'll never go with
IIS because it's a breach waiting to happen and Apache is so secure.
Well, guess again.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.infosecuritymag.com/articles/april01/features1_web_server_sec.shtml


BETA RELEASE OF TRUSTIX SECURE LINUX 1.4.80
"This is to announce the BETA release for the upcoming Trustix Secure Linux 1.5
release. It has version 1.4.80, and is nicknamed "Ooops". It is in serveral ways
INCOMPATIBLE with 1.2, and you do not want to just continue without knowing
a little more of what is ahead. If it breaks your system, let us know so we can
prevent it from happening to others. But don't say you didn't know it would :-)"
Link: http://linuxtoday.com/news_story.php3?ltsn=2001-04-05-020-20-SC


HACKER TOOL THREATENS .NET
Microsoft's .Net platform has been dealt a security blow before it has even
been released. The discovery of what is thought to be the first C# decompiler
for the software giant's much heralded next-generation operating system will
undermine confidence in the platform. John Safa, a former cracker and CTO
of security vendor BitArts, said: "The cracking community now has a C#
decompiler, which unravels application code. If you got on the inside of
a network using this tool, you could do anything."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://thebusiness.vnunet.com/News/1120202


E-MAIL WIRETAPPING
Corporate spies are using covert JavaScript code within email to track the
contents of sensitive financial communications. That's the warning from
managed service provider Activis which said that it is seeing increasing use
of malicious JavaScript coding to create Web bug that spy on Internet traffic.
These Web bugs can be embedded into HTML based emails before they are
sent. The code then acts to covertly copy the original sender each time this
email is forwarded on within the recipient's system.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/18147.html


DISTANT EARLY WARNING
Keeping a pulse on national and international developments that impact
computer security is like trying to catch a subway train just leaving the
station. You do a lot of running, and maybe, you still miss the train. If
your company does business across multiple political borders, strange
questions may arise.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/articles/earlywarning20010406.html


MACINTOSH OS X SECURITY
Security to the general Macintosh user has never been much of an issue. Turn
it on, use it, turn it off when you’re done. And even if you’ve got a DSL or other
dedicated line, warnings related to hack attempts on open and dedicated
networks lines never seemed to instill fear in a Mac user. Sure there are
products like Norton Personal Firewall or NetBarrier 2.0, but these are for
professionals right?
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securemac.com/macosxsecurity.cfm


INTERVIEW WITH LANCE SPITZNER
Introduction by Max Vision: "Lance is an absolutely essential leader in the
whitehat community. He infects everyone with his passion and enthusiasm
for network security. But more importantly, he organizes a fairly disparate
group of security experts into a productive, cooperative team. This is no
easy feat in an industry that increasingly favors non-disclosure. Lance is
an exemplar of a true whitehat: curious, intelligent, and honest. He is
simply good."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.safemode.org/LanceSpitzner.html


PASSWORD RECOVERY SOFTWARE
Elcom is a private russian company established in 1990. They develop password
recovery software: for archives (ZIP, RAR, ARJ, ACE), Adobe Acrobat PDF,
Microsoft Office (Word, Excel, Access, Outlook, Visio, PowerPoint, VBA), MS
Project, MS Backup, MS Mail, MS Schedule+, Symantec ACT!, Intuit Quicken &
QuickBooks, Borland/Corel Paradox and Lotus WordPro, 1-2-3.
Link: http://www.security-db.com/info.php?id=150


CAN YOU BREAK WINDOWS XP SECURITY?
Microsoft quietly put a new test site online last Saturday to let hackers
attempt to breach Windows XP's security. Microsoft placed a version of
Windows XP Home Edition online in a configuration that resembles a typical
user's home setup. The Web site will help Microsoft determine configuration
settings that it can recommend to potential users of the new OS.
Link: http://www.ntsecurity.net/Articles/Index.cfm?ArticleID=20596


WOH 'S INTERVIEW
Alldas.de has an interview with RuBiX, a member of WoH (World Of Hell) - a
defacing group that attacks web sites of rich and famous companies.
Link: http://security.alldas.de/interviews/?id=2


ATTACKERS HIT CRICKET, BOLLYWOOD SITES
Attackers have defaced two Indian internet sites catering to movie fans and
cricket lovers, the chief of thecompany which runs the sites said on Saturday.
One of the sites showed pasted statements criticising India's role in Kashmir.
The other had a dark green colour resembling the Pakistani flag.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.economictimes.com/today/08tech05.htm

----------------------------------------------------------------------------




Security issues
---------------

All vulnerabilities are located at:
http://net-security.org/text/bugs


----------------------------------------------------------------------------

TOMCAT MAY REVEAL SCRIPT SOURCE CODE
Tomcat (http://jakarta.apache.org/tomcat/), the Reference Implementation for
the Java Servlet 2.2 and JavaServer Pages 1.1 Technologies, may be tricked into
revealing the source code of JSP scripts by using simple URL encoding.
Link: http://www.net-security.org/text/bugs/986039232,20871,.shtml


BEA WEBLOGIC MAY REVEAL SCRIPT SOURCE CODE
BEA WebLogic may be tricked into revealing the source code of JSP scripts
by using simple URL encoding of characters in the filename extension.
Link: http://www.net-security.org/text/bugs/986039343,69657,.shtml


SILENT RUNNER COLLECTOR BUFFER OVERFLOW
Silent Runner Collector (SRC) has a buffer overflow condition in the routines
that parse SMTP traffic. SRC is the "sniffer" conponent of the Silent Runner
network traffic analysis suite. The overflow was noticed in SRC v1.6.1 but is
likely present in other versions as well. The actual buffer in question holds the
SMTP HELO line. The overflow occurs when a HELO command in excess of 4096
bytes transits a network segment that the collector is monitoring. This
vulnerability can be exploited by an intruder to crash the collector and
thus stop the monitoring of transiting network traffic.
Link: http://www.net-security.org/text/bugs/986039956,52213,.shtml


VIRUS BUSTER 2001 BUFFER OVERFLOW
The buffer overflow occurs when MUA received email with the header defined in
RFC 822 including unusually long strings. As a result, the user of this software is
not able to receive any e-mail(s) more. An attacker could use this vulnerability
to execute arbitrary commands. A restart of the computer is required in order to
gain normal functionality.
Link: http://www.net-security.org/text/bugs/986040790,23239,.shtml


PROBLEMS WITH INCORRECT MIME HEADER
Microsoft has released a security bulletin
http://www.microsoft.com/technet/security/bulletin/ms01-020.asp entitled
"Incorrect MIME Header Can Cause IE to Execute E-mail Attachment". EML files
are MIME multipart files that IE 5 will parse. There is a vulnerability allowing
arbitrary code execution using this kind of files. This vulnerabiliy could allow
an hostile page or e-mail to perform any action on your computer. The
vulnerability affects IE 5, IE 5.5 over all windows platforms.
Link: http://www.net-security.org/text/bugs/986042902,80256,.shtml


TREND MICRO'S SCANMAIL FOR EXCHANGE BUG
Several registry values are created during installation and during use of the
product's Management Console to store the credentials of the last user to
log on. These credentials are valid at least on the server, and possibly valid
on the entire domain depending on the last user to log in. Additionally, these
keys are created with Everyone set to Special Access, which includes the
ability to read the values. The usernames and passwords are rolled right a
number of characters and then XOR'ed with a constant key
(0xB15A0E707EEDEB80F70FB78F1399).
Link: http://www.net-security.org/text/bugs/986122048,75503,.shtml


SECURITY BUG IN INTERNET EXPLORER
By visiting a web page with IE it is possible to read arbitrary local files (in very
rare cases small amount of the file's content is lost) if the file name is known
and send them to an arbitrary server. It is also possible to read arbitrary web
pages to which the victim has access. Probably this bug may be more serious,
have not investigated further - an interesting scenario seems to be playing with
C:\Documents and Settings\USERNAME\Local Settings\Temporary Internet Files\
Content.IE5\index.dat. which probably may lead to executing arbitrary programs.
Link: http://www.net-security.org/text/bugs/986122152,59013,.shtml


TOMCAT 3.2.1 FOR WIN2000 DIR. TRAVERSAL
A security vulnerability has been found in Windows NT/2000 systems that have
Tomcat 3.2.1 installed.The vulnerability allows remote attackers to access files
outside the document root directory scope.
Link: http://www.net-security.org/text/bugs/986122415,77089,.shtml


WINAMP 2.63 FULL DISCLOSURE EXPLOIT
I have written a full disclosure buffer overflow exploit for the winamp 2.63
buffer overflow found in the M3U file parser. Attached is a file called
DROPPER.M3U, if you execute the following commands in dos :
COPY /B DROPPER.M3U+C:\WINDOWS\CDPLAYER.EXE HACKME.M3U when
you click HACKME.M3U, the file will drop and execute the appended exe
file, CDPLAYER.EXE in this case...
Link: http://www.net-security.org/text/bugs/986145682,48652,.shtml


INTERNET & ACCELERATION SERVER EVENT DOS
If an alert action has been chosen in the ISA server console, a malicious
attacker can cause a Denial of Service situation on the ISA server.
Link: http://www.net-security.org/text/bugs/986229749,12002,.shtml


MALWARE.COM ADVISORY: THE BAT!
We are able to blind the The BAT! with trivial file extension modifications and
carefully calculated file name lengths:
Content-Type:image/gif;
Content-Transfer-Encoding: base64
Content-Disposition: inline;
filename=" what's this?

v .gif.exe"
vWill create an inline attachment, which, while not important will not be indicted
in the in-box. What is important is that the attachment viewed once the mail
message has been opened will be with the icon of something else. On two win98
machines, we achieved the icon of a folder:vv (screen shot:
http://www.malware.com/guano.jpg 32KB)
and the icon of the local machine hard drive. BAT! worse, when clicking the icon,
the *.exe is executed without warning. The comprehensive warning for *.exe
attachments is bypassed. As far as the client is concerned there is no attachment
and their is no file extension, other than what we decide to give it.
Link: http://www.net-security.org/text/bugs/986301594,30398,.shtml


RED HAT - UPDATED OPENSSH PACKAGES
Updated openssh packages are now available for Red Hat Linux 7. These
packages fix an error in the supplied init script and PAM configuration file.
Link: http://www.net-security.org/text/bugs/986379615,60428,.shtml


RED HAT - UPDATED KERBEROS 5 PACKAGES
Updated Kerberos 5 packages are now available for Red Hat Linux 7. These
updates resolve a linkage problem introduced in RHSA-2001:025.
Link: http://www.net-security.org/text/bugs/986379723,44012,.shtml


ANOTHER PHP-NUKE VULNERABILITY
There is a bug in the banner section of PHP-Nuke (http://www.phpnuke.org).
In order to change the URL of the first banner you should enter in your browser
the following
http://target/banners.php?op=Change&bid=bannerid&url=http://where.to
If we want to change the banner number 1 to redir to www.you_are_redir we
write
http://www.foo.com/banners.php?op=Change&bid=1&url=http://you.are.redir
where www.foo.com is the server running PHP-Nuke
Link: http://www.net-security.org/text/bugs/986379826,58027,.shtml


ORINOCO RG-1000 WEP KEY EXPOSURE
An attacker can determine the network name (SSID), and current WEP
encryption key - allowing unrestricted access to the LAN.
Link: http://www.net-security.org/text/bugs/986379950,66980,.shtml


NAVISION FINANCIALS SERVER DOS
Sending a null character followed by approx. 30k of A's to TCP port 2407
causes a buffer overflow and terminates the process (SERVER.EXE). The
overflow does not appear to be exploitable. A smaller amount can also be
used, and will silently kill the process. This requires approx. 10 connections
starting with a null character, followed by 100+ characters.
Link: http://www.net-security.org/text/bugs/986380075,16618,.shtml


MS PATCH Q292108 OPENS A VULNERABILITY
Last MS patch Q290108 released with the bulletin MS01-020 opens a new
vulnerability. A tricked EML file can confuse the user displaying him a fake
downlodaded file name. Executable files can be disguised as other
supposedly inocent files (text, sound or images).
Link: http://www.net-security.org/text/bugs/986470161,75358,.shtml


BINTEC X4000 ACCESS ROUTER DOS
A simple nmap SYN scan (nmap -sS) will cause the machine to lock up
completely. It can neither be accessed through LAN nor through a serial
connection or the built in, LCD-display-based MMI (man-machine-interface).
The only way of getting it back to life is to pull the plug and put it back in.
Link: http://www.net-security.org/text/bugs/986470239,57678,.shtml


CISCO CONTENT SERVICES SWITCH VULNERABILITY
The Cisco Content Services (CSS) switch product, also known as Arrowpoint,
has a security vulnerability in a previous release that allows non-privileged
users to escalate their privilege level, permitting them configuration ability
on affected units. This vulnerability can only be exercised from a valid user
account. To remove the vulnerability, Cisco is offering free software upgrades
to revision 4.01B19s for all affected platforms. This defect is documented as
Cisco bug ID CSCdt32570.
Link: http://www.net-security.org/text/bugs/986470409,87666,.shtml


DEBIAN FIXES REMOTE ROOT EXPLOIT IN NTP
Przemyslaw Frasunek reported that ntp daemons such as that released with
Debian GNU/Linux are vulnerable to a buffer overflow that can lead to a remote
root exploit. This has been corrected for Debian 2.2 (potato) in ntp version
4.0.99g-2potato1. We recommend you upgrade your ntp package immediately.
Link: http://www.net-security.org/text/bugs/986506509,167,.shtml


602PRO LAN SUITE DENIAL OF SERVICE
Connect to lan suite on port 80 with telnet or somthing and send the following
request.

GET / HTTP/1.1
Proxy-Authorization:AAAAAAAAAAAAA.....

Where A x 1033 or more characters, as long as its over 1032, it will work. Lan
suite terminates, that means ALL services go with it. And YES you have to
restart the program to get everything working. ALL services going again require
restart of Lansuite.exe because its dead after it recieves the BAD header
Link: http://www.net-security.org/text/bugs/986551102,54597,.shtml


TRUSTIX - LOCAL ROOT EXPLOIT IN KERNEL
Some time ago, a vulnerability was discovered that allowed for root access
through ptrace call in the linux kernel. This was originally considered fixed in
a previous patch, but as it turns out, it wasn't. This is fixed in kernel version
2.2.19.
Link: http://www.net-security.org/text/bugs/986551308,48499,.shtml


WATCHGUARD FIREBOX II KERNEL DOS
This vulnerability makes it possible to force the Firebox into a condition where
it stops responding to packets of a certain protocol after it has been sent large
bursts of packets for that protocol.
Link: http://www.net-security.org/text/bugs/986551556,48015,.shtml


IMMUNIX OS - NTP AND XNTP3 UPDATE
Przemyslaw Frasunek has found a buffer overflow in the ntpd package. The
StackGuard protection in Immunix is effective at stopping this attack. If the
published exploit is run against the Immunix version, it will cause ntpd to exit
with a StackGuard detection message but no penetration vulnerability is
possible. WireX is releasing updated packages to prevent the residual DoS
attack.
Link: http://www.net-security.org/text/bugs/986646295,76110,.shtml


LINUX MANDRAKE - NTP/XNTP3 UPDATE
Link: http://www.net-security.org/text/bugs/986646364,83413,.shtml

----------------------------------------------------------------------------




Security world
--------------

All press releases are located at:
http://net-security.org/text/press

----------------------------------------------------------------------------

SYBARI AWARDED "FIVE-STAR" RATING - [02.04.2001]

Sybari Software, Inc., the premier anti-virus and security specialist for groupware
solutions, announced its anti-virus solution, Antigen, has earned a five-star rating
from SC Magazine. Five is the highest possible rating and indicates the importance
of Sybari's anti-virus technology in delivering reliable e-mail security solutions for
messaging infrastructures. SC Magazine's product reviews through its West Coast
Labs are recognized globally as a prime source in providing functional measures on
product effectiveness and performance.

Press release:
< http://www.net-security.org/text/press/986229209,98816,.shtml >

----------------------------------------------------------------------------

THE INTERNET SECURITY CONFERENCE IN JUNE - [02.04.2001]

To be held June 4-8, 2001 at the Century Plaza Hotel in Los Angeles, The
Internet Security Conference (TISC) offers a growing cast of the leading
experts in the Internet security field. "Say TISC, and security professionals,
CTOs and CIOs think quality, uncompromising education," says David Piscitello,
TISC conference founder and program chairman. "We came strong out of the
gate with some of the most respected security experts in the world - Radia
Perlman, Stephen Kent, Tina Darmohray, and Charlie Kaufmann. As the word
spreads, TISC is attracting new and rising stars of the Internet Security field
to complement our already knowledgeable faculty."

Press release:
< http://www.net-security.org/text/press/986229300,66109,.shtml >

----------------------------------------------------------------------------

LOCKHEED MARTIN AND RIPTECH PARTNER - [02.04.2001]

Lockheed Martin, a proven leader in information technology for both commercial
and government clients, today announced a strategic alliance with Riptech Inc.,
the only provider of real-time managed security services. Through this
arrangement, both commercial and government customers will benefit from a
seamless offering that combines Riptech's around-the-clock managed security
services with Lockheed Martin's broad engineering and consulting expertise.

Press release:
< http://www.net-security.org/text/press/986229334,85578,.shtml >

----------------------------------------------------------------------------

SOPHOS: TOP TN VIRUSES IN MARCH 2001 - [02.04.2001]

This is the latest in a series of monthly charts counting down the ten most
frequently occurring viruses as compiled by Sophos, a world leader in corporate
anti-virus protection.

Press release:
< http://www.net-security.org/text/press/986229465,39850,.shtml >

----------------------------------------------------------------------------

SECURIFY SECURVANTAGE SERVICES ANNOUNCED - [02.04.2001]

As part of its new strategic direction, Securify, Inc., a leading provider of
security technologies and services for connected businesses, today introduced
Securify SecurVantage Services, a managed security offering that connected
organizations can use to control the quality of security as they extend their
network infrastructures and applications to e-partners. By first setting baseline
security metrics for "correct" network behavior and then continuously monitoring
traffic, Securify SecurVantage Services offer businesses a unique way to verify
the ongoing safety of their trust relationships with partners, suppliers and
customers - as well as the safety of their Intranet - as they communicate
and share critical business information.

Press release:
< http://www.net-security.org/text/press/986229615,14193,.shtml >

----------------------------------------------------------------------------

RSA HELPING GOVERNMENT CUSTOMERS - [03.04.2001]

RSA Security Inc. announced that WareOnEarth Communications, Inc., a leading
provider of network security and "Trusted Information Exchange" solutions, has
licensed RSA BSAFE Cert-C and RSA BSAFE Cert-J security software. The company
has incorporated this software into its Hypership peer-to-peer transport technology,
which helps enable trusted information exchange over the Internet. Hypership relies
on RSA Security software to help provide a complete public key infrastructure (PKI)
solution - including authentication of senders and receivers, data security in transit
and at rest, and binding non-repudiation. As a result, WareOnEarth is able to offer its
government customers the security they require to leverage the speed and cost
advantages of electronic delivery.

Press release:
< http://www.net-security.org/text/press/986299842,19253,.shtml >

----------------------------------------------------------------------------

AUTHENTIFY PROTECTS AGAINST INTERNET FRAUD - [0.04.2001]

Authentify, Inc., an emerging provider of Internet identity solutions,
introduced a first-of-its-kind product, Authentify|Register. The company
also announced that leading middleware provider mVPN, LLC has integrated
Authentify|Register into its mPKI Platform. The integration enables mVPN to
provide a crucial layer of security for its e-business customers by providing
them an enhanced process for the secure deployment of digital certificates.

Press release:
< http://www.net-security.org/text/press/986299926,82090,.shtml >

----------------------------------------------------------------------------

INTERNET GUARD DOG CAPTURES HIGHEST MARKS - [03.04.2001]

McAfee Consumer Products Division, a business unit of Network Associates,
Inc. announced that its Internet Guard Dog software was named Best Filtering
Software by Family PC Magazine. Awarded the only "A" grade in a competitive
roundup that included CyberPatrol, CyberSitter, NetNanny and SOS Kid Proof,
Internet Guard Dog software was deemed "your child's best online friend,"
earning the highest marks for its easy installation and set-up.

Press release:
< http://www.net-security.org/text/press/986300214,22309,.shtml >

----------------------------------------------------------------------------

F-SECURE AND TELIA ANTIVIRUS DEPLOYMENT - [03.04.2001]

F-Secure Corporation and the Swedish Telia e-bolaget AB in Sweden have
signed a cooperation contract. The collaboration will offer a managed anti
virus solution to consumers and the small-to-medium businesses. F-Secure
Anti-Virus is a component in Telia's service Telia Antivirus. F-Secure Anti
Virus provides simple and reliable protection against viruses, e-mail worms
and malicious code. F-Secure Anti-Virus with service specifications by
Telia, is targeted for Telia's Internet and broadband customers. The
service has been available since March 19.

Press release:
< http://www.net-security.org/text/press/986301407,76377,.shtml >

----------------------------------------------------------------------------

CRYPTOSWIFT 400 ECOMMERCE ACCELERATOR OUT - [04.04.2001]

iVEA Technologies, a Rainbow Technologies company and a leading provider of
Internet and eCommerce security solutions, debuted the CryptoSwift 400, a new
400 transaction-per-second (TPS) PCI-based eCommerce accelerator that sets
a new standard for entry-level cryptographic acceleration for fast, secure online
transactions and Web-server performance enhancement. The CryptoSwift 400
optimizes Web-server performance without sacrificing the rapid acceleration of
complex and robust encryption processes for today's high-capacity eCommerce
Web servers. The new entry-level CryptoSwift 400 allows eCommerce Web sites
to handle substantially more traffic, securely, with virtually no end-user waiting.

Press release:
< http://www.net-security.org/text/press/986381125,42907,.shtml >

----------------------------------------------------------------------------

CRYPTOSWIFT EN-2000 ECOMMERCE ACCELERATOR OUT - [04.04.2001]

iVEA Technologies, a Rainbow Technologies company and a leading provider of
Internet and eCommerce security solutions, today introduced the CryptoSwift
EN-2000, the industry's fastest stand-alone SSL acceleration appliance
designed for large business-to-business Web-server farms or high-end data
centers when SSL acceleration is shared across multiple servers. The EN-2000
provides up to 2,000 transactions per second (TPS) performance, making it the
fastest available SSL acceleration appliance on the market today. The CryptoSwift
EN-2000's 100BaseT Ethernet rack-mountable appliance form factor permits high
performance security acceleration to scale to a network of servers without
consuming additional PCI slots. The EN-2000 offers twice the processing power
of the first-generation EN-1000 accelerator and can easily be integrated into all
popular server platforms including iPlanet Web Server, Apache, and Microsoft IIS.
The large capacity provided by this processing power allows the EN-2000 to scale
with the needs of today's ever-growing IT infrastructures. Like other members of
iVEA's CryptoSwift family, the EN-2000 works with existing secure Web-server
resources and makes an organization's Web server infrastructure investment
last longer.

Press release:
< http://www.net-security.org/text/press/986381216,40945,.shtml >

----------------------------------------------------------------------------

DETECT COMPUTER ABUSE WITH BOSS EVERYWARE - [04.04.2001]

Alexander Jmerik has released Boss Everyware v. 2.2, a powerful Windows
security program that secretly records data about how your computer is
being used. Boss Everyware keeps a log of which programs each user has
run, and how much time they've spent on them. In addition, it records all
of the users' keystrokes, allowing the computer owner or network
administrator to answer questions about what correspondence is being
created. Boss Everyware makes it easy to answer questions about what
new software has been installed, and what specific web sites are being visited.

Press release:
< http://www.net-security.org/text/press/986381324,34086,.shtml >

----------------------------------------------------------------------------

FORENSICS EXPLORERS INTRODUCES NETWITNESS - [04.04.2001]

Forensics Explorers introduces NetWitness, a suite of products that go far
beyond other network security systems and solves problems most network
security software cannot even detect. In addition, NetWitness is the only
network security system that can guard against the most dangerous and
difficult to detect threats: threats from an organization¹s trusted employees,
clients and strategic partners, the people who operate behind the firewall.

Press release:
< http://www.net-security.org/text/press/986400826,81864,.shtml >

----------------------------------------------------------------------------

LOCKHEED MARTIN SPONSORS BIOMETRIC TESTING - [05.04.2001]

Lockheed Martin announced that it is an official sponsor of International
Biometric Group's Comparative Biometric Testing. IBG's Comparative Biometric
Testing is the de facto industry standard for evaluating the accuracy of
leading biometric technologies. Round Three of Testing, to commence later
this month, will address the following technical and marketing questions
regarding biometrics: How do finger-scan, iris-scan, facial-scan and voice
scan technologies compare in terms of accuracy? Within a given technology
field, which vendors have the most effective technology? What are the exact
accuracy rates that can be expected when applications are rolled out in the
field? How easy are biometrics to use?

Press release:
< http://www.net-security.org/text/press/986483731,80761,.shtml >

----------------------------------------------------------------------------

NEW SSL AND PKI ENABLED SECURITY PRODUCTS - [05.04.2001]

Andes Networks, a leading provider of next generation SSL acceleration systems
and Chrysalis-ITS, the worldwide leader in the field of high security key protection
in PKI, today announced the introduction of a new class of security products for
both SSL and PKI enabled security on the Internet. Through the combination of
Andes Networks Packetized SSL acceleration technology and FIPS 140-1 validated
Ultimate Trust(TM) secure key management technology from Chrysalis-ITS, the
companies plan to unveil joint product offerings that will dramatically increase
the level of security and scalability associated with delivery of information over
the Internet.

Press release:
< http://www.net-security.org/text/press/986483838,66032,.shtml >

----------------------------------------------------------------------------

EDS LAUNCHES CYBER SECURITY INSTITUTE - [05.04.2001]

Continuing its fight against the rising tide of cyber crime, EDS launched its
Cyber Security Institute (CSI) - a computer security curriculum to arm IT
professionals and consumers with skills to battle hackers, security breaches
and viruses. EDS launched the CSI for internal use at COMDEX Fall 2000 in
November 2000. As of today, companies and consumers can access the CSI's
interactive, on-demand, globally-available courseware. It offers a cost-effective
method for training in critical security topics such as secure system administration,
firewalls, network security, risk assessment, incident handling and response,
threats, vulnerabilities and countermeasures.

Press release:
< http://www.net-security.org/text/press/986484228,80978,.shtml >

----------------------------------------------------------------------------

SOPHOS SHOWS MINISTER ABOUT VIRUS RISKS - [05.04.2001]

Paddy Tipping, Parliamentary Secretary to the Privy Council Office, visited
the Abingdon HQ of Sophos Anti-Virus, a world leader in corporate anti-virus
protection. The minister used the visit to discuss the needs of fast-growing,
hi-tech businesses such as Sophos and to benefit from advice on how
organisations can protect against computer viruses. In his role in the
Government's Business Coordination Unit, Mr Tipping regularly visits both
small and large businesses to discuss their needs and what they feel is
required from the Government. As part of the Government's initiative for
all UK businesses to be online by 2005, Mr Tipping is keen to listen to the
viewpoints of organisations such as Sophos.

Press release:
< http://www.net-security.org/text/press/986505498,96592,.shtml >

----------------------------------------------------------------------------

BIOMETRIC SINGLE SIGN-ON DEMONSTRATION - [06.04.2001]

SAFLINK Corporation, a leading provider of biometric software solutions, and a
Computer Associates (CA) Development Partner and Novell Industry Partner,
will be attending the upcoming RSA Security Conference to support its
partners' presentations of biometric solutions for the enterprise market.
The Conference will be held April 8-12 at San Francisco's Moscone Center.

Press release:
< http://www.net-security.org/text/press/986509672,97322,.shtml >

----------------------------------------------------------------------------

VERISIGN CEO TO SPEAK AT RSA 2001 CONFERENCE - [06.04.2001]

Stratton Sclavos will offer a visionary perspective on digital identity and the
Internet's central role as an easily accessed, universal locator and repository
of personal information. Attendees will walk away with a better understanding
on the latest technologies available to deliver robust methods of seamless
authentication and trusted transactions on the Internet.

Press release:
< http://www.net-security.org/text/press/986509820,60827,.shtml >

----------------------------------------------------------------------------

AUTHENTIFY TEAMS WITH RSA SECURITY - [06.04.2001]

Authentify, Inc., an emerging provider of Internet identity solutions, announced
it has joined the RSA Secured(TM) Partner Program to support interoperability
between Authentify|Register service and RSA Keon PKI software.
Authentify|Register delivers real-time authentication of a user's identity during
the online registration process. By synchronizing an Internet session with an
automated telephone call to the end user, Authentify|Register provides an
added level of security to the RSA Keon OneStep(TM) registration process by
utilizing the world's most widely deployed infrastructure, the telephone network.
The Authentify|Register process is highly scalable and provides an enhanced
audit trail for increased security. The automation provided by Authentify|Register
reduces costs and eliminates the risk of human error or omission. Authentify's
customizable application provides two-factor authentication and, integrated
with RSA Keon OneStep, it allows an organization to quickly, securely and
cost-effectively deploy digital certificates.

Press release:
< http://www.net-security.org/text/press/986509886,31224,.shtml >

----------------------------------------------------------------------------

TREND MICRO'S OFFERS OUTLOOK ON VIRUS INDUSTRY - [06.04.2001]

David Perry, global director of education for Trend Micro, Inc., a worldwide
leader in network antivirus and Internet content security solutions, will be
a featured speaker at the RSA Conference held at San Francisco's Moscone
Center. This e-Security Expo will be held April 8-12 and will address the
latest issues surrounding current implementations of enterprise security
and secure electronic commerce. Perry will be speaking on April 12, at 11 a.m.
Given the recent onslaught of viruses, Perry will provide attendees with an
analysis of significant malicious code exploits seen thus far in 2001. In addition,
Perry will touch on the newest challenges to the security industry, viruses for
broadband and wireless, as well as a discussion of the specific solutions that
are currently in place to combat these threats. Perry will round out the
presentation with suggestions for how to best combat the myths, hypes,
hoaxes, and common misperceptions surrounding viruses.

Press release:
< http://www.net-security.org/text/press/986562195,19617,.shtml >

----------------------------------------------------------------------------

NETWORK ICE DE-ROBES LATEST CLOAKING HACK - [06.04.2001]

Network ICE, a leading provider of consumer and corporate intrusion detection
systems, has warned users to be wary of a cloaking technique, known as
polymorphic coding, designed to disguise buffer overflow code. The camouflage
code was revealed at the recent CanSecWest conference in Vancouver, British
Columbia by a hacker going by the alias 'K2'. This cloaking technique allows
intruders to evade network-based intrusion detection system (IDS's). This is
an important development because it means while IDSs may detect the common
'script kiddies', they are useless against the serious, expert hacker.


Press release:
< http://www.net-security.org/text/press/986562666,36028,.shtml >

----------------------------------------------------------------------------

SECUNET SECURITY NETWORKS OPENS SECULAB - [06.04.2001]

Germany's secunet Security Networks AG, one of Europe's leading IT security
service companies, announced its entry into the U.S. market with the opening
of Seculab, Inc., headquartered in Austin, Texas. Seculab is one of only five
Common Criteria testing labs in the United States accredited by the National
Security Agency (NSA) and National Institute for Standards and Technology
(NIST). Seculab is the world's only Common Criteria lab accredited in both
the United States and Europe. In addition to Common Criteria testing, Seculab
provides IT security consulting services and has access to secunet's global
network of security experts. Seculab offers client companies services that
include security audits, vulnerability assessments and PKI consulting and
implementation.

Press release:
< http://www.net-security.org/text/press/986570488,96969,.shtml >

----------------------------------------------------------------------------

MASTERING THE ART OF NETWORKED SECURITY SEMINARS - [06.04.2001]

Rainfinity, the provider of continuous availability software for business
transactions over the Internet, in conjunction with Check Point Software,
Compaq Computer Corporation, NetIQ and Trend Micro Inc., launched a
seminar series entitled 'Mastering the Art of Networked Security.' The
focus of the seminar series is to help IT managers learn how to create
a more secure enterprise by integrating high availability and security
best practices within their server and network infrastructures. The first
seminar will take place on April 17, 2001, in Washington, D.C. at the
American Institute of Architects. Other seminars will follow throughout
April and May 2001 at museums and cultural venues in locations across
North America.

Press release:
< http://www.net-security.org/text/press/986570605,2425,.shtml >

----------------------------------------------------------------------------




Featured article
----------------

All articles are located at:
http://www.net-security.org/text/articles

Articles can be contributed to staff@net-security.org

----------------------------------------------------------------------------

ISSUES: "SAVE A BUG, SAFE A LIFE?" by Thejian

Above exchange, from the novel "Hogfather" by Terry Pratchett, holds quite an
accurate description of what hacking is, or at least of the ideal of what hacking
should be. That is, to me personally, because one of the things coherent with
the scene where this practice thrives is the many different clashing opinions
and ideas. You may "smash the stack" for fun, for profit, or maybe just because
you’re a vicious lil’ bugger with too much time on his hands, but the ideal most
people have concerning what a hacker is, is someone who opens stuff up to
find out the why and the how.

Read more:
< http://www.net-security.org/text/articles/thejian/bug.shtml >

----------------------------------------------------------------------------




Security Software
-------------------

All programs are located at:
http://net-security.org/various/software

----------------------------------------------------------------------------

INTRUDER PROTECTION 1.0

Intruder Protection is a program to keep anyone you dont want on your
computer off. Whenever the computer is started it will ask for a password
before windows starts. If you do not know the password you can not get
into the computer. The default password is 0000 you will need to change
this to something that you want.

Info/Download:
< http://www.net-security.org/various/software/986746031,94910,windows.shtml >

----------------------------------------------------------------------------

SYGATE PERSONAL FIREWALL 4.0

Sygate Personal Firewall is a bi-directional intrusion defense system for your
personal computer. It ensures that your computer is protected from hackers
and other intruders while preventing unauthorized programs on your computer
from accessing the network. Sygate Personal Firewall makes machines invisible
to the outside world. It works on computers connected to a private network or
the Internet. This program assures that your business, personal, financial and
other data is safe and secure. This version includes advanced active-scan
vulnerability assessment to pinpoint your every weakness and fine-tune your
security policy.

Info/Download:
< http://www.net-security.org/various/software/986746226,47831,windows.shtml >

----------------------------------------------------------------------------

FREEVSD 1.4.7

FreeVSD facilitates true Linux Virtual Servers within a 'chroot' environment,
allowing Web servers and other applications to be deployed and administered
discretely, without compromise to security. Each Virtual Server has its own
IP address(es), Apache webserver, and view of the process table. FreeVSD
expands the Linux system by creating a pseudo-'super user' (admin) for each
Virtual Server. The admin user has the ability to create extra POP3/FTP and
Telnet users and also administrate vital services such as the webserver.

Info/Download:
< http://www.net-security.org/various/software/986746661,92183,linux.shtml >

----------------------------------------------------------------------------

PROCWATCH

Procwatch is a perl script which watches a /proc filesystem for new processes.
When a process is created, procwatch reports the time, the username, the PID,
and the binary that was run. Its output is suitable for logging to log files

  
and is
geared for system administrators who are testing a new but as yet untrusted
UNIX system. Although it cannot detect, and is not proof against, hacked
loadable kernel modules that have modified /proc, it is useful in watching
for possible rogue binaries.

Info/Download:
< http://www.net-security.org/various/software/986302285,89785,linux.shtml >

----------------------------------------------------------------------------

REMOTE NMAP 0.5.2 BETA

Remote Nmap is a python client/server package which allows many authorized
clients to connect to a centralized nmap server to do their port scanning. This
could be useful for security companies who want to have all their scans come
from a dedicated machine.

Info/Download:
< http://www.net-security.org/various/software/986746439,36162,linux.shtml >

----------------------------------------------------------------------------




Defaced archives
------------------------

[02.04.2001]

Original: http://www.efdpac.navfac.navy.mil/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www.efdpac.navfac.navy.mil/
OS: Windows

Original: http://www.toshiba.cz/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www.toshiba.cz/
OS: IRIX

Original: http://www.volvo.fr/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www.volvo.fr/
OS: Unknown

Original: http://www.martini.nl/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www.martini.nl/
OS: Unknown

Original: http://route.opel.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/route.opel.com/
OS: Windows

Original: http://www.opelhaendler.de/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www.opelhaendler.de/
OS: Windows

Original: http://www.canon.co.nz/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www.canon.co.nz/
OS: Windows

Original: http://www.macromedia.cl/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www.macromedia.cl/
OS: Unknown

Original: http://www.goodyearmotors.net/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www.goodyearmotors.net/
OS: Windows

Original: http://www.goodyear.se/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www.goodyear.se/
OS: Windows

Original: http://webwatch.wsj.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/webwatch.wsj.com/
OS: Windows

Original: http://www2.disney.go.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www2.disney.go.com/
OS: Windows

Original: http://www.toyota-esbjerg.dk/
Defaced: http://defaced.alldas.de/mirror/2001/04/02/www.toyota-esbjerg.dk/
OS: Windows


[03.04.2001]

Original: http://www.hyundai.co.za/
Defaced: http://defaced.alldas.de/mirror/2001/04/03/www.hyundai.co.za/
OS: Windows

Original: http://www.btworldwide.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/03/www.btworldwide.com/
OS: Windows

Original: http://www.toyota-ghana.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/03/www.toyota-ghana.com/
OS: Windows

Original: http://www.toyota-ep.co.jp/
Defaced: http://defaced.alldas.de/mirror/2001/04/03/www.toyota-ep.co.jp/
OS: Unknown

Original: http://thestore.sonymusic.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/03/thestore.sonymusic.com/
OS: Unknown

Original: http://www.ace.bridgestone.co.jp/
Defaced: http://defaced.alldas.de/mirror/2001/04/03/www.ace.bridgestone.co.jp/
OS: Windows

Original: http://cfdev.wwf.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/03/cfdev.wwf.com/
OS: Windows


[04.04.2001]

Original: http://www.mitsubishi-engine.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/04/www.mitsubishi-engine.com/
OS: Windows

Original: http://www.mitsubishi-electric.it/
Defaced: http://defaced.alldas.de/mirror/2001/04/04/www.mitsubishi-electric.it/
OS: Windows

Original: http://3mdweb.3com.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/04/3mdweb.3com.com/
OS: Windows

Original: http://www.delphi.fi/
Defaced: http://defaced.alldas.de/mirror/2001/04/04/www.delphi.fi/
OS: Windows

Original: http://www.visa.de/
Defaced: http://defaced.alldas.de/mirror/2001/04/04/www.visa.de/
OS: Windows


[05.04.2001]

Original: http://restaurantrow.lycos.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/05/restaurantrow.lycos.com/
OS: Windows

Original: http://www.activebuyersguide.looksmart.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/05/www.activebuyersguide.looksmart.com/
OS: Windows

Original: http://www.compaq-novell.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/05/www.compaq-novell.com/
OS: Windows

Original: http://www.compaq-ontraq.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/05/www.compaq-ontraq.com/
OS: Windows

Original: http://www.polizei.co.at/
Defaced: http://defaced.alldas.de/mirror/2001/04/05/www.polizei.co.at/
OS: Unknown


[06.04.2001]

Original: http://www.packardbell.com.my/
Defaced: http://defaced.alldas.de/mirror/2001/04/06/www.packardbell.com.my/
OS: Windows

Original: http://www.xerox.com.cn/
Defaced: http://defaced.alldas.de/mirror/2001/04/06/www.xerox.com.cn/
OS: Windows

Original: http://www.compaq-signup.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/06/www.compaq-signup.com/
OS: Windows

Original: http://www.compaq-pshk.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/06/www.compaq-pshk.com/
OS: Windows


[07.04.2001]

Original: http://www.sony-center.ch/
Defaced: http://defaced.alldas.de/mirror/2001/04/07/www.sony-center.ch/
OS: Windows

Original: http://www.quiksilver.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/07/www.quiksilver.com/
OS: Windows

Original: http://www.bc.gov.cu/
Defaced: http://defaced.alldas.de/mirror/2001/04/07/www.bc.gov.cu/
OS: Unknown


[08.04.2001]

Original: http://www.casio.co.id/
Defaced: http://defaced.alldas.de/mirror/2001/04/08/www.casio.co.id/
OS: Windows

Original: http://3comleads.3com.com/
Defaced: http://defaced.alldas.de/mirror/2001/04/08/3comleads.3com.com/
OS: Windows

Original: http://www.shell.se/
Defaced: http://defaced.alldas.de/mirror/2001/04/08/www.shell.se/
OS: Windows

Original: http://www.sony-center.ch/ (Redefacement)
Defaced: http://defaced.alldas.de/mirror/2001/04/08/www.sony-center.ch/
OS: Windows

----------------------------------------------------------------------------


Questions, contributions, comments or ideas go to:

Help Net Security staff

staff@net-security.org
http://net-security.org
http://security-db.com

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT