- -=[ Recently Added on 4-28-99 ]=-
|
Serious security holes in web anonimyzing services
Anyboard Forum Security Hazard
b4b0 Issue #7 - Good Ezine
Bash Bug
Security Notice: Big Brother 1.09b/c
Cisco security notice: Input Access List Leakage with NAT
Shopping Carts exposing CC data
Discus (Free discussion for your Web Site!)
at http://www.chem.hope.edu/discus/ has a directory
and file permission problem
eGROUPS security flaw
javascript hotmail password trap
Security Vulnerability in MPEi/X debug
ICQ Homepage Exploit By Shadow51
Bug in Services for IRC Networks 4.2.2
Keen Veracity #7 by Legions of the Underground [LOU]
Linux Info: Part 3 by dr0z
Outlook 98 allows spoofing internal users
Microsoft has released fixes for some of the IE 5 bugs.
Kernel hang or panic in name lookup under certain circumstances
nmap stealth wrapper
Minor privacy exploit in Outlook Express
Shopping Carts exposing CC data
MAO Enterprises announced today that a security flaw in Rocketmail's free web email services
Shopping Carts exposing CC data
WebShop advisory
ARP problem in Windows9X/NT results in a d0s attack.
Secure UNIX Programming FAQ
Web Hacking FAQ - NEWBIES NEED TO READ THIS!!!
Hacking FAQ [html version]- NEWBIES NEED TO READ THIS!!!
Hacking FAQ [rtf version]- NEWBIES NEED TO READ THIS!!!
Hacking FAQ [txt version]- NEWBIES NEED TO READ THIS!!!
Linux Mini Administration HOWTO. By Kostas Petrakis aka Pestilence
Ethics Of A True Hacker written by The Mob Boss
Security Holes In FileGuard 3.0.8 [MAC]
w00w00 on Heap Overflows By: Matt Conover (a.k.a. Shok) & w00w00 Security Team
Hotmail saves POP3 userid/passwords in plaintext inside of HTML. by Jon Robson
HP-UX Vulnerabilities (hpterm, ftp)
Security Vulnerability in MC/ServiceGuard & MC/LockManager
Security hole in ICQ-Webserver
Linux insmod bug/security vulnerability
Overflow in CAC.Washington.EDU ipop3d 4.xx
(nearly) Complete Linux Loadable Kernel Modules written by pragmatic / THC, version 1.0
The wonderful and evil world of e-mail - The art of e-mail forging and tracing explained in one simple text published by THE MOB BOSS
The Melissa macro virus - A report prepared by Robert M. Slade
IE 5.0 allows reading and sending local files to a remote server
NetZero "Hack" by TechnoTurbo
NMAP guide
Overflow in pine 4.xx (Linux)
Security vulnerabilities have been identified in various packages that
ship with Red Hat Linux
Potential vulnerability in SCO TermVision Windows 95 client
How to be a script kiddie by DrHamstuh
Internet Scanner Buffer Overflow
Basic Packet-Sniffer Construction from the Ground Up by Chad Renfro
Vengine - polymorphizer for MS-Word macro viruses
DNS ID Hacking - Brought to you by: Raw-Powa and w00w00 Security Development
Multiple WinGate 3.0 Vulnerabilities by eEye Digital Security Team
Bug in xfs by Lukasz Trabinski
Security and Monitoring Tools by Shok
Wordmacro Viruses by b0z0
Basic Unix Information
Bypassing IE Security by modem
Cyber-Magazine Issue 1 - This magazine is dedicated to exploration of other techniques available for Microsoft Word Macro Virus propagation
Alright, here's a list of anonymous public proxies, they're only HTTP, btw, heh..
I'm sure you could find these on your own, but here ya go -Belatucadros-
Telnet Explained Written by [warlock]
How to phuck around at your school (for the exteme newbie)
Cisco security notice: Cisco Catalyst Supervisor Remote Reload
Security Code Review Guidelines by Adam Shostack
Designing Secure Software by Peter Galvin
HWA.hax0r.news - Number 11 Volume 1 1999 March 24th 99
New IE4 vulnerability : the clipboard again.
BlackHats Security Advisory - Application: InterScan Viruswall for Solaris - Severity: Any user can download binaries and virus infected files though the VirusWall
ISO COUNTRY CODES provided by http://www.bikkel.com/~proxy/iso.html
MSIE 5 installer disables screen saver on NT4
More IE 5 security vulnerabilities
NcFTPd remote buffer overflow
NetBus client 1.x overflow
Vunerability in Index Server 2.0 and the Registry
NT Security - Frequently Asked Questions version 0.41
TOP TEN LIST - March 25, 1999 provided by http://www.bikkel.com/~proxy/topten.html - All Top Ten Proxys Are Always Anonymous
The Solaris Security FAQ
Tools of the Trade
The Unix Secure Programming FAQ - by Peter Galvin
Time/Date bug in Windows' OSes
Wingate Listing provided by Proxys-4-All @ http://www.bikkel.com/~proxy/win-tel-socks.html
WU-FTPD REMOTE EXPLOIT Version wu-2.4.2-academ[BETA-18](1)
The Yahoo! NEWS TICKER leaves a file name "install.log" in the program directory. The file contains plaintext userid and password.
An anatomy of a fairly easy attack
The Double proxy method - By: ViRi-
ISS Security Advisory: LDAP Buffer overflow against Microsoft Directory Services
Foolproof for MAC Hack
Security Vulnerability with hpterm on HP-UX 10.20
Newbie Hacker Lesson #1 BY: Tech Cougar
Microsoft's SMTP service broken/stupid (simple DoS attack)
IE5 - same javascript vulnerabilities, only some fixed
IE5's New Web Browser Feature May Put Private Info At Risk
Netbsd - noexec mount flag is not properly handled by non-root mount
Netscape Communicator v4.51 still has problems with Javascript expliots
ProMail v1.21, an advanced freeware mail program spread through several worldwide distribution networks (SimTel.net, Shareware.com and others),is a trojan.
TzinE #1 - Hacking Hotmail Networks; WinGates; IRC Spoofing
TzinE #1 - The same info above except it adds XXX passwords/sites/newsgroups.
A better basic guide to Wingate
A basic guide to Wingate.
Buffer overflow in a TetriNet daemon for Linux called "Tetrix".
Beginner's guide to Proxy Servers by c1ph3r
Personal Web Server directory security flaw
Introduction to the Log Files in a Unix System by WhiteDevil
Easy Shells (basically a txt about finding stupid people using root to irc etc etc..)
Getting past Fortress security
ch4x0rzin3 - issue two by Canada h4xor
Quick Hack File ; Mainly explaining quick old Publically KNOWN exploits
Major Unix flaw emerges
Outlook password protected add-ins are stored in memory as Plaintext
Win NT [ ALERT ] Case Sensitivity and Symbolic Links
NT Domain DoS and Security Exploit with SAMBA Server
HWA.hax0r.news Number 9 Volume 1 1999 March 13th 99
HWA.hax0r.news Number 8 Volume 1 1999 Feb 27th 99
ch4x0rzin3 - issue phr33 by Canada h4xor
ISS Security Alert Summary February 18, 1999 Volume 3 Number 5
L0pht Security Advisory ; any local user can gain administator privileges and/or take full control over a NT 4.0 system
Netscape Communicator window spoofing bug
The Gran-Son of Cuartango Hole
ISS Security Advisory: HP JetDirect TCP/IP DoS problems
HWA.hax0r.news Number 5 Volume 1 1999 Feb 99
HWA.hax0r.news Number 6 Volume 1 1999 Feb 13/14th 99
HWA.hax0r.news Number 7 Volume 1 1999 Feb 20th 99
Hyperseek Exploit allowing users to change the layout/template around
IIS 4.0 metabase can reveal plaintext passwords
fun with the ES-3810 an ATM Reality by Optiklenz
Overloading a DSU Satellite by Optiklenz
Using FSO in ASP to view just about anything
Another IIS DoS attack? ; This vulnerability involves the HTTP GET method
IRIX's fcagent daemon is vulnerable to a Denial of Service attack.
ISS Internet Scanner Brute Force Bug
tips for using "john the ripper"(JTR) by TEKN0 GURU
Another Paper on Linux Security by Bronc Buster
Linux For Dipshit's - Lesson: Understanding The Shell By: Redemption
Lydia password storing problem
Apple "Web Sharing" in MacOS 8.5.1 DoS
How to stop a fucking menu and kill the stupid limitations V.2.2 (Restricted shells, menus and that kind of shit) by ET LoWNOISE 1998/99
Trick mIRC users into running .exe files sent to them.
Excel is vulnerable to an exploit that allows the execution DLL functions without user intervention or knowledge. Are we going to see a new breed of Excel Macro virii??
Microsoft has released a patch that fixes a vulnerability in Microsoft(r) Internet Explorer(r) that could allow a malicious web site operator to impersonate a window on a legitimate web site. The threat posed by this vulnerability is that the bogus window could collect information from the user and send it back to the malicious site.
Microsoft's Network Monitor susceptible to Denial of Service attack
MSProxy 2.0 can be used to attack hosts on internal network
mSQL (Mini-SQL) - Remote attackers could potentially gain read and/or access to databases by retrieving authentication
When you go into Netscape Messenger and check your mail, the software stores the password you used in the registry and encrypts it. It remains there for as long as netscape is open.
Netscape Communicator window spoofing bug
A popular security tool called "nmap" can generate unusual network traffic, which can be exploited to generate a wide variety of failures and crashes on numerous operating systems
Novell Netware Administration Exploit by Mnemonic
Perl script that creates a file to DoS NT Explorer
Inherent weaknesses in NT system policies
Linux PAM (up to 0.64-2) local root compromise
Proof of Concept - Security Advisory - mail.local (Berkeley Sendmail) ; Mailbox compromise
Anonymous Qmail Denial of Service
Rainbow Six Buffer Overflow
RealSystem G2 Server saves password in clear text
DoS attack against people running Serve-U
SIMS 3.x (Sun Internet Mail Server) and SDS 1.x & 3.1 (Sun LDAP Directory services) vulnerability.
Solaris DTmail vulnerable to buffer overflow attack
ISS Security Advisory: Buffer Overflow in "Super" package in Debian Linux
System Failure: Issue #15
RedHat sysklogd vulnerability
451's - Ezine.. small basically talks about Wardialing.
Program Topdesk has weak encryption, paper explianing how to break it.
Plaintext Password in Tractive's Remote Manager Software
How do fucking trojans work by HACKERDEVIL
[In]security in USR TotalSwitch
ValueClick CGI Vulnerability
The Windows NT Wardoc: A study in remote NT penetration by NEONSURGE and THE RHINO9 TEAM
Website Pro v2.0 (NT) Configuration Issues (bug used to hack idsoftware.com explained)
Windows98 Bug Explorer crashes on a 235 character filename explained.
ISS Vulnerability Alert: Windows Backdoors Update
Regarding passwords in registry keys
Win98 Explorer has bugs in handling files with pathname longer than or equal to the documented
Pingflood attack against Windows98
Wingate Problem makes it possible for anyone with registry editing permissions (remote or physical) to change wingate settings
Macintosh version of Word '98 includes sensitive material in document files
Article explaining why you shouldn't install WP8 as root on Linux. If you do your
making your security a little weaker.
Yahoo Pager - security bug w/ services 7,8
Another Security hole: "zgv"
If a AIX system administrator executes snap -a as while diagnosing a problem it defeats password shadowing and under /tmp/ibmsupt/general/ you will find the passwd file with cyphertext.
Allaire Forums GetFile bug
Hackerdevil's guide on how to send ANONYMOUS e-mails
AOL4 allows imbedded pictures in email (background pictures). If you name a .jpg 235 characters, opening the email crashes AOL.
The risks of using an AOL IM client behind a firewall
Severe Security Hole in ARCserve NT agents
Microsoft BackOffice Vulnerability ; BackOffice Server 4.0 Does Not Delete Installation Setup File
Breeze Network Server remote reboot and other bogosity
Cert Advisory - Remote buffer overflows in various FTP servers leads to potential root compromise.
CERT Advisory CA-98.13 - TCP/IP Denial of Service
Cisco IOS 12.0 security bug and workaround
Defunct Internet Protocol by Optiklenz
More Buffer Overflows in Digital Unix
L0pht Security Advisory- Windows 95/98 Network File Sharing ; Sniffed authentications can be used to impersonate network users
3Com HiPer ARC vulnerable to nestea attack
The software that 3com has developed for running the NMC (network management card) for the Total Control Hubs is a bit shady. After uploading the software ( as one must do) YOU will notice a login account called "adm" with no password. This can not be deleted. If you delete it and do a hardware reset its still there. The only
way to fix this problem is to disable the "adm" login.
Informational Resources - Cracking -
- -=[ Recently Added on 4-12-99]=-
|
Learn to Crack by Ignatz Number 1 : Generals explained with MP3 Wolf - Here is the file_id.diz.txt [made it text so it can view it in yer browser]
Crack Guide on Keygen and Usefull breackpoints
Introducing into the world of cracking - A beginners tutorial written by ByteBurn
How to crack Blood 2 cd protection - A little update to my tutorial#1 written by ByteBurn
CbD's Tutorial on cracking Cherry Slots by Ultisoft, Inc. using Softice 3.xx
CbD's Tutorial on cracking RUMMY 500 (Version 3.8) using Softice 3.xx
CbD's Tutorial #3 "Function Disabled Protections Defeated"
CbD's Tutorial #4 "Alternitive to Serial # Locating"
CbD's Tutorial #5 "General Cracking"
Informational Resources - Phreaking -
- -=[ Recently Added on 4-12-99 ]=-
|
StatiK's guide to setting up a fone confrence
That Thing Called a Beige Box by WhiteDevil
Cell Phone Cloning (Programming) FOR: NOKIA,MOTOROLA,ERICSSON By: LYSERGIC
An Explanation of Centrex by Downtime
Informational Resources - Pirating -
- -=[ Recently Added on 4-12-99 ]=-
|
IRC Warez for newbies
Back to the Menu