exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

winsd.101899.txt

winsd.101899.txt
Posted Oct 22, 1999
Authored by winsd

[ Windows Security Digest ] 1999 - October 18. Excel Symbolic Links, JavaScript Redirect, Anatomy of an Intrusion, Getting the Drop on Network Intruders, State of Security 2000, So You Want to Be a Cryptographer, C2 Compliance Check. www.ntsecurity.net

tags | javascript, magazine
systems | windows
SHA-256 | b52d9e47f72f9bd6daa0001926b02ea197343a60b323bde7dd34592350f20bdf

winsd.101899.txt

Change Mirror Download
=====================================================================
WINDOWS SECURITY DIGEST 1999 SERIES
Watching the Watchers October 18, 1999
=====================================================================
SPONSORED BY VERISIGN - THE INTERNET TRUST COMPANY

-- C O N T E N T S --

<< WEB SITE NEWS >>
* Got Attrition?
* Packetstorm Security!
* Spotlight: New Security Product Database
* Spotlight: HotFix Hotlist

<< NT SECURITY RISKS >>
* Excel Symbolic Links
* JavaScript Redirect

<< IN THE NEWS >>
* Wired for Warfair
* Why Hacking Contests Are a Bad Idea
* Melissa Varient Virus Discovered
* NTFS for Windows 98

<< FEATURE ARTICLES >>
* Anatomy of an Intrusion
* Getting the Drop on Network Intruders
* State of Security 2000
* Fear, Uncertainty, and Doom
* So You Want to Be a Cryptographer?

<< HOW TO >>
* Motives and Methods: A Virus Tutorial Part 2
* C2 Compliance Check

<< NOTABLE HACK ATTACKS >>
* George W. Bush Jr. Presidential Campaign Site


Hello -

You may have noticed that since the beginning of August, we have
started making significant changes to our Web site, located at
http://www.ntsecurity.net.
Of course, the changes are designed to serve each of you better,
and as such we're interested in learning what you think so far.
Please feel free to drop me a line with any comments you have
regarding the new Web site as well as its features and content.

Thanks,
Mark, mark@ntsecurity.net


==== SPONSORED BY VERISIGN - THE INTERNET TRUST COMPANY ====
Start preparing for holiday customers NOW - protect your
site with 128-bit SSL encryption! Get VeriSign's FREE guide,
"Securing Your Web Site for Business." You will learn
everything you need to know about using SSL to encrypt
your e-commerce transactions for serious online security.
http://www.verisign.com/cgi-bin/go.cgi?a=n032602130009000
============================================================

_____________________________________________________________________
___________________________ WEB SITE NEWS ___________________________

*** GOT ATTRITION?
NT Security News is now providing a mirror from ATTTRITION.ORG that
contains a list of the most recent Web site defacements, as reported
to the fine folks at ATTRITION. You'll find a link on the home page
currently listed under the "So What's New?" section.
Be sure to take a look at this data from time to time. It provides
a decent perspective on the number of sites that are defaced daily
around the globe.
http://www.ntsecurity.net/go/loadit.asp?iD=/scripts/attrition.asp

*** PACKETSTORM SECURITY
As you may know, Packetstorm Security is now back online. For those
not already familiar with Packetstorm, the site offers a wealth of
security information in the form of bug reports, security-related
programs and code, whitepapers, technical documents, and more.
We now provide an up-to-the-minute mirror of all the latest
additions to Packetstorm easily accessible from our home page. Be
sure to check the list from time to time. As you'll learn by watching
our Packetstorm page, many of the items added each day to do not
pertain to Microsoft-based network and application security.
Nonetheless, it is without question worth the effort to look for items
that do pertain to your networks. Be sure to check this page each day.
http://www.ntsecurity.net/go/loadit.asp?iD=/scripts/packetstorm.asp

*** SPOTLIGHT: NEW SECURITY PRODUCT DATABASE
We've recently added a brand new security product database to the
site. Using the new Web pages, any security-related product vendor
may add their product listings to our site where tens of thousands of
users will see them every single month.
And, once your products are listed online you may return at any
time to modify your entries as you see fit. For example, when you
release a new version of a listed product, the details of your new
version appear on our site as fast as you can modify the listing.
If your company sells products that are related to security, you
should definitely swing by our site and list them with us. Think of
it as free advertising. To list your products at NTSecurity.NET,
click the link below:
http://www.ntsecurity.net/go/loadit.asp?id=/products/start.asp
To see what the vendor product listings look like, follow this
link:
http://www.ntsecurity.net/go/loadit.asp?id=/products/listproducts.asp

*** SPOTLIGHT: HOTFIX HOTLIST!
The Hotfix Hotlist is a feature that many of you asked us for time
and time again - so we finally created exactly what you asked for.
The Hotfix Hotlist is a singular resource for all service packs and
fixes related to just about any major Microsoft product. So now,
instead of tediously surfing Microsoft's Web site and FTP site
looking for new security patches, you can simply visit our Hotfix
Hotlist, select a product, and everything you need regarding services
packs and security-related hotfixes appears on the screen, complete
with hotlinks to Support Online articles, downloable fix files,
one-click top-level FTP directory access, and more. Plus, you can
click one link to see all new fixes for almost any Microsoft released
in the last 45 days. Come check it out!
http://www.ntsecurity.net/go/loadit.asp?id=/fixes.asp

_____________________________________________________________________
__________________________ NT SECURITY RISKS ________________________

*** EXCEL SYMBOLIC LINK VULNERABILITY
Software Effected: Excel 97 and Excel 2000
David Young reported a problem with Excel 97 and Excel 2000 symbolic
link files that can contain macros, which execute without permission.
Microsoft has released a patch for the problem. The Excel 97 patch
also corrects a problem with macros imported from Lotus 1-2-3 or
Quattro Pro, where those macros also run without permission.
For complete details, including links to Microsoft's FAQ, the
Support Online articles, and the patches, please visit our Web site:
http://www.ntsecurity.net/go/load.asp?iD=/security/excel-slk.htm

PUT A REMINDER on your calendar to load this fix!
JUST CLICK THE LINK BELOW:
http://www.ntsecurity.net/to-do/excel-slk.vcs

*** JAVASCRIPT REDIRECT
Software Effected: Internet Explorer 4.01 and 5.0
Georgio Guninski reported a problem with IE regarding JavaScript and
redirects which could allow a Web site to read files on a remote
user's system without that user's knowledge.
According to Georgi's message, "Internet Explorer 5.0 under Windows
95 and WinNT 4.0 (suppose Win98 is vulnerable) allows reading local
files and text/HTML files from any domain. Window spoofing is
possible. It is also possible in some cases to read files behind
fiewall."
"The problem is a HTTP redirect to "javascript:" URLs. If you open
a local file and the change its location to an URL that redirects to
"javascript:JavaScript code" then the JavaScript code is executed in
the security context of the original local file and has access to its
DOM. The local file may be sent to an arbitrary server. In a similar
way one may do window spoofing. This vulnerability may be exploited
using HTML email message or a newsgroup posting."
http://www.ntsecurity.net/go/loader.asp?iD=/security/javascript.htm

_____________________________________________________________________
____________________________ IN THE NEWS ____________________________

*** WIRED FOR WARFARE
Time Magazine offers an interesting view of how at least one group of
Mexican guerillas are using the Internet to wage cyberwar against
their enemies. [Time Magazine]
http://www.ntsecurity.net/go/2c.asp?f=/news.asp?IDF=164&TB=news

*** WHY HACKING CONTESTS ARE A BAD IDEA
Ira Winkler, author of Corporate Espionage, offers up his opinion
of the latest PC Week challenge that offers everyone the chance to
hack into a Linux or Windows NT system. [ZDNet]
http://www.ntsecurity.net/go/2c.asp?f=/news.asp?IDF=163&TB=news

*** MELISSA VARIENT DISCOVERED IN THE WILD
According to a recent Network Associates report, a varient of the
dangerous Melissa virus has been discovered in the wild.
http://www.ntsecurity.net/go/2c.asp?f=/news.asp?IDF=162&TB=news

*** NTFS FOR WINDOWS 98
Mark Russinovich and Bryce Cogswell of SysInternals have released a
beta version of their new NTFS file system utility for Windows 9x
systems.
http://www.ntsecurity.net/go/2c.asp?f=/news.asp?IDF=161&TB=news

=====================================================================
Want to sponsor the newsletter or Web site?
Send email to ads@ntsecurity.net
=====================================================================
_____________________________________________________________________
______________________________ FEATURES _____________________________

*** ANATOMY OF AN INTRUSION
Greg Shipley offers a great feature detailing many of the means by
which an intruder may approach your particular systems in an attempt
to break in. [Network Computing]
http://www.ntsecurity.net/go/2c.asp?f=/features.asp?IDF=130&TB=f

*** GETTING THE DROP ON NETWORK INTRUDERS
In her feature for Network World, Ellen Messmer discusses various
intrusion detection systems (IDS,) as well as the nature of the
industry regarding ongoing development. [Network World]
http://www.ntsecurity.net/go/2c.asp?f=/features.asp?IDF=129&TB=f

*** STATE OF SECURITY 2000
Network Computing offers a bird's eye view of the challenges we'll
all face in the coming years. In this article, which discusses VPNs,
PKI, firewalls, intrusion detection systems, various various security
tools, and antivirus concerns, experts offer the skinny on what to
expect and to keep things in a proper perspective. [Network Computing]
http://www.ntsecurity.net/go/2c.asp?f=/features.asp?IDF=128&TB=f

_____________________________________________________________________
_______________________________ HOW TO ______________________________

*** MOTIVES AND METHODS: A VIRUS TUTORIAL PART 2
In part two of her ongoing series, Diane Levine discusses
additional virus-like risks that may also jeopardize a network. Items
include, Trojans, worms, logic bombs, time bombs, backdoors, and
rabbits.
http://www.ntsecurity.net/go/2c.asp?f=/howto.asp?IDF=110&TB=h

_____________________________________________________________________
_______________________ NOTEABLE HACK ATTACKS _______________________

*** GEORGE W. BUSH PRESIDENTIAL CAMPAIGN SITE
Crackers defaced the presidential campaign site of Republican
candidate George W. Bush early Tuesday, October 18th. The picture of
Bush normally seen on the site was replaced with a photo of the Texas
governor pictured with a red hammer and sickle along with a call for
"a new October revolution."
In a stroke of irony, Bush's Web site just happens to be hosted by
the Austin-based ISP "Illuminati Online." No archive of the cracked
site has been made available, and not-so-coincidentally, no one has
claimed responsibility for the defacement.
_____________________________________________________________________
______________________________ CONTACTS _____________________________

-- EDITOR: Mark Edwards, mark@ntsecurity.net
-- ADVERTISING: Jeffrey Scott Strayer, ads@ntsecurity.net
-- WEB SITE: General Delivery, webmaster@ntsecurity.net

Have something to contribute to this newsletter? Send it to us!
Email: press@ntsecurity.net
_____________________________________________________________________

Copyright (c) 1999 - NTSecurity.Net - ALL RIGHTS RESERVED
This newsletter maybe be forwarded or copied so long as the entire
content, including this notice, remain intact.

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close