exploit the possibilities

netsec36.txt

netsec36.txt
Posted Oct 31, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: The phpinfo() function in PHP gives out lots of server information, NAV misses certain folers, JRun problems with web-inf directory, JRun 2.3 arbitrary file retrieval and command execution, Microsoft Session ID cookie marking bug patch, Hotjava Browser 3.0 Javascript bug, Windows ME printer sharing vulnerability, SuSE ncurses vulnerability, NetBSD global 3.55 vulnerability, NetBSD GNU CFEngine remote vulnerability, Cisco VCO/4000 SNMP bug, PAM_MYSQL local and remote bugs, cisco catalyst 3500 xl remote command execution. Security news: Virus threats getting worse, final vote on secret searches expected, protecting freedom of expression, islamic attackers crash israeli web sites, global hacker agreement could affect bug hunters, and more.

tags | remote, web, arbitrary, local, php, javascript, virus
systems | cisco, linux, netbsd, windows, suse, me
MD5 | 016eaac311b0615c706806a3e6efb1d3

netsec36.txt

Change Mirror Download
Net-Sec newsletter
Issue 36 - 30.10.2000
http://net-security.org

This is a newsletter delivered to you by Help Net Security. It covers weekly
roundups of security events that were in the news the past week. Visit Help
Net Security for the latest security news - http://www.net-security.org.


Subscribe to this weekly digest on:
http://www.net-security.org/text/newsletter

Table of contents:

1) General security news
2) Security issues
3) Security world
4) Featured articles
5) Featured books
6) Security software
7) Defaced archives



============================================================
HELP NET SECURITY ANNIVERSARY
We are proud to announce the second anniversary of HNS. In these 2 years
the site has grown and with dedication and enthusiasm it became all we ever
wanted it to be. This doesn't mean we are going to stop here, we'll keep on
working to bring you even more updates in all the sections, as well as original
content. We would like to take this opportunity to thank all the visitors,
contributors, affiliates and advertisers who have been with us these past 2 years
and that have supported us, giving us the opportunity to make the site better
day by day. If you have any ideas, comments or suggestions, please e-mail us,
we would like to hear from you.

HNS staff
staff@net-security.org
============================================================




General security news
---------------------

----------------------------------------------------------------------------

VIRUS THREAT'S BAD AND GETTING WORSE - ICSA SURVEY
The number of corporations infected by viruses this year has risen by 20
percent, with the pace of infections accelerating rapidly, according to a report
issued Monday by anti-virus consulting firm ICSA.net. Larry Bridwell, content
security program manager for ICSA Labs, and a study co-author, said the
company's 2000 report indicates the danger for corporate "virus disasters" is
worse now than it has ever been in the six years that ISCA has been conducting
its annual virus surveys.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computeruser.com/news/00/10/24/news7.html


SECURITY THROUGH OBSCURITY
Is security through obscurity ever a useful way to protect your network, or
does it just make things easier for corporate spies and hackers? This week in
Unix Security, Carole Fennelly investigates who's benefiting from this security
tactic.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.sunworld.com/sunworldonline/swol-10-2000/swol-1013-unixsecurity.html


US AND EUROPEAN HACKERS
"U.S. hackers are basically proving things to themselves for ego. European
hackers include a significant number of individuals motivated by political, religious,
and cultural deeply held beliefs," said Gartner Group computer security analyst
William Malik. Bob Sullivan did an article, in which he is talking about difference
between European and US hackers (at least his point of view).
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/zdnn/stories/news/0,4586,2644086,00.html


BAD SIGNS
"Digital signatures are not signatures, and they will never fulfill their promise" -
Bruce Schneier's opinion on The Standard.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://thestandard.com/article/display/0,1151,19485,00.html


SDF PREPARES TO COMBAT CYBERTERRORISM
Japan's Defense Agency (SDF) is set to develop computer systems to combat
attempts by cyber attackers to disrupt the country's defense operation by
breaking into key computer systems, sources said Monday.
Link: http://www.japantimes.co.jp/cgi-bin/getarticle.pl5?nn20001024b5.htm


DANISH VIGILANTE
CRN has a piece on Danish security company Vigilante and their product -
SecureScan - which is an automated Internet security assessment service.
Link: http://www.crn.com/sections/Upstart/Upstart.asp?RSID=CRN&ArticleID=20749


FINAL VOTE ON SECRET SEARCHES BILL EXPECTED
Urgent alert from DefendYourPrivacy.com's mailing list - "Two weeks ago we
warned you about S. 2516, the Fugitive Apprehension Act of 2000, which would
empower federal bureaucrats to subpoena your electronic records without a
warrant. This bill has now been attached to another piece of legislation -- The
Presidential Threat Protection Act (HR 3048) - and is expected to come up for
a final vote on Wednesday or Thursday (October 24 or 25.)"
Link: http://www.cluebot.com/article.pl?sid=00/10/20/2341243&mode=nested


PROTECTING FREEDOM OF EXPRESSION
The human rights body of the Organization of American States has approved a
declaration that says the "consolidation and development of democracy depends
on the very existence of freedom of expression." The OAS's Inter-American
Commission on Human Rights calls the declaration, a "fundamental document
for the defense of freedom within the inter-American system."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://cipherwar.com/news/00/freedom_of_expression.htm


'RUMOR' - SHARING AV UPDATES
Next week, a Network Associates subsidiary, MyCIO.com, will formally roll out
Rumor, a Napster-like file-sharing technology for managing antivirus updates.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2000/42/ns-18647.html


MICROSOFT NETWORK TROJANED INTO
Guardian Unlimited and some othr media outlets reportted that Hackers have
broken into Microsoft's computer network and may have stolen blueprints to
the latest versions of the company's Windows and Office software. And if you
read the whole article you will come to the fact that attackers broken into the
network by using simple trojan horse program with a bit of social engineering,
so they were no hackers in this story.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.guardianunlimited.co.uk/internetnews/story/0,7369,388816,00.html


CYBERCRIME DRAFT
European Committee On Crime Problems and Committee Of Experts On Crime
In Cyber-Space in april released a paper for "Draft Convention On Cyber-Crime"
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://conventions.coe.int/treaty/en/projets/cybercrime.htm


MICROSOFT HACKED... NOT
The Register - "MS hacked again - 'illuminati terrorists,' this time",
IT-Analysis.com - "Microsoft domain falls foul to hacker terrorists" (I presume
the first article on this story, as I bookmarked it yesterday, and today lot of
online news sites have information on this "issue". So is Microsoft hacked? Not
of course... Some reader sent a mail to IT-Analysis.com staff saying that he
checked DNS record for Microsoft.com and that they were corrupted. By
searching microsoft.com in whois lookup, you come to:
MICROSOFT.COM.IS.SECRETLY.RUN.BY.ILLUMINATI.TERRORISTS.NET
MICROSOFT.COM
So as you could see there was no hacking activity in this case, but just some
tactics of creating subdomains similiar to the Microsoft's domain, so it could
come out as part of search results. Do whois on Microsoft.com (just whois not
a search like these 'journalists' did), and you will see that everything is fine
with DNS records.


ISLAMIC ATTACKERS CRASH ISRAELI WEB SITES
Several Israeli Web sites containing the government's perspective on the
Mideast conflict crashed after Islamic groups abroad jammed them with fake
traffic. The cyberattack was the most intense since Israel's government
launched its Internet sites several years ago, and opens a new front in Israel's
confrontation with the Arab world.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.salon.com/tech/wire/2000/10/26/cyberwar/index.html


BLACKHAT '00 SINGAPORE - GREG HOGLUND
Conference video from Blackhat '00 Singapore - Advanced Buffer Overflow
Techniques. This is a technical talk aimed at people who have already been
exposed to buffer overflows and want to learn more. The talk assumes the
audience has at least some knowledge of CPU's and Processes.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/media/71


LINUX FIREWALL SURVEY PART 3
In the final entry of a three-part series of firewall product reviews, Pawel
Leszek looks at dedicated appliance firewalls based on Linux. "Fire and forget"
is the main idea behind hardware firewall appliances like WatchGuard's Firebox
II, the Raptor Firewall from Cobalt and Axent, the Phoenix Adaptive Firewall
from Progressive Systems, and the T.Rex firewall appliance from Freemont
Avenue Software.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.linuxworld.com/linuxworld/lw-2000-10/lw-10-fwproducts3.html


0BLIVION
Issue 8 of 0blivion, a monthly eZine dedicated to security, technology and
internet issues, is out. 0blivion is released every month and is read by thousands
around the world. So grab a copy today and get reading.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.0blivion.org


GLOBAL HACKER AGREEMENT COULD AFFECT BUG HUNTERS
The Council of Europe's Draft Convention on Cybercrime aims to foster a
common international criminal policy that addresses offenses directed against
computer systems, data or networks. The treaty is intended to encourage
legislation around the world. More than 40 countries, including the United States,
are participating in the treaty, which is set to be signed by December and
adopted by the council's Committee of Ministers in early autumn 2001. The treaty
could go too far by prohibiting tools commonly used by legitimate computer
researchers to discover and fix software vulnerabilities, computer security
experts say.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://news.cnet.com/news/0-1005-200-3314003.html


YANKEES WEB SITE ATTACKED
The team's official site, www.yankees.com, was temporarily closed early Friday.
"There was a hacking incident. The Web site was temporarily shut down because
of it," Yankees spokesman Rick Cerrone said. "We have turned it over to the FBI
and intend to prosecute to the fullest extent of the law."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.salon.com/tech/wire/2000/10/27/hacker/index.html


WAY BACK - WAZZU
Surfing trough PSS, I found an article in Cheyenne security newsline from October
1996 which pointed out that the September edition of Microsoft's Solution Provider
CD contained a document infected with the WM.Wazzu virus. Old news, but it is
interesting how Microsoft employees like viruses/trojans ;)
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://packetstorm.securify.com/advisories/cheyenne/cheyenne.003


DO YOU KNOW IF YOUR DATA IS SAFE?
Brian Robison explains what companies need to do above and beyond the firewall
level to ensure the protection and integrity of their information assets. This is an
excellent non-technical article for the CTO or CIO trying to determine what kinds
of safeguards need to be in place at their organization.
Link: http://www.securityfocus.com/frames/?content=/templates/forum_message.html%3fforum=2%26head=3649%26id=3649

----------------------------------------------------------------------------




Security issues
---------------

All vulnerabilities are located at:
http://net-security.org/text/bugs


----------------------------------------------------------------------------
PHP INFO WWW SEARCH AND SERVER INFO GATHERING
The phpinfo() function available from PHP versions gives out a _LOT_ of server
information, directories things are installed in, versions etc.
Link: http://www.net-security.org/text/bugs/972433288,21401,.shtml


POSSIBLE SECURITY ISSUE IN NAV2001 ON WIN2K
If you place a virus or other known malware in the c:\_RESTORE folder Norton
Antivirus will not scan that folder in a "full-system" scan. This seems to be
Symantec´s poor choice not to scan such files? However if you manually scan
C:\_RESTORE NAV will find the infected file but won´t be able to delete, repair
nor quarantine the file? This could lead a malicious user to drop files into the
restore folder - there´re a few obvious ways to exploit this.
Link: http://www.net-security.org/text/bugs/972433331,66345,.shtml


ALLAIRE'S JRUN PROBLEMS WITH WEB-INF DIRECTORY
A severe security flaw exists with Allaire's JRun 3.0 allowing an attacker to
access WEB-INF directories on the JRun 3.0 server. The WEB-INF directory
tree contains web application classes, pre-compiled JSP files, server side
libraries, session information and files such as web.xml and webapp.properties.
Link: http://www.net-security.org/text/bugs/972433386,31966,.shtml


ALLAIRE JRUN 2.3 ARBITRARY FILE RETRIEVAL
Multiple show code vulnerabilities exist in Allaire's JRUN Server 2.3 allowing an
attacker to view the source code of any file within the web document root of
the web server. Using the same vulnerability, it is also possible to retrieve
arbitrary files that lie outside the web document root on the host operating
system's file system.
Link: http://www.net-security.org/text/bugs/972433407,34255,.shtml


ALLAIRE JRUN 2.3 REMOTE COMMAND EXECUTION
It is possible to compile and execute any arbitrary file within the web document
root directory of the JRUN's web server as if it were a JSP file, even if the file
type is not .jsp. If applications running on the JRUN 2.3 server write to files
within the web document root directory, it is possible to insert executable code
in the form of JSP tags and have the code compiled and executed using JRUN's
handlers. This can potentially cause an attacker to gain administrative control
of the underlying operating systems.
Link: http://www.net-security.org/text/bugs/972433423,22015,.shtml


MS - "SESSION ID COOKIE MARKING" BUG PATCHED
Microsoft has released a patch that eliminates a security vulnerability in
Microsoft Internet Information Server. The vulnerability could allow a malicious
user to "hijack" another user's secure web session, under a very restricted set
of circumstances.
Link: http://www.net-security.org/text/bugs/972435493,54113,.shtml


IIS UNICODE - '>' REDIRECT
"I was having problems executing a command that contains a redirect (>) using
any of the IIS Unicode exploits. In order to get some interesting tools on the
victim, you would probably want to have the victim to FTP to the attacker.
Problem without redirect is that you cannot build the FTP command file, and you
are a bit stuck."
Link: http://www.net-security.org/text/bugs/972524142,79006,.shtml


"VM FILE READING" VULNERABILITY PATCHED
Microsoft has released a patch that eliminates a security vulnerability in the
Microsoft virtual machine, that originally was discussed in Microsoft Security
Bulletin MS00-011. Like the original vulnerability, the new variant could enable
a malicious web site operator to read files from the computer of a person who
visited his site or read web content from inside an intranet if the malicious site
was visited by a computer from within that intranet.
Link: http://www.net-security.org/text/bugs/972524163,7,.shtml


SUN SECURITY BULLETIN - BROWSER CERTIFICATES
Sun advises of a potential compromise of 2 specific security certificates which
had limited distribution. Sun recommends that you follow the directions found at http://sunsolve5.sun.com/secbull/certificate_howto.html to determine if your
web browser has accepted any of the potentially compromised certificates.
Link: http://www.net-security.org/text/bugs/972524178,81366,.shtml


HOTJAVA BROWSER 3.0 JAVASCRIPT BUG
There is a security vulnerability in HotJava Browser 3.0 which allows accessing
the DOM of arbitrary URLs after viewing a web page. This allows stealing of
cookies. The problem is opening an javascript: URL in a named window, which
allows accessing the DOM of the document in the named window.
Link: http://www.net-security.org/text/bugs/972524196,6460,.shtml


WINDOWS (ME) PRINTER SHARING VULNERABILITY
"One of the new "features" of Windows ME that immediately caught my eye
was that as soon as I got networking up and running it had gone ahead and
created shortcuts to all visible network shares and installed all networked
printers without even hassling me with one "are you sure" dialog. At first
glance it appeared to be nothing more then an annoyance. Later I came to
thinking that naturally host machines must keep a list of files needed to install
their printer. What if we were to replace one of these files with a trojan? Or
perhaps add a trojan onto this list of files?"
Link: http://www.net-security.org/text/bugs/972650098,62744,.shtml


RED HAT - UPDATED SECURE WEB SERVER PACKAGES
Security bugs in versions of Apache prior to 1.3.14 also affect Secure Web
Server. A new release which incorporates 1.3.14 is now available.
Link: http://www.net-security.org/text/bugs/972694410,70614,.shtml


SUSE LINUX - LOCAL ROOT COMPROMISE
The ncurses library is used by many text/console based applications such as
mail user agents, ftp clients and other command line utilities. A vulnerability has
been found by Jouko Pynnönen in the screen handling functions: Insufficient
boundary checking leads to a buffer overflow if a user supplies a specially
drafted terminfo database file. If an ncurses-linked binary is installed setuid
root, it is possible for a local attacker to exploit this hole and gain elevated
privileges.
Link: http://www.net-security.org/text/bugs/972694424,49042,.shtml


NETBSD - REMOTE EXECUTION OF SHELL COMMANDS
When using the CGI interface of the Global v3.55 package, it's possible to
execute random commands. The exploit of this is possible due to insufficient
handling of quoted or escaped characters in this version, and command line
arguments that are then handed off to shell commands.
Link: http://www.net-security.org/text/bugs/972694452,89982,.shtml


NETBSD - POSSIBLE REMOTE ROOT COMPROMISE
The cfd daemon in GNU CFEngine contains several format string vulnerabilities
in syslog() calls. This could permit remote hosts to inject the network daemon
with a message causing a segmentation fault. As cfd is almost always run as
root due to its nature (centralized configuration management), this could lead
to a root compromise.
Link: http://www.net-security.org/text/bugs/972694471,61555,.shtml


PROBLEMS WITH CISCO VCO/4000 SNMP
If an attacker knows the read-only community string of a VCO/4K, then they
can obtain a list of users and their obfuscated passwords. The obfuscation
can be easily reversed, allowing an attacker to obtain additional privileges
on the VCO/4K.
Link: http://www.net-security.org/text/bugs/972694517,63881,.shtml


REMOTE AND LOCAL VULNERABILITIES IN PAM_MYSQL
pam_mysql is a pluggable authentication module to allow user authentication
against mysql databases. The module constructs SQL statements using user
input (username and password) without escaping it. This leads to trivial
attacks that can result in the exposure of plaintext passwords/hashes to
remote unauthorized login.
Link: http://www.net-security.org/text/bugs/972694530,83265,.shtml


CISCO CATALYST REMOTE COMMAND EXECUTION
Cisco Catalyst 3500 XL series switches have a webserver configuration interface.
This interface lets any anonymous web user execute any command without
supplying any authentication credentials by simply requesting the /exec
location from the webserver.
Link: http://www.net-security.org/text/bugs/972694543,5289,.shtml

----------------------------------------------------------------------------




Security world
--------------

All press releases are located at:
http://net-security.org/text/press

----------------------------------------------------------------------------

BETRUSTED CHOSEN BY NCIPHER TO GUARD ITS EMAIL - [25.10.2000]

beTRUSTed(sm), the PricewaterhouseCoopers unit that offers trust services
for Internet transactions, has been chosen by leading Internet security
company nCipher to help provide its employees with secure email and
authenticated network access. nCipher will use beTRUSTed digital certificates
to ensure the security of its electronic transactions - nCipher is itself a leading
developer of high performance hardware security products for e-commerce and
public key infrastructure (PKI) applications.


Press release:
< http://www.net-security.org/text/press/972432017,44785,.shtml >

-----------------------------------------------------------

SECOND G-8 CONFERENCE ON INTERNATIONAL SECURITY - [26.10.2000]

Symantec Corp., a world leader in Internet security technology,
today announced it has again been invited to join the U.S. delegation at the G-8
Government/Industry Workshop on Safety and Confidence in Cyberspace, to be
held Oct. 24 through 26 in Berlin. Ron Moritz, senior vice president and chief
technical officer at Symantec, will serve as one of only seven U.S. industry
delegates to the conference. The G-8 conference offers a unique opportunity
for international government and private sector representatives to meet to
discuss ways to combat computer crime.


Press release:
< http://www.net-security.org/text/press/972432224,44203,.shtml >

----------------------------------------------------------------------------

POINT-AND-CLICK PKI-BASED SIGITAL SIGNATURES - [26.10.2000]

E-business security leader Cylink Corporation today announced plans to
bundle E-Lock Technologies' digital signature solution with Cylink's public
key infrastructure (PKI) to provide a seamless point-and-click solution for
securing electronic documents. Together, the solutions will enable healthcare
providers, financial institutions and other organizations that handle sensitive
electronic documents such as patient records and loan applications to
maintain the highest levels of data confidentiality and dramatically streamline
document processing

Press release:
< http://www.net-security.org/text/press/972515023,50852,.shtml >

----------------------------------------------------------------------------

SMART WATCH TOP RATED IN SC MAGAZINE - [26.10.2000]

WetStone Technologies is pleased to announce that SMART Watch, the
company's premier product offering, earned a perfect 5 star rating from SC
Magazine's product review team this October. SMART Watch is a Preemptive
Hacker Defense Tool and host based intrusion detection system that detects
when key “Watched” Files or Directories have been maliciously or accidentally
altered.

Press release:
< http://www.net-security.org/text/press/972523152,24040,.shtml >

----------------------------------------------------------------------------

NORTON ANTIVIRUS FOR MACINTOSH RELEASED - [26.10.2000]

Symantec Corporation, today announced the latest versions of Norton
Utilities for Macintosh and Norton AntiVirus for Macintosh. Norton Utilities
for Macintosh 6.0 helps customers optimize performance and easily solve
problems, such as disk errors, lost or accidentally erased data, or fragmented
files. Norton AntiVirus for Macintosh 7.0 detects and repairs infected files to
keep personal data safe and secure.


Press release:
< http://www.net-security.org/text/press/972523671,14261,.shtml >

----------------------------------------------------------------------------

PRIVACY CONFERENCE ANNOUNCED BY ZKS - [27.10.2000]

Zero-Knowledge Systems, the leading developer of privacy solutions for
consumers and companies, today announced the first annual "Privacy by
Design: The Future of Privacy Compliance and Business" conference, sponsored
by Royal Bank Financial Group, IBM, Merrill Lynch, and PricewaterhouseCoopers.
Bringing world-class privacy experts together with companies implementing privacy
practices and solutions, the conference will be held at Le Chateau Montebello,
Quebec from November 19 to 21, 2000.


Press release:
< http://www.net-security.org/text/press/972648319,95401,.shtml >

----------------------------------------------------------------------------

VPN SECURITY FOR FEDERAL LAW ENFORCEMENT - [27.10.2000]

V-ONE Corporation (Nasdaq:VONE), a leading provider of Virtual Private
Networks (VPN), today announced it has been selected by Louisiana State
University (LSU) and their subcontractor, Science Applications International
Corporation (SAIC) to provide security for Law Enforcement Online (LEO), the
Federal Bureau of Investigation (FBI) project which established the nation's
first-ever communications mechanism to link all levels of law enforcement across
the country


Press release:
< http://www.net-security.org/text/press/972648475,5255,.shtml >

----------------------------------------------------------------------------

SPHINX FIREWALL SOLUTION FROM BIODATA - [31.10.2000]

Biodata Information Technology, global leader in network and communications
security, is recommending that home PC users as well as large corporations take
further steps to protect their internal network or personal PC's connected to the
Internet through `always on' cable, T1 or DSL connections. The announcement
comes as attackers based in St. Petersburg, Russia, successfully employed an
attack on Microsoft's network - stealing source code to the company's Windows
operating system and Office software suite.


Press release:
< http://www.net-security.org/text/press/972960020,30864,.shtml >

----------------------------------------------------------------------------

PANEL DISCUSSION ON CYBERCRIME - [31.10.2000]

Symantec Corp., a world leader in Internet security, today announced Ron
Moritz, senior vice president and chief technical officer at Symantec, has
been invited to participate as a panel speaker at the Software Development
Conference & Expo (SD 2000), to be held Oct. 29 - Nov. 2, at the Washington
Convention Center in Washington D.C


Press release:
< http://www.net-security.org/text/press/972960112,41653,.shtml >

----------------------------------------------------------------------------

E-SECURITY EXECUTIVE BREAKFAST SERIES - [31.10.2000]

AXENT Technologies, Inc., one of the world's leading Internet security
solutions providers for e-business, which recently entered into a definitive
merger agreement with Symantec Corporation, today announced their sponsorship
of AXENT's Executive Breakfast Series for CXOs, senior level VPs, and senior
management of Fortune 1000 companies. The series will feature Scott Charney,
former Department of Justice chief of computer crime division, who will engage
attendees by discussing his cyber-crime experiences and will offer a vision for
executives on how to effectively minimize their e-business security risks.


Press release:
< http://www.net-security.org/text/press/972960272,57108,.shtml >

----------------------------------------------------------------------------

TRIPWIRE LINUX EDITION NOW AVAILABLE - [31.10.2000]

Tripwire, Inc., the leading provider of data and network integrity solutions, today
announced the availability of its Open Source product for the Linux operating
system. Delivering on the commitment made earlier this year, Tripwire Open Source,
Linux Edition is hosted on VA Linux Systems' SourceForge, the world's largest Open
Source development center. The software is also included on the recently
announced Red Hat Linux 7 Open Source Operating System. Tripwire Open Source,
Linux Edition will continue to be integrated into other Linux solutions.


Press release:
< http://www.net-security.org/text/press/972960761,34362,.shtml >

----------------------------------------------------------------------------




Featured articles
-----------------

All articles are located at:
http://www.net-security.org/text/articles

Articles can be contributed to staff@net-security.org

Below is the list of the recently added articles.

----------------------------------------------------------------------------

BEWARE THE PIF! - A DANGEROUS MONSTER CAN HIDE BENEATH HARMLESS FILES

Kaspersky Lab, an international anti-virus software development company,
considers it necessary to draw users' attention to a threat that programs
with PIF extension can pose to the normal operating of personal computers
and corporate networks. Because of the lack of awareness of this problem
Kaspersky Lab has began to receive numerous reports of virus infections
caused by this type of malicious program.

Read more:
< http://www.net-security.org/text/articles/viruses/pif.shtml >

----------------------------------------------------------------------------

VIRUSES: THEN AND NOW by Randy M. Nash

Computer viruses and the people who engineer them have grown smarter and
more devious as technology has grown. Early computer viruses would attach
themselves to executable files (either .COM or .EXE), or would infect diskettes
and hard drives. They were silent, irritating, and sometimes devastating. They
were commonly passed via floppy diskette when sharing files between one
computer and another. They had such names as Stoned and Anti.Exe. That
was then.

Read more:
< http://www.net-security.org/text/articles/viruses/tan.shtml >

----------------------------------------------------------------------------

THE HISTORY OF ZERO KNOWLEDGE SYSTEMS by Jordan Socran

Austin & Hamnett Hill - the brothers behind Zero-Knowledge Systems, were
involved with the Internet at a very young age. At 21 Austin founded the ISP
Infobahn Online Services with money from his father and a small group of
investors. They soon called upon Hamnett, a 23 year-old reformed Deadhead
studying accounting in Montana, to be CFO...

Read more:
< http://www.net-security.org/text/articles/zks.shtml >

----------------------------------------------------------------------------

PASSWORDS - THE WEAK LINK by Randy M. Nash

A chain is only as strong as its weakest link. In the security world, that weak
link is the human element, and it manifests in the poor management of user
passwords. As our society becomes increasingly wired we need to remember
an increasingly large number of accounts, PINs, and passwords.

Read more:
< http://www.net-security.org/text/articles/passwords.shtml >

----------------------------------------------------------------------------

ONLINE SECURITY: WHAT'S YOUR APPROACH? by Randy M. Nash

In the rush to get online, many companies consider security as an afterthought.
The hurry to develop an online presence causes them to overlook the obvious...
they could be compromised. Many companies are willing to accept this. They
consider themselves too "low profile" to be at risk. The reality is, you don't have
to be an e-Bay, Yahoo, or e-Trade to get attacked. Systems are compromised
for several reasons.

Read more:
< http://www.net-security.org/text/articles/approach.shtml >

----------------------------------------------------------------------------




Featured books
----------------

The HNS bookstore is located at:
http://net-security.org/various/bookstore

Suggestions for books to be included into our bookstore
can be sent to staff@net-security.org

----------------------------------------------------------------------------

LINUX KERNEL INTERNALS

This book is written for anybody who wants to learn more about Linux. It
explains the inner mechanisms of Linux from process scheduling to memory
management and file systems, and will tell you all you need to know about
the structure of the kernel, the heart of the Linux operating system.
CD-ROM included.

Book:
< http://www.amazon.com/exec/obidos/ASIN/0201331438/netsecurity >

----------------------------------------------------------------------------

EXAM CRAM CCNP ROUTING (EXAM CRAM)

The book sports some of the snappiest writing ever to grace an Exam Cram book
which is good, because routing concepts are tricky little devils that you just can't
memorize. You need to internalize how each of the various protocols works, and
not just snarf down some list of functions. The explanations for the reason that
each protocol (RIP, OSPF, EIGRP, BGP) was developed and how it's implemented
are well written and concise. The occasional spot illustration helps flesh out your
knowledge of how routers share information under each protocol. If you've been
a trifle unclear on what the precise differences are between the various routing
approaches, this is where all will be revealed. Later sections of the book deal
with traffic management and routing updates, and do it well, mixing a bit of
real-world experience with lectures to give a well-rounded approach. Sadly,
information on actual router configuration is fairly spotty, so probably you'll
want to write down some additional cheat sheets for the actual configuration
commands.

Book:
< http://www.amazon.com/exec/obidos/ASIN/1576106330/netsecurity >

----------------------------------------------------------------------------

MICROSOFT WINDOWS ME SECRETS

For nearly a decade, Brian Livingston and Davis Straub have been tracking down
the shortcuts, fixes, and workarounds that let you get more done - and have
more fun - with Microsoft Windows. From streamlining Internet access to
tweaking the Registry, their latest guide delivers hundreds of Windows Me
secrets that will take your productivity to a new level.

Book:
< http://www.amazon.com/exec/obidos/ASIN/0764534939/netsecurity >

----------------------------------------------------------------------------

THE NEW HACKER'S DICTIONARY

This third edition of the tremendously popular Hacker's Dictionary adds 100 new
entries and updates 200 entries. In case you aren't familiar with it, this is no
snoozer dictionary of technical terms, although you'll certainly find accurate
definitions for most techie jargon. It's the slang and secret language among
computer jocks that offers the most fun. Don't know what the Infinite-Monkey
Theorem is? Or the meaning of "rat dance?" It's all here. Most people don't sit
down to read dictionaries for entertainment, but this is surely an exception.

Book:
< http://www.amazon.com/exec/obidos/ASIN/0262680920/netsecurity >

----------------------------------------------------------------------------



Security Software
-------------------

All programs are located at:
http://net-security.org/various/software

----------------------------------------------------------------------------

FWLOGWATCH 0.0.22

fwlogwatch 0.0.22 is a RUS-CERT (Universitat Stuttgart Computer Emergency
Response Team) project to build an ipchains packet filter log analyzer with
text and html summary output, interactive incident report generator, and
realtime anomaly response capability

Link:
< http://net-security.org/various/software/972384323,89827,.shtml >

----------------------------------------------------------------------------

ETHEREAL 0.8.13

Ethereal is a free network protocol analyzer for Unix and Windows. It allows
you to examine data from a live network or from a capture file on disk. You
can interactively browse the capture data, viewing summary and detail information
for each packet. Ethereal has several powerful features, including a rich display
filter language and the ability to view the reconstructed stream of a TCP session

Link:
< http://net-security.org/various/software/972687117,59532,.shtml >

----------------------------------------------------------------------------

MIMEDEFANG V.0.5

With the proliferation of e-mail trojans and viruses, e-mail is becoming a preferred
mechanism for attacking PC's. The best way to avoid these trojans and viruses is
not to use any insecure client software on your PC (especially software from
Microsoft, which is notorious for security problems.) Use Linux as your operating
system and one of many excellent e-mail packages as your mail client

Link:
< http://net-security.org/various/software/972729772,36460,.shtml >

----------------------------------------------------------------------------

TRIPWIRE 2.3.47

Tripwire is a very popular file integrity checker which saves checksums of
selected files in a database. Any changes to these files are flagged and logged,
including those that were added or deleted, with optional email / pager reporting.
Databases and reports are cryptographically signed.


Link:
< http://net-security.org/various/software/972961108,21294,.shtml >

----------------------------------------------------------------------------




Defaced archives
------------------------

[23.10.2000] - North Eastern Wisconsin Linux Users Group
Original: http://www.newlug.org/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/23/www.newlug.org/

[24.10.2000] - Easy (YU)
Original: http://www.easy.co.yu/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/24/www.easy.co.yu/

[24.10.2000] - Philippine Air Force
Original: http://paf.mil.ph/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/24/paf.mil.ph/

[25.10.2000] - FSCIT Mil (SE)
Original: http://www.fscit.mil.se/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/25/www.fscit.mil.se/

[25.10.2000] - FHS Mil (SE)
Original: http://www.fhs.mil.se/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/25/www.fhs.mil.se/

[25.10.2000] - Honda Motor Company Singapore
Original: http://www.honda.com.sg/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/25/www.honda.com.sg/

[25.10.2000] - Letterkenny Institute of Technology
Original: http://dns2.lyit.ie/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/25/dns2.lyit.ie/

[26.10.2000] - Mercedes Benz
Original: http://www.mercedes-benz.ca/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/26/www.mercedes-benz.ca/

[26.10.2000] - World Brokers
Original: http://www.world-brokers.com/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/26/www.world-brokers.com/

[26.10.2000] - Leonardo DiCaprio
Original: http://www.leonardodicaprio.com/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/26/www.leonardodicaprio.com/

[27.10.2000] - Atlas Security
Original: http://www.atlassecurity.co.za/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/27/www.atlassecurity.co.za/

[27.10.2000] - Ford Motors, Brasil
Original: http://www.ford.com.br/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/27/www.ford.com.br/

[27.10.2000] - Windows Guru
Original: http://www.windowguru.com/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/27/www.windowguru.com/

[28.10.2000] - Governo Do Estado De Sao Paulo
Original: http://www.araraquara.sp.gov.br/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/28/www.araraquara.sp.gov.br/

[28.10.2000] - AntiOnline
Original: http://www.antionline.com/
Defaced: http://www.attrition.org/mirror/attrition/2000/10/28/www.antionline.com/

----------------------------------------------------------------------------


Questions, contributions, comments or ideas go to:

Help Net Security staff

staff@net-security.org
http://net-security.org


---------------------------------------------------------------------
To unsubscribe, e-mail: news-unsubscribe@net-security.org
For additional commands, e-mail: news-help@net-security.org

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close