exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netsec46.txt

netsec46.txt
Posted Jan 15, 2001
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the News the past week. In this issue: New Guidelines for Prosecuting Computer Crimes.

SHA-256 | 8bc907f685dc3c31085988bb88b3ac4b67b1f0428030eae07f81ec15c2a5a5f8

netsec46.txt

Change Mirror Download
HNS Newsletter
Issue 46 - 15.01.2001
http://net-security.org

This is a newsletter delivered to you by Help Net Security. It covers weekly
roundups of security events that were in the news the past week. Visit Help
Net Security for the latest security news - http://www.net-security.org.

Subscribe to this weekly digest on:
http://www.net-security.org/text/newsletter

Archive of the newsletter in TXT and PDF format is available here:
http://www.net-security.org/news/archive/newsletter

Current subscriber count to this digest : 1754

Table of contents:

1) General security news
2) Security issues
3) Security world
4) Featured books
5) Defaced archives



General security news
---------------------

----------------------------------------------------------------------------

E-GAP CUTS OFF HACKER ACCESS
An Israeli high-tech firm says it has developed a system that cuts off the main
route used by most Internet hackers when they try to break into a company's
computer network. The new technology by start-up Whale Communications is
aimed primarily at e-commerce companies that offer goods or services to
consumers who sometimes are wary about providing credit card information
over the Internet. Most e-commerce sites use sophisticated encryption to
encode sensitive information and make it unreadable to outsiders. Whale's
system, called "E-Gap," goes another route. What it does is ensure that
hackers cannot jump from the Internet into a company's "back office" -
the internal Web server or computer where it stores sensitive information
such as a buyer's credit card details.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/business/0,1367,41044,00.html


WHAT'S IMPORTANT FOR INFORMATION SECURITY
The basic reasons we care about information systems security are that some
of our information needs to be protected against unauthorized disclosure for
legal and competitive reasons; all of the information we store and refer to
must be protected against accidental or deliberate modification and must be
available in a timely fashion. We must also establish and maintain the
authenticity (correct attribution) of documents we create, send and receive.
Finally, if poor security practices allow damage to our systems, we may be
subject to criminal or civil legal proceedings; if our negligence allows third
parties to be harmed via our compromised systems, there may be even
more severe legal problems.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/cover/coverstory20010108.html


EGGHEAD: NO EVIDENCE HACKER STOLE CREDIT CARD INFO
Egghead.com Inc. said that no customer credit card numbers appear to have
been stolen from its Web site, two and half weeks after the online retailer
announced it had detected an intruder in its computer systems. Only about
7,500 of the more than three million credit card accounts in Egghead's database
showed evidence of "suspected fraudulent activity", the company said, saying
those transactions may have been the result of unrelated thefts.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/zdnn/stories/news/0,4586,2672279,00.html


LINUXPPC SECURITY PRIMER, PART II
"If you're like most LinuxPPC users, a large portion of your computing time is
spent using network-based applications, either explicitly or implicitly. Unless
you maintain a private physical link with each computer you communicate with,
this means that your are both sending and receiving data over shared networks.
And this in turn means that your communications are potentially vulnerable to
inquisitive (but unwelcome) eavesdroppers."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://linuxppc.org/security/articles/lppc_security_primer_II.php3


MACROMEDIA: FLASH IS SECURE
Macromedia Inc. on Monday said its own tests have shown there is no risk that
its popular Flash multimedia player could allow a computer virus to be sent to
attack the computers of Internet users.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/zdnn/stories/news/0,4586,2672473,00.html


SEARCH AND SEIZURE EVIDENCE RETRIEVAL AND PROCESSING
This is the sixth article in a series written by Timothy Wright devoted to
providing a field guide for computer forensics - the investigation of computer
fraud and abuse. The field guide has thus far addressed questions and issues
fundamental to investigating computer crime, and detailed methods for
conducting searches and seizures of physical computer evidence for the
purpose of computer crime investigation. This article will examine the last
two stages of search and seizure: evidence retrieval and processing crime
scene evidence.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/ih/articles/crimeguide6.html


NT STILL MOST HACKED WEB SERVER PLATFORM
The year 2000 saw Windows NT steaming ahead yet again as the most hacked
web server operating system, after a majority of defaced pages were found to
be sitting on compromised NT boxes. As NT is one of the most popular options
for web servers, it appears that it is attacked most, however a number of
companies running web sites on variations of Linux also suffered the
embarrassment of defacement.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.uk.internet.com/Article/101161


TOP LEVEL DOMAINS: WINNERS AND LOSERS, 2000
"Over year 2000, Attrition.org recorded over 5800 defacements, over 2000 more
defacements over 1999. Where did all of these defacements come from? Did any
Top Level Domains manage to reduce their share of defacements over the last
year in what can only be described as a harsh environment? The answers
surprised me. I didn't expect to see Brazil leading those countries with gains,
or the U.S. military heading the list of those TLDs to reduce their absolute
share of defacements."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.attrition.org/security/commentary/winnersandlosers.html


ATTACKER BOMBS CHAT NETWORK
A Romanian attacker has launched a major distributed denial of service forcing
one of the largest IRC networks, Undernet, to shut down much of its service.
A number of Internet Service Providers hosting Undernet servers - including
some in the US, the Netherlands and France - have been hit with DDoS attacks.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/1/ns-20101.html


HISTORY LOOKS AT THE NSA
As anyone who watched Enemy of the State knows, the National Security
Agency is a rapacious beast with an appetite for data surpassed only by its
disregard for Americans' privacy. Or is the opposite true, and the ex-No Such
Agency staffed by ardent civil libertarians? To the NSA, of course, its devilish
reputation is merely an unfortunate Hollywood fiction. Its director, Lt. Gen.
Michael Hayden, has taken every opportunity to say so, most recently on a
History Channel documentary that aired for the first time Monday evening.
"It's absolutely critical that (Americans) don't fear the power that we have,"
Hayden said on the show.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/politics/0,1283,41063,00.html


WEAK SECURITY IN NUKE PLANT
A security guard is believed to have hacked his way into computer networks
at the Bradwell nuclear reactor in Essex near London and to have altered and
deleted information.
Link: http://www.theregister.co.uk/content/6/15947.html


LINUX.CONF.AU - THE HACKER'S CONFERENCE
The talk of Linux Australia at the moment is about Linux.conf.au. This four-day
gathering of some of the world's most influential Linux developers is being held
at the University of New South Wales, Sydney from 17 to 20 January.
Link: http://www.linuxworld.com.au/news.php3?nid=393&tid=2


BIOMETRICS - WHAT YOU NEED TO KNOW
Biometrics have garnered increasing attention and backing in the last few years.
We are promised a utopian existence: never again will you forget your password
or need to remember your access card to get into the building. Unfortunately, it
isn't quite this simple. While biometrics will be a significant portion of any
authentication or identification in the future, they cannot replace many
existing security systems without significant disadvantages. Using biometrics
in conjunction with other proven security methods can result in a stronger
solution; but using biometrics on their own is a very bad idea, for numerous
reasons.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/closet/closet20010110.html


POLICE: HACKERS OF INDIAN SITES TRACED TO PAKISTAN
Indian authorities and computer specialists have traced many cases of hacking
of Indian Internet sites to Pakistan. "Quite a few of hackers can be traced to
ISPs (Internet service providers) in Pakistan," R.K. Raghavan, director of the
Central Bureau of Investigation (CBI), told a seminar on Internet security in
the Indian capital. Raghavan said it would be difficult to nail hackers who broke
into computer systems without help from Pakistani law enforcers. Indian industry
officials say hackers broke into at least 635 Indian Internet sites last year.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://dailynews.yahoo.com/h/nm/20010110/wr/india_security_dc_1.html


BOOTS PENETRATED
Britain's biggest chemist had its corporate Web site attacked this morning - by
a poet. Instead of the usual corporate nonsense, the 534-word poem left
behind by 'Mentor' tells of the angst of a teenage hacker - but also the
personal discovery of computer crime. Called The Conscience of a Hacker,
there is a deliciously dark undercurrent that shines a light on teenage
angst in a digital generation.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/6/15958.html


U.S. TURNS ITS TECH EFFORTS TO PREVENTION
In a recent study about new national security threats, CSIS warned that it is
growing increasingly difficult to distinguish between threats from foreign militaries
or spies, terrorists, or run-of-the mill hackers. Plus, the interconnectedness of
America's many computer networks creates tasty new targets; for example,
taking down a large bank's computer system could do more damage than
attacking a bank building. The study also noted that 95 percent of U.S.
military traffic moves over civilian telecommunications and computer networks.
Link: http://enterprisesecurity.symantec.com/content.cfm?articleid=559&PID=1726127


WHAT WAS EBAY'S E-MAIL MOTIVE?
EBay is either a scheming marketing company or an innocent victim of mass
paranoia launched by a well-intentioned e-mail it sent to its users. The truth
may be out there, but no one seems to agree on what it is - except that the
seminal auction site has committed a serious PR blunder. And so the debate
rages on over whether companies should be allowed to act according to their
own benefit, if they should give users a fair chance to opt-out of marketing
plans, or if they should instead be legally required to strictly protect their
users' privacy above all else.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/business/0,1367,41116,00.html


EUROPE TRIES TO TAKE ON SPAMMERS
Having won the fight against telemarketers, European lawmakers turned their
sights on one of the banes of the new media age: spam. But at the first public
hearing to increase Internet privacy by, among other things, banning the
sending of unsolicited e-mails, the European Union commissioner charged
with "information society" initiatives conceded that the Web's global nature
made a crackdown difficult.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://news.excite.com/news/ap/010110/14/eu-fighting-spam


CLINTON: RELAX CRYPTO EXPORT CONTROLS
In a move that could be its final action regarding encryption, the Clinton
administration acknowledged that it can't control security using hardware-
based measures, because even the most innocuous home PCs can be strung
together to form a powerful computing system. The Department of Defense,
which has been working with the White House on the issue, agreed.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/zdnn/stories/news/0,4586,2673461,00.html


INFECTED OBJECTS - PART FOUR
No matter how quickly the speed of the Internet increases, we still find it
convenient to compress files before we send them. Once a file is compressed,
however, it becomes harder for a virus scanner to find any virus threat that
may be lurking inside it. The challenge of peering inside the various compression
and archival formats to discover the viruses hidden there has not gotten easier
over time. This article - the fourth in a series by Robert Vibert examining
different aspects of viruses - will discuss the implications of various forms
of file compression for virus protection.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/virus/articles/infobj4.html


ENEMIES OF THE INTERNET
Forty-five countries restrict their citizens' access to the internet - usually by
forcing them to subscribe to a state-run ISP. Twenty of these countries may
be described as real enemies of this new means of communication. On the
pretext of protecting the public rom "subversive ideas" or defending "national
security and unity", some governments totally prevent their citizens from
gaining access to the internet. Others control a single ISP or even several,
installing filters blocking access to web sites regarded as unsuitable and
sometimes forcing users to officially register with the authorities.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.rsf.fr/uk/homennemis.html


PERSONAL SIDE OF BEING A SYSADMIN
Have you got what it takes to be a sysadmin? Can you deal with an annoying
user without telling them off? How about that dreaded boss with an idea? In
this article, the Personal Side of being a Sysadmin, we will look at methods of
dealing with the day to day aspects of keeping all the kids happy in the sandbox.
Link: http://www.linux.com/sysadmin/newsitem.phtml?sid=1&aid=11529


WRITING INTERNET WORMS FOR FUN AND PROFIT
The media, kindly supported by AV "experts", have drawn an apocalyptical vison
of desctruction caused by little MS Outlook / VisualBasic worm, called "ILOVEYOU".
Rough estimations - $10M lost for "defending the disease", especially when you
look at increasing with the speed of light value of AV companies market shares,
made many people curious - is it really the worst disease ever? Or just another
lame VBS application that is not even able to spread without user "click-me"
interaction, and is limited to one, desk-end it's original version, kills mp3 files
on your disk. This article is a study of research on Internet worms.
Link: http://linuxnews.pl/news.html?id=41498


FBI TARGETS 7 HACKERS
The FBI is conducting an investigation into a ring of seven juvenile hackers -
three in the US and four based overseas - suspected of plotting a series of
virus and widespread denial-of-service attacks planned to take place on
Christmas and New Year's Eve 2000, sources said today. No arrests have
been made yet in the case, but several FBI field offices have conducted a
series of "preemptive" search warrants over the past two weeks to keep
the planned attacks from occurring, one FBI official told Newsbytes.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.newsbytes.com/news/01/160373.html


MAGICFX CHARGED
Jerome T. Heckenkamp, 21, is charged in a 16-count indictment with
unauthorized access into computers. Acting under the handle MagicFX
and Magic, Heckenkamp defaced eBay.com in 1999. He also allegedly
broke into computers at Exodus Communications Inc. , Juniper
Networks Inc., and Lycos Inc.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/zdnn/stories/news/0,4586,2673501,00.html


GEEKS DROOL OVER MAC SUPERDRIVE
The latest status symbol for the upscale cracker who likes to look stylish while
"appropriating" data may be Apple's new, top-of-the-line G4. That's not to say
that Apple set out to make a cracker's dream machine. The company intended
to create an affordable start-to-finish video and audio authoring and recording
system with the new "professional" G4 – which comes with a SuperDrive
capable of burning DVD and music CDs.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/technology/0,1282,41142,00.html


HYBRIS VIRUS: A SLEEPER HIT?
Hybris, a computer worm that uses encrypted plug-ins to update itself, could
be the sleeper hit of 2001, anti-virus experts say. "It's not a fast mailer or a
mass mailer. It's slow and subtle," said Roger Thompson, technical director of
malicious-code research for security firm TruSecure. But "slow and steady wins
the race." The spread of most computer worms tends to spike quickly and just
as quickly die out. But the 3-month-old Hybris worm shows no sign of dying
anytime soon, Thompson said.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://news.cnet.com/news/0-1007-201-4448139-0.html


DATA PROTECTION FEARS OVER FRAUD INVESTIGATORS' POWERS
Banks and credit reference companies are urging the Government to rethink
plans to give benefit fraud investigators free rein to access people's bank
accounts, credit card details, and credit ratings... Trade unions are threatening
to use the code to bring legal action against employers guilty of excessive
snooping on their workforce's e-mail and Internet habits. But the CBI said
businesses should be allowed to decide...
Link: http://www.computerweekly.co.uk/cwarchive/daily/20010112/cwcontainer.asp?name=C3.HTML&SubSection=6&ct=daily


INTRODUCTION TO SNOOPY
Although shared libraries present many advantages, they also have their
disadvantages. One obvious point of failure of the system would be if the
shared libraries are exploitable. Hence, the shared libraries must be trusted.
If they are not, the system's security if fully up to that of the shared library.
For example, consider an untrusted or exploited version of the c library. It
has a version of the commonly used 'printf' function that not only carries out
the tasks of the real printf, but in addition has a go at the filesystem, doing
something similar to 'rm -rf /' when it is being called as root. This can be
potentially disastrous. The first root user to come along could potentially
ruin the system.
Link: http://www.linux.com/newsitem.phtml?sid=1&aid=11528


THE FEDS'LL COME A-SNOOPIN'
Ever wonder how much leeway federal agents have when snooping through
your e-mail or computer files? The short answer: a lot. The U.S. Department
of Justice this week published new guidelines for police and prosecutors in
cases involving computer crimes. The 500 KB document includes a bevy of
recent court cases and covers new topics such as encryption, PDAs and
secret searches. It updates a 1994 manual, which the Electronic Privacy
Information Center had to file a Freedom of Information Act request to
obtain. No need to take such drastic steps this time: The Justice
Department has placed the report on its cybercrime.gov site.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/politics/0,1283,41133,00.html


SECURITY IS OUT OF STEP WITH EBUSINESS
Fewer than half of blue-chip companies believe that their ebusiness and
security strategies are effectively coordinated. Business managers are
guilty of demanding ebusiness at all costs and security is overlooked,
according to research by analyst group Xephon. IT managers at 64
companies across various industrial sectors were interviewed for the
report. Xephon blames the problem on the rigid nature of security
policies. "The results highlight the need for security policies to be
more flexible," said Mark Lillycrop, director of research at Xephon.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.vnunet.com/News/1116290


IRC ATTACK LINKED TO DOS THREAT
Recent cyberattacks on IRC services have now been linked to a National
Infrastructure Protection Center security warning that advised systems
administrators to protect their systems against a potential widespread
distributed denial of service attack over New Year's weekend. According
to court documents filed by the FBI as well as sources involved in the
investigation, the agency is now investigating a Lynwood, Washington
teenager. The teenager is also under investigation for attacking the
servers of DALNet, an IRC service.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/culture/0,1284,41167,00.html


PIMPSHIZ TALKS AFTER FBI RAID
"My defacements are protests," he said. "I want people to think about the
Napster case positively, not negatively." The state attorneys are waiting
for the FBI to complete forensics on the computer equipment seized from
the suspect's home. The equipment amounted to three computers, two
Palm III devices, a DVD player, and several boxes of computer-related
equipment, according to the teenager. Although the teenager has admitted
to almost 200 defacements, many of those are foreign Web sites outside
the jurisdiction of the FBI.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://news.cnet.com/news/0-1005-201-4460608-0.html


MALAYSIA GOVERNMENT TO BEEF UP SECURITY
The Malaysian government is taking drastic measures to combat an increasing
series of hacking incidents involving the Web sites of its agencies and ministries.
The measures include adding more information and communications technology
(ICT)-skilled staff to better manage Web sites, and ensuring that all security
modules and features of software programs used are optimized.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://asia.internet.com/biz/2001/01/0112-malaysia.html


ATTACKERS "WILL TARGET MOBILES NEXT"?
Network Associates says virus attacks are capable of raiding a mobile phone
to gain personal details about the user. In one case, a virus was able to glean
banking details from an Internet-enabled WAP mobile phone, the company says.
Sandra England, a President of one of Network Associations' divisions
specialising in encryption, said it was possible in theory to send a virus
as part of a text (SMS) message.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://itn.co.uk/news/20010112/business/09virus.shtml


ZOOM IN EMAIL SECURITY SCARE
Gabi Matthews, a customer with Zoom's free online email service, contacted
ZDNet Friday claiming she was shocked to be given access to another user's
account when trying to log in on Tuesday 2 January. She says she was
accidentally(?) allowed access to accounts belonging to four different
customers. Despite contacting technical staff at Zoom and being told
that the problem had been fixed, Matthews says she has still been able
to read(?!?) other user's email Friday. "It's absolutely unbelievable,"
Matthews says. "It's personal stuff and I'm thinking of closing the
account before the whole world can see it."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/1/ns-20208.html


EUROPEAN FIRMS HIT BY POTENT NEW VIRUS
Four European companies have lost all their data in an attack from a new HTML
virus, it emerged on Friday evening. According to an alert from anti-virus
developer Panda Software, the worm called Little Davinia spreads via the
internet and potentially wipes out all files on hard disks and network drives.
The virus began spreading from a "very large ISP" in Spain, which Panda has
refused to name. It also declined to name the four companies attacked. Panda
initially alerted the ISP to the virus and has worked to remove it from the
provider's systems.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.vnunet.com/News/1116313


THE FUTURE OF OPERATING SYSTEMS SECURITY
Often computer security takes us down strange paths; for example, what is
the connection between the Navajo language and the future of operating
systems? These subjects seem odd bedfellows to be sure; yet, we shall learn
that obscurity, contrary to the general maxim, sometimes does create a degree
of security. The current trends in OS development dwell on the mainstream
players: Linux, Unix, and Windows NT/2000 and their offshoots Trinux, Minix,
and Windows CE. Linux, for example, will probably continue with a 25% percent
annual growth rate for the next couple of years. Factors driving the immense
popularity of these OS families include economics, learning inertia, and the low
desire for the "overengineering" of security features.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/cover/coverstory20010115.html


FILE TRANSFER OPTIONS - PART I: SECURE IXPLORER
This is the first-part in a series of articles about different options for secure file
transfers. I won't cover how to sniff connections, steal passwords or if SSH is
really "secure". But hopefully, I can provide some information that will be valuable
for your web hosting clients and for you - the Apache webserver administrators.
This first article covers a file transfer client for the end users - it requires a
secure shell server to be installed on the web server. Yes, Secure iXplorer is
for Microsoft Windows. Basically, iXplorer is a Microsoft Explorer-like, graphical
front-end to a modified pscp, which is a text-based (DOS) scp client for
Windows. (Pscp is from the same author of the popular PuTTY SSH client).
Link: http://apachetoday.com/news_story.php3?ltsn=2001-01-12-003-06-OS-LF-AD


PROCESS ACCOUNTING WITH LASTCOMM AND SA
"Over a year ago, I had an interesting job of tracking down how a root
superuser account vanished. Once I was on the system, it appeared that
the issue was not malicious and I enjoyed the detective work tracking down
the problem. I searched RADIUS accounting logs, httpd logs and process
accounting logs and I was able to pin-point the problem (and the user) within
seconds: a faulty CGI provided a way for the root account to be removed.
One of the tools I used was lastcomm - the command for showing last
commands executed. This article covers the basics of enabling process
accounting and shows a few examples of using lastcomm and sa to read
and use the accounting data. These tools can help monitor user activity
and system usage."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.bsdtoday.com/2001/January/Features385.html

----------------------------------------------------------------------------




Security issues
---------------

All vulnerabilities are located at:
http://net-security.org/text/bugs


----------------------------------------------------------------------------

IS 5.0 ALLOWS VIEWING FILES USING %3F+.HTR
The following URL:
http://TARGETIIS/scripts/test.pl%3F+.htr
reveals the content of /scrips/test.pl instead of executing it. This may
giveway passwords in CGI and other stuff. If you are not patched the
following may work (not discovered by me):
http://TARGETIIS/scripts/test.pl+.htr This does not work for some types
of .ASP if they contain certain characters.
Link: http://www.net-security.org/text/bugs/978975449,10625,.shtml


IMAGECAST IC3 CONTROL CENTER DOS
ImageCast, a rapid-PC-deployment tool, much like Ghost, has problems handling
malformed input. These problems can result in a DoS against the ImageCast
Control Center.
Link: http://www.net-security.org/text/bugs/978976035,67157,.shtml


MACROMEDIA ON SHOCKWAVE FLASH BUFFER OVERFLOW
As was posted earlier to BUGTRAQ, an issue has been discovered with the
Macromedia Flash Player that shows a possible buffer overflow error when
the player encounters a maliciously or incorrectly created SWF file. After
an investigation, and consultation with the reporting engineer, Macromedia
has determined the following:
- The data being accessed is located entirely in a dynamically allocated
structure in the heap space of the application.
- The data access is limited to reading the information. At no time is the
buffer in question ever written to. Neither the heap, nor the stack is written
to during this processing, and at no time does this lead to the execution of
arbitrary data as native instructions.
Given the above information, it is Macromedia's belief that the error in question,
though unfortunate, does not constitute a significant security risk. The effects
of this defect are limited to the crashing of the users client (denial of service).
Link: http://www.net-security.org/text/bugs/978976480,96328,.shtml


LOTUS DOMINO: SECURITY HOLE THE SIZE OF TEXAS
Any authorized user of lotus domino mail system can gain unautiorized access
to *any* mailbox in the system by modifying the traffic between his client
and domino server or by modifying client software itself.
Link: http://www.net-security.org/text/bugs/978977775,88049,.shtml


INFOCURE "EXACT DENTAL" PMS SECURITY POLICY
Due to minimal documentation and anticipation of user incompetence, it has
become the policy of Infocure to make the default configuration of the Exact
Dental software so devoid of permissions and restrictions that virtually no one
will encounter difficulty using the system. Client workstations look to deposit
data on a network resource. These network resources are specified in the
exact.ini file (installed to c:\windows on client machines) as being "K:\NDCDENT\..."
In as much as the client anticipates that the k: drive is a mapping of the server's
c: drive, one needs only to realize that the Exact Dental software (which resides
in c:\NDCDent on the server) does not need a full path and a share compromising
security on the server to function. A relative path works fine.
Link: http://www.net-security.org/text/bugs/979055917,14876,.shtml


PGP 7.0 SIGNATURE VERIFICATION VULNERABILITY
There seems to be a vulnerability in the key import code in PGP 7.0 on the
Win32/Intel platform, causing a signature on a full exported and ASCII armored
key block not to be checked when "Decrypt/Verify" is selected to import the
key(s). This means that any signatures on the full exported key block is not
checked, opening the possibility for anyone who have write access to the file
to replace the keys without having to generate a new signature. Key signature
verification, however, is not affected by this vulnerability.
Link: http://www.net-security.org/text/bugs/979055938,89332,.shtml


WORKAROUND NO.1 TO LOTUS NOTES BUG
Today our Domino administrator (Robert Turnsek) and I (Miha Vitorovic) spent
some time trying to make the recent Domino vulnerability disappear. This is
what we came up with.
Domino Server 5.0.5
- Open the Administration Client
- Select the server you want to administer
- "Configuration" tab / "Server" section / Current server document :
Press the "Web" button
Select "Create URL mapping/redirection"
- In the URL redirection document
+ "Basics" tab
Select: URL ---> Redirection URL
+ "Mapping" tab
Incoming URL: /.nsf/*
Redirection URL: [the URL you want to redirect to, for example
"http://www.notes.net"]
- Save the document
- Restart the HTTP task
Link: http://www.net-security.org/text/bugs/979092758,87743,.shtml


WORKAROUND NO.2 TO LOTUS NOTES BUG
Well, as Lotus haven't released a fix for the *confirmed* bug, we get a
workaround. Adding the following line:
map */../* /something.nsf
at httpd.conf, seems to handle the bug. You should notice that EVERYTHING
using ../ links will stop working too, including the bug!
Link: http://www.net-security.org/text/bugs/979092786,46323,.shtml


NETSCREEN FIREWALL BUFFER OVERFLOW
NetScreen Firewall is a popular commercial firewall. It has a Web administration
interface (default listening at port 80) that allows firewall administrator to
configure firewall with browser. However, it is lack of length check-up of input
URL. Provided with a oversized URL request, a buffer overflow may take place
that will crash the NetScreen firewall. In that case, all connections through
firewall will be dropped, and the firewall won't response to any connection
request. Rebooting the firewall is required to regain its functions.
Link: http://www.net-security.org/text/bugs/979092823,58403,.shtml


LOTUS ON DOMINO SERVER VULNRABILITY
Lotus has published a statement regarding the recently reported issue "Domino
Server Directory Traversal Vulnerability".
Link: http://www.net-security.org/text/bugs/979235602,78963,.shtml


CONFERENCE ROOM VULNERABILITY
Conference Room 1.8.1x or older versions are subject to a DoS attack when
following commands are used.
Make to connections to the irc server second being the clone of other. On
second connection (clone)
type "/ns buddy on".
on first connection type "/ns buddy add < clone client nickname>".
on clone type "/ns auth accept 1"
and the services crashes.
Since conference room saves databases at 15min intervals, everything done in
this period will be deleted. Services cannot connect automatically to the server.
Only a "/servstart" issued by an ircop or admin will return the services to normal
functionality and connect to server.
Link: http://www.net-security.org/text/bugs/979235618,27534,.shtml


CRASHING THTTPD
It appears thttpd is resorting to vsprintf() numerous times because it is lacking
snprintf() and vsnprintf(). The thttpd source clearly states that the code may
not be secure when running in an environment that does not contain the proper
header files.
Link: http://www.net-security.org/text/bugs/979235636,24982,.shtml


BACKDOOR IN BORLAND INTERBASE
It has been found that a backdoor has been coded into InterBase since 1992.
This previously-secret account has full access and an unchangeable, known
username and password. With this knowlege, attackers can remotely gain
read and write access to any database on the server.
Link: http://www.net-security.org/text/bugs/979325025,67142,.shtml


EAGLE USA SHIPMENT TRACKING SOFTWARE
"I have discovered that the shipping software distributed by EAGLE USA sends
Username/Password information in clear text over the internet. This can be
replicated by installing the software and using a sniffer to view the HTML string
that gets passed to the server. Very clearly the Username password combo
appears in clear text in the string. This information could be very useful in a
corporate espionage situation in which gaining information about product
shipments by a competitor (how many of what product where shipped at
what cost to what customer when) could be of use."
Link: http://www.net-security.org/text/bugs/979325069,4092,.shtml


ULTRABOARD CGI DIRECTORY PERMISSION PROBLEM
In default installation, following Directories below ub2k cgi installtion directory
have 777 permission.
./Private/Skins
./Private/Database
./Private/Backups
You can add some cgi scripts to theses directories and can gain webserver uid.
Link: http://www.net-security.org/text/bugs/979405525,56482,.shtml


BASILIX WEBMAIL SYSTEM VULNERABILITY
There is a simple mistake in the Basilix Webmail system. If .class file extension is
not defined as a PHP script at the httpd.conf any attacker may see very valuable
information by simply enterering the URL :
http://victim.host/mysql.class
MySQL password and username is stored in this file.
Link: http://www.net-security.org/text/bugs/979405598,11062,.shtml

----------------------------------------------------------------------------




Security world
--------------

All press releases are located at:
http://net-security.org/text/press

----------------------------------------------------------------------------

GETRONICS SELECTS SYBARI'S ANTIGEN - [08.01.2001]

Sybari Software, Inc., the premier antivirus and security specialist for groupware
solutions, announced that it has signed a global agreement with Getronics to
provide high-level antivirus protection and information security for its global
messaging communications infrastructure. Getronics, headquartered in Amsterdam
with U.S. headquarters in Billerica, MA, is a worldwide leader in providing information
and communication technology solutions.

Press release:
< http://www.net-security.org/text/press/978971806,10384,.shtml >

----------------------------------------------------------------------------

DEFENDNET SOLUTIONS PARTNERS WITH BUYTELCO - [08.01.2001]

DefendNet Solutions, Inc., a leading provider of managed Internet security
solutions, announced that it has formed a strategic partnership with BuyTelco,
Inc., a leading telecom services provider, to resell DefendNet's managed
security solutions through the BuyTelco.com Web site.

Press release:
< http://www.net-security.org/text/press/978971856,12347,.shtml >

----------------------------------------------------------------------------

CYBERGUARD KEEPS NETWORKS SAFER - [08.01.2001]

CyberGuard Corporation, the technology leader in network security, announced
that its line of premium firewall appliances, which includes CyberGuard STARLord,
KnightSTAR and FireSTAR, are the first firewall appliances in the world to receive
Common Criteria Evaluation Assurance Level 4 (EAL4) certification, the most
prestigious and rigorous IT security evaluation process available.

Press release:
< http://www.net-security.org/text/press/978971921,45076,.shtml >

----------------------------------------------------------------------------

SYMANTEC INCLUDED IN 'BEST OF THE BEST' - [08.01.2001]

Symantec Corp. (Nasdaq:SYMC), a world leader in Internet security technology,
announced that two of its best-of-breed security solutions have been named to
the annual "Best of the Best" list by Smart Business magazine. Ziff Davis editors
named Norton AntiVirus 2001 the best anti-virus software of the year and Norton
Personal Firewall 2001 one of the top personal firewall solutions for 2000. Norton
AntiVirus is the world's leading anti-virus software. Norton Personal Firewall
ensures maximum defense against hackers by securing systems, safeguarding
privacy, and alerting users to attempted intrusions.

Press release:
< http://www.net-security.org/text/press/978971971,90511,.shtml >

----------------------------------------------------------------------------

REDSIREN TO USE XCERT SENTRY PKI - [08.01.2001]

Xcert, a leader in software products for securing business transactions and
communications over the Internet, has partnered with RedSiren Technologies,
Inc. a provider of IT infrastructure availability, performance and security services,
to enable RedSiren to use Xcert Sentry Public Key Infrastructure (PKI) and
digital certificate technology.

Press release:
< http://www.net-security.org/text/press/978972056,19654,.shtml >

----------------------------------------------------------------------------

BALTIMORE TECH. SUPPORT CISCO SYSTEMS SAFE - [08.01.2001]

Baltimore Technologies, a global leader in e-security, announced support for the
Cisco SAFE blueprint for secure e-Business from Cisco Systems, Inc. Cisco SAFE
is a flexible, comprehensive security blueprint that is designed to help
organizations securely engage in e-Business.

Press release:
< http://www.net-security.org/text/press/978972140,344,.shtml >

----------------------------------------------------------------------------

SANCTUM SUPPORTS CISCO SAFE BLUEPRINT - [08.01.2001]

Sanctum, Inc., the established leader in automated Web application control and
security software, anounced its participation in the Cisco Security and VPN
Associate Program, as well as its endorsement of Cisco Systems, Inc.'s new
security blueprint for e-Business, called Cisco SAFE.

Press release:
< http://www.net-security.org/text/press/978972243,72165,.shtml >

----------------------------------------------------------------------------

HUSH COMMUNICATIONS AWARDED PATENT - [08.01.2001]

Hush Communications (www.hush.com), a leading global provider of managed
security solutions and encryption key serving technology, announced it has
been granted a patent for its revolutionary key pair management technology
that enables personal computer users to send and receive fully encrypted
electronic communications. Hush Communications, the category leader in
key pair management technology, now has the exclusive intellectual
ownership of its core technology, the Hush Encryption Engine.

Press release:
< http://www.net-security.org/text/press/978972364,61977,.shtml >

----------------------------------------------------------------------------

EMAIL SECURITY FOR USERS OF LOTUS NOTES - [08.01.2001]

ZixIt Corporation, premier provider of products and services that bring privacy
and security to Internet communications, and IT FACTORY Inc., the leading
supplier of collaborative e-business solutions, announced a strategic partnership
to bring ZixIt's award-winning email security products, ZixMail and SecureDelivery,
to the Lotus Notes environment.

Press release:
< http://www.net-security.org/text/press/978972430,34130,.shtml >

----------------------------------------------------------------------------

ENTRUST TO SECURE VODAFONE'S 550,000 CUSTOMERS - [09.01.2001]

Entrust Technologies Inc., a global leader in solutions that bring trust to
e-business, announced a contract with Vodafone Corporate, the specialist
service provider division of Vodafone, to provide secure and controlled
extranet access for its UK customers.

Press release:
< http://www.net-security.org/text/press/979056213,58590,.shtml >

----------------------------------------------------------------------------

MISSION-CRITICAL DATA DELIVERY - [09.01.2001]

Atabok Inc., formerly known as e-Parcel, is a leading provider of digital logistics
solutions. Atabok's superior technology provides solutions for efficient, secure
and reliable transmission and control of digital assets. Atabok assists clients in
developing secure, efficient reliable logistics for digital assets, such as
communications, data, sensitive information, and graphics, to their intended
audience. Additionally, the company's solutions allow constant control over
assets, even after delivery, for the remainder of their lifecycle.

Press release:
< http://www.net-security.org/text/press/979056355,419,.shtml >

----------------------------------------------------------------------------

SECURITYFOCUS.COM SECURES FUNDING - [09.01.2001]

SecurityFocus.com, the leading provider of security intelligence services for
business, announced that it has closed on an additional $1 million of Series B
funding, bringing the total Series B to $2.5 million. The capital was provided by
a group of private angel investors. The company will use the funds to accelerate
the launch of its next generation of security intelligence services.

Press release:
< http://www.net-security.org/text/press/979056443,15777,.shtml >

----------------------------------------------------------------------------

REGISTER.COM LAUNCHES ESECURITY SOLUTION - [09.01.2001]

Registrars on the Internet, announced the launch of CommerceLock, a digital
certificate security product that enables businesses to protect their web-based
transactions easily and affordably. CommerceLock will use the highest level of
e-security technology (128 bit) from Baltimore Technologies enabling register.com
to issue digital certificates to online businesses at an introductory rate of $149
per certificate.

Press release:
< http://www.net-security.org/text/press/979056580,72027,.shtml >

----------------------------------------------------------------------------

SUMMERCON 2001 IN NETHERLANDS - [09.01.2001]

Summercon 2001
The Grand Hotel Krasnapolsky
01-03 June 2001
Amsterdam, NL

This year's Summercon will be quite different from those of years past. For the
first time ever the conference will be outside of the United States with this
year’s venue being the Netherlands.

Press release:
< http://www.net-security.org/text/press/979093015,9968,.shtml >

----------------------------------------------------------------------------

ALADDIN DISCOVERS CREATORS OF HYBRIS WORM - [10.01.2001]

Aladdin Knowledge Systems, a global leader in the field of Internet content and
software security, announced its Content Security Response Team (CSRT) has
discovered the creators of the common Hybris vandal that has hit numerous
organizations around the world.

Press release:
< http://www.net-security.org/text/press/979093259,46697,.shtml >

----------------------------------------------------------------------------

SYMANTEC SECURES EARTHLINK'S MAC USERS - [10.01.2001]

Symantec Corp. announced that EarthLink, the nation's second largest ISP,
will make available the newest version of Symantec Security Check, which
now supports both PCs and Macintosh systems, to Macintosh users who
access EarthLink's Web site (www.earthlink.net). Symantec Security Check
analyzes a Macintosh user's computer for potential security risks and
recommends ways to secure those risks.

Press release:
< http://www.net-security.org/text/press/979093401,86162,.shtml >

----------------------------------------------------------------------------

ALADDIN ANNOUNCES HASP4 FOR MAC OS X - [10.01.2001]

Aladdin Knowledge Systems, a global leader in the field of Internet content and
software security, announced readiness of HASP4 USB for Mac OS X. HASP4 is
the latest hardware-based software protection system designed to offer
unparalleled security in a multi-platform environment. Live demonstrations
of the HASP4 solution for Mac OS X are scheduled to take place at Aladdin's
MacWorld Booth No.3240.

Press release:
< http://www.net-security.org/text/press/979093515,25898,.shtml >

----------------------------------------------------------------------------

INTRUSION.COM AND DELTACOM PARTNER - [11.01.2001]

Intrusion.com, Inc., a leading provider of enterprise security solutions for the
information-driven economy, and e deltacom, the Atlanta-based division of ITC
DeltaCom, Inc. announced they will work together to manage network and
platform security at e deltacom's new data center in Suwanee, Ga.

Press release:
< http://www.net-security.org/text/press/979235084,4547,.shtml >

----------------------------------------------------------------------------

TWO NEW SECURITY PRODUCTS FROM ANYWARE TECH - [11.01.2001]

- The EverLink SRAC (Secure Remote Access & Control) Server 1.0: Fully
functional without any client software installation, the SRAC Server supports
a broad range of network applications, platforms and protocols, and won't
cause any changes to existing firewalls.
- The EverLink CA (Certificate Authority) Server 1.0: With the PKI compliant
CA Server, certificate application, distribution and management have just
become easier. Anyware Technology has announced two new additions to its
fine line of software-based, network security products: the EverLink SRAC
Server and the EverLink CA Server.

Press release:
< http://www.net-security.org/text/press/979235311,83635,.shtml >

----------------------------------------------------------------------------

Brilaw International Provide Extra Security - [15.01.2001]

North West-based Brilaw International, the security systems specialist are proud
to announce that they have become an authorised reseller of Internet Security
Systems (ISS) and their range of intrusion detection and vulnerability
assessment tools.

Press release:
< http://www.net-security.org/text/press/979574057,76947,.shtml >

----------------------------------------------------------------------------

PRESENTING INFOSECURITY UNIVERSITY - [15.01.2001]

At the invitation of COMDEX, MIS Training Institute and Information Security
Institute (ISI) will present InfoSecurity University at COMDEX Chicago,
April 3-4, 2001.

Press release:
< http://www.net-security.org/text/press/979574372,8808,.shtml >

----------------------------------------------------------------------------

ANTIVIRUS PROTECTION FOR LOTUS NOTES - [15.01.2001]

Sybari Software, Inc., the premier antivirus and security specialist for groupware
solutions, today announced the release of Antigen 6 for Lotus Notes and Domino,
the next generation in antivirus protection for groupware.

Press release:
< http://www.net-security.org/text/press/979574424,33632,.shtml >

----------------------------------------------------------------------------




Featured books
----------------

The HNS bookstore is located at:
http://net-security.org/various/bookstore

Suggestions for books to be included into our bookstore
can be sent to staff@net-security.org

----------------------------------------------------------------------------

CRYPTO: WHEN THE CODE REBELS BEAT THE GOVERNMENT -
SAVING PRIVACY IN THE DIGITAL AGE

Crypto is about privacy in the information age and about the nerds and
visionaries who, nearly twenty years ago, predicted that the Internet's
greatest virtue - free access to information - was also its most perilous
drawback: a possible end to privacy. Levy explores what turned out to be
a decisive development in the crypto wars: the unlikely alliance between
the computer geeks and big business as they fought the government's
stranglehold on the keys to information in a networked world.

Book:
< http://www.amazon.com/exec/obidos/ASIN/0670859508/netsecurity >

----------------------------------------------------------------------------

MISSION CRITICAL INTERNET SECURITY (MISSION CRITICAL SERIES)

The growth of the Internet and its reach into the fabric of business and
personal life has outdistanced most organizations' ability to protect the
confidentiality and integrity of information. The increased exposure and
the constant escalation of threats to network security have increased
the need for effective controls that can restore availability, confidentiality,
and integrity to information systems. Mission Critical Internet Security
shows how security can be provided in TCP/IP at any layer, and outlines
the advantages and disadvantages of each approach. This book will
answer the questions you have about Internet Security, including: If I
use protocol switching on my network, what protocol should I use in
place of IP? • Should I be placing my VPN gateway at the same level
as my firewall? • Can I use IPSec to secure communications with my
Win 9x machines? • Are there back doors in PGP? • Would a firewall or
other security product interfere with the IDS? • How does SOCKS Proxy
differ from WinSock Proxy? • I am setting up my outbound access control
lists to specify which traffic I will permit users to use. How do I know
which TCP or UDP port a particular application uses?

Book:
< http://www.amazon.com/exec/obidos/ASIN/1928994202/netsecurity >

----------------------------------------------------------------------------

CRYPTOGRAPHY DECRYPTED: A PICTORIAL INTRODUCTION TO DIGITAL SECURITY

The book provides a historical framework on which to build your understanding
of how and why computer cryptography works. After a discussion of how
cryptography has evolved into an essential Internet tool, we analyze secret
key exchange problems and then explain the evolution of public key cryptography,
with its solution to the key exchange problem. Along the way we explain some
simple background on the math tricks that make public key cryptography secure.
Traditionally, those who have thoroughly understood cryptography have been
trained as mathematicians or scientists. Our goal here is to explain computer
cryptography with rather little discussion of math. If the esoteric details aren't
of immediate concern to you, you can skip Chapter 11 ("Making Public Keys: Math
Tricks"), Chapter 14 ("Message Digest Assurances"), and the appendixes without
diminishing your understanding of the basic concepts. Appendix A describes some
aspects of public key mathematics, including inverses, primes, the Fermat test,
Diffie-Hellman, DSA, elliptic curve, and pseudo-random number generation.
Appendix B provides details of IPsec, a security system introduced in Chapter 21.

Book:
< http://www.amazon.com/exec/obidos/ASIN/0201616475/netsecurity >

----------------------------------------------------------------------------

BUILDING STORAGE NETWORKS (NETWORKING)

The amount of electronic data being transmitted is skyrocketing - making the
need for storage capacity tremendous. Explains innovative strategies for storing,
accessing, and protecting data. Provides valuable information on the latest
technologies, including Storage Area Networks (SAN), Network Attached Storage
(NAS), and high Availability (HA) clustering solutions. Includes 16 page Blueprint
section displaying network storage topolgies and six case studies of network
storage strategies used in real corporations.

Book:
< http://www.amazon.com/exec/obidos/ASIN/0072130725/netsecurity >

----------------------------------------------------------------------------

LINUX SHELLS BY EXAMPLE (WITH CD-ROM)

Topics covered: Survey of Unix shells (the Bourne, C, and Korn shells), survey
of Linux shells (the Bourne Again and TC shells), processes, shell environments,
tutorial for regular expressions, grep for file searches, the streamlined editor
(sed), awk/nawk/gawk scripts, gawk basics and expressions, gawk programming
(variables, arrays, flow control, built-in and user-defined functions), the bash
and tcsh shells (interactive mode, programming tutorial for shell scripts),
reference to common Linux/Unix utilities, comparison of shells, and tips for
using correct quoting styles within shells.

Book:
< http://www.amazon.com/exec/obidos/ASIN/0130147117/netsecurity >

----------------------------------------------------------------------------

MANAGING TELECOMMUNICATIONS AND NETWORKING TECHNOLOGIES IN
THE 21ST CENTURY: ISSUES AND TRENDS

Excerpted from the book: "These are exciting and challenging times for the
fields of telecommunications and networking. They are exciting because we
are witnesses to an explosion in technological developments in almost all
aspects of the fields. 'Convergence' is now the watchword when speaking
of telecommunications and networking. The coming together of
telecommunications and computing technologies portend a future of
ubiquitous, high bandwidth, multimedia communications. Such a scenario
was almost undreamed of a few..."

Book:
< http://www.amazon.com/exec/obidos/ASIN/1878289969/netsecurity >

----------------------------------------------------------------------------




Defaced archives
------------------------

[09.01.2001] - Banco Internacional (Ecuador)
Original: http://www.bancointernacional.com.ec/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/09/www.bancointernacional.com.ec/

[09.01.2001] - Linux Edu (CN)
Original: http://www.linux.edu.cn/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/09/www.linux.edu.cn/

[09.01.2001] - Linux.co.cr
Original: http://www.linux.co.cr/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/09/www.linux.co.cr/

[09.01.2001] - The British Council
Original: http://www.britcoun.org/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/09/www.britcoun.org/

[09.01.2001] - MP3.co.uk
Original: http://www.mp3.co.uk/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/09/www.mp3.co.uk/

[10.01.2001] - Mirror of Astalavista
Original: http://kr.astalavista.box.sk/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/10/kr.astalavista.box.sk/

[10.01.2001] - Ministry of Agriculture and Forestry - Croatia
Original: http://www.mps.hr/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/10/www.mps.hr/

[11.01.2001] - Salmon and Steelhead Habitat Inventory and Assessment Project (SSHIAP)
Original: http://bulltrout.nwifc.wa.gov/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/11/bulltrout.nwifc.wa.gov/

[11.01.2001] - Governo do Estado de Mato Grosso do Sul
Original: http://www.sefaz.ms.gov.br/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/11/www.sefaz.ms.gov.br/

[11.01.2001] - Office of the Deputy Chief of Staff, Information Management, HQ USAREUR/7A
Original: http://www.aeaim.hqusareur.army.mil/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/11/www.aeaim.hqusareur.army.mil/

[13.01.2001] - National Centre for Radio Astrophysics, India
Original: http://servo.gmrt.ncra.tifr.res.in/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/13/servo.gmrt.ncra.tifr.res.in/

[13.01.2001] - McDonalds (South Africa)
Original: http://www.mcd.co.za/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/13/www.mcd.co.za/

[13.01.2001] - Austin, Texas Capital Metro Transit
Original: http://www.capmetro.austin.tx.us/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/13/www.capmetro.austin.tx.us/

----------------------------------------------------------------------------


Questions, contributions, comments or ideas go to:

Help Net Security staff

staff@net-security.org
http://net-security.org



---------------------------------------------------------------------
To unsubscribe, e-mail: news-unsubscribe@net-security.org
For additional commands, e-mail: news-help@net-security.org

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close