Dragonmount Networks has released Part 2 of a multipart series on the Transmission Control Protocol. This installment looks at how to use tools provided with your operating system to see TCP and related protocols in action. It also describes the flow of data between machines at multiple levels during simple network operations.
f51add40b996ecf1990c275bbd083fcae7cd466641b1e38a2b0bf55d8417a4af
Decrypt Maus Trap passwords, a Win9x desktop lock down tool. Source included.
cee06ccc56185ba5f2598caeccf80f3a091926be4713d63569cf40302d068014
Dragonmount Networks has broken the weak encryption used on Sybergen Secure Desktop passwords. This windows app will display the password.
94356d13911ad5852a918419555188a7bce26d68dae8fbcaa89a9ad827e668a2
Dragonmount Networks has released Part 1 of Using Lookout, which gives an overview of how the Lookout program can be used to quickly test servers for the presence of buffer overflows by taking you through a routine example.
29af8aa269b9de7ff54d1b8593f69425bbc591f9ac74957ead8c9f7b27f6ef7f
Dragonmount Networks Advisory - DNA1999-002 Fictional Daemon (an FTP and telnet server) contains several security problems including possible DOS attacks, probably remote execution of code, and poor logging practices. In addition, any user with write permission can retrieve or delete any file on the system, even above the root directory.
f35dfe1dd5a0a5d04eff0de52b28e065943dab9688194e2f0a7b1e8f3f4c1858
Dragonmount Networks has released Part 1 of a multipart series on the Transmission Control Protocol. This first discussion is geared towards those new to the Internet who want an overview of the processes involved in client/server communications. A brief history of the Internet, discussion of ports, the 3-way handshake, and SEQ/ACK numbers are all included.
f3bcf352a2c27fc77330298259a54d48d655f8a17860eee8facd4fce4ee33641
Dragonmount Networks Advisory 1999-001 [DNA-1999-001] Intersoft's NetFTP daemon (included with NetTerm) has many insecure options enabled by default, including allowing access to the entire hard drive to everybody. There are also numerous buffer overflow problems, resulting in remote Denial of Service and possible remote execution of code.
21e973724a97cfd33d343c72679ad892148ca46d585d7f456c876ae569d173c8