Twenty Year Anniversary
Showing 1 - 16 of 16 RSS Feed


Posted Apr 13, 2001
Authored by Leigh Purdie, George Cora | Site

IIS 4.0 Security Checklist v1.2 - This document provides a series of recommendations for securing Internet Information Server version 4 on Windows NT. Designed to be used with WinNTConfig.txt.

tags | paper
systems | windows, nt
MD5 | 8eee3d7152ac8e0f97867508e4d267b7
Posted Feb 6, 2001
Authored by Leigh Purdie, George Cora | Site

Graded Risk Based Security Configuration for Windows NT - How to secure a Windows NT machine, based upon the agreed security risk profile of the target system. Includes Initial Installation, System Accounts, User Accounts and Rights, File and Registry Access Control, Network Access Control, Subsystems, Malicious Code, and Event Logging.

tags | paper, registry
systems | windows, nt
MD5 | 02b2acbc4cb845109818031df2346802
Posted Nov 19, 2000

IIS and NTS 4.0 Hardening Guide v1.1 - Detailed instructions on tightening down the security on an IIS 4.0 web server. Includes install and setup details, server configuration, hardening, registry edits, securing permissions, firewall ACL's, and SSHD. This hardening procedure should NOT be used on general-purpose NT servers on an internal LAN as it removes several of the services that NT uses for default functionality.

tags | paper, web, registry
MD5 | 60f5012d0eae4de8b74a697b38969202
Posted Oct 18, 2000
Authored by Cory L. Scott

Windows NT/2000 Event Log Management and Intrusion Detection - This powerpoint presentation focuses on how Windows NT/2000 administrators can get a handle on multiple event logs on many boxes, how to interface with the UNIX syslog facility, how to build a real-time monitoring system for a heterogeneous environment using inexpensive tools, and what event log messages to look for in regards to host-based intrusion detection.

tags | paper
systems | windows, unix, nt
MD5 | 7cf2f2635e5569aecb894d8bfe9520c0
Posted Aug 30, 2000
Authored by Neon-Lenz | Site

NT Blackhat paper is a beginner's document about NT-security. This document describes pretty well what malicious hackers exactly do when they attempt to hack your NT servers. Although it was meant for beginners, it is still suitable for novices, and maybe even experts who wants to read and maybe learn something that they didn't know.

tags | paper
MD5 | 2867800b1ee7110efa967e627ad864de
Posted Apr 13, 2000
Authored by Hochoa | Site

Modifying Windows NT Logon Credentials - A common attack against Windows NT consists in obtaining usernames and LM/NT password hashes using tools such as L0phtCrack, or tcpdump-smb. These are then used to gain unauthorized access to file and printer shares on the attacked server. To be able to use this username/hashes pairs instead of the commonly used username/password pairs, the attacker must use some kind of modified SMB client. SAMBA, a Unix implementation of the SMB/CIFS protocol, is normally used by attackers due to the availability of its source code, what makes its modification to conform to their needs extremely simple.

tags | paper, protocol
systems | windows, unix, nt
MD5 | ed288864627e0d1ba051fbd7b5474d32
Posted Apr 10, 2000
Authored by Neon-Lenz | Site

NTsec.doc is a Microsoft Word document concerning Remote NT-security, contains information about SMB, NetBIOS, NT-TCP/IP, and major IIS vulnerabilities. The current version is 1.0, updates are coming very soon.

tags | paper, remote, tcp, vulnerability
MD5 | 73adb12a9547bc4e066441e626577bb8
Posted Mar 25, 2000
Authored by P4riah

Information on how to exploit the IIS 4.0 / MDAC 1.5 RDS bug to its full potential.

tags | paper
MD5 | 8b6642597a4269be475910fd7bff481d
Posted Jan 7, 2000
Authored by Jason Jordan | Site

Windows NT Buffer Overflows From Start to Finish. Includes lots of demonstration code.

tags | paper, overflow
systems | windows, nt
MD5 | 41141436421022cc75b9fd500ce2b9c7
Posted Jan 2, 2000
Authored by JD Glaser | Site

Paper detailing a successful attack against a NT server running the avirt mail service. In powerpoint, html, and text format.

tags | paper
MD5 | 61a925ecb37fa72c1c76aac9c3717f76
Posted Nov 5, 1999
Authored by rain forest puppy

Antidote for RFPoison (Followup to RFP9906) Recently I released RFP9906: NT denial of service in services.exe (RFPoison). I included a limited sample exploit that would demonstrate the problem. Since then, I've worked with a few individuals and confirmed some configurations what will protect your system.

tags | paper, denial of service
MD5 | 21ba37765c5f231ee9672896229f8907
Posted Nov 3, 1999
Authored by rain forest puppy | Site

Advisory RFP9907 - You, your servers, RDS, and thousands of script kiddies. .gov, .mil, and even haven fallen lately to the hands of website defacers. Turns out, it's all been because of RDS. This paper is the straight story on fixing the RDS hole.

tags | paper
MD5 | 4d0f9583ce01d3e57f18fd11bd55b8e6
Posted Oct 25, 1999
Authored by Nishad P. Herath

Adding new services to the Windows NT kernel (Native API) on intel X86 processors. Version 0.81.

tags | paper, x86, kernel
systems | windows, nt
MD5 | 1187954d5ff261ed6572cb4c5878fef1
Posted Oct 14, 1999
Authored by JD Glaser

Updated paper on Intrusion Detection under Windows NT. This should make things a bit clearer. Microsoft Powerpoint presentation.

tags | paper
systems | windows, nt
MD5 | a6b974d58cccac1795f348a9b20fca96
Posted Oct 12, 1999
Authored by JD Glaser

Intrusion Auditing Under Windows NT. Microsoft PowerPoint presentation.

tags | paper
systems | windows, nt
MD5 | 23c6e8f8800427ce328732b27ccbf496
Posted Jun 28, 1998
Authored by Chessy

Spanish paper on NT Security. Rather comprehensive. Word97 format.

tags | paper
MD5 | 471022c65eacf52aa4253c1ed41b9b11
Page 1 of 1

Top Authors In Last 30 Days

Recent News

News RSS Feed
Equifax Fined By ICO Over Data Breach That Hit Britons
Posted Sep 20, 2018

tags | headline, privacy, britain, data loss, fraud, identity theft
Hackers Steal Credit Cards From Newegg, Researchers Say
Posted Sep 19, 2018

tags | headline, hacker, cybercrime, data loss, fraud
Mirai Botnet Creators Praised For Helping FBI, Won't Serve Prison Time
Posted Sep 19, 2018

tags | headline, hacker, government, malware, usa, botnet, fbi
US State Department Confirms Staff Email Hack
Posted Sep 19, 2018

tags | headline, hacker, government, privacy, email, usa, data loss, cyberwar
Hackers Peddle Thousands Of Air Miles On The Dark Web For Pocket Money
Posted Sep 19, 2018

tags | headline, hacker, cybercrime, fraud
US Judge Allows E-Voting Despite Hack Fears
Posted Sep 19, 2018

tags | headline, government, usa, fraud, flaw
Facebook Now Offers Bounties For Access Token Exposure
Posted Sep 19, 2018

tags | headline, hacker, data loss, facebook, social
A History Of Badgelife, Def Con's Unlikely Obsession With Artistic Circuit Boards
Posted Sep 19, 2018

tags | headline, hacker, conference
14 Million Records Exposed In GovPayNow Leak
Posted Sep 18, 2018

tags | headline, government, privacy, usa, data loss
"Lawful Intercept" Pegasus Spyware Found Deployed In 45 Countries
Posted Sep 18, 2018

tags | headline, government, phone, google, spyware, apple
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By