Exploit the possiblities
Showing 1 - 16 of 16 RSS Feed


Posted Apr 13, 2001
Authored by Leigh Purdie, George Cora | Site intersectalliance.com

IIS 4.0 Security Checklist v1.2 - This document provides a series of recommendations for securing Internet Information Server version 4 on Windows NT. Designed to be used with WinNTConfig.txt.

tags | paper
systems | windows, nt
MD5 | 8eee3d7152ac8e0f97867508e4d267b7
Posted Feb 6, 2001
Authored by Leigh Purdie, George Cora | Site intersectalliance.com

Graded Risk Based Security Configuration for Windows NT - How to secure a Windows NT machine, based upon the agreed security risk profile of the target system. Includes Initial Installation, System Accounts, User Accounts and Rights, File and Registry Access Control, Network Access Control, Subsystems, Malicious Code, and Event Logging.

tags | paper, registry
systems | windows, nt
MD5 | 02b2acbc4cb845109818031df2346802
Posted Nov 19, 2000
Site shebeen.com

IIS and NTS 4.0 Hardening Guide v1.1 - Detailed instructions on tightening down the security on an IIS 4.0 web server. Includes install and setup details, server configuration, hardening, registry edits, securing permissions, firewall ACL's, and SSHD. This hardening procedure should NOT be used on general-purpose NT servers on an internal LAN as it removes several of the services that NT uses for default functionality.

tags | paper, web, registry
MD5 | 60f5012d0eae4de8b74a697b38969202
Posted Oct 18, 2000
Authored by Cory L. Scott

Windows NT/2000 Event Log Management and Intrusion Detection - This powerpoint presentation focuses on how Windows NT/2000 administrators can get a handle on multiple event logs on many boxes, how to interface with the UNIX syslog facility, how to build a real-time monitoring system for a heterogeneous environment using inexpensive tools, and what event log messages to look for in regards to host-based intrusion detection.

tags | paper
systems | windows, unix, nt
MD5 | 7cf2f2635e5569aecb894d8bfe9520c0
Posted Aug 30, 2000
Authored by Neon-Lenz | Site TheGovernment.com

NT Blackhat paper is a beginner's document about NT-security. This document describes pretty well what malicious hackers exactly do when they attempt to hack your NT servers. Although it was meant for beginners, it is still suitable for novices, and maybe even experts who wants to read and maybe learn something that they didn't know.

tags | paper
MD5 | 2867800b1ee7110efa967e627ad864de
Posted Apr 13, 2000
Authored by Hochoa | Site core-sdi.com

Modifying Windows NT Logon Credentials - A common attack against Windows NT consists in obtaining usernames and LM/NT password hashes using tools such as L0phtCrack, or tcpdump-smb. These are then used to gain unauthorized access to file and printer shares on the attacked server. To be able to use this username/hashes pairs instead of the commonly used username/password pairs, the attacker must use some kind of modified SMB client. SAMBA, a Unix implementation of the SMB/CIFS protocol, is normally used by attackers due to the availability of its source code, what makes its modification to conform to their needs extremely simple.

tags | paper, protocol
systems | windows, unix, nt
MD5 | ed288864627e0d1ba051fbd7b5474d32
Posted Apr 10, 2000
Authored by Neon-Lenz | Site ellicit.org

NTsec.doc is a Microsoft Word document concerning Remote NT-security, contains information about SMB, NetBIOS, NT-TCP/IP, and major IIS vulnerabilities. The current version is 1.0, updates are coming very soon.

tags | paper, remote, tcp, vulnerability
MD5 | 73adb12a9547bc4e066441e626577bb8
Posted Mar 25, 2000
Authored by P4riah

Information on how to exploit the IIS 4.0 / MDAC 1.5 RDS bug to its full potential.

tags | paper
MD5 | 8b6642597a4269be475910fd7bff481d
Posted Jan 7, 2000
Authored by Jason Jordan | Site technotronic.com

Windows NT Buffer Overflows From Start to Finish. Includes lots of demonstration code.

tags | paper, overflow
systems | windows, nt
MD5 | 41141436421022cc75b9fd500ce2b9c7
Posted Jan 2, 2000
Authored by JD Glaser | Site ntobjectives.com

Paper detailing a successful attack against a NT server running the avirt mail service. In powerpoint, html, and text format.

tags | paper
MD5 | 61a925ecb37fa72c1c76aac9c3717f76
Posted Nov 5, 1999
Authored by rain forest puppy

Antidote for RFPoison (Followup to RFP9906) Recently I released RFP9906: NT denial of service in services.exe (RFPoison). I included a limited sample exploit that would demonstrate the problem. Since then, I've worked with a few individuals and confirmed some configurations what will protect your system.

tags | paper, denial of service
MD5 | 21ba37765c5f231ee9672896229f8907
Posted Nov 3, 1999
Authored by rain forest puppy | Site wiretrip.net

Advisory RFP9907 - You, your servers, RDS, and thousands of script kiddies. .gov, .mil, and even microsoft.com haven fallen lately to the hands of website defacers. Turns out, it's all been because of RDS. This paper is the straight story on fixing the RDS hole.

tags | paper
MD5 | 4d0f9583ce01d3e57f18fd11bd55b8e6
Posted Oct 25, 1999
Authored by Nishad P. Herath

Adding new services to the Windows NT kernel (Native API) on intel X86 processors. Version 0.81.

tags | paper, x86, kernel
systems | windows, nt
MD5 | 1187954d5ff261ed6572cb4c5878fef1
Posted Oct 14, 1999
Authored by JD Glaser

Updated paper on Intrusion Detection under Windows NT. This should make things a bit clearer. Microsoft Powerpoint presentation.

tags | paper
systems | windows, nt
MD5 | a6b974d58cccac1795f348a9b20fca96
Posted Oct 12, 1999
Authored by JD Glaser

Intrusion Auditing Under Windows NT. Microsoft PowerPoint presentation.

tags | paper
systems | windows, nt
MD5 | 23c6e8f8800427ce328732b27ccbf496
Posted Jun 28, 1998
Authored by Chessy

Spanish paper on NT Security. Rather comprehensive. Word97 format.

tags | paper
MD5 | 471022c65eacf52aa4253c1ed41b9b11
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Variants Of Meltdown-Spectre Flaws May Have Been Discovered
Posted Feb 16, 2018

tags | headline, hacker, flaw, intel
Former ICE Top Lawyer Stole Alien Identities From Govt Database
Posted Feb 16, 2018

tags | headline, government, privacy, usa, fraud, identity theft
New Chaos Linux Backdoor Is Pretty Stealthy
Posted Feb 16, 2018

tags | headline, hacker, malware, linux, backdoor
A Potent Botnet Is Exploiting A Critical Router Bug That May Never Be Fixed
Posted Feb 15, 2018

tags | headline, hacker, botnet, flaw
Anti-Clinton Wikileaks Chat Leaked
Posted Feb 15, 2018

tags | headline, government, data loss, fraud
NSA, FBI, CIA All Agree You Shouldn't Trust A Huawei Phone
Posted Feb 15, 2018

tags | headline, government, usa, phone, china, fbi, nsa, cia
Unsecured Server Exposed Thousands Of FedEx Customer Records
Posted Feb 15, 2018

tags | headline, privacy, data loss, flaw
Hack The Air Force 2.0 Uncovers Over 100 Vulnerabilities
Posted Feb 15, 2018

tags | headline, hacker, government, usa, flaw
UK Blames Russia For Malicious NotPetya Cyber Attack
Posted Feb 15, 2018

tags | headline, government, malware, britain, russia, cyberwar
Until Last Week, You Could Pwn KDE Linux Desktop With A USB Stick
Posted Feb 13, 2018

tags | headline, linux, flaw
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By