Hacker writes rootkit for Cisco’s routers

Thursday, May 15th, 2008

A security researcher has developed malicious rootkit software for Cisco's routers, a development that has placed increasing scrutiny on the routers that carry the majority of the Internet's traffic. Sebastian Muniz, a researcher with Core Security Technologies, developed the software, which he will unveil on May 22 at the ...

Admins warned of brute-force SSH attacks

Wednesday, May 14th, 2008

Over the weekend, a number of network administrators issued warnings over an order-of-magnitude increase in the number of attempts to guess the username and password of systems running secure shell (SSH), the encrypted access method that replaced the common telnet service. System administrators at universities and some companies have reported ...

Bots Use SQL Injection Tool in New Web Attack

Wednesday, May 14th, 2008

A little-known botnet has put a different spin on the recent wave of SQL injection attacks on thousands of Websites: It’s outfitting its bots with its own tool to launch SQL injection attacks on vulnerable sites. The Asprox botnet, a relatively small botnet known mainly for sending phishing emails, has been ...

Get More from Ubuntu’s Uncomplicated Firewall

Wednesday, May 14th, 2008

The Ubuntu Unleashed blog has an excellent guide to the ins and outs of the Uncomplicated Firewall (ufw), a new feature in Ubuntu Linux 8.04, or Hardy Heron, that makes it easy to control the traffic into and out of your system. While turning on the firewall is as simple ...

browserrecon – Passive Browser Fingerprinting

Wednesday, May 14th, 2008

Most of todays tools for fingerprinting are focusing on server-side services. Well-known and widely-accepted implementations of such utilities are available for http web services, smtp mail server, ftp servers and even telnet daemons. Of course, many attack scenarios are focusing on server-side attacks. Client-based attacks, especially targeting web clients, are becoming ...