Tuesday, April 21st, 2009
Firefox 3.0.9 fixes several security issues found in Firefox 3.0.8:
Firefox allows Refresh header to redirect to javascript: URIs
POST data sent to wrong site when saving web page with embedded frame
Malicious search plugins can inject code into arbitrary sites
Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString
XSS hazard using third-party stylesheets and XBL bindings
Same-origin violations ...
Posted in Internet, Linux, Privacy, Security, Software, Windows | No Comments
Saturday, April 18th, 2009
Security researchers are warning administrators to secure their servers in the wake of new Secure Shell (SSH) attacks.
Researchers at security firm SANS warned that so-called 'brute force' attacks were occurring on a "daily" basis. The attacks attempt to guess usernames and passwords in an attempt to compromise the server.
To help ...
Posted in Internet, Linux, Networking, Privacy, Security | No Comments
Wednesday, April 15th, 2009
Kernel rootkits are tough enough to detect, but now a researcher has demonstrated an even sneakier method of hacking Linux.
The attack attack exploits an oft-forgotten function in Linux versions 2.4 and above in order to quietly insert a rootkit into the operating system kernel as a way to hide malware ...
Posted in Coding, Linux, Privacy, Security | No Comments
Wednesday, April 1st, 2009
Autohack your targets with least possible interaction.
Features :
- Contains already custom-compiled executables of famous and effective exploits alongwith a few original exploits.
- No need to debug, script or compile the source codes.
- Scans all ports 1 - 65535 after taking the IP address and tries all possible exploits according to ...
Posted in Coding, Internet, Linux, Networking, Perl, PHP, Privacy, Security, Software, Windows | No Comments
Saturday, March 21st, 2009
As promised, the paper and the proof of concept code has just been posted on the ITL website here.
A quote from the paper:
In this paper we have described practical exploitation of the CPU cache poisoning in order to read or write into (otherwise protected) SMRAM memory. We have implemented two ...
Posted in Coding, Hardware, Linux, Security, Windows | No Comments