|
|
Information
-Poison Ivy Farmers: Virus Collections
-A Methodology for Detecting New Binary Rootkit Exploits
-Remote physical device fingerprinting by Yoshi Kohno
-JPEG Vulnerability: A day in the life of the JPEG Vulnerability
-Who Wrote Sobig?
-HOWTO bypass Internet Censorship (external link)
-Is finding security holes a good idea? by Eric Rescorla
-A generic threat analysis for an Internet enabled organisation. by Ed Skoudis, Chris Brenton, Jason Fossen, Mike Poor and Jim Herbeck
-Simulating and optimising worm propagation algorithms by Tom Vogt
-IEBUG.COM (external link)
-Unpatched IE security holes (external link)
-Unpatched IE security holes (external link)
-Remote Desktop Management Solution for Microsoft (external link)
-An Overview of UNIX Rootkits. (pdf)
-A practical approach for defeating Nmap OS-Fingerprinting (external link)
-IP Spoofing: An Introduction (link)
-SSH Tunneling part 1 - Local Forwarding (external link)
-SSH Tunneling part 2 - Remote Forwarding (external link)
-The Evolution of Cross-Site Scripting Attacks (pdf) by David Endler.
-Host Discovery with nmap (pdf) by Mark Wolfgang.
-Curious Yellow: The First Coordinated Worm Design
-How to 0wn the Internet in Your Spare Time
-Detecting Backdoors by Yin Zhang
-Computer Hacking & Cybercrime The Law Hacking Tools Hacking Tools (PDF).
-Extension Identification Bug and IE Registry Manipulation by Doc.
-Cross Site Scripting (external link)
-The Tao of Windows Buffer Overflow (external link) by DilDog
-Reverse Engineering Malware by Lenny Zeltser
-An Environment for Controlled Worm Replication and Analysis by Ian Whalley and others
-HOW TO COVER YOUR TRACKS by Van Hauser
-Scrap Files Can Tear You Up (external link)
-Common methods allowing to bypass almost any content filtering
software (antiviral products, CVP firewalls, mail attachment filters, etc).
-D.I.R.T. 2.2 Designed for US Law enforcement agencies, US Intelligence agencies and US Military agencies
-H.O.P.E.TM is a system to mass distribute D.I.R.T.TM technology via the internet through a variety of surreptitious means (link)
-Spyware ripped apart by Doc
- mIRC Backdoors - An advanced overview by ReDeeMeR
-CERT� Coordination Center: Home Network Security (external link)
-grcsucks.com (link)
-Analysis of the .ida "Code Red" worm
-CERT� Advisory CA-2001-19 "Code Red" Worm Exploiting Buffer Overflow In IIS Indexing Service DLL (external link)
-CERT� Incident Note IN-2001-07. W32/Leaves: Exploitation of previously installed SubSeven Trojan Horses (external link)
-"New Scanning Activity (with W32-Leaves.worm) Exploiting SubSeven Victims" (external link)
-Why Windows XP will be the Exploitation Tool of Choice for Internet Hackers Everywhere (link) by Steve Gibson
-The Strange Tale of the Attacks Against GRC.COM (link) by Steve Gibson
-Strange Attractors and TCP/IP Sequence Number Analysis (link)
-Interpol Manual: IT Security and crime prevention methods (external link)
-Top 10 Places Your Email Can Be Intercepted (external link)
-Windows Registry structure explanation
-Guninski: XML scripting in IE, Outlook Express
-Guninski: Double clicking on innocent looking files may be dangerous
-Guninski: Security bugs in interactions between IE 5.x, IIS 5.0 and Exchange 2000
-IP-Masquerading (external link)
-How to Obscure Any URL (external link)
-Auto Start Methods by Da_Doc.
-Examining Advanced Remote OS Detection Methods/Concepts using Perl
-New Autostart Method
-How to Stop Love_Letter, Life Stages and Other Viruses
-register DLL and OCX files without regsvr32.exe
-How Syphillis was defeated by Mobman
-Interview with FC
-Ramen Linux Worm
- Where There's Smoke, There's Mirrors: The Truth about Trojan Horses on the Internet
- "I don't think I really love you" or writting internet worms for fun and profit
-Testing Times for Trojans
-An Environment for Controlled Worm Replication and Analysis
-Root Kits" and hiding files/directories/processes after a break-in
by Dave Dittrich
-Trojan Horse attacks by Dave Dittrich
-CERT releases a detailed paper on the risk of ActiveXs (pdf)
-Stopping Spam and Trojan Horses with BSD
-ICMP Usage In Scanning
-Romeo and Juliet Worm
-Malicious programs that may be planted
inside PIF-files
-Georgi Guninski security advisory #27 - There is a security vulnerability in IE 5.x, Outlook, and Outlook Express which allows searching for files with specific name (wildcards are allowed) or
content. Combined with other local file reading vulnerabilities this allows attackers to search for
and retrieve any file on a users drive. Read more
-Finjan Software: Microsoft Hacker Incident - Looking Back
-Windows 2000 in danger of being banned
-Additional details on the System Monitor ActiveX buffer overflow
-IE 5.5/Outlook security vulnerability - com.ms.activeX.ActiveXComponent
allows executing arbitrary programs
- IIS Security Alert: Subseven Defcon 2.1
-Matrix worm
-Attackers can use ShieldsUp! to scan any host on the Internet
- FakeGINA, the integrated Trojan.
-Windows NT Event Log explained
-You can get AV software to attack the PC it is trying to protect
-Trinity v3 Distributed Denial of Service tool
-Serious Microsoft File Association Bug
-How to make a trojan look like a JPG
-Create a shadow directory of the real one
with trojan versions of the same files
- Prevent Cross-Site Scripting Security Issues
-Cross Site Scripting by Microsoft
-IIS 5.0 cross site scripting vulnerability
-Distributed Denial of Service (DDoS) Attacks/tools by David Dittrich
-Using publicly available tools and sniffers in hacking by Timo Aterma and
Johannes Kleimola. Department of Computer ScienceHelsinki University of technology
-Backdoors in U**x Systems by ManiaX Killerian
-Trojan horse hiding under Linux by Iron Code
-The Gentle Art of Trojan Horsing under Windows by EXo.
-Collecting Information from Remote Sites by ManiaX Killerian.
-Attacking Windows 9x with Loadable Kernel Modules by Solar Eclipse.
-From Trojan Horses to Worms: Understanding Various Malicious Threats. Read more
-Remote OS detection via TCP/IP Stack FingerPrinting
-Default Passwords
-Revolutionary Trojan
-Brown Orifice, the new multi-platform remote management tool and Trojan
- Adding a small function (Autostart) to Shell32.dll by LaZaRuS
-The ICQ Protocol
-Free Macro AntiVirus Techniques by Chengi Jimmy Kuo
-Relative Registry Paths May Allow Trojans to Run.
-Step by Step NT Explotation Techniques
-Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks. By the consultants of the Network Security Solutions Ltd.
-Big Brother vulnerability scanner.
-Passive Aggression v1.0. Exploits FTP servers using passive mdoe to transfer data.
-Patching the NT Kernel.
-How to write Buffer Overflows.
-Trojan Reversing by defiler
-Intruder Detection Checklist
-UDP Information
-TCP/IP Transmission Control Protocol
-Tracing e-mail by Frederick M. Avolio.
-L0phtCrack readme.txt.
-VB auto update support by Senna Spy
-Elza is a script language, which doubles as a unique attack tool.
This script language allows you to write simple scripts that mimic HTTP clients, and can be used
to test HTTP servers' security.
Trojan Run Script by bansh33 of r00tabega.
Fling is a new suite of internet protocols that perform the function of DNS, TCP, and UDP in a manner that's both untraceable and untappable. Fling protects clients from servers, servers from clients, and both from an eavesdropper in-between. The result is that anyone can serve or retrieve any data, without fear of censure. Read more.
-Remotely Triggered Trojans
-ICMP Usage in Scanning
-Backdoors by Christopher Klaus
-The Motives and Psychology of the Black-hat Community.
-Analysis of Subseven Trojan. Distributed Attack Feature
-CERT Advisory CA-2000-12 HHCtrl ActiveX Control Allows Local Files to be Executed..
Microsoft Corp will give personal firewall vendors advanced access to code for future Windows 2000 Service Packs to avoid repetition of the bug that this week disabled firewalls for more than 3.5 million users using the Redmond, Washington-based company's latest operating system.
-Trojans patching tutorial. .
-Microsoft Access VBA Trojan: The overlooked "Macro Virus"..
-Computer Ethics
-Hostile Java Information
-File Sharing by:
Ghost_Rider
-Jolt2 - a new Windows DoS attack
-Resume and KAK Viruses are spreading
-An alternative approach for writing e-mail viruses
-Latest wave of worms using hidden file extensions
-Love Bug variant fools Anti-Virus programs
-Big Brother allows remote command execution
-Patch Available for the "Frame Domain Verification", "Unauthorized Cookie
Access", and "Malformed Component Attribute" Vulnerabilities
-THE HACKER CRACKDOWN (link).
-Microsoft Office 2000 UA ActiveX Control
Incorrectly Marked "Safe for Scripting"
-PCAnywhere configuration files use weak passwords encryption.
-Gnutella Self-Replication and other attacks.
-Ways to cope with active content in e-mail.
-Preventing nmap OS detection for Windows NT
-Mining BlackICE with RFPickAxe
-Knapster and Gnapster allow local file access
-Writing internet worms for fun and profit.
-South Park Shooter Worm
-Hotmail JavaScript-in-attachment attack
-How apache.org was defaced.
-Win95.Smash virus
-Virus, worm, trojan Information
-proxy servers (link)
-proxy servers 2
-I love you worm
-iss.00-05-02.mstream
-the Internet Security Act of 2000
-Phrack
-the big brother system and network monitor .
-NT Wardoc. A study in remote penetration.
-Redhat backdoor
-Lack of Network Security
-IRC worms, thorie and code, by SnakeByte
-Adobe Acrobat Netbus story
-Trojan package for newbies
-Bypass Virus check
-Trojan list by LockDown 08/april/2000
-antiTBC trojan
-BackDoors
-Rel tunneling
-Mail tunneling
-ICMP tunneling
-HTTP tunneling
-Port Redirect by happyhackr
-About D.I.R.T.
-Different Kind of Trojans by 'tHe mAnIaC'
-How to use Trojan Horses by tHe mAnIaC.
-The Complete Trojans Text by 'tHe mAnIaC'
-Everything about Trojans and how to use their Options by 'tHe mAnIaC'
-Trojan Ports
-How to build a Trojan by 'Wax
-How to build an Advanced Trojan by 'Wax
-An Analysis of TCP/IP NetBIOS file-sharing protocols
-Base64 encoding
-Telnet
-Sniffing FAQ
-Assembler Tutorial
-Understanding NetBIOS by NeonSurge.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------
Trojan Information
CERT Coordination Center
AVP updates
Distributed Denial of Service
Vulnerabilities and Exploits
Firewalls: Text, disable, vulnerabilities, exploits, tunneling
Hostile Java