Kernel hang or panic in name lookup under certain circumstances
MAO Enterprises announced today that a security flaw in Rocketmail's free web email services
Linux Mini Administration HOWTO. By Kostas Petrakis aka Pestilence
w00w00 on Heap Overflows By: Matt Conover (a.k.a. Shok) & w00w00 Security Team
Hotmail saves POP3 userid/passwords in plaintext inside of HTML. by Jon Robson
(nearly) Complete Linux Loadable Kernel Modules written by pragmatic / THC, version 1.0
The Melissa macro virus - A report prepared by Robert M. Slade
IE 5.0 allows reading and sending local files to a remote server
Security vulnerabilities have been identified in various packages that
ship with Red Hat Linux
Basic Packet-Sniffer Construction from the Ground Up by Chad Renfro
DNS ID Hacking - Brought to you by: Raw-Powa and w00w00 Security Development
Multiple WinGate 3.0 Vulnerabilities by eEye Digital Security Team
Cisco security notice: Cisco Catalyst Supervisor Remote Reload
BlackHats Security Advisory - Application: InterScan Viruswall for Solaris - Severity: Any user can download binaries and virus infected files though the VirusWall
ISO COUNTRY CODES provided by http://www.bikkel.com/~proxy/iso.html
TOP TEN LIST - March 25, 1999 provided by http://www.bikkel.com/~proxy/topten.html - All Top Ten Proxys Are Always Anonymous
Wingate Listing provided by Proxys-4-All @ http://www.bikkel.com/~proxy/win-tel-socks.html
The Yahoo! NEWS TICKER leaves a file name "install.log" in the program directory. The file contains plaintext userid and password.
ISS Security Advisory: LDAP Buffer overflow against Microsoft Directory Services
Netbsd - noexec mount flag is not properly handled by non-root mount
Netscape Communicator v4.51 still has problems with Javascript expliots
ProMail v1.21, an advanced freeware mail program spread through several worldwide distribution networks (SimTel.net, Shareware.com and others),is a trojan.
TzinE #1 - The same info above except it adds XXX passwords/sites/newsgroups.
Buffer overflow in a TetriNet daemon for Linux called "Tetrix".
Introduction to the Log Files in a Unix System by WhiteDevil
Easy Shells (basically a txt about finding stupid people using root to irc etc etc..)
Quick Hack File ; Mainly explaining quick old Publically KNOWN exploits
Outlook password protected add-ins are stored in memory as Plaintext
ISS Security Alert Summary February 18, 1999 Volume 3 Number 5
L0pht Security Advisory ; any local user can gain administator privileges and/or take full control over a NT 4.0 system
ISS Security Advisory: HP JetDirect TCP/IP DoS problems
Hyperseek Exploit allowing users to change the layout/template around
Using FSO in ASP to view just about anything
Another IIS DoS attack? ; This vulnerability involves the HTTP GET method
IRIX's fcagent daemon is vulnerable to a Denial of Service attack.
Linux For Dipshit's - Lesson: Understanding The Shell By: Redemption
Excel is vulnerable to an exploit that allows the execution DLL functions without user intervention or knowledge. Are we going to see a new breed of Excel Macro virii??
Microsoft has released a patch that fixes a vulnerability in Microsoft(r) Internet Explorer(r) that could allow a malicious web site operator to impersonate a window on a legitimate web site. The threat posed by this vulnerability is that the bogus window could collect information from the user and send it back to the malicious site.
Microsoft's Network Monitor susceptible to Denial of Service attack
mSQL (Mini-SQL) - Remote attackers could potentially gain read and/or access to databases by retrieving authentication
A popular security tool called "nmap" can generate unusual network traffic, which can be exploited to generate a wide variety of failures and crashes on numerous operating systems
Proof of Concept - Security Advisory - mail.local (Berkeley Sendmail) ; Mailbox compromise
SIMS 3.x (Sun Internet Mail Server) and SDS 1.x & 3.1 (Sun LDAP Directory services) vulnerability.
ISS Security Advisory: Buffer Overflow in "Super" package in Debian Linux
451's - Ezine.. small basically talks about Wardialing.
Program Topdesk has weak encryption, paper explianing how to break it.
Plaintext Password in Tractive's Remote Manager Software
How do fucking trojans work by HACKERDEVIL
The Windows NT Wardoc: A study in remote NT penetration by NEONSURGE and THE RHINO9 TEAM
Website Pro v2.0 (NT) Configuration Issues (bug used to hack idsoftware.com explained)
Windows98 Bug Explorer crashes on a 235 character filename explained.
Win98 Explorer has bugs in handling files with pathname longer than or equal to the documented
Macintosh version of Word '98 includes sensitive material in document files
Article explaining why you shouldn't install WP8 as root on Linux. If you do your
making your security a little weaker.
If a AIX system administrator executes snap -a as while diagnosing a problem it defeats password shadowing and under /tmp/ibmsupt/general/ you will find the passwd file with cyphertext.
AOL4 allows imbedded pictures in email (background pictures). If you name a .jpg 235 characters, opening the email crashes AOL.
Microsoft BackOffice Vulnerability ; BackOffice Server 4.0 Does Not Delete Installation Setup File
Cert Advisory - Remote buffer overflows in various FTP servers leads to potential root compromise.
L0pht Security Advisory- Windows 95/98 Network File Sharing ; Sniffed authentications can be used to impersonate network users
The software that 3com has developed for running the NMC (network management card) for the Total Control Hubs is a bit shady. After uploading the software ( as one must do) YOU will notice a login account called "adm" with no password. This can not be deleted. If you delete it and do a hardware reset its still there. The only
way to fix this problem is to disable the "adm" login.
Learn to Crack by Ignatz Number 1 : Generals explained with MP3 Wolf - Here is the file_id.diz.txt [made it text so it can view it in yer browser]
Introducing into the world of cracking - A beginners tutorial written by ByteBurn
How to crack Blood 2 cd protection - A little update to my tutorial#1 written by ByteBurn
CbD's Tutorial on cracking Cherry Slots by Ultisoft, Inc. using Softice 3.xx
CbD's Tutorial on cracking RUMMY 500 (Version 3.8) using Softice 3.xx
CbD's Tutorial #5 "General Cracking"
StatiK's guide to setting up a fone confrence
Cell Phone Cloning (Programming) FOR: NOKIA,MOTOROLA,ERICSSON By: LYSERGIC
An Explanation of Centrex by Downtime