Skip to main content

Networking

Undernet insecure !

posted onJuly 27, 2001
by hitbsecnews

Recently linked on the live network .. and granted only with a test-link .. ottawa.on ca.undernet.org server got delinked from the live net 1 or 2 days ago for getting compromised as a machine . Server of ottawa which was initially running on Linux with a planed move to freebsd... the machine prolly got hacked with the same telnetd exploit from teso since someone got into the server added himself an o-line and has tried to mess all the network.. I am waiting for more news and i'll post comments when I get more information.


Confidence in corporate security shattered by misconfigured Firewalls

posted onJuly 27, 2001
by hitbsecnews

Only two out of 50 firewalls at a leading Swiss bank were configured correctly -- just one instance of security that is all that it should be Network security is being overestimated by IT managers because they are failing to manage protective software properly, according to a security expert.


Hackers Pounce On New Telnet Hole found on most Unix systems

posted onJuly 26, 2001
by hitbsecnews

A newly discovered vulnerability affecting many UNIX-based computers is providing fertile ground for Web site attackers. Since a buffer overflow bug in the Telnet program shipped with most operating systems built on code from Berkeley Software Design Inc. was publicized last week, hundreds of Web sites running the operating system have been defaced.


Stolen Program Easily Cracks BSD Servers - Other Unix OS vulnerable

posted onJuly 25, 2001
by hitbsecnews

A free operating system used by thousands of Web sites has a serious new security hole that is being exploited by hackers, according to the developers of FreeBSD. An advisory released Monday by FreeBSD.org says that a bug in the Telnet program included with FreeBSD and related operating systems can allow remote attackers to gain complete control of the Web server.

Sir Cam steps up knight of terror

posted onJuly 25, 2001
by hitbsecnews

The Sir Cam virus, is continuing its rampage around the world, despite the fact that most antivirus (AV) companies have already released a remedy for it.According to reports, the dark knight of the virus world has seemingly evolved from one or two isolated infections into a whole army of incidents. Some AV companies have even reported thousands of hits over the last day or two.

Building a Secure User Environment with SSH ChRootGroups

posted onJuly 24, 2001
by hitbsecnews

Chroot alters the effective root directory of a user or process to one specified by the root user. Thus far, chroot has not been widely used for creating secure user environments; the difficulties involved with creating a functional cage are an obstacle that still needs to be overcome. This article will provide an overview of SSH ChRootGroups feature; which provides a quick and easy way for administrators to lock users inside a chrooted cage.

Securityfocus.

Pentagon Blocks Public Web Site Access

posted onJuly 24, 2001
by hitbsecnews

The U.S. military has blocked public access to nearly all its Web sites after its servers were attacked by a new computer virus.

Late last week, the U.S. Space Command, which provides security for military computers, instructed all military organizations to block public access after a number of sites had contracted the virus, called the "Code Red" bug, according to an official.

IT bugs out over IIS security

posted onJuly 24, 2001
by hitbsecnews

For Brooks Martin, patching and
maintaining his Microsoft IIS Web servers is
almost a full-time job. With so many
vulnerabilities—and with a new patch appearing
seemingly every week—Martin said it’s a
struggle keeping his head above water. “We stay
on top of what we do, but you never know,” said
Martin, CEO of isObject, an independent
software developer in Brentwood, Tenn.