Skip to main content

Networking

Lock that Sucker Up!

posted onMay 15, 2001
by hitbsecnews

Notebook locks aren't exactly the first thing on your list when you're purchasing accessories, maybe even a new notebook. You're probably more interested in what kind of case, or better yet, what kind of stickers you're going to plaster it with (or maybe that's just me?!). With more and more notebooks hitting the streets, there is going to be more and more notebooks going missing. Here's a product that will keep your notebook a little safer and its called the Notebook Guardian by the folks at PC Guardian. Here's a clip:

Solaris/IIS worm takes off

posted onMay 12, 2001
by hitbsecnews

The quite reliable hacker tracker attrition.org is reporting that nearly nine thousand machines had been auto-defaced by the sadmind/IIS worm as of Tuesday, making it one of the most effective little scripts ever loosed on the Net.

Attrition has posted the IPs of all the boxes known to have been hit, and mirrored the default defacement to boot.

The worm infects Solaris boxes up to version 7, and then scans for IIS machines susceptible to the folder traversal vulnerability and executes mean-spirited code on them, replacing their default Web pages with naughty words.

Chinese Hackers back at work

posted onMay 9, 2001
by hitbsecnews

This time it's a worm for Solaris systems that have them exploit IIS boxes that havent
been patched for a security hole seven months old. The worm results with a page
defacement signed by an email address from Yahoo! China with a message reading: f*ck
USA Government f*ck PoizonBOx. I wonder if PoizonBox has any response. Exploit

Max Vision: FBI pawn

posted onMay 9, 2001
by hitbsecnews

The FBI called him their "equalizer" -- a security expert and confessed hacker who infiltrated the underground and took names at DEFCON. When he drew the line at bugging a friend, they threw the book at him.

Federal officials used threats and a false promise of leniency to lure computer security researcher and admitted cyber intruder Max Butler into becoming an undercover FBI informant, according to a defense motion filed in the case Tuesday.

Hackers invade Pentagon computers with impunity

posted onMay 9, 2001
by hitbsecnews

A series of sophisticated attempts to break into Pentagon computers has continued for more than three years, and an extensive investigation has produced ''disturbingly few clues'' about who is responsible, according to a member of the National Security Agency's advisory board.

Worm puts old IIS attack in full-auto mode

posted onMay 9, 2001
by hitbsecnews

British TV news outfit ITN was the first major site we know of to be infiltrated by the sadmind/IIS worm, a new take on a past theme which automates attacks on Solaris and Microsoft IIS boxes, using two very old exploits.

The worm first infects systems running Solaris through version 7, exploiting the two-year-old sadmind buffer overflow vulnerability which gives up root access.

The Register

Hack Attack Threat?

posted onMay 8, 2001
by hitbsecnews

Department of Energy investigators recently demonstrated to Congress just how easy it is to hack into a supposedly secure government computer. It took them less than 15 minutes.

And that's not all. At the EPA, an intruder blocked access to agency computers. And last year, congressional investigators secretly tapped into IRS computers that held confidential information about taxpayers.

Top Layer to unveil hacker-unfriendly software

posted onMay 6, 2001
by hitbsecnews

Top Layer Networks is preparing to make life even more difficult for hackers with the launch of its latest security offering next week at the Networld+Interop conference in Las Vegas.

The Westborough, Mass.-based security vendor will unveil on Tuesday SecureWatch, a software application that sits between the Internet and firewall to monitor all network traffic.