-
Content Count
2130 -
Joined
-
Last visited
Content Type
Profiles
Forums
Calendar
Everything posted by Peaches
-
Buddy and his wife Edna went to the state fair every year, And every year Buddy would say, 'Edna,I'd like to ride in that helicopter.' Edna always replied, 'I know Buddy, but that helicopter ride is fifty bucks, And fifty bucks is fifty bucks' One year Buddy and Edna went to the fair, and Buddy said, 'Edna, I'm 85 years old... If I don't ride that helicopter, I might never get another chance.' To this, Edna replied, "Buddy that helicopter ride is fifty bucks, and fifty bucks is fifty bucks.'' The pilot overheard the couple and said, 'Folks I'll make you a deal. I'll take the both o
-
Sql Injection Reloaded: Access To The Operating System
Peaches posted a topic in Article Submissions
17 April 2009, 16:40 SQL injection reloaded: access to the operating system SQL (Structured Query Language) injection lets attackers not only manipulate a database, but to immediately take control of a complete server along with the operating system. (Further information about this is available in The H Security feature – Lethal injection - SQL injection – attack and defence. Bernardo Damele Assumpcao Guimaraes, a security specialist, demonstrated this at the Black Hat hacker conference with his sqlmap tool. The tool that Guimaraes developed has a repertoire of attack methods to use against a -
April 2009 Patch Tuesday Release by Roderick Ordoñez (Technical Communications) Microsoft released a total of 8 patches last April 14, comprising of 5 critical, 2 moderate, and 1 important update for the Windows OS. More information on the said patches are given below: • (MS09-009) Vulnerabilities in Microsoft Office Excel Could Cause Remote Code Execution (968557) • (MS09-010} Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution (960477) • (MS09-011) Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (961373) • (MS09-012) Vulnerabilitie
-
New Waledac Campaign: SMS ‘Snooping’ Software by Joey Costoya (Advanced Threats Researcher) After attempting to shock us with dire news of terrorist bombings, Waledac now attempts to entice us with offers of spying somebody else’s (notably a lover’s) SMS messages. The links in the spammed messages shown above lead to a malicious website, which offers a 30-day trial for a SMS (Short Messaging Service) Spying software. The link “Download Free Trial” leads to the download of an .EXE file which installs a Waledac bot into the user’s system. So if you must ask, no, it is not legitimate SMS spy sof
-
Online Casino, Geocities, and Waledac by Jonell Baltazar (Advanced Threats Researcher) Deviating from Conficker/Downad update and jigsaw puzzle menace, Waledac updated its spam emails and is now spamming online casino advertisements. The spammed email contains a URL link to a Yahoo! Geocities web page which is shown in Figure 4, and when the link “Play now” is clicked, it shows a casino related image ad as shown in Figure 5. There is no activity seen where Waledac is seeding URLs that links to a new Waledac binary for this specific spam run, but our radars are actively monitoring for this eve
-
17 April 2009, 13:06 A new Linux rootkit technique presented Anthony Lineberry, a Linux expert, announced during his presentation, "Alice in User-Land: Hijacking the Linux Kernel via /dev/mem", at the Black Hat security conference now taking place in Amsterdam that he will shortly be publishing the libmemrk library. He says Libmemrk works in both 32-bit and 64-bit environments. This offers rootkit developers a new way to hide files or processes, or interfere with network traffic. The trick is that, without requiring extensive rights, libmemrk uses the /dev/mem device driver to write arbitrary
-
Investment tips With all the turmoil in the market today and the collapse of Lehman Bros and Acquisition of Merrill Lynch by Bank of America this might be some good advice. For all of you with any money left, be aware of the next expected mergers so that you can get in on the ground floor and make some BIG bucks! Watch for these consolidations in later this year: 1.) Hale Business Systems, Mary Kay Cosmetics, Fuller Brush, and W R. Grace Co. Will merge and become: Hale, Mary, Fuller, Grace. 2.) Polygram Records, Warner Bros., and Zesta Crackers join forces and become: Poly, Warner Crack
-
A true story from Mount Isa in Queensland . Recently a routine Police patrol car parked outside a local neighbourhood pub. Late in the evening the officer noticed a man leaving the bar so intoxicated that he could barely walk. The man stumbled around the car park for a few minutes, with the officer quietly observing. After what seemed an eternity and trying his keys on five vehicles. The man managed to find his car, which he fell into. He was there for a few minutes as a number of other patrons left the bar and drove off. Finally he started the car, switched the wipers on and off (it was a fin
-
Disk Defrag Help From Hassle-Free PC PC World blogger Rick Broida's brand-new PC kept bogging down. The culprit? Vista's Disk Defragmenter. Rick Broida, PC World For the last couple months I've been troubleshooting a vexing problem on my new quad-core HP desktop: Roughly once per week, the machine would start running as slow as molasses. And I mean slow: Programs would take several minutes to load, and even simple activities like switching browser tabs were maddeningly sluggish. The system slowdowns appeared to be due to excessive disk activity, at least based on my observations of Windows' Re
-
Mac and Linux Bastilles assaulted by new attacks No one here gets out alive By John Leyden A set of recently discovered security holes in Mac and Linux platforms reminds those over-confident in their superior protection that no one is immune to vulnerabilities. H Security reports on a series of actively exploited vulnerabilities in Apple's Mac OS X operating system that remain unpatched. A vulnerability in mounting malformed HFS disk images creates a privilege elevation risk, allowing regular users to obtain root privileges. Other exploits involving kernel system vulnerabilities create a mean
-
Report: <strong>Firefox is the world's most vulnerable browser</strong> Firefox fans take note: A just-released report from the security company Secunia found that Firefox is far more vulnerable than Opera, Safari, and Internet Explorer --- and by a wide margin. In 2008, it had nearly four times as many vulnerabilities as each of those browsers. The report, available here in PDF form, found that Firefox had 115 vulnerabilities reported in 2008, compared to 30 for Opera, 31 for Internet Explorer, and 32 for Safari. That doesn't mean, though, that Internet Explorer is off the hook
-
Microsoft sets Office 2007 SP2 release for April 28 Also debuts first free Office for Mac 2008 trial download By Gregg Keizer Computerworld) Microsoft Corp. has set April 28 as the release date for Office 2007 Service Pack 2 (SP2), the first update to the company's popular application suite since December 2007. Last week, the company said that it would begin pushing Office 2007 SP2 as an upgrade via Windows Server Update Services (WSUS) this month, but until yesterday had not slated an exact date. Office 2007 SP2 adds support for Open Document Format (ODF) Version 1.1 to Word, Excel and PowerP
-
Alaska Airlines flies ahead with in-flight Wi-Fi It joins other big airlines in committing to the wireless service By Stephen Lawson April 15, 2009 (IDG News Service) U.S. airlines are piling on to the in-flight Wi-Fi bandwagon, with Alaska Airlines Inc. joining other airlines in expanding the service to more aircraft. More than 2,100 passengers have used the service since it was offered in a free trial run on one plane beginning Feb. 26, the airline said Tuesday. Alaska Airlines will now go ahead with installing the system on more aircraft in the coming months and testing prices. Other U.S.
-
15 April 2009, 17:46 Root exploit for Mac OS X Several exploits for Apple's Mac OS X operating system are in circulation which have not yet been patched. In a short test carried out by the heise Security editorial team, one of the exploits allowed a Mac OS X 10.5.6 user with normal privileges to obtain root privileges. The problem is triggered when mounting malformed HFS disk images. The exploit consists of a shell script and some source code written in C. The C code generates the disk image which, when mounted, provokes the flaw that allows execution of code at root level. The other exploits
-
16 April 2009, 11:15 Vulnerabilities in Linux allow root privileges According to a number of Linux distributors, a bug in the udev service under Linux can be exploited to obtain root privileges. The kernel uses udev to dynamically create device-specific files and folders (/dev/) for input and output, so that only devices which are actually connected appear in /dev. udev is not a direct component of the Linux kernel, but is included and activated by default in almost all Linux distributions which use 2.6 series kernels. By sending crafted Netlink messages to udev, an attacker can create a glob
-
Microsoft DirectShow MJPEG Decompression Vulnerability Highly critical .. Description: A vulnerability has been reported in Microsoft DirectX, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error when decompressing MJPEG content and can be exploited via a specially crafted MJPEG file. Successful exploitation may allow execution of arbitrary code. Secunia - http://secunia.com/advisories/34665
-
Now why did I not think of it?? http://video.yahoo.com/watch/2803879/8129895
-
FBI issues warning on Oprah show email scam Last Updated: Friday, April 10, 2009 | 10:52 AM ET CBC News The FBI is warning of at least a dozen email scams that promise a ticket to The Oprah Winfrey Show and other prizes in exchange for the purchase of a plane ticket. FBI's Internet Crime Complaint Center released a warning this week about a circulating email, advertised as "Oprah Millionaire Contest Show," which asks people for their contact information. It claims that the recipient of the email was "nominated" to attend an Oprah show in which he or she has a chance to win $1 million US. Re
-
As someone who worked in the banking industry, no way would anyone convince me to do online banking because no matter how fussy we are with our computers, do U know what is lurking unbeknown to U that may be logging your keystrokes, etc? Criminals are thinking up new ideas of stealing your assets and I am not about to make it easy for them. Also, by actually dealing with a human, I keep someone employed and off the welfare role if they cannot find work. Another aspect of personal communication is when U have to deal with an issue then at least the staff know who U are rather than U being j
-
April 9, 2009 11:43 AM PDT Researchers say Conficker is all about the money by Elinor Mills The Conficker worm that has infected millions of Windows-based computers will likely be used to send spam and steal data much like one of the nastiest botnets on the Internet does, researchers said on Thursday after finding links between the two worms. A week after failing to do anything but snore, the much hyped Conficker worm was roused from its slumber on Wednesday, with infected computers transmitting updates via peer-to-peer and dropping a mystery payload onto PCs. Researchers suspect that the p
-
Apr9 Adobe Acrobat/Reader getIcon() Vuln Exploit in the Wild by JJ Reyes (Advanced Threats Researcher) Cyber criminals have now updated their PDF exploits to include the getIcon() vulnerability (CVE-2009-0927). We currently detect this as TROJ_PIDIEF.OE. As usual, we highly encourage users to update now to the latest versions of Adobe Acrobat and Adobe Reader (if you haven’t yet). Reading the security advisory by Adobe closely, we see that this issue was previously fixed in version 8.1.3 but not for version 9.0: The Adobe Reader and Acrobat 9.1 and 7.1.1 updates resolve an input validation i
-
April 9, 2009 1:11 PM PDT Microsoft to patch Excel hole, seven others by Elinor Mills A correction was made to this story. See below for details. Microsoft on Thursday said next week's Patch Tuesday would include eight patches, five of them critical, including one addressing a vulnerability in Excel. A company representative declined to confirm whether the patch for its spreadsheet software addresses a vulnerability that has seen "zero-day attacks" which target unpatched security holes. But given the fact that both that Excel vulnerability and the Excel patch slated for Tuesday affect Micr
-
What to do if your computer is infected with Conficker Conficker has a feature that prevents a user on an infected machine from accessing a security site to get a fix tool. To get around that, Symantec recommends doing the following: Go to Command Prompt and type "net stop dnscache," which disables the DNS cache. You will get a message that the DNS client service is stopped. You can now proceed to access the security website or download the fix tool.
-
9 April 2009, 11:37 Lost+found: Apache, Google, Conficker "Too short for news, too good to lose; lost+found is a round up of useful security information. Today, Apache and PHP, Google spam data and Conficker trends The Apache web server doesn't just execute PHP from files with a .php extension. A file with a name test.php.gif will be interpreted as a script if it contains PHP code: Apache Common Misconception Google Enterprise have published their data on spam and virus attacks: Spam Data and Trends Q1 2009. New worms exploit the Windows vulnerability that Conficker has been using: Donbot Joi
-
9 April 2009, 13:11 Conficker now definitely downloading updates Trend Micro reports that the Conficker.C (or Downad) worm has now indeed begun to download updates – not, however, from the web sites that many have been watching, but through its peer-to-peer function. The experts say they stumbled on this while observing the Windows Temp folder and the network traffic on an infected system. In contrast to Conficker.A and .B, the .C version can establish a P2P network with other infected systems and use it to download further programs and receive commands. Trend Micro says this P2P operation is