|
News for
011299
The Hacker Emergency Response Team
|
|
contributed by G0tAcLu3
A recently formed non-profit organization based in France, based on
the ideals of the US based CERT (Computer Emergency Response Team),
is beginning operations. Their main page labels CERT as corrupted
citing their creation by the US Military complex. An interesting
statistic they have on their page is that since 1995 they have only
published 55 CERT advisories for the 1027 vulnerabilities reported.
HERT definitely seems like a good idea and a place to keep your eye
on, I just wish they would change the name.
H.E.R.T.
|
contributed by Tan
An Underwriters Laboratory for the Information Security Industry?
Sounds like a good idea. Tan at the L0pht has written an excellent
article describing how computer security systems are currently rated
and suggests an alternative. Another must read for you folks in the
Information Security business.
L0pht Heavy Industries
|
contributed by photon
Someone calling themselves "UC3n1wVWGSnAk" cracked www.tucows.com
early this morning. While the cracked site may not have been much to
look at it definitely was worth reading. The source that is. The
source included URLs to various web sites and what appeared to be
tucows /etc/passwd file. The only image on the main page was linked
to SORM, a Russian Web site attempting to build awareness about the
FSB's (Federal Security Service, the successor to the KGB)
wiretapping program.
HNN Archive of cracked
site
System
for Conduct of Investigations and Field Operations- SORM
www.tucows.com
|
contributed by Dr. Mudge
With all the news that happened over the weekend we missed the
release of an excellent utility by Dr. Mudge. Released last Friday
this tool is for analyzing problems in the temporary and scratch
areas of your UNIX based OS. Best of all the tool comes with source
and it is FREE.
L0pht Heavy Industries
|
contributed by War3zHut
Evidently the Quake back door we asked about yesterday isn't all that
new. (I just don't have time for warez, sorry.) First found back on
May 1, 1998 the rcon_password bug can be found in Quake 1,
QuakeWorld, Quake 2, Quake 2 Linux and Quake 2 Solaris, all versions.
If exploited this back door, purposely installed by ID Software,
could allow an attacker to have remote administrator access on any
Quake server.
Quake
Advisory
|
contributed by mindphasr
85 domains all at once, cracked. Just how do they do it? Just get
inside one virtual hosting web server perhaps? Regardless here is a
small sampling of the unconfirmed cracked domains.
pcpowerups.com
tools.co.kr
printingshop.com
silkprint.com
bigmart.com
dcmart.com
powersale.com
familymart.com
seoulstudio.co.kr
icard.com
|
|

|