Combating reverse telnet using OpenBSD Packet Filter (pf) - This paper goes into detail on how to set up a firewall properly to disallow outbound traffic from reverse telnet attacks from compromised machines.
b8b0f85c10f344cc6143603c25ef79a8379bb05a1625ef6cbb3755e44d03971c
IP Telephony based networks, which might be a core part of our Telephony infrastructure in the near future, introduce caveats and security concerns which traditional telephony based networks do not have to deal with, have long forgotten about, or have learned to cope with. The security risk is usually overshadowed by the technological hype and the way IP Telephony equipment manufacturers push the technology to the masses. This paper highlights the different security risk factors with IP Telephony based networks.
10fdc19e837a48d2132e421740f1be97f5a4b7f2e8d40525080b86f72461e49f
acFreeProxy (aka "acfp") is an HTTP/1.x proxy for Microsoft Windows that generates error pages when unable to reach a destination host. The results of the error page do not have any input validation leaving it vulnerable to cross-site scripting attacks.
b73cb37d7003a95b03e17334931602a4021c36c50e68d3f36d09ad572bddca2d
The problem described on this advisory certifies BIND versions 4 and 8 do not prevent sending of two or more resolution requests for the same domain name allowing DNS Spoofing attacks with significant probability of success.
1ff0291e103cffab6d704722eb3a1553d6877ea3f7896be778483fcaf7956ec1
Itadem Trojan v3.0 is a small trojan controlled by a web browser. New features include bug fixes, server can be passworded, and html layout. Archive password is set to p4ssw0rd. Use at your own risk.
5f57c327b784ac19ffee3dd1b85e14d9c139481d4145e666f173874e625d089e
anwrap is a wrapper for ancontrol that serves as a dictionary attack tool against LEAP enabled Cisco Wireless Networks. It traverses a user list and password list attempting authentication and logging the results to a file.
5b2c150321984726d6e8b0dce2701c05c125c16ac8cf177cc9d5351ee2046d15
Calisto Internet Talker Version 0.04 Remote Denial of Service exploit.
cfa90118496081e0fe751cc98451d2637dd51c25d130732436c1a6e645da95b7