New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 979
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Computer Cops: UNIX

Search on This Topic:   
[ Go to Home | Select a New Topic ]

image An Overview of UNIX Rootkits image
UNIX
Rootkits, as we know them now, came into being sometime in the mid 1990s. At that time, Sun operating system UNIX system administrators started seeing strange server behavior, missing disk space, CPU cycles and network connections that strangely did not show up in command netstat. By implementation technology, three main classes of Rootkits are available today: binary kits, kernel kits and library kits. The first class achieves its goal by replacing certain system files with their Trojan counterparts. The second uses kernel components (also called modules) or Trojans, and the third employs system library Trojans. Rootkits found in the wild (such as captured on Honeypots), often combine Trojaned binaries with higher "security" provided by the kernel and library components.
Posted by Paul  on Sunday, 23 March 2003 @ 09:27:53 EST (544 reads)
(» Read More... | 1057 bytes more | TrackBack (0) | comments? | Score: 0)
image

image Vulnerabilities: Sun Solaris Hole Leaves Users Vulnerable image
UNIX
A vulnerability in how Sun Solaris handles fonts leaves systems susceptible to takeover by an attacker, according to a security bulletin.

The vulnerability comes from Sun's implementation of the X Windows Font Service, which serves font files to clients and runs by default on all versions of Solaris, according to an advisory issued by the CERT Coordination Center at Carnegie Mellon University.
Posted by Paul  on Friday, 29 November 2002 @ 08:55:00 EST (363 reads)
(» Read More... | 869 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 0)
image

image Firewalls: Combating Reverse Telnet using OpenBSD Packet Filter image
UNIX
This article is meant for those who are going to implement firewall using OpenBSD. The main purpose for this article is to protect servers (such as web, mail, DNS and others) within a firewalled network.
This article is based on wanvadder's personal experiences and wanvadder cannot guarantee it will suit all system that you have. Fell free to email wanvadder any comments, feedback or any other issues concerning this article. Co-operations from everybody are highly appreciated.
Posted by Paul  on Monday, 25 November 2002 @ 08:05:00 EST (376 reads)
(» Read More... | 629 bytes more | TrackBack (0) | comments? | Firewalls | Score: 0)
image

image Books: The Unix Auditor's Practical Handbook image
UNIX
This is a step-by-step practical guide to auditors when carrying out a Unix Audit. It mostly covers Sun Solaris systems, but it has cross-references for AIX and Linux.
Posted by Paul  on Friday, 15 November 2002 @ 02:00:00 EST (364 reads)
(» Read More... | 1036 bytes more | TrackBack (0) | comments? | Books | Score: 0)
image

image Vulnerabilities: Buffer Overflow in KDE resLISa image
UNIX
KDE is a popular open source graphical desktop environment for Unix workstations. Its kdenetwork module contains a LAN browsing implementation known as LISa, which is used to identify CIFS and other servers on the local network. LISa consists of two main modules: "lisa", a network daemon, and "resLISa", a restricted version of the lisa daemon created by Alexander Neundorf. LISa's lisa module can be accessed in KDE using the URL type "lan://"; the resLISa module can be accessed using the URL type "rlan://". A buffer overlfow vulnerability in the product allows attackers to gain elevated privileges.
Posted by Paul  on Tuesday, 12 November 2002 @ 11:14:24 EST (405 reads)
(» Read More... | 1240 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 0)
image

image Advisories!: UnixWare 7.1.1 Open UNIX 8.0.0 : rcp of /proc causes denial-of-service image
UNIX

Subject:      UnixWare 7.1.1 Open UNIX 8.0.0 : 
rcp of /proc causes denial-of-service Advisory #: CSSA-2002-SCO.41 Issue date: 2002 October 21 _________________________________________________________ 1. Problem Description An rcp of /proc by a normal user can cause the entire system to be unusable.
Posted by Paul  on Monday, 21 October 2002 @ 21:35:00 EDT (515 reads)
(» Read More... | 3359 bytes more | TrackBack (0) | comments? | Advisories! | Score: 0)
image

image Downloads: Unix tools track hackers image
UNIX

If you find you've been cracked use these old-school Unix tools to help track down the perpetrators

You have determined that your network has been breached. There are two standard approaches on what to do next:

  • Close the holes as fast as possible and put in safeguards to protect against future attacks.
  • Identify the perpetrator and prepare for prosecution.

Posted by Paul  on Tuesday, 01 October 2002 @ 09:00:00 EDT (1146 reads)
(» Read More... | 4575 bytes more | TrackBack (0) | comments? | Downloads | Score: 0)
image

image Privacy: An Introduction to GNU Privacy Guard (Part 1) image
UNIX

DesktopLinux.com guest author David Scribner has penned an article introducing new users to GnuPG on GNU/Linux (and UNIX) systems. Scribner focuses on how this powerful encryption package can play a vital role in personal and business communications by increasing security. This very detailed article will be available in two parts this week on DesktopLinux.com . .

Posted by Paul  on Thursday, 26 September 2002 @ 12:00:00 EDT (389 reads)
(» Read More... | 12877 bytes more | TrackBack (0) | comments? | Privacy | Score: 0)
image

image Vulnerabilities: DNS vulnerability 'critical' image
UNIX

Nominum Inc says a recently discovered flaw in the dominant domain name server on the internet is far more serious than originally thought, and could allow crackers to crash or even take control of any internet-connected application running on Unix, Kevin Murphy writes.

"We know for sure we can use this bug to crash any application," said Richard Probst, VP of product management at Nominum, which has released a product that fixes the problem. "And we think we know how to use it to hijack any application, but we haven't seen an exploit yet."

Posted by Paul  on Thursday, 05 September 2002 @ 09:00:00 EDT (443 reads)
(» Read More... | 2864 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 4)
image

image Solaris users slam Sun Intel plans (again) image
UNIX
Johnny-B-Goode writes "Sun Microsystems Inc is still facing protests from unhappy Solaris x86 users despite announcing the resurrection of the Unix operating system for Intel Corp-compatible processors at last month's LinuxWorld Conference and Expo, Matthew Aslett writes.

Santa Clara, California-based Sun has fought a running battle with Solaris x86 users since it canceled the development of Solaris 9 x86 in January, citing development costs and market economics. The user community has come together to launch a web site, www.save-solaris-x86.org, and has run advertisements protesting against Sun's plans in several newspapers, including the San Jose Mercury News, the Boston Globe, the Australian Financial Review, and the UK Guardian.

The latest, and largest ad appeared in the San Jose Mercury News on Tuesday September 3, and comes just weeks after Sun announced the return of Solaris x86 with plans to support version 9 on its new LX50 general-purpose Intel-compatible server. Despite that announcement, the user community is still unhappy that Solaris 9 x86, due for release in early 2003, will initially only be licensed for use with Sun's own LX50 server.

The customer community will not be satisfied until Solaris 9 x86 is available as a stand-alone product at reasonable prices and until management fully engages us as partners who share the same goal for Sun to be the leader in the technology industry for another 20 years, reads the ad, which is entitled Shame on you, Scott, and challenges Sun's CEO Scott McNealy to meet with community members and technical press to support his company's actions.
"
Posted by Paul  on Thursday, 05 September 2002 @ 07:09:35 EDT (357 reads)
(» Read More... | 3944 bytes more | TrackBack (0) | comments? | Score: 0)
image

Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication