Monday, July 30, 2001

HackerHeaven
This is hackerheaven, a site for hackers, by hackers. With hacker, I mean the hacker mentioned in the Jargon file (no, not the one carving furniture :)
Dshield - Distributed Intrusion Detection System
DShield.org is an attempt to collect data about cracker activity from all over the internet. This data will be cataloged and summarized. It can be used to discover trends in activity and prepare better firewall rules.
Right now, the system is tailored to simple packet filters. As firewall systems that produce easy to parse packet filter logs are now available for most operating systems, this data can be submitted and used without much effort.
More complex patterns, such as are used by application level firewalls may be handled in the future.
Cops, Crimes and HAL2001
HAL2001 is an event similar to HIP97, where hackers come together, learn about lots of nifty new stuff and pick each others brains clean. Unfortunately, a lot of scriptkiddies that call themselves 'hackers' attend as well, and usually only because of the 1 Gbit uplink that will be present.
Rop Gonggrijp (from hacktic fame) wrote a short text about HAL2001, targeted at that dubious group of people. A fun read for real hackers (tm) and a wise lesson for neophytes. Read on for the text.
Hacker Grabs JDS Earnings Release Prior To Posting
Executives at the fiber-optics company, based here, said during the company's earnings call Thursday that a hacker gained access to a draft of its fourth-quarter financial release as it was being prepared for the company's Web site. JDS quickly halted trading of its stock because of the incident.
JDS had its earnings release ready to post on its Web site with the push of a button Thursday, and someone was able to guess the release's URL before it became public on the site, a company spokesman said Friday.
Save Your Site
For the fullest online security, companies need the broadest array of defenses. Many commercial sites maintain firewalls to control access and allow certain kinds of content (or people) in or out. Most encrypt sensitive data like credit card numbers in transit over the Internet. Yet web applications inside your firewall are essentially wide-open targets. Holes and vulnerabilities in commercial web software constantly crop up and need to be filled or plugged with upgrades or patches from vendors.
Businesses can't afford to wait passively for security glitches to be discovered and fixed manually. And continually fixing code written in-house by hand is an expensive, time-consuming and never-ending task. In fact, most sites add so much new code every day that they could never hope to keep up by patching or fixing holes manually. This makes a majority of sites essentially insecure.
Sanctum's AppShield™ can make your online business all but impenetrable to Web Perversion. And our AppScan™ software can show you where your applications are vulnerable, and recommend how to fix them.
Protecting the applications running at the heart of your online business by manually patching or upgrading is a strategy that will fail you, sooner or later.
SECUROM
SecuROM™ is a PC CD-ROM copy protection solution developed by Sony DADC. Together with its sister plants Sony DADC is the world market leader in CD replication services. Protect your profits with SecuROM™and see what a difference it makes.
The Spread of the Code-Red Worm (CRv2)
Around 10:00 UTC in the morning of July 19th, 2001 a random seed variant of the Code-Red worm (CRv2) began to infect hosts running unpatched versions of Microsoft's IIS webserver. The worm spreads by probing random IP addresses and infecting all hosts vulnerable to the IIS exploit. As noted by others, there are at least two variants of the worm: one that used a fixed, static seed for its random number generator, and another that used a random seed. [eeye] [stuart] In this paper, we examine the characteristics of the random seed variant of Code-Red (CRv2).
ITNet exposes job seekers' details online
A job applicant to IT services firm ITNet had more to worry about than company perks after sensitive details from his application form were left accessible online.