Linux Hacks & Cracks

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

Security Mavens Invaded by Trojan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A popular Web discussion board in which the subject is computer security became the unwitting host of an attack program directed at security consultant firm Network Associates Wednesday night. A cracker posted to the Bugtraq board what he said was a . . .

Experts send malicious code to 37,000 users

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It seems that even the experts get fooled sometimes. A Trojan horse posing as a security tool did just that Wednesday night, when experts at SecurityFocus.com-which moderates the popular Bugtraq security list-sent the mildly malicious code to the list's 37,000 users. . . .

Former System Admin. Sentenced

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A former network administrator for the US District Court in Alaska has been sentenced for launching a series of denial-of-service attacks against a New York District Court Web site. According to information released today by the FBI, Anchorage resident Scott . . .

Captain Crunch sets up security firm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Legendary hacking figure Captain Crunch is returning from years of relative obscurity to set himself up as a security consultant. Perhaps the most well known figure in the digital underground besides Kevin Mitnick, John Draper made his name in 1971 when . . .

Close calls, but no cracks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The dust has settled from the frantic first week of Openhack III, with its heavy traffic and mass of DoS attacks. The second week saw a lot more stability in the site and a bit more frustration from serious hackers still . . .

The next security threat: Web applications

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The next wave of hacking schemes focuses on a vulnerable and extremely difficult area to defend: Web applications. Application hacks take advantage of vulnerabilities that normally occur in many HTML pages. A person hacking into a Web page could, for example, . . .

From Outlaw to Consultant

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

... there may be no tale so poignant as that of John T. Draper, the mythical "phone phreak" who became a national figure in 1971 after being one of the first to discover that a toy whistle in the Cap'n Crunch . . .

Web war rages over DVD-cracking site

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In a move that free-speech activists hope will be trendsetting, Internet service provider Verio is standing up to the movie industry by refusing to remove a Web site the Motion Picture Association of America says is illegal. Many ISPs, especially smaller . . .

Internet Exploits Defined

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Start with the basics. "No longer does a hacker have to huddle in front of a glowing monitor. Today's hacker has at his disposal a literal arsenal of fully automated tools, through which he can gain access to your system without . . .

French hackers break SDMI, publish results

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Two French hackers, Julien Stern and Julien Boeuf, have broken the Secure Digital Music Initiative's watermarking scheme. However, being French, they (1) have declined to sign SDMI's nondisclosure agreement, and (2) are not subject to the Digital Millennium Copyright Act. So they have published their findings, both in French and in English. . . .

Security patches aren't being applied

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As a result, this easily avoidable problem has reached near-epidemic proportions. Making matters more frustrating is knowing that so many losses could have been easily avoided with a few mundane but crucial steps. "I would put patching in the top two . . .

Linux' Bug Problem: Getting the Fixes Out

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Still, the continuing spread of Ramen raises some serious questions about the ability of the open-source community to live up to its security boasts. Linux supporters have long claimed the transparent nature of open-source development produces more secure software and fixes . . .

Planet Suffers Big Hack Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A group calling itself Pentaguard simultaneously cracked government websites in the United States, England and Australia. The group replaced the home pages of the sites over the weekend with a statement reading "The largest .gov & .mil mass defacement in the . . .

Vandals mutate Ramen Linux worm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After infecting NASA and Texas A&M University last week, the worm--a self-spreading program that focuses on versions 6.2 and 7.0 of Red Hat's Linux OS--is making its move on Linux servers abroad, as vandals use the program to post digital graffiti.. . .

Openhack III bowed but not broken

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The battle has begun, and the first salvo was a fierce one, as a cascade of denial-of-service attacks swept over the Openhack III site in its first four days of operation. As of midday Thursday, no one had succeeded in any . . .

Yahoo, Microsoft traffic 'hijacked'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A computer glitch is being blamed for cutting off Web traffic headed for Yahoo.com and Microsoft.com on Saturday. For about 12 hours, thousands of Internet users trying to visit those two popular Web sites and dozens of others were instead sent . . .