Introduction to Spyware Keyloggers

This the website to which I link below:

"The user of more modern, feature-rich browsers such as Mozilla Firefox can virtually eliminate the spyware problem altogether. However, it is still the case that some websites are coded to only work with IE, and therefore switching to Firefox may not be a solution for 100% of a user's web surfing needs."

Coding a site to work only in IE is bad practice for a long list of reasons before we even get to Security. But enough of my soapbox commentary this is also a good article on spyware.

Introduction to Spyware Keyloggers




Alt.hacker - Link Overload

The following text was cut and pasted from the alt.hacker newsgroup.

---------------

[Further note: Due to complaints, this text is currently only being
posted once per week. H.]

Title $>
Newbies: Information Overload [Links, links and more links] ..

Release Version $>
2.0

Compiled by $>
VisiGoth

Permissions $>
This file can be (re)distributed by whoever feels the need
and to whoever wants it. Just make sure that it is in tact
and not altered (aside from any links you want to add
yourself)
in any form.

Updates $>
12.30.98 - This post as well as my other post entitled 'HowTo:
Makeshift Linux Network @ Home ..' is being turned over to
Quinny for an indefinite period of time [read: Until I decide
to take over again or he decides to hand it over to someone
else]. If you have any questions or comments regarding this
post, please contact Quinny via the group[s]. If you need to
contact me personally, my e-mail address is located at the
end if this file.

%%%%
%%%%

Why (Long):

The primary purpose of this list is to help the 'newbies' find the
information that they desire. Whether it be in regard to hacking,
phreaking, cracks and wares, mailing lists or to find an address from a
telephone number. But, as you may have guessed, there is an ulterior
motive to this list as well. Yes, i hate to say it but there is. What is
this 'ulterior motive' you ask?? Well, that can be best explained with
an example of what we see here everyday:

"The regulars are sitting in this group, as they do virtually everyday,
doing many things. Answering questions to the best of their abilities.
Taking tortuous threads and forming them to be the slinky in a garbage
disposal threads that you see before you. Posting primers and old text
files for the masses. Correcting these primers and text files for
accuracy. Some don't say much of anything and just hide out in the
rafters and lurk. And of course some are involved in soap opera like
discussions, which could sometimes boggle even the sharpest mind.

But, amidst these everyday activities that most people are consumed in,
they are temporarily distracted by a 'newbie' or a 'llama' redundantly
asking for the most simplest things of which could be found with the use
of a search engine or by reading the posts regularly. Oh, here comes
'ZeRo Co0l LlAmA' now.

"Hey d00dz! I saw a post with a sh!t load of linkZ, but i am 2 laZy 2
click on the UrLz. GiMM3 WAREZZZZZZZZZ !!!!!"

Now, unfortunately my posting will not help this poor, lost soul. I
don't think there is much of anything that could help this person except
maybe for a swift slap across the back of the head and a bottle of
Prozac. Ah, but here comes 'Genuine Newbie' now.

"Greetings everyone. I am new at hacking and i would really like to gain
all the information that i possibly can regarding the subject at hand.
I've already used a search engine to find a lot of links, but my thirst
for knowledge has not yet been quenched. Could you guys give me a hand
by throwing some more links my way?? Thank you."

Of course, if this person had read the group for awhile he/she could
have found numerous links to quench that thirst. /But/ - he/she was
polite enough to post a good, solid request.

Which is where the ulterior motive comes in. (Yes, FINALLY!) No one in
the group wants people like 'ZeRo Co0l LlAmA' or 'Genuine Newbie' asking
these types of questions. So, this list is my effort to try to quell the
influx of those posts. If this doesn't get you going in the right
direction, than nothing will. Except maybe for a psychologist and a new
hobby that has absolutely nothing to do with computers.

%%%% %%%%

When and What Else:

This will be posted as Quinny sees fit. I am assuming at least twice a
week to the normal groups. It can also be found at DejaNews if you do a
search on my name or Quinny's name. This post is also HTMLized on my
site in the 'TB2600' section.

I also recommend that you read Harlequin's 'Newbie' posts: "How to Hack
- Info for Newbies", the alt.2600 FAQ, the alt.2600 survival guide and
his cracks and wares list of links.

Now, enough of my dulling discourse and onto the links.

%%%%
%%%%

Categories:
/*Hacking/*
/*Shell Accounts/*
/*Mailing Lists/*
/*Proxy Servers/*
/*Operating System Specifics/*
/*Programming Related/*
/*On-Line Reading Materials/*
/*Search Engines/*
[C] /*Cracks, Wares and Serial Numbers/*
/*Finding People on the 'Net/*
/*Phreaking Related/*

%%%%
%%%%

/*Hacking Related/*
http://visigoth.isCool.net
http://www.hackers.com
http://www.ftech.net/~monark/crypto/
http://www.2600.com
http://www.mit.edu/hacker/hacker.html
http://www.krew.org/H.html
http://www.arts.unimelb.edu.au/Dept/Crim/Hack/pap.htm
http://www.unitedcouncil.org
http://www.infowar.com
http://www.phrack.com
http://www.cybercom.com/~bsamedi/hack.html
http://www.techbroker.com/happyhacker.html
http://www.rootshell.com
http://www.genocide2600.com
http://www.l0pht.com
http://www.thecodex.com/hacking.html
ftp://ds.internic.net/rfc/
http://www.sysone.demon.co.uk/
http://www.thtj.com
http://sun.soci.niu.edu/~cudigest
http://www3.l0pht.com/~oblivion/blackcrawlarch.html
http://www.cynet1.com/blindsight/
http://members.aol.com/madzombie/
http://www.tower.net.au/~hellfire/RTFM/rtfm.html
http://skynet.ul.ie/~flynng/security/
http://www.escape.com/~samk/
http://www.rhino9.org
http://www.io.com/~ritter/NETLINKS.HTM#CryptoDesigns
http://www.con.wesleyan.edu/~triemer/network/docservs.html
http://www.jabukie.com/Hacking.html
http://www.txdirect.net/users/wall/cgisec.htm
http://www.antionline.com/archives/windows/passwdcrack/
ftp://ftp.ox.ac.uk/pub/wordlists/
http://www.7thsphere.com/hpvac/index.html
http://www.inil.com/users/doug/hold.htm
http://www2.fwi.com/~rook/
http://www.pagewerx.com.au/nitroland/
http://easyweb.easynet.co.uk/~davegraham/ukarena/ukarena.htm
http://www.phreak.co.uk/datathief/home.html
http://www.feist.com/~tqdb/
http://www.hfactorx.org/
http://www.lordsomer.com/
http://main.succeed.net/~kill9/hack/
http://www.xmission.com/~ryder/hack.html
http://www.clark.net/pub/srokicki/linux/
http://www.hfactorx.org:80/user_pages/syntaxerror/
http://l0pht.com/~weld/index.html
http://www.sonic.net/~group42/
http://loa.ml.org
http://thepsyko.home.ml.org
http://prozac.iscool.net
http://www.legions.org
http://www.cotse.com
http://www.nmrc.org

%%%%
%%%%

/*Shell accounts/*

http://www.geocities.com/SiliconValley/Way/2183/
http://www.freeshells.net

[From The §eventh §ign:
www.grex.cyberspace.org
Should be added the list of links. It is a good system and they could
use contributions to aide you in your quest to become a Unix Guru!
I have used the help and can tell you having never used unix solaris 4.5
those folks where helpful. H.]

%%%%
%%%%

/*Mailing lists/*
http://www.ntsecurity.net/ (Subscribe to the NTSecurity list w/the
on-line sign up page)

Alert - Send an e-mail to request-alert@iss.net with the following in
the body of the message: Subscribe alert

BugTraq - Send an e-mail to LISTERV@NETSPACE.ORG with the following in
the body of the message: SUBSCRIBE BUGTRAQ

Cert - Send an e-mail to cert-advisory-request@cert.org with the
following in the subject line: SUBSCRIBE

FreeBSD Hackers Digest - Send an e-mail to Majordomo@FreeBSD.ORG with
the following in the body of the message: subscribe
freebsd-hackers-digest

Happy Hacker Digest - Send an e-mail message to hacker@techbroker.com
with the following in the body of the message: subscribe hh

Linux Security - Send an e-mail message to
linux-security-request@redhat.com with the following in the subject of
the message: subscribe

Linux Admin - Send an e-mail message to Majordomo@vger.rutgers.edu with
the following in the body of the message: subscribe linux-admin e-mail address here>

NTBugTraq - Send an e-mail message to LISTSERV@LISTSERV.NTBUGTRAQ.COM
with the following in the body of the message: SUBSCRIBE NTBUGTRAQ
firstnamelastname

NT FAQ - Send an e-mail message to nt-faq@ed-com.com with the following
in the body of the message: subscribe nt-faq

Windows95 - Send an e-mail message to
WIN95-L-request@PEACH.EASE.LSOFT.COM
with the following in the body of the message: SUB WIN95-L
firstnamelastname

Windows98 - Send an e-mail message to
WIN98-L-request@PEACH.EASE.LSOFT.COM
with the following in the body of the message: SUB WIN98-L
firstnamelastname

Visual Basic - Send an e-mail message to
VISBAS-L-request@PEACH.EASE.LSOFT.COM with the following in the body of
the message: SUB VISBAS-L firstname lastname

%%%%
%%%%

/*Proxy Servers/*

proxy.ak.iconz.co.nz:8080
proxy.wn.iconz.co.nz:8080
proxy.pm.iconz.co.nz:8080
proxy.tg.iconz.co.nz:8080
proxy.ch.iconz.co.nz:8080
proxy.ro.iconz.co.nz:8080
proxy.na.iconz.co.nz:8080
proxy.nn.iconz.co.nz:8080
svc.logan.k12.ut.us:8001
svc.nues.k12.ut.us:8001
svc.helpdesk.k12.ut.us:8001
svc.logan.k12.ut.us:8001
svc.nues.k12.ut.us:8001
svc.slc1.k12.ut.us:8001
gargoyle.apana.org.au:3128
proxy.magnusnet.com:8080 (or 8085, 8086, 8088)
proxy.third-wave.com:3128
supernova.netscape.com:8080
access.adobe.com:8080
server.librarysafe.com:8080
wwwcache.mcc.ac.uk:3128
http://www.anonymizer.com:8080
http://lpwa.com
http://www.iproxy.com

%%%%
%%%%

/*Operating System Specifics/*

Linux/UNIX related sites:

http://www.freebsd.org
http://www.hawken.edu/help/linux.htm
http://sunsite.unc.edu/mdw/index.html
http://www.linux.org
http://www.geek-girl.com/Unixhelp/
http://www.netsys.com/
http://www.ugu.com/
http://www.clark.net/pub/srokicki/linux/
http://www2.xtdl.com/~jlorenz/allunix.html
http://www.linuxhq.com
http://www.linuxos.org
http://www.li.org
http://freshmeat.net
http://slashdot.org
http://lwn.net/daily
http://lwn.nethttp://webwatcher.org
http://www.linuxresources.com
http://www.linuxgazette.com
http://www.linuxjournal.com
http://www.best.com/~aturner/RedHat-FAQ/
http://linux-list.home.ml.org
http://www.labs.redhat.com
http://www.redhat.com
http://www.clark.net/pub/ray/
[From Juergen Dollinger:
http://www.suse.de (Most popular german Linux distribution)
http://www.suse.com (dto) H.]

{
Linux Vendors
}

http://www.cdrom.com
http://www.lsl.com
http://www.linuxmall.com
http://www.cheapbytes.com
http://www.varesearch.com (systems with Linux pre-installed)
http://www.linux-hw.com

WindowsNT related sites:

http://www.nmrc.org/files/nt/
http://www.webtrends.com
http://www.ntsecurity.net
http://www.windowsnt-plus.com/
http://www.ntshop.com
http://www.ntfaq.com

Windows95 related sites:

http://www.windows95.com
[Note from ~The §eventh §ign~: It was bought by Cnet and is Now.
http://www.Winfiles.com. It is now both Windows 95, Windows NT, and
(Bwahahahaha!) Windows CE related thanks!! H.]

http://www.geocities.com/SiliconValley/Heights/1094/
http://www.windows98.org
http://www.mindspring.com/~ggking3/pages/windmill.htm
http://www.annoyances.org/win95/
http://www.cobb.com/win95/index.htm
http://www.winmag.com
http://walden.mo.net/~rymabry/95winfaq.html#FAQ
http://web.mit.edu/afs/athena/org/i/is/help/win95/
http://www.halcyon.com/cerelli/
http://cuiwww.unige.ch/info/pc/remote-boot/
http://www.helmig.com/
http://www.pcguide.com

%%%%
%%%%

/*Programming related/*

C/C++:

http://www.cm.cf.ac.uk/Dave/C/CE.html
http://www.delorie.com/djgpp/
http://www.strath.ac.uk/CC/Courses/NewCcourse/ccourse.htmlMS-DOS:
http://www.cm.cf.ac.uk/User/P.L.Poulain/project/allcomms.htm
http://log.on.ca/users/rhwatson/dos7/commandintro.html
http://www4.ncsu.edu/unity/users/j/john/html/dosinfo/batch.html
http://www.cit.ac.nz/smac/os100/msdos14.htm

QBasic:

http://www.geocities.com/SiliconValley/Park/4504/qbasic_tutorials.html
http://www.qbasic.com

Visual Basic:

http://www.wvinter.net/~smithm/archives.htm
http://www.inquiry.com/techtips/thevbpro/
http://www.cdc.net/~dmitri/utilities.html
http://www.brianharper.demon.co.uk/files.htm
http://www.zeode-sd.com/ccrp/
http://www.freecode.com/
ftp://ftp.microsoft.com/developr/vb/kb/index.txt
http://www.planet-source-code.com/vb/
http://www.softcircuits.com/sw_vbsrc.htm
http://www.karland.com/code/visualbasic/
http://www.kingsoft.com/qaid/vb/index.html
http://www.cgvb.com/links/lpage.boa/FILE
http://www.buffnet.net/~millard/vb/vbwfaq1.htm
http://www.vb-helper.com/howto.htm
http://pi1438.kub.nl:2080/VisualBasicSource/scindex.htm
http://www.goldenfamily.com/visbas/index.html#CODE
http://thebestweb.com/vbfaqs/faq_prog.html
http://www.pconline.com/~markp/winsock.htm

Miscellany:

http://www.uni-tuebingen.de/zdv/projekte/linux/books/nag/node1.html
http://www.programmersheaven.comh
http://www.strangecreations.com/
http://www.utexas.edu/cc/

%%%%
%%%%

/*On-Line Reading Materials/*

http://www.mcp.com/personal/
http://www.developer.com

%%%%
%%%%

/*Search Engines/*

http://www.yahoo.com
http://www.altavista.com
http://www.infoseek.com
http://www.lycos.com
http://www.excite.com
http://www.webcrawler.com
http://www.metacrawler.com
http://www.hotbot.com
http://www.dejanews.com
http://www.filez.com
http://www.ftpsearch.com
http://www.phoaks.com

%%%%
%%%%

/*Cracks, Wares and Serial Numbers/*

[VGI Note: I am fully aware that this section has absolutely nothing to
do with hacking or phreaking, but I am getting sick and tired of people
requesting this crap so hopefully if they are directed towards this
list, they will eventually cease and desist (or at least slow down to an
extent).]

http://www.compucall.com/keys.htm
http://hack.box.sk/
http://www.fravia.org
http://www.lordcaligo.org
http://www.t50.com
http://www.wwisp.com/~wsg/cbd/cracks.html
http://members.tripod.com/~tnwo/
http://www.fortune500.net/super/

If the links above do not offer what you are looking for, then here is a
list of the appropriate news groups that cracks, wares, and serial
number requests should be made in (In other words, not here!):

news://alt.cracks
news://alt.binaries.cracks
news://alt.binaries.cracks.phrozen-crew
news://alt.2600.warez
news://alt.2600.programz
news://alt.warez.ibm-pc
news://alt.binaries.warez.linux
news://alt.binaries.warez.mac
news://alt.binaries.warez.macintosh

%%%%
%%%%

/*Finding People on the 'Net/*

http://www.anywho.com
http://www.infospace.com
http://www.whowhere.com
http://www.four11.com
http://www.switchboard.com
http://www.cis.ohio-state.edu/hypertext/faq/usenet/finding-addresses/faq.html
[Now http://www.faqs.org/hypertext/faq/usenet/finding-addresses/faq.html
H.]
http://www.thecodex.com/
http://rs.internic.net/cgi-bin/whois/

%%%%
%%%%


/*Phreaking Related/*

http://www-personal.engin.umich.edu/~jgotts/underground/boxes.html
http://members.tripod.com/~iang/http://www.phonelosers.org/
[Note from !!Sabu!!: After RBCP took down his discussion board at
www.phonelosers.org I set up my own message board modeled after the one
rbcp had. It ain't great but it's better than no message board.
It's at: http://pla.tsx.org. If that link goes dead the backup is:
http://boards.eesite.com/board.cgi?boardset=q7rj7dk4 - Enjoy. H.]
http://www.geek.org.uk/phila/nd/index.html
http://www.slcnet.net/personalwww/apollo/telecom/phreak.htm
http://www.webcrunchers.com
http://www.visual-traffic.com/hacker.html

%%%%
%%%%

I hope that this posting has been of some value to you and has not
proved to be a complete waste of time on my part.

E-mail: visigoth[at]technologist.com




Clear explaination of XSS (Cross Site Scripting) vulnerabilites

This article also describes the difference between many different "injection" techniques, including HTML, SQL, and Metacharacter injections.

Common Security Problems in the Code of Dynamic Web Applications : Hackers Center : Internet Security Archive: Exploits, Patch, Security Articles, Advisories




ISDN Tutorial

One of the 'pain points' on the ICND exam is ISDN because there is large amount of data to know and not much tangible about it. Here is a short tutorial that may help out. It references the important ISDN protocols by layer and provides good brief explainations of each protocols function.

ISDN Tutorial




Spam is a waste of time

When you saw that headline did you just have to click to find out what could possibly justify saying something so obvious? Spam is actually addicting, as any other emotional subject can often be. No matter how infurriating, we can't pass up the chance to express some anger about it.

Better yet are the people who have made a hobby of fighting spam. Its a great service to us all, but what invariably happens is that events of retaliation create philosophical discussions about spamming spam.

Those that spam feel just as strong about their right to do it as anyone feels about their right not to recieve it. And any reaction in one direction will always incite an equal but opposite reaction.

Try to laugh at it if you can.

Mugu Marauder Spokesperson Takes Aunty to Task - Reported by Aunty Spam's Net Patrol




Behind the Closed Doors of AMD's Chip Production

This is pretty cool, a short trip through a chip factory with images of the what the chips look like naked.

Tom's Hardware Guide Business Reports: Behind the Closed Doors of AMD's Chip Production - Behind The Closed Doors Of AMD's Chip Production




iPods pose security risk for enterprises, Gartner says

No, I disagree. What could possibly be wrong with introducing a 30G portable storage device to the network and while downloading stuff administrators walk past and say "Hey, whatcha listing to?"

Next they will say camera phones might present privacy concerns.


iPods pose security risk for enterprises, Gartner says | InfoWorld | News | 2004-07-06 | By Laura Rohde, IDG News Service




Introduction: Buffer Overflow Vulnerabilities - The Community's Center for Security

Buffer overfolows, there can never be too many attempts at explaining them. (I am not being sarcastic here)

Here is one you can absorb in less then ten minutes.
Introduction: Buffer Overflow Vulnerabilities - The Community's Center for Security




Sharp Ideas: Trivial honeypot

From the Sharp Ideas blog, how to use Netcat as a simple honeypot.

Sharp Ideas: Trivial honeypot




PortForward.com - Free Help Setting up Your Router or Firewall

For those setting up a router or firewall for the first time, or for those who found a dusty 3com something for $5 at the local computer swap meet, here is a site that posts instructions for getting it to work.


PortForward.com - Free Help Setting up Your Router or Firewall




Infamous video on cracking WEP in ten minutes

This link used to be accessible via the Whoppix site which is now Whax and the link is a little harder to find. It is interesting how Googling for something is often easier than using a website's own navigation, but I digress.

I get asked for this link alot so here 'tis.

Created by Satya Jith




Cisco IOS MPLS Virtual Private LAN Service: Multipoint Ethernet

Hopefully you still get this link Travis (This is a student in a recent ICND class I taught). Here is that article I thought might answer your questions about combining multipoint services.

Cisco IOS MPLS Virtual Private LAN Service: Application Note� [Layer 2 VPNs] - Cisco Systems




What Is Computer Forensics?

Investigations, wether they be for legal or informational reasons, can be put into one of two catagories that will influence how you apporach the situation. In some cases the event used the computer as a tool, in other cases the computer was the focus of the event.

Example: Someone storing illegal materials and having chats with cohorts is when the computer is the object in use. An attacker breaching a host and uploading keylogger software is an example of the computer being attacked. In either case, what you are looking for changes your selection of tools and techniques.

Are you looking for evidence or an explaination of an occurance?

This article presents a few other good points in describing the goals and objectives of computer forensics.

CyberSecurity Institute: What Is Computer Forensics?




Microsoft Downgrades Claria Adware Detections

It amazes me how dense, or how little they care about integrity. The "they" I refer too are those looking to make an extra dollar in every conceivable fashion possible using advertising.

Consider Baseball, and yes I know they have issues also. But the last guy that was caught gambling on even his own team, and even to win, was banned or life. This happened because even the baseball execs understand that the very essence and fabric of professional sports is compromised if the end result of a game might be pre-determined or even influenced in any way other than through honest competition.

But we have no such standards on the Internet. The article I reference below posits that Microsoft is downgrading the threat level of an obvious piece of adware in their spyware detection tool. This decision seems to be based on a business arrangement Microsoft is making with Claria Inc, the makers of the "Gator" spyware application.

Microsoft Downgrades Claria Adware Detections




Microsoft Baseline Security Analyzer 2.0

MBSA 2.0 is now available. If you are still using Office 2000, you must continue to use the older version of MBSA. For most everyone else however, this is a worthy upgrade.

Plus, its a free pentest tool :)

Microsoft Baseline Security Analyzer 2.0




I N K S C A P E . Draw Freely

SVG is an XML specification that allows one to define shapes and graphics using a text-based markup language. Why would anyone want to do this? Because descriptions can tell a display device how to draw the image, and this can be searched through, programmatically manipulated, edited by hand in a text editor, or transformed into other things on the fly.

Plus SVG is an open standard, so anyone who needs to can really learn how it works. "Inkscape" is an application that is more for the artist who does not want to draw a tree using notepad, but would rather have a set of familiar graphics tools and let the application create the XML for the programmers automagically.

Even if you are not at all interested in XML or SVG but you just need a free drawing tool, hear 'tis.

I N K S C A P E . Draw Freely




Just BASIC - Free programming language

This subject has come up several times over the last few days; people remembering the good ol' days of programming in Basic in either their Commodore, Atari, or IBM XT for those with more discretionary income at the time.

It is always handy to be able to code out a little tool now and then. Whatever the language, its a terrific mental excercise and something I really wish I had more time for myself.

Just BASIC - Free programming language




Whoppix is now Whax.

Whoppix er er Whax is a Bootable Linux distro for penetration testing. The distribution encorporates compiled exploits from many popular repositories as well as important open source tools used by security professionals.

Whax is no longer based on knoppix, it is now based on Slackware, which may make things easier for the developer but seems to make its hardware detection scope a bit more limited, at least in my experiences. It is cool nonetheless, give it a try by downloading it from here:

IWHAX.NET - News




IP and Routing Tutorials

Here is a resource of well written, yet short tutorials on important IP related protocols.

Even though I encourage students to read the source documents from the point of origination, be they the IETF, Cisco, Microsoft or whoever, third party articles often take a unique angle and can provide great incite.

Internet Protocol (IP) v4, TCP/IP, routing




This page is powered by Blogger. Isn't yours?