Security Problems

This page is a subsection of the Crypto link farm. Links to further crypto and security-related information can be found there.

$10,000 DES Challenge
RSADSI's encryption-breaking challenge.
AccentSoft Series Utilities
Password recovery for MS Office, Access, Word, Excel, Money.
Accidental Trojan Horses
How to run arbitrary code on a Windows machine via email or the web.
ActiveX - Conceptual Security Flaw
Using ActiveX to steal money via fake bank transfers.
ActiveX security check page
Sampling of dangerous ActiveX controls which can be used to run arbitrary code on your machine.
AirSnort Homepage
WEP encryption key recovery tools.
aLoNg3x'S hOmEpAgE
Links to assorted cracking and hacking sites and resources.
Analysis of DVD ContentsScrambling System
Cryptanalysis of CSS.
AOL-Security Pages
AOL security problems (some fairly scary).
Architectural considerations for cryptanalytic hardware
Breaking RC4, A5, DES, and CDMF with FPGA's.
Archive of Hacked Websites
Various web pages which have been altered by hackers.
Armageddon
Packet sniffing and spoofing.
Ars Technica: Wireless Security Blackpaper - Page 1 - (7/2002)
Problems with 802.11 wireless security.
ATTRITION Mirrored Sites
Mirror of defaced web pages.
Back Orifice
Backdoor access to Windows machines which allows them to be controlled from anywhere via the net.
Back Orifice Removal - BORED
Tool to scan for and remove Back Orifice.
Basement Research
SMB session sniffer, NT TCP/IP connection killer.
Bioinformatics and Data Analysis Products at Paracel
Data filtering hardware originally designed for NSA/Echelon use.
BO2K - Back Orifice 2000
Windows trojan allowing remote control of a machine, file transfer, keystroke logging, registry access, and user plugins.
Bokler's Guide to "CRACKER" Software
Programs to break the "encryption" on a number of DOS and Windows programs.
Buchanan International
Password recovery (apparently they're just a reseller for Access Data).
BugNet
Wintel PC bugs, including occasional security problems and holes.
Bugtraq Archives for July 1995 - present
Security vulnerability archives.
Bugtraq mailing list archives
Security vulnerability archives, 1993-present.
CCC klont D2 Kundenkarte
CCC cloning of GSM SIM's and software SIM emulator (in German).
CCD : software cablecrypt decoder
Decoder for cablecrypt-enrypted PAL TV signals.
Cellular-Cables.com - Sim Readers ::
SIM cloning gear.
Cellular Telephone Experimentors Kit
Completely control an OKI900 through a computer (including many neat things you're not supposed to be able to do).
Channel 1 File Library:Unprotects
Unprotects for a large amount of software.
Chaos Computer Club
cfDecrypt
Code to decrypt Cold Fusion templates.
Cmos, LILO, NT passwords - Antivirus
Edit NTFS partitions, reset NT/CMOS/LILO passwords.
Computer Crime Reference Index
Organisations, publications, legal resources, security advisories, mailing lists.
Computer Security Information
Information on password cracking, denial-of-service attacks, and NT security holes.
Cookie Jar
Control which web servers can get cookies.
CooL_MoDe's Kewl World
Exploit files for a wide variety of Unix security problems.
Craaack Labs
"We make the things that break the things that you make".
CRAK Software
Password-recovery software for Word, Excel, 123, Quattro Pro, WordPerfect, Quicken, etc.
Crash Netscape
This URL will crash Netscape (and make Windows unusable for Win 3.x) when connected to.
Crashing IE4
Combines the MSIE res security hole and the Pentium F00F bug to lock up any Pentium machine running MSIE.
Cursor
Cellular phone tracking technology.
Crypto & Hacker Linkz
Links to crypto and password-recovery pages.
Cryptography Research - Differential Power Analysis
Powerful noninvasive analysis technique for recovering information (eg encryption keys) from smart cards.
Cybercrime on the Internet
Cyberciminals and cybercrime buzzword buzzword hacking buzzword fnord child pornography buzzword fnord.
Cypherpunks Key Cracking Ring
The cypherpunks attack crippled US export-approved encryption.
Cypherpunks SSL challenge broken
The cypherpunks break crippled US export-approved encryption.
Death by ActiveX
More ActiveX security holes.
Decompilation of Binary Programs - dcc
Decompiler for reverse-engineering 80x86 software.
DeCSS Gallery
DeCSS as C source, in Standard ML and Scheme, as a GIF image, in (non-compilable) pseudocode, in English, as a haiku, photo of a t-shirt, recordings of a dramatic reading and a song version, as a film, steganographically encoded in various images, etc etc.
Default Password List
Default passwords for systems, network gear, printers, embedded devices.
Default usernames and password for Routers/Switches/Hubs and others
Collection of default passwords used in assorted commercial equipment.
Defiants Eurosat.com
Pay TV and smart card hacking information.
Déjà Vu All Over Again
BYTE article in plethora of NT security holes.
DES Challenge Coordinated Effort
SolNET RSADSI DES challenge.
DES Challenge Attack
Distributed software attack on DES
Denial-of-Service FAQ
The denial-of-service FAQ.
Device Object Security
Problems with Windows NT device object security.
Digital Signals Monitoring with your scanner
Monitoring trunked radio nets with scanners.
distributed.net - Node Zero
Distributed computing applications (such as encryption breaking).
DMZ Services, Inc.
Dictionary generator for brute-force password crackers.
D.O.E. SysWorks
Links and information on security weaknesses, password recovery, key recovery tools, reverse engineering. Of particular interest is the information on the large number of snake oil crypto programs out there.
Electronic Voting
Problems with electronic voting.
Ericsson Unlock Devices
Unlock and generally mess with Ericsson GSM and PCN phones.
ERL PTT: Monitoring Inmarsat
Inmarsat interception using standard commercial gear, with an example of interception of sensitive political information and electronics smuggling to the Iraqi internal security organisation.
Eye Tech Surveillance = Products Page
Transmitters, phone taps, listening devices, computer bugs.
Factorization of RSA-130
Firewall Test, Port Scan and Security Test at Auditmypc.com - research open ports online.
Scan your PC for open ports and privacy leaks.
Flaws in Java Implementations
Catalogue of and analysis of security flaws in Java implementations.
floydsoft.com - Free NT/IIS Utilities
IIS SSL key password recovery tool.
Forbes ASAP: Hack Attack
Hackers test the gullibility of a Forbes reporter.
Forbes addendum: EMP weapons: Calling Victor von Doom
Debunking some of the more outrageous parts of the Forbes story.
Forbes addendum: The Netly News - EMP Gun
Another writeup on the EMP gun urban legend.
Fravia's page of reverse engineering
Much information on reverse-engineering software.
Fravia's Steganography Starting Page
Stego information, including how to defeat various steganography-based watermarking techniques.
Fun and Games with PGP
Potential PGP weaknesses and problems.
Fuzz Testing of Application Reliability
Relability testing of applications in the presence of random input (most apps crash or hang).
Fyodor's Exploit World, Exploits for many Operating Systems including Linux,Solaris,Microsoft,Macintosh. For Hackers, Hacking, Computer Security auditing & testing
Catalogue of security holes and exploits for Windows and various Unixen.
GB_SOFTWARE(English)
Red and blue box software, IR car door unlocker for the Gameboy.
Georgia SoftWorks - Windows NT Password Guard!
NT password grabber.
Greg Miller's Home Page: Crypto, AI, and Networking
Netware-related security problems and issues.
GSM cellphone cloning
The Smartcard Developers Association proves that GSM security isn't nearly as good as the vendors claim.
GSM Cloning
The ISAAC group's page on the GSM security breach.
Gullibility Virus
Frightening new virus running rampant on the net.
Hack Watch News
Satellite TV security and insecurities
Hacker's Encyclopedia CDROM
CDROM full of files on every aspect of computer security and how to bypass it.
Hacking
Keystroke loggers/sniffers, password crackers, etc.
Hacking Novell Netware FAQ
Hacking Texts
Various texts related to hacking and security.
HackZone
Information on viruses, trojans, denial-of-service problems, and other security weaknesses.
HAM Radio Software
POCSAG decoder for monitoring pager messages.
Hardware Hacks
Hardware hacks, mainly mag.card related.
Hardware Security Links
Links to information and equipment suppliers for TEMPEST and hardware penetration attacks.
Home of Mnemonix - Welcome!
Various NT security problems.
Hostile Applets Home Page
Various hostile Java applets.
H/P/C/V Utilities
Password crackers, carding, war diallers, key generators, hex editors, links to related sites.
Hyperlink Spoofing
SSL server authentication attack.
ICKiller can be deadly
Warning about ICQ toolz/ICKiller, which installs nasty trojans in your system.
Infilsec - Vulnerabilities
Vulnerabilities database for various OS's.
Inmarsat zapping
DIY Echelon.
(In)Security of the WEP algorithm
Security problems in 802.11 wireless LANs.
Inside the Windows 95 Registration Wizard
What the Windows 95 Registration Wizard is *really* doing with your system.
Internet Attacks
A (very complete) taxonomy of Internet attacks.
Internet browser access to your hard drive
How to access your local hard drive with a web browser.
Internet Explorer Expoit #4
IE security hole which allows your logon username and password hash to be grabbed over the net, regardless of firewalls or use of "strong" passwords. 14,000 passwords grabbed so far by this site alone, with no apparent attempt by MS to fix it.
IOPUS Internet and Security Software
Stealth activity monitor, Windows PWL password recovery.
IOPUS Software: Automatic, invisible POP3 / SMTP email sender sender
Secretly monitor and mail files to other machines.
ISS NT Security Library
Links to sites covering NT security issues.
Java Code Engineering: engineer & reverse engineer Java class files
Links to books and articles, disassemblers, decompilers, and deobfuscators.
John the Ripper
Unix password cracker, including MMX version which is 30% faster than the standard one.
K^KakO^B Cracking Tools Page
Password breakers for Trumpet Winsock, Eudora, Win95 screen saver, Netscape mail, Win95 shared items, Pegasus mail.
Key Code Generators
Key and unlock code generators for large amounts of software.
Key Recovery Alliance
Communicate secure in the knowledge that only the US government is listening.
Key Recovery Technologies
How to implement espionage-enabled software.
Key Recovery Utilities and Resources
Key recovery utilities, tutorials, programs (including ones to break Arj, BIOS passwords, Compuserve, Contraband 9G, Crypt-o-Text, Cryptic Writer, CuteFTP, CyberSitter, Encrypt-It, Eudora, MS Access, MS Word, MS Excel, Norton Diskreet, Novell Netware, RAR, 40-bit S/MIME, Stacker, Turbo Encrypto, Wincrypt, Windows NT password, WordPerfect, WS_FTP, and Zip), and resources.
KSR[T] Security Advisories
Unix security problems and advisories.
Kyler Laird's PDF utilities
How to print "unprintable" PDFs.
Locraker
Brute-force combination lock breaker.
M2mike's Corner of the Web
Information on breaking various security systems used by schools (mostly Win95-related - this is "security" for very small values of security).
Mailtunnel
Tunnel anything (telnet, ssh, file transfers, etc) through firewalls via email.
Maximum Security
Updates on Internet and Internet software security problems.
MDT Monitor for Windows
Software to decode police mobile data terminal messages.
Microsoft CD Key Authentication Revealed!
Microsoft FrontPage 98 Security Hell
The infinite security holes in FP for Unix.
Microsoft IIS Web Server Security Bugs
Security holes and bugs in Microsofts Internet Information Server.
Microsoft Password Recovery Software
Recover passwords for MS Word, Excel, Access, Money, and VBA projects.
Microsoft's Really Hidden Files
Summary of the information about user activities secretly logged by MSIE and Outlook, and how to get rid of it.
MS Word & Excel security weakness
Recover passwords for all newer versions of Word and Excel.
Mini-FAQ: NT Password Attack & defences
NT password cracking FAQ.
Money Protocols
Things which can go wrong with smart cards.
MOSIACs CSDU
Cellular signal destruction unit (in other words a GSM jammer).
Netbus
Windows backdoor access server.
Netscape Security Problems
Security flaws in Netscape.
Netware/Windows NT/Web Hack FAQ
Security problems in Netware, NT, web servers and browsers.
Neverness
Hacking, kracking, phreaking, crypto.
New Media Laboratories - Crypto
Distributed attack on RC5.
No First Virtual
Security problems with First Virtual.
Nortek Computers Ltd: ThinkPad Password Solutions
ThinkPad power-on and hard drive password removal.
Norton Internet Security 2000
Symantec's be-your-own-victim Internet security check (requires Win95, MSIE, Java, ActiveX, active scripting, cookies, and firewalling disabled).
(Not only) Russian Password Crackers
Good collection of password breakers and crackers for a variety of programs.
Novell Remote.NLM Password Decryption Algorithm
How to decrypt Remote.NLM passwords for Netware 4 and 5.
Nowhere to Run
TEMPEST monitoring.
NSClean information
Clean up various Netscape files which record information on you and your net activity.
NTAccess
Change the Windows NT administrator password.
NTBugtraq - NTBugtraq Home
Mailing list covering Windows security holes and problems.
NT Crack
Very effective NT password cracker.
NT Exploits
Windows NT security holes and exploits.
NT Internals
Not directly security-related, but contains a lot of useful technical information and source code to bypass or upset NT's security controls.
NT offline pw-util, bootdisk
Password change and general system editing utility for NT.
NT Security Home
NT security issues and concerns, security tools.
Nurse your Net Nanny!
How to disable various Internet blockers (and these things are supposed to be childproof!).
Offline NT Password & Registry Editor
NT password recovery.
Omen project tls cbc attack on Openssl
Password-recovery attack for SSL/TLS.
On the topic of Firewall Testing
mjr on firewall testing and certification.
OptOut -- Internet Spyware Detection and Removal
Remove some common Windows spyware programs.
Outlook Redemption
Plugin to allow your code to bypass MS Outlook security measures.
Palmtop plunder
Breaking into cars using a PalmPilot.
pan1k?
Assorted information on security problems and programs (AOL, Netware, boxing, carding, encryption, password-cracking, virii, satellite TV, text files).
Pandora
Reverse-engineering Novell's directory services (includes Novell password breaker).
Paradox Specs
Decode Paradox tables without knowing the password.
Password Removal Tactics
How to remove/bypass password/"encryption" protection for a variety of software.
Password recovery software
Password recovery software for NT, Zip, Arj, RAR, ACE, all MS Office programs along with MS Money, Project, and Backup, VBA, Quicken/QuickBooks, Lotus SmartSuite, Acrobat/PDF, Paradox.
Password recovery tools
Password recovery tools and services for MS Office and WinZip.
Pavel Semjanov's Home Page
Assorted key and password breakers (partially in Russian).
PC Keyboard Bug
Hardware keyboard bug which records 2,500 keystrokes.
PHENOELIT
Tools and info for getting into HTTP, FTP, POP, IMAP, LDAP, telnet servers.
Phrack Magazine Home Page
Security problems, hacking, hacker conferences, general news.
Phrozen Crew - News
Various Win32-related security utilities.
PIC16C84 Security
How to bypass the 16C84 security fuse.
Ping o' Death Page
Problems with remote machines crashing whens sent long ping packets (this affects Unix systems, Macs, Netware, routers, printers, ...).
PIR8 Underground : Home Of KeyGenz
Crackz, Keygenz, and other things ending in z (including cracks for a large number of copy protection schemes like Vbox, SalesAgent, softSENTRY, TimeLock, and many others).
PkCrack - Breaking PkZip-encryption
An implementation of the Biham/Kocher paper (complexity 2^38).
PKI and Smart Cards
Security holes in a large smart-card based PKI project.
PPN
Phone punx network.
Products / Flash / Unlock / Repair Boxes
Cellphone "unlockers".
Products / SIM Cards Backups
SIM cloning gear, blank cards.
Projects - fakeAP
802.11 access point spoofer.
PROTOS - Security Testing of Protocol Implementations
Automated black-box testing of protocol implementations (most recently used to find numerous flaws in WAP and LDAP implementations).
Pwdump2
Dump NT password hashes even with Syskey installed.
qnxdecrypt
Decrypt any QNX password.
. r a i n . f o r e s t . p u p p y .
Rain.Forest.Puppy's collection of NT security holes and information.
Random Credit Card/Check Card Fraud with Small Charges
Warnig about an online credit card fraud technique.
Random Input Processing Flaws of System Programs
What happens when you feed MS command-line apps garbage input.
Read text/HTML file with Internet Explorer
Demo of MSIE bug which allows arbitrary files to be read from your machine.
Reverse Engineering the LEGO RCX
Tutorial on reverse-engineering a microcontroller.
RISKS Forum Archives
Archives of the ACM forum on risks to the public in computers and related systems (use the arrow icons to move to other risks volumes).
Risks Of "Key Recovery," "Key Escrow," And "Trusted Third-Party" Encryption
Report on GAK risks by noted cryptographers.
Risks of the Passport Single Signon Protocol
Problems with Microsoft's Passport protocol.
RISKS Search results for Explorer,MSIE,MS IE,ActiveX
Security and other problems in MSIE.
Robin Keir's Software - FireHole
Bypassing outgoing connection restrictions in personal firewalls.
rootshell.com
Searchable archive of Windows and Unix security problems.
RSA Challenge '97--Break the Key
RSA encryption-breaking challenge (40 bits in 3.5 hours, 48 bits in 13 days).
Satellite Code Network
Network of ~300 sites devoted to satellite TV hacking and related topics (eg smart cards, decoders, smart card programming).
SatHack HomePage
Satellite TV hacking, cards, software, programmers, and codes.
School Security Flaws
Collection of typical security problems and holes in school computers.
Scott Schnoll's Unofficial Microsoft Internet Explorer Security FAQ
Bugs and design flaws in MS Internet Explorer.
Sécurité & Piratage
French security page with information on security problems, backdoors, and patches.
Security Survey of Key Internet Hosts
Security survey which found that two thirds of the WWW hosts checked had security problems.
SecurID Weaknesses
Paper on potential weaknesses in SecurID.
Sekcia bugs
Large collection of security bugs in most major OS's.
ShareSniffer
Windows' lack of security turned into a feature: "ShareSniffer is an honest peer-to-peer venture that brings out the full potential of Windows' networking features".
Shutdown Windows
Shut down Windows 95/98 from Java. So much for the sandbox.
S/MIME Screen Saver
Screen saver which breaks 40-bit S/MIME encryption.
SnadBoy Software - Revelation
Recovers Windows saved passwords.
Snake Oil FAQ
Snake oil warning signs - encryption software to avoid.
Snoopie, a TCP login tracer for DOS-machines
TCP/IP login tracer which sniffs logins for FTP, telnet, POP3 connections.
SQL Server Security
SQL server security issues and problems.
SSL implementation bugs
List of known SSL implemetation bugs.
Stack Smashing Security Vulnerabilities
Resources related to stack-overwriting security holes.
Stealth Keyboard Interceptor
Completely invisible interceptor which logs keystrokes, URL's, executed, dates, times, mouse click events, etc, with optional encryption.
StealthLogger official homepage
Windows 95 and NT keystroke logger.
Stone's WebNote
Windows PE compressors, deprotectors, unwrappers, anti-debugging/tracing, executable encrypters, and other useful Windows programming/hacking tools.
Weaknesses in Euro-Clipper
More weaknesses in Euro-Clipper.
swaptec
Broadcast everything in your home all over the neighbourhood, secured with 40-bit crypto.
The BioArchive
Novell Netware, cellular phone, and other security problems.
The Codebreakers
Assorted virii, including a PGP keyfile-stealing virus.
The Hacker's Choice - Official HomePage
THC home page.
T H E · L E G A C Y
Hacking/phreaking information and links. Load this one with Java disabled.
The Reversal of NetNanny
Reverse-engineering and cryptanalysis of NetNanny.
The Sanctuary
Satellite TV hacking info: D2Mac, Eurocrypt, Videocrypt, Multimac, etc.
"The Stalker's Home Page"
What others can find out about you using online search engines.
The TEMPEST Information page
Much information on TEMPEST eavesdropping and its prevention.
The Toolbox
Various Windows security tools (port scanner, find processes listening on ports, obtain various privileges on a system).
Threats to your security on the Internet
Information on various NT trojans (Back Orifice, Netbus, etc).
Tools!
Crackers for MS Office, Excel, Word Perfect, Word, Pkzip, and other programs.
Twenty Most Critical Internet Security Vulnerabilities
SANS/FBI list of the top twenty Internet security vulnerabilities.
Ultra Zip Password Cracker
Fast Zip password cracker.
Underground Railroad
Filez! Warez! D00D!&lt
unix / net / hack page
Unix security problems, software, documentation, RFC's.
Vacation War Driving, 802.11b Access Point Mapping
802.11 war driving in Pasadena.
VBA Key
VBA password recovery (allows viewing of VBA source code).
Vendors Of GSM Mobile Location Positioning
GSM tracking technology vendors.
Visual Domain - Homepage of Erwin van den Berg
How to remove the region coding of Creative Labs DVD drives - choose the "Documentation" link.
Vulnerability Database
Database of common security vulnerabilities in RPC's, sendmail, firewalls, and various other categories.
Web Pages we�..