|
Hacker - Vulnerabilities, Threats & Attacks
-
The BugTraq List
BugTraq is a full disclosure moderated mailing list for the *detailed*
discussion and announcement of computer security vulnerabilities:
what they are, how to exploit them, and how to fix them.
By SecurityFocus.
Bugtraq Archive,
FAQ,
Subscription.
Vulnerabilities Archive
(by vendor, title, keyword, BugTraq id, CVE id).
-
SANS Top 20 Vulnerabilities
The twenty most critical internet security vulnerabilities:
Top 10 vulnerabilities to Windows systems &
Top 10 vulnerabilities to Unix/Linux systems.
By SANS (SysAdmin, Audit, Network, Security)
Institute & the
National Infrastructure Protection Center (NIPC)
at the FBI.
Top 20 PDF version.
-
Common Vulnerabilities and Exposures (CVE)
Common Vulnerabilities and Exposures (CVE) is a list or dictionary that provides
standardized common names for vulnerabilities and other information security
exposures. CVE aims to standardize the names of all publicly known
vulnerabilities and security exposures, making it easier to share data across
separate network security databases and tools that are CVE-compatible.
CVE also provides a baseline for evaluating the coverage of an organization's
security tools. CVE content is determined by the CVE Editorial Board,
composed of experts from the international information security community.
The MITRE Corporation maintains CVE and manages the Editorial Board.
-
eEye Digital Security Advisories
The eEye Digital Security Research
Team is dedicated to finding and educating the public about new and
existing security vulnerabilities. What you will find here is the result
of the hard work and many sleepless nights of our staff.
-
HackerWatch.org Anti-Hacker Online Community
HackerWatch is a community and collection point for Internet users to report
and share information to block and catch 'hackers' and other unwanted traffic.
-
Security Tracker
Keep Track of the Latest Vulnerabilities.
Vulnerabilities archive by: Category, Cause, Impact, Operating System, Vendor.
Free Weekly SecurityTracker E-mail Alert Summary.
-
Secunia Advisories
Secunia monitors vulnerabilities in more than 4000 products, including:
operating systems, browsers, IMs, anti-virus, firewalls, routers, and
much, much more.
- [ISTF] InfoSecurity Task Force
Site in Portuguese. Information security news and articles.
-
Jargon File Resources - The New Hacker's Dictionary
The Internet's definitive lexicon of hacker slang.
By Eric S. Raymond.
Mirror 1,
Mirror 2,
Mirror 3,
Mirror 4,
Mirror 5,
Mirror 6.
Eric Raymond's FAQ collection.
-
Zone-H.org
Zone-H.org - IT Security Information Network.
Archives:
Digital attacks (Defacements),
Internet Spam/Frauds.
- Delta5 Mirror
Defacements mirror by Delta5 Security.
- ATTRITION.org
ATTRITION Mirrored hacked
Sites: Web site defacements history and mirror, from 06/1995 to 05/2001.
News, Security, Image gallery. attrition.org Book library:
Computer/Information Security.
-
Safemode.org Defacement Mirror
From 03/2000 to 01/2002.
-
SNN1 @stake Security News Network
Security news headlines, collected from a good variety of affiliate sources.
Formerly HNN Hacker News Network.
Secure Business Quarterly (SBQ)
@stake online publication that examines critical topics taht need to be
understood be everyone in digital assets.
@stake Research Labs
@stake's Research Labs are dedicated to researching and documenting
security flaws that exist in the Internet infrastructure.
These flaws may be in operating systems, networking protocols,
application software, or hardware devices.
Adivisories, Research Reports, Tools. Contents from
L0pht Heavy Industries.
Tools:
Information Gathering, Network Utilities, Password Auditing,
Recovery/Restoration, Vulnerability Scanning/Analysis.
L0phtCrack 3 (LC3)
- The Password Auditing and Recovery Application for Windows.
-
DoShelp - Intrusion Prevention and Attack Reporting Center
DoShelp provides security incident reporting services for victims
of Denial of Service (DoS), intrusions and system scanning attacks.
Using any of the protection tools listed in its personal firewalls section
you can protect your computer from attacks.
By Network Abuse Clearinghouse.
Incident Report, Personal Firewall, Anti-Virus Tools, Security Tests,
Trojan Ports, OS Patchfiles, Security News, Security Books,
Security Sites, Firewall Reviews, Security Tips, Personal Privacy.
-
ALT.Hacking FAQ
The alt.hacking FAQ was originally created and maintained by Zomby Woof.
He has retired the community in order to follow his interest in the programing field.
-
2600 Magazine - The Hacker Quarterly
- Insecure.Org
Security Tools, Good Reading, Security Lists, Exploit World, News, Links.
Home of Nmap.
- ISS X-Force
By Internet Security Systems (ISS).
Resource for Computer Threats & Vulnerability.
Vulnerability Database. Security Library: Links, FAQs,
Online documentation. Mail lists.
- Hacker Whacker
See your computer the way hackers do.
-
DeepZone Digital Security (DZ!) [In Spanish]
DeepZone Digital Security is a site devoted to the
investigation and development in questions on security,
computers and telecommunications. In Spanish.
DZ!incidents, DZ!advisories.
DZ!pathIT:
Patches notification service by DeepZone Digital Security.
S1M's Quick DataBase
La semana en un minuto [S1M]. Weekly bulletin summarizing the highlights
of the system security week through the world. In this bulletin
you find in a short place and with quick search facilities, listings
of the most important patches, vulnerabilities and software updates.
-
advICE
A database of information security (infosec) and anti-hacker information.
By Network ICE. Countermeasures, Cryptography, Reference,
Exploits, Intrusions, Law, OS, Statistics, Underground.
-
Trojan list sorted on trojan port
By Simovits Consulting.
Article Archive:
Information warfare & Business intelligence, Cryptology, Steganography,
Network security, System security, Remote Secure Access, Intrusion Detection.
- HoneyNet Project
The honeynet project is a group of 30 security professionals dedicated
to learning the tools, tactics, and motives of the blackhat community
and sharing those lessons learned.
-
Ataques na Internet
By ,
of Modulo Security Solutions. Article at
Network Designers - A Comunidade Virtual dos Profissionais de Redes.
In Portuguese.
- AstaLaVista
Daily updated search engine for computer security related material.
- newOrder
The resource for people to help avoid being hacked, security and exploiting
related files and links. Link/files database of hacking texts, utilities,
interesting information, exploits, security.
By Box Network.
-
cyrebels - insecurity exposed
Security & hacking.
War Games - Hacking Exercises
- www.invasao.com.br
Brazilian site devoted to invasion and security subjects.
In Portuguese. Courses, Articles, Downloads, Hints, Tests, Webdesign, FAQ,
News, Photos, Links, Team, Virus.
- HackersLab.org
(English)
Free Hacking Zone.
By HackersLab, Korea.
The Free Hacking Zone is designed to let its members satisfy their hacking
urges and eventually lead them away from illegally hacking into network systems.
telnet drill.hackerslab.org.
-
"Under Attack" Hacking Server
By inetcop.
-
Pull The Plug
-
CyberArmy Exploit Research - Nix Based
|