|
Hacker - Vulnerabilidades, Ameaças & Ataques
-
The BugTraq List
BugTraq é uma lista de email totalmente aberta para discussão
*detalhada* e divulgação de vulnerabilidades de segurança
de computadores: o que elas são, como explorá-las, e como
consertá-las.
By SecurityFocus.
Bugtraq Archive,
FAQ,
Subscription.
Catálogo de Vulnerabilidades
(por fornecedor, título, palavra-chave, BugTraq id, CVE id).
-
SANS Top 20 Vulnerabilities
As vinte vulnerabilidades de segurança mais críticas na Internet:
10 maiores vulnerabilidades para sistemas Windows &
10 maiores vulnerabilidades para sistemas Unix/Linux.
Por SANS (SysAdmin, Audit, Network, Security)
Institute & o
National Infrastructure Protection Center (NIPC)
do FBI.
Top 20 versão PDF.
-
Common Vulnerabilities and Exposures (CVE)
Common Vulnerabilities and Exposures (CVE) is a list or dictionary that provides
standardized common names for vulnerabilities and other information security
exposures. CVE aims to standardize the names of all publicly known
vulnerabilities and security exposures, making it easier to share data across
separate network security databases and tools that are CVE-compatible.
CVE also provides a baseline for evaluating the coverage of an organization's
security tools. CVE content is determined by the CVE Editorial Board,
composed of experts from the international information security community.
The MITRE Corporation maintains CVE and manages the Editorial Board.
-
eEye Digital Security Advisories
The eEye Digital Security Research
Team is dedicated to finding and educating the public about new and
existing security vulnerabilities. What you will find here is the result
of the hard work and many sleepless nights of our staff.
-
HackerWatch.org Anti-Hacker Online Community
HackerWatch is a community and collection point for Internet users to report
and share information to block and catch 'hackers' and other unwanted traffic.
-
Security Tracker
Keep Track of the Latest Vulnerabilities.
Arquivo de Vulnerabilidades por: Categoria, Causa, Impacto, Sistema
Operacional, Fornecedor.
Free Weekly SecurityTracker E-mail Alert Summary.
-
Secunia Advisories
Secunia monitora vulnerabilidades em mais de 4000 produtos, incluindo:
sistemas operacionais, navegadores, IMs, anti-v�rus, firewalls,
roteadores, e muito, muito mais.
-
[ISTF] InfoSecurity Task Force
Site em Português. Notícias e artigos sobre segurança
da informação.
-
Jargon File Resources - The New Hacker's Dictionary
The Internet's definitive lexicon of hacker slang.
By Eric S. Raymond.
Mirror 1,
Mirror 2,
Mirror 3,
Mirror 4,
Mirror 5,
Mirror 6.
Eric Raymond's FAQ collection.
-
Zone-H.org
Zone-H.org - IT Security Information Network.
Archives:
Digital attacks (Defacements),
Internet Spam/Frauds.
- Delta5 Mirror
Defacements mirror by Delta5 Security.
- ATTRITION.org
ATTRITION Mirrored hacked
Sites: Web site defacements history and mirror, from 06/1995 to 05/2001.
News, Security, Image gallery. attrition.org Book library:
Computer/Information Security.
-
Safemode.org Defacement Mirror
From 03/2000 to 01/2002.
-
SNN1 @stake Security News Network
Security news headlines, collected from a good variety of affiliate sources.
Anteriormente HNN Hacker News Network.
Secure Business Quarterly (SBQ)
@stake online publication that examines critical topics taht need to be
understood be everyone in digital assets.
@stake Research Labs
@stake Research Labs são dedicados a pesquisa e documentação
de brechas de segurança existentes na infra-estrutura da Internet.
Estas brechas podem ser em sistemas operacionais, protocolos de rede,
software aplicativo, ou dispositivos de hardware.
Alertas, Relatórios de Pesquisa, Ferramentas. Conteúdo
vindo de L0pht Heavy Industries.
Tools:
Information Gathering, Network Utilities, Password Auditing,
Recovery/Restoration, Vulnerability Scanning/Analysis.
L0phtCrack 3 (LC3)
- The Password Auditing and Recovery Application for Windows.
-
DoShelp - Intrusion Prevention and Attack Reporting Center
DoShelp provides security incident reporting services for victims
of Denial of Service (DoS), intrusions and system scanning attacks.
Using any of the protection tools listed in its personal firewalls section
you can protect your computer from attacks.
By Network Abuse Clearinghouse.
Incident Report, Personal Firewall, Anti-Virus Tools, Security Tests,
Trojan Ports, OS Patchfiles, Security News, Security Books,
Security Sites, Firewall Reviews, Security Tips, Personal Privacy.
-
ALT.Hacking FAQ
The alt.hacking FAQ was originally created and maintained by Zomby Woof.
He has retired the community in order to follow his interest in the programing field.
-
2600 Magazine - The Hacker Quarterly
- Insecure.Org
Ferramentas de Segurança, Leitura Recomendada, Listas de Segurança,
Exploit World, Notícias, Links. Home do Nmap.
- ISS X-Force
By Internet Security Systems (ISS).
Resource for Computer Threats & Vulnerability.
Banco de dados de Vulnerabilidade. Biblioteca de Segurança:
Links, FAQs, Documentação online. Listas de Mail.
- Hacker Whacker
See your computer the way hackers do.
-
DeepZone Digital Security (DZ!) [Em Espanhol]
DeepZone Digital Security é um site voltado para a
investigação e desenvolvimento em questões
de segurança, informática e telecomunicações.
Em Espanhol.
DZ!incidents, DZ!advisories.
DZ!pathIT:
serviço da DeepZone Digital Security de notificação sobre patches.
S1M's Quick DataBase
La semana en un minuto [S1M]. Boletim semanal que resume os destaques
da semana no mundo da segurança de sistemas.
Neste boletim, você encontra, em um curto espaço e com
facilidades de busca rápida, uma relação de patches,
vulnerabilidades e atualizações de software mais importantes.
-
advICE
A database of information security (infosec) and anti-hacker information.
By Network ICE. Countermeasures, Cryptography, Reference,
Exploits, Intrusions, Law, OS, Statistics, Underground.
-
Trojan list sorted on trojan port
By Simovits Consulting.
Article Archive:
Information warfare & Business intelligence, Cryptology, Steganography,
Network security, System security, Remote Secure Access, Intrusion Detection.
- HoneyNet Project
O projeto honeynet é um grupo de 30 profissionais de segurança
dedicado a estudar as ferramentas, táticas e motivos da comunidade
"blackhat" e compartilhar estas lições aprendidas.
-
Ataques na Internet
Por ,
da Modulo Security Solutions. Artigo em
Network Designers - A Comunidade Virtual dos Profissionais de Redes.
Em Português.
- AstaLaVista
Daily updated search engine for computer security related material.
- newOrder
The resource for people to help avoid being hacked, security and exploiting
related files and links. Link/files database of hacking texts, utilities,
interesting information, exploits, security.
By Box Network.
-
cyrebels - insecurity exposed
Security & hacking.
War Games - Exercícios de Hacking
- www.invasao.com.br
Site brasileiro voltado para assuntos de invasão e segurança.
Em Português. Cursos, Artigos, Downloads, Dicas, Testes, Webdesign, FAQ,
News, Fotos, Links, Equipe, Vírus.
- HackersLab.org
(English)
Free Hacking Zone.
By HackersLab, Korea.
The Free Hacking Zone is designed to let its members satisfy their hacking
urges and eventually lead them away from illegally hacking into network systems.
telnet drill.hackerslab.org.
-
"Under Attack" Hacking Server
By inetcop.
-
Pull The Plug
-
CyberArmy Exploit Research - Nix Based
|