Skip to content
Permalink
main
Switch branches/tags
Go to file
 
 
Cannot retrieve contributors at this time
<HTML><HEAD><TITLE>Security Breach</TITLE></HEAD><body text="#FF9900" bgcolor="#000000" link="#FF6600" vlink="#CC6600" alink="#FFFF00">
<BR><font size=6><font color="#FF6600"><CENTER>Security Breach</font></font></CENTER><BR><BR>
<P1 align="CENTER">It is amazing how many NT based web servers are still vulnerable to
<A HREF="http://www.wiretrip.net/rfp/p/doc.asp?id=1&iface=2">RDS</A>
exploit even if this hole is more than a year old by now. My intention was not to delete (only log files were erased) or compromise in anyway system files, but to warn Administrator that security should be taken seriously. They say it is more difficult to secure web servers than to break into them, but you should at least patch critical and well-known holes like <A HREF="http://www.wiretrip.net/rfp/p/doc.asp?id=1&iface=2">RDS</A> and <A HREF="http://www.wiretrip.net/rfp/p/doc.asp?id=57&iface=2">Unicode</A>.
<BR><BR><BR>
Patch RDS hole @ <A HREF="http://www.microsoft.com/technet/security/bulletin/
ms99-025.asp">http://www.microsoft.com/technet/security/bulletin/
ms99-025.asp</A><BR>
Patch Unicode hole @ <A HREF="http://www.microsoft.com/technet/security/bulletin/ms00-057.asp">
http://www.microsoft.com/technet/security/bulletin/ms00-057.asp</A><BR>
Harden your NT box @ <A HREF="http://ntbugtraq.ntadvice.com/IIS4Fixes.asp">
http://ntbugtraq.ntadvice.com/IIS4Fixes.asp</A><BR>
<BR><BR><BR>
<CENTER><font size=4><font color="FFFFFF"><B>"Great minds discuss ideas, average minds discuss events, small minds discuss people" </B></font></font></CENTER><BR><BR><CENTER><B>./modu1e</B></CENTER>
</CENTER><BR>
</BODY></HTML>
<!-- ADMIN: default.htm was renamed to default.bak
Secure your server...
!!modu1e!!rox!!your!!world!!
THANX TO: Neon-Lenz and d00m -->
<!-- www.attrition.org web hack mirror - watermark or something -->