The Wayback Machine - https://web.archive.org/web/20010118210000/http://www.l0pht.com:80/
"That vulnerability is completely theoretical."
  -- Microsoft
 
L0pht, Making the theoretical practical since 1992.

   
Serving up security and technical info on the web for over 6 years.
Advisories
  Latest
  1999
  1998
  1997
  1996

Soapbox
  L0pht Soapbox

Products
  software
   AntiSniff
   L0phtCrack
   SLINT
   BCS Archives

  service
   Consulting
   Product Certification

  T-Shirts!

Lab
  L0phtCrack
  Palm Pilot
  NFR IDS
  Wireless

Archives
  Black Crawling
     Systems
  Whacked Mac
  Cybertek
  Tezcat
  Pictures
  IIRG

Lounge
  The L0pht BBS
  Cons

Contact
  FAQ
  General Contact
  Press Contact
  Business Contact
  Send Us News
  Webmaster
  Snail Mail

Search







L0pht, the L0pht logo, its likeness, and these pages Copyright © 2000 L0pht Heavy Industries, Inc. All Rights Reserved. Read the legal stuff.

 

   

  Join in LIVE on the Internet Security Policy Forum

09.27.00  
09.27.00: Free Live Webcast
Internet Security Policy Forum & Luncheon
U.S. Chamber of Commerce Hall of Flags
Washington, D.C.

In cooperation with the Critical Infrastructure Assurance Office, CXO Media will be hosting the Internet Security Policy Forum & Luncheon. The Forum assembles 100 of the top CEOs and CIOs in the United States in an effort to "raise public awareness of the vulnerabilities of information technology pertaining to security issues and to contemplate feasible solutions." Lew McCreary, Editorial Director at CXO Media, will host the forum with Lou Dobbs, founder of CNNfn.com and CEO of Space.com, serving as moderator.

WEDNESDAY, 09.27.00, 1:00PM
Mudge, Vice President of Research and Development for @stake, will be a panelist at the Internet Security Policy Forum. Fellow panelists joining Mudge include John Tritak, Director of the Critical Infrastructure Assurance Office, Abbie Lundberg, the Editor in Chief of CIO Magazine, Larry Abramson, a Telecommunications Correspondent for National Public Radio, and participating via satellite will be Richard Clarke, the National Coordinator for Security Infrastructure Protection and Counter-Terrorism.

The Internet Policy Forum Webcast is available via two locations:
Webcast 1
Webcast 2

ASK QUESTIONS. GET HEARD!



  L0pht web site to Merge with @stake web site

07.24.00  
The L0pht has evolved radically in the 7 years since it was founded. What started out as a place for a few computer hobbyists to store their manuals and "recycled" computers became an organization focused on computer security and privacy. The L0pht has impacted the security of the most popular hardware, operating systems and applications used today.

Through our security advisories, tools, and talks at conferences, we have changed the way many vendors design their systems and respond to security issues. We have even affected the political environment of our times. The L0pht has always been about sharing information and getting people to be more open about security issues. Thus moving towards actually understanding the problems at hand and becoming able to address them "before the fact". This is one of the reasons we have supported full disclosure and sought to inform end users as well as technology professionals and vendors about security issues.

When the L0pht merged with @stake at the beginning of the year, it was in an attempt to augment and impart our ideologies and problem solving methodologies on a much grander scale. We believe we are heading in the right direction.

Over the next several weeks we will start moving the L0pht, Hacker News Network, and the @stake web sites into one cohesive unit. We will continue to provide the useful information that the community has come to expect from us. It is our belief that this, among other efforts, will ultimately help us give back to the community in a greater way.

Rest assured, the new web site will continue to provide our research in the form of security advisories, white papers and tools to the security community, the way the L0pht web site always has.

If you have any questions or comments please contact us.
Brian Oblivion
Kingpin
Weld Pond
Mudge
Tan
Dildog
Silicosis



  Rainbow iKey USB Token Advisory

07.20.00  
Rainbow Technologies' iKey 1000 is a portable USB (Universal Serial Bus) smartcard-like device providing authentication and digital storage of passwords, cryptographic keys, credentials, or other data. This attack requires physical access to the device circuit board, which can be gained in under 30 seconds with no special tools and leaving no proof of attack.  Administrator access to the iKey, using the MKEY (Master Key) password, is normally used for initialization and configuration, and will allow all private information stored on the key to be accessed. By using any number of low-cost, industry-standard device programmers, the MKEY value can be recovered or changed to a new user-defined value. This will allow the attacker to login to the iKey with administrator priviledges and access all public and private data. 

Full Details
iSpy, Proof-of-concept tool for Win9x/NT, source code included (31kB)
iKey 1000 Schematic .PDF (12kB)



  NetZero Password Advisory

07.18.00  
NetZero's password encryption algorithm can be trivially defeated. Weak local password storage is a common practice but there are good solutions. The advisory details the vulnerability and suggests better ways of handling the local password storage problem.

Full Advisory



  AntiSniff Researchers Version 1-1-1 Release - typecast DNS fix

05.17.00  
A cool bug on not properly ensuring variables were cast correctly was found by sc. His statement that version 1.02 was affected seems to be in error. In addition, the sample code he provided to various lists was reported to us not to work. We have not verified the sample code but see the problem that he points out and are in agreement on the problem. Only the free researchers version appeared vulnerable.

AntiSniff Download page



  Microsoft Office 2000 Scripting Advisory

05.12.00  
A vulnerability in active scripting allows a malicious web page, either on a web site or sent through the mail, to execute arbitrary scripts and commands. Office 2000 must be installed for the computer to be vulnerable.

Full Advisory:
Microsoft Office 2000 UA Control Scripting
Demonstration:
Try it out
Microsoft Fix:
Patch Available for "Office 2000 UA Control" Vulnerability



  Pair of Intel NetStructure Advisories

05.09.00  
Intel's NetStructure products contain multiple vulnerabilites. The vulnerabilities include undocumented backdoor user accounts with computable passwords based on the NetStructure's MAC address. These accounts can be remotely exploited in certain configurations on the NetStructure 7180.

A proof of concept tool that will generate the backdoor account passwords is available.

Full Advisories:
NetStructure 7110 console backdoor
NetStructure 7180 remote backdoor vulnerability



  eToken Private Information Extraction and Physical Attack Advisory

05.04.00  
Aladdin Knowledge Systems' eToken is a portable USB authentication device providing access control for digital assets. An attacker can access all private information stored on the hardware token device without knowing the PIN number of the legitimate user.

The full advisory can be found at:

Full Details
Heimlich, Proof-of-concept tool for Win98 (47kB)
eToken Schematic .PDF (9kB)
Physical Attack Images



  Cartfix Secret Backdoor Patch Tool Released

04.27.00  
The shopping cart software Cart32 contains many serious security vulnerabilities. These include a backdoor password and embedded URLs that allow anonymous users to change the administrator password and execute shell commands on the web server. Cerberus Information Security issued an advisory detailing these problems. We have issued a patch because we think this problem is so serious that it deserves an immediate fix. It is unknown when the vendor will fix these problems.

Executable Patch
Source Code



  CRYPTOCard PalmToken PIN Extraction Advisory

04.10.00  
CRYPTOCard's CRYPTOAdmin software is a challenge/response user authentication administration system. The PT-1 token, which runs on a PalmOS device, generates the one-time-password response. A PalmOS .PDB file is created for each user and loaded onto their Palm device. By gaining access to the .PDB file, the legitimate user's PIN can be determined through a series of DES decrypts-and-compares. Using the demonstration tool below, the PIN can be determined in under 5 minutes on a Pentium III 450MHz.

CRYPTOCard Corporation was extremely responsive to our advisory submission. Their comments and recommendations are included.

Full Details
DeCRYPTO, Proof-of-concept tool for Win9x (71kB)



  TBA, The PalmOS Wardialer Is Now Available

03.24.00  
After 2 years of blood, sweat, and tears, @Stake and L0pht Heavy Industries proudly present TBA, the outcome of Project BootyCall. TBA is the first wardialer for the PalmOS platform. No more using a desktop or laptop for scanning. Using a Palm device with a modem, you can wardial from anywhere a phone line is available - throw it in a phone can to retrieve later, toss it up in the ceiling during a security audit - the possibilities are endless. TBA is fully-featured, fully d0pe, and best of all, fully free!

Full Details



  Advisory on Microsoft Clipart Gallery attachements

03.06.00  
ClipArt Gallery (CAG.EXE) that comes with Microsoft Office 2000 processes ".CIL" files for installation of clipart from the Internet. The CIL format is not handled properly by CAG.EXE and one of the internal fields in the file presents a buffer overflow condition, allowing arbitrary code to be executed by an attacker. The attacker would place a malicious CIL file on a website, or in an email, causing the target to import the CIL file. The file will be opened without prompting as the CIL file format does not require confirmation for open after download. This issue requires NO active scripting to exploit, and is NOT regulated by Internet Explorer 'security zones'.

Full Details



  Anarchy on the Web on The Connection radio show

02.11.00  
Mudge and Weld Pond will be on The Connection radio show with host Christopher Lydon today. Also on the chow are David Clark from MIT and Mark Rasch, a former federal prosecuter. The program airs 11:06 to noon on Friday 2/11/00 on WBUR, 90.9 in Boston. Check the Connection Stations to see if it is syndicated in your city. The program should also be available online streamed.

The Anarchy on the Web Connection



  Answers to all your @Stake Merger Questions

01.25.00  
We created an L0pht/@Stake merger FAQ to answer many of the questions we have been receiving about the merger.

L0pht/@Stake Merger FAQ



  Article on L0pht Merging with @Stake

01.22.00  
There have been many articles written about the L0pht-@Stake merger. We think this one sums up the facts the best.

Hackers join forces with security firm to keep the world safe ,Boston Herald



  Remote Root lpd Vulnerability in RedHat Linux

01.08.00  
Dildog ain't slowing down for a second and has released his 2nd Linux vulnerability for the week. This one allows a user who can print to a RedHat Linux print server to execute code remotely as root. RedHat has a patch.

Full Details



  L0pht Merges with @Stake

01.06.00  
With news that is sure to shake up both the computer underground and the computer security services market, the L0pht is very excited to announce our merger with @Stake.

"The opportunity to join the first and only independent 'pure play' in the field of Internet security consulting is perfect for the L0pht," according to Mudge, now @Stake's VP of R&D.; "@Stake's vendor neutrality, combined with open lines of communication to the full spectrum of people dealing with online security, allows us to remain true to our roots - security research and execution which shatters industry myths and builds a totally new standard."

Press Release

News:
Tech Heavyweights Join Hackers, MSNBC
Hackers Become Security Consultants, AP
The Hackers and the Suits: A Made-for-the-Media Story , The Industry Standard



  PamSlam Advisory on Red Hat Linux pam vulnerability

01.04.00  

A local root vulnerability exists in Linux in the pam authentication module. Dildog has written source code to demonstrate the problem.

Both 'pam' and 'userhelper' (a setuid binary that comes with the 'usermode-1.15' rpm) follow .. paths. Since pam_start calls down to _pam_add_handler(), it will dlopen any file on disk. 'userhelper' being setuid means it will run as root.

RedHat has a patch for this problem.

Full Details



MORE NEWS...