-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It would be nice if the people who ridicule pdp would actually do some
research in the field of JS exploits before passing judgement.

Two places I can think of are RSnake's blog at http://ha.ckers.org/
and also the forum: http://sla.ckers.org/forum/
You might learn something regarding the dangers of XSS.

Cheers,
Scott
reepex wrote:
> dont you listen to pdp ever? the government uses xss and bruteforces
> remote desktop logins
>
> http://seclists.org/fulldisclosure/2007/Oct/0417.html
>
> pdp: "military grade exploits? :) dude, I am sorry man.. but you are living
> in some kind of a dream world. get real, most of the military hacks
> are as simple as bruteforcing the login prompt.. or trying something
> as simple as XSS."
>
> ------
>
> pdp is an hero and a computer security expert and based on his fans
> from the list he is the greatest researched since lcamtuf. his word =
> gold
>
>
>
> On 11/1/07, jf <[EMAIL PROTECTED]> wrote:
>> must be on one of the .gov red teams ;]
>>
>>
>> On Wed, 31 Oct 2007, reepex wrote:
>>
>>> Date: Wed, 31 Oct 2007 16:56:20 -0500
>>> From: reepex <[EMAIL PROTECTED]>
>>> To: Joshua Tagnore <[EMAIL PROTECTED]>,
>>> full-disclosure@lists.grok.org.uk
>>> Subject: Re: [Full-disclosure] Flash that simulates virus scan
>>>
>>> resulting to se in a pen test cuz you cant break any of the actual
machines?
>>>
>>> lulz
>>>
>>> On 10/31/07, Joshua Tagnore <[EMAIL PROTECTED]> wrote:
>>>> List,
>>>>
>>>> Some time ago I remember that someone posted a PoC of a small site that
>>>> had a really nice looking flash animation that "performed a virus
scan" and
>>>> after the "virus scan" was finished, the user was prompted for a
"Download
>>>> virus fix?" question. After that, of course, a file is sent to the
user and
>>>> he got infected with some malware. Right now I'm performing a
penetration
>>>> test, and I would like to target some of the users of the corporate
LAN, so
>>>> I think this approach is the best in order to penetrate to the LAN.
>>>>
>>>> I searched google but failed to find the URL, could someone send it to
>>>> me ? Thanks!
>>>>
>>>> Cheers,
>>>> --
>>>> Joshua Tagnore
>>>> _______________________________________________
>>>> Full-Disclosure - We believe in it.
>>>> Charter:
>>>> http://lists.grok.org.uk/full-disclosure-charter.html
>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>
>>> _______________________________________________
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHKVFfxajqy/aNaRsRAtfEAKC8sRWj8i4IQGQ0jEnjFveg0T9SLACfeykj
ptS9bqw+XU+R9KQaSkcVdpM=
=+wFb
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to