Re: ABfrag/ac1db1tch3z Kernel Exploit ?

2002-10-18 Thread Orlando
On Thursday 17 October 2002 05:03 am, Orlando wrote:
> Not sure if this is real.
>
> He's using a hushmail account to post to the lists which is somewhat
> suspicious.
> He claims to have attached the binary but no one seems to have a copy of
> it. Some co-workers and other people have asked for a copy of it without
> success.
>
> I woudln't be too surprised if this is another PHC attempt for more
> attention.
>
Ok I stand corrected, silvio the moderator of unix-virii list on segfault.net 
seems to have a copy of that binary. 

-x



Re: ABfrag/ac1db1tch3z Kernel Exploit ?

2002-10-18 Thread Orlando
On Thursday 17 October 2002 05:03 am, Orlando wrote:
> Not sure if this is real.
>
> He's using a hushmail account to post to the lists which is somewhat
> suspicious.
> He claims to have attached the binary but no one seems to have a copy of
> it. Some co-workers and other people have asked for a copy of it without
> success.
>
> I woudln't be too surprised if this is another PHC attempt for more
> attention.
>
Ok I stand corrected, silvio the moderator of unix-virii list on segfault.net 
seems to have a copy of that binary. 

-x


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: ABfrag/ac1db1tch3z Kernel Exploit ?

2002-10-17 Thread Orlando
Not sure if this is real.

He's using a hushmail account to post to the lists which is somewhat 
suspicious.
He claims to have attached the binary but no one seems to have a copy of it.  
Some co-workers and other people have asked for a copy of it without success.

I woudln't be too surprised if this is another PHC attempt for more attention.

On Thursday 17 October 2002 11:31 am, Dragan Cvetkovic wrote:
> Stephan Schmieder <[EMAIL PROTECTED]> writes:
> > Hello,
> >
> > I`ve just read an article at linuxsecurity.com regrading the ABfrag
> > exploit.
> > http://www.linuxsecurity.com/articles/intrusion_detection_article-5933.ht
> >ml Does anyone know something about that one?
>
> I find this part both intersting and ironic:
>
>   ABfrag - Linux Kernel ( <= 2.4.20pre20 ) Remote Syncing exploit
>
>   Found and coded by Ac1db1tch3z - t3kn10n, n0n3 and t3kn0h03.
>
>   WARNING:
>   Unlicensed usage and/or distribution of this program carries heavy fines
>   and penalties under American, British, European and International
> copyright law.
>   Should you find this program on any compromised system we urge you to
> delete this binary rather than attempt distribution or analysis. Such
> actions would be both unlawful and unwise.
>
>
> Can you be charged for reverse engineering exploits found on your system?
>
> Bye, Dragan

--
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
'A woman drove me to drink and I didn't 
even have the courtesy to thank her' -wa
--



Re: ABfrag/ac1db1tch3z Kernel Exploit ?

2002-10-17 Thread Orlando
Not sure if this is real.

He's using a hushmail account to post to the lists which is somewhat 
suspicious.
He claims to have attached the binary but no one seems to have a copy of it.  
Some co-workers and other people have asked for a copy of it without success.

I woudln't be too surprised if this is another PHC attempt for more attention.

On Thursday 17 October 2002 11:31 am, Dragan Cvetkovic wrote:
> Stephan Schmieder <[EMAIL PROTECTED]> writes:
> > Hello,
> >
> > I`ve just read an article at linuxsecurity.com regrading the ABfrag
> > exploit.
> > http://www.linuxsecurity.com/articles/intrusion_detection_article-5933.ht
> >ml Does anyone know something about that one?
>
> I find this part both intersting and ironic:
>
>   ABfrag - Linux Kernel ( <= 2.4.20pre20 ) Remote Syncing exploit
>
>   Found and coded by Ac1db1tch3z - t3kn10n, n0n3 and t3kn0h03.
>
>   WARNING:
>   Unlicensed usage and/or distribution of this program carries heavy fines
>   and penalties under American, British, European and International
> copyright law.
>   Should you find this program on any compromised system we urge you to
> delete this binary rather than attempt distribution or analysis. Such
> actions would be both unlawful and unwise.
>
>
> Can you be charged for reverse engineering exploits found on your system?
>
> Bye, Dragan

--
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
'A woman drove me to drink and I didn't 
even have the courtesy to thank her' -wa
--


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: a nessus developpers joke?

2002-10-14 Thread Orlando
Do you really depend and/or expect to stay secure on a 'stable' release of 
'_a_' software?
The developer[s] were nice enough to release the software free, whether it 
sucks or not you should be greatful, unless of course you can code something 
better.. And call each and every update a stable release so that they can be 
released along with stable operating systems.

untill then stfu, learn to compile updated software or don't bitch.

-x 

ps. I dont mean to sound like an asshole (kind of ironic considering the tone 
of my email but shit!)  , but he sounded like an asshole for assuming and  
implying nessus sucked .. it is a matter of opinion but state something 
reasonable to backup it up at least.

On Sunday 13 October 2002 08:45 am, WebMaster wrote:
> > Isn't the nessus in Debian quite old ? I think, there were newer
>
> nessus
>
> > packages at the following sources:
> >
> > -- deb http://www.srce.hr/~joy/nessus1.2/ ./
> > deb-src http://www.srce.hr/~joy/nessus1.2/ ./
>
> i ll install this version
>
> it s sure the woody version is a bogus version :-P
>
> isn t it strange for a stable release...?
>
> i ve done a nmap -sU on those ports (trinoo) from the 2 fresh hosts,
> they re closed and of course a nmap -sS on port 22
> give us a opened port.
>
> thanks Martin
>
> ;-)
>
> 
> Ivan Rambeau
> FranceOnLine
> 



Re: a nessus developpers joke?

2002-10-14 Thread Orlando

Do you really depend and/or expect to stay secure on a 'stable' release of 
'_a_' software?
The developer[s] were nice enough to release the software free, whether it 
sucks or not you should be greatful, unless of course you can code something 
better.. And call each and every update a stable release so that they can be 
released along with stable operating systems.

untill then stfu, learn to compile updated software or don't bitch.

-x 

ps. I dont mean to sound like an asshole (kind of ironic considering the tone 
of my email but shit!)  , but he sounded like an asshole for assuming and  
implying nessus sucked .. it is a matter of opinion but state something 
reasonable to backup it up at least.

On Sunday 13 October 2002 08:45 am, WebMaster wrote:
> > Isn't the nessus in Debian quite old ? I think, there were newer
>
> nessus
>
> > packages at the following sources:
> >
> > -- deb http://www.srce.hr/~joy/nessus1.2/ ./
> > deb-src http://www.srce.hr/~joy/nessus1.2/ ./
>
> i ll install this version
>
> it s sure the woody version is a bogus version :-P
>
> isn t it strange for a stable release...?
>
> i ve done a nmap -sU on those ports (trinoo) from the 2 fresh hosts,
> they re closed and of course a nmap -sS on port 22
> give us a opened port.
>
> thanks Martin
>
> ;-)
>
> 
> Ivan Rambeau
> FranceOnLine
> 


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: linux random capabilities ...

2002-07-31 Thread Orlando
On Wednesday 31 July 2002 06:08, Adam Olsen wrote:

> Short answer: Linux mainly uses interrupt timings as an entropy
> source, from devices that are fairly unpredictable.  Assuming those
> are secure, the entropy pool is protected by a SHA hash of it's state
> when something needs random bits.  (afaik) a SHA hash has no know
> weaknesses, with the exception of brute force which is simply too big
> to attempt.
>
untrue, consider the attack against Netscape's ssl implementation consider:
"Ian Goldberg and David Wagner, "Randomness and the Netscape Browser", 
Dr.Dobbs Journal, January 1996, p.66"
http://www.ddj.com/documents/s=965/ddj9601h/9601h.htm

> Long answer: read drivers/char/random.c from your nearest linux source
> tree.
>
> > Finally, i read here and there some work on hardware random generation
> > devices (based on radio activity readings, or diods based devices or
> > whatever), is there anyone with some experience with those ?

yeah, I dont' know much about it but an article exists on P4's with a PRNG on 
them.. If anyone can provide some more feedback on this I'd love to hear them 
out, I myself have not had time to read the article I'm about to link or do 
any research on this whatso ever.
www.g0thead.com/papers/Cryptography/IntelRNG.pdf

www.g0thead.com/ssl_notes.txt  unfinished research on ssl - I apologize on any 
wrong information provided in this text as I said it's unfinished research 
and all comments/corrections/flames are welcome :)

--
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
'A woman drove me to drink and I didn't 
even have the courtesy to thank her' -wa
--



Re: Allow FTP in, but not shell login

2001-03-14 Thread Orlando Padilla
If I'm not mistaking and If you only have telnet enabled you can simply '*' 
disable the account for
the user[s] you want to restrict access to in /etc/passwd file.
ie -
user:*:::UserName,,,:/home/user:/bin/bash

^ which *should* still let users ftp in and deny telnet sessions...

If have your users login via ssh then 'sshd_config' file must be edited to
have something like :

sshd_config---

DenyUsers guest1 guest2 guest3 etc...

eof---

cheers,
xbud
-
[EMAIL PROTECTED]
[EMAIL PROTECTED]
"I only drink to make other people interesting."
-

On Tue, 13 Mar 2001, Kenneth Pronovici wrote:

> Hello -
>
> I'm not sure exactly where to look for this information, so if I should
> RTFM, just point me toward the right one.
>
> I have a situation where I've volunteered to host a few webpages for
> some users.  They're at a university and are having problems getting timely
> access to their organizational websites on their school's server.  Anyway,
> I'm happy to be the host, but I want these people to be able to FTP in ONLY,
> without interactive access.  I want to do this specifically for a set of
> users, not for all users on the machine.
>
> My feeling is that PAM supports this somehow, but I'm not sure where to
> start.  Anyone have any suggestions?
>
> Thanks for the help.
>
> KEN
>
> --
> Kenneth J. Pronovici <[EMAIL PROTECTED]>
> Personal Homepage: http://www.skyjammer.com/~pronovic/
> "The phrase, 'Happy as a clam' has never really held much meaning for me."
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>
>



Re: Allow FTP in, but not shell login

2001-03-14 Thread Orlando Padilla

If I'm not mistaking and If you only have telnet enabled you can simply '*' disable 
the account for
the user[s] you want to restrict access to in /etc/passwd file.
ie -
user:*:::UserName,,,:/home/user:/bin/bash

^ which *should* still let users ftp in and deny telnet sessions...

If have your users login via ssh then 'sshd_config' file must be edited to
have something like :

sshd_config---

DenyUsers guest1 guest2 guest3 etc...

eof---

cheers,
xbud
-
[EMAIL PROTECTED]
[EMAIL PROTECTED]
"I only drink to make other people interesting."
-

On Tue, 13 Mar 2001, Kenneth Pronovici wrote:

> Hello -
>
> I'm not sure exactly where to look for this information, so if I should
> RTFM, just point me toward the right one.
>
> I have a situation where I've volunteered to host a few webpages for
> some users.  They're at a university and are having problems getting timely
> access to their organizational websites on their school's server.  Anyway,
> I'm happy to be the host, but I want these people to be able to FTP in ONLY,
> without interactive access.  I want to do this specifically for a set of
> users, not for all users on the machine.
>
> My feeling is that PAM supports this somehow, but I'm not sure where to
> start.  Anyone have any suggestions?
>
> Thanks for the help.
>
> KEN
>
> --
> Kenneth J. Pronovici <[EMAIL PROTECTED]>
> Personal Homepage: http://www.skyjammer.com/~pronovic/
> "The phrase, 'Happy as a clam' has never really held much meaning for me."
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>
>


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: promiscuous eth0

2001-03-03 Thread Orlando Padilla
Snort by default sets your interface card to promiscuous mode.  You can verify 
this by looking at 'ifconfig' output. 
eth0  Link encap:Ethernet  HWaddr 00:E0:7D:79:01:25
  inet addr:XX.XX.XX.XX  Bcast:255.255.255.255  Mask:255.255.254.0
  UP BROADCAST RUNNING PROMISC  MTU:1500  Metric:1
  RX packets:1882801 errors:0 dropped:0 overruns:0 frame:0
  TX packets:1704205 errors:8 dropped:0 overruns:0 carrier:16
  collisions:7247 txqueuelen:100
  Interrupt:10 Base address:0xe000
UP BROADCAST RUNNING ||[PROMISC]|| etc...
If you don't want snort running in promisc mode you can set this with the -p 
option.  
Another way of verifying your interface is in promisc mode is to look at your 
/var/log/messages file for kernel message 
"Mar  3 04:07:06 kid_natas kernel: device eth0 entered promiscuous mode
Mar  3 04:07:15 kid_natas kernel: device eth0 left promiscuous mode
"
cheers
xbud

[EMAIL PROTECTED]
[EMAIL PROTECTED]




Re: promiscuous eth0

2001-03-03 Thread Orlando Padilla

Snort by default sets your interface card to promiscuous mode.  You can verify this by 
looking at 'ifconfig' output. 
eth0  Link encap:Ethernet  HWaddr 00:E0:7D:79:01:25
  inet addr:XX.XX.XX.XX  Bcast:255.255.255.255  Mask:255.255.254.0
  UP BROADCAST RUNNING PROMISC  MTU:1500  Metric:1
  RX packets:1882801 errors:0 dropped:0 overruns:0 frame:0
  TX packets:1704205 errors:8 dropped:0 overruns:0 carrier:16
  collisions:7247 txqueuelen:100
  Interrupt:10 Base address:0xe000
UP BROADCAST RUNNING ||[PROMISC]|| etc...
If you don't want snort running in promisc mode you can set this with the -p option.  
Another way of verifying your interface is in promisc mode is to look at your 
/var/log/messages file for kernel message 
"Mar  3 04:07:06 kid_natas kernel: device eth0 entered promiscuous mode
Mar  3 04:07:15 kid_natas kernel: device eth0 left promiscuous mode
"
cheers
xbud

[EMAIL PROTECTED]
[EMAIL PROTECTED]



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: libwrap.h

2001-02-14 Thread Orlando Padilla
Did valentine's day piss you off and now you're making no sense to get your 
anger out?
- xbud



libwrap.h

2001-02-14 Thread Orlando Padilla
I'm wanting to install OpenSSH with tcpwrappers but it seems to need a file 
called "libwrap.h".  I have tried freshmeat.net osdn.net sourceforge.net and a 
few other sites searching for a suite that might contain that header file.  
Anyone have an idea what package it comes with?

tks
-xbud

"I only drink to make other people interesting"
[EMAIL PROTECTED]




Re: libwrap.h

2001-02-14 Thread Orlando Padilla

Did valentine's day piss you off and now you're making no sense to get your anger out?
- xbud


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




libwrap.h

2001-02-14 Thread Orlando Padilla

I'm wanting to install OpenSSH with tcpwrappers but it seems to need a file called 
"libwrap.h".  I have tried freshmeat.net osdn.net sourceforge.net and a few other 
sites searching for a suite that might contain that header file.  Anyone have an idea 
what package it comes with?

tks
-xbud

"I only drink to make other people interesting"
[EMAIL PROTECTED]



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]