RE: [Full-disclosure] RE: when will AV vendors fix this???

2006-08-11 Thread Dmitry Yu. Bolkhovityanov
On Mon, 7 Aug 2006, Thomas D. wrote:

 And even if you hide the file, if it hide the way you describe, you aren't
 able to execute the file, until you give access to yourself. If you do this,
 the anti-virus program will also have access
 
 
 Keep in mind: If it is an unknown file (zero-day), you don't even think
 about hiding, because it isn't necessary. You have other problems...
 
 = I don't think it is a security related problem nor a problem itself.

Remember: some years ago off by one was treated as useless for 
exploits.

Any type of data/file hiding (of course, alternate data streams in 
the first place) can become the last brick required for some new attack 
vector.

So, while currently I can't present any workable scenario, I 
wouldn't consider such type of data hiding as not a security-relate 
problem.

_
  Dmitry Yu. Bolkhovityanov
  The Budker Institute of Nuclear Physics
  Novosibirsk, Russia

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Server Redundancy

2006-08-11 Thread Siim Põder
Yo!

wac wrote:
 Isn't there a way to map a name to several IPs?
 Or use aliases?
 I'm interested in the subject because I want to do the same thing.

read this: http://www.supersparrow.org/ss_paper/

--
Siim Põder

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] live.com xss

2006-08-11 Thread Thomas Pollet
http://boards.live.com/Travelboards/search.aspx?search=\;--/scriptscriptalert(1)/script
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] (Fwd) CWD--Save the Nation; Eat a hacker

2006-08-11 Thread lsi
[flashback - not much has changed - FUD has a new face, but his modus
operandi remains the same. See also: http://en.wikipedia.org/wiki/FUD
 - Stu]

--- Forwarded message follows ---
From:   Meeks, Brock [EMAIL PROTECTED]
To: '[EMAIL PROTECTED]' [EMAIL PROTECTED]
Subject:CWD--Save the Nation; Eat a hacker
Date sent:  Fri, 24 Sep 1999 11:25:39 -0700

CyberWire Dispatch // Copyright © 1999 // September 24, 1999

Jacking in from the Snake in the Grass Port:

Save the Nation; Eat a Hacker
By George Smith
CWD special correspondent

Richard Clarke, President Clinton's baleful counter-terrorism
guru on the National Security Council, has a plan to save us from
computerized terrorists. Actually, he appears to have lots of
plans but we're only going to talk about one today. And while
it's not particularly original, it's a real viper.

To save the nation from electronic Pearl Harbor -- you
know, that nebulous electronic doom that's supposed to be
creeping toward us from out of the gibbering dark of the
Internet -- Clarke democratically suggested recently that
the U.S. government could change laws that are impediments to
information assurance and security.

And these impediment laws would be?

Why, just the Freedom of Information Act, as well as antitrust
regulations and liability law.

Clarke was speaking for an extended interview published in the
August edition of Signal magazine, a quasi-military trade
publication whose editors get hard-ons over Pentagon electronic
technology and anything that would aid in the smiting of the
Department of Defense's alleged manifold computer enemies. Signal
is best known for an utterly weird April 1998 howler on an
alleged piece of attack software, called Blitzkrieg, which was,
the magazine seriously told a readership of easily-gulled Pentagon
contractors, more dangerous than nuclear weapons.

In one form or another the venomous idea to tamper with FOIA
has been bandied around in documents and studies on information
warfare since at least 1996, well before the appearance of
Clarke on the cyberscene. It is generally coupled to the linking of
the military and law enforcement to select industry groups. The
intelligence agencies, Department of Defense and law enforcement
would then share classified or supposedly sensitive materials with
these ill-defined industrial groups so they could pool resources
to quickly thwart potential electronic Pearl Harbors.

The head of the Federation of American Scientists' Secrecy and
Government Project, Steven Aftergood, explained the rationale,
or rather the lack of it, behind screwing with the FOIA.

Modifying FOIA is the first thing everyone thinks of, said
Aftergood. It's the one thing everyone can agree upon.

Whenever someone in the government or military writes something
on electronic Pearl Harbor, they have to come up with a set
of recommendations, added Aftergood.  The no-brainer is to rip up
FOIA, one of the final ramparts used by citizens, as well as
journalists, in the preservation of open government.

The belief driving this, said Aftergood, is that, (1), industry
won't share any information on computer security problems with
government if it isn't shielded from FOIA because of the
potential for misuse by competitors, and, (2); It's already
too easy to obtain information through FOIA . . . which is
ridiculous.

How ridiculous?

Rob Rosenberger, a well-known independent computer
security analyst and one of the U.S. military's first information
warriors, recently tried to use FOIA to dig up some simple
information about how the Air Force reacted to the Melissa
virus.

The Department of Defense has a rating system known as INFOCON.
It tries, emphasis on the word tries, to emulate the old DEFCON
system in that it is a way the military rates a threat and its
posture regarding the threat.

The conditions range from NORMAL, notes Rosenberger, which
means no significant activity (a theoretical optimum, he
notes dryly on his website, [that] we cannot achieve if
we accept 14-yr-old hackers as a national security threat) to
ALPHA, an increased risk of attack, -- all the way up
to  DELTA, signifying a general attack. 

INFOCON DELTA computer incidents would undermine [DoD's]
ability to function effectively [and would create a]
significant risk of mission failure, Rosenberger explains
on his website.

INFOCON DELTA means the military treats the Internet as a
battlefield, complete with damaged PCs and smoldering
mousepads, added Rosenberger.

Rosenberger's FOIA request was simple. He asked a number of Air
Force agencies what their INFOCON status was from March 15 to
April 15, a window that covered the incidence of the Melissa
virus.

U.S. Air Force HQ in Europe was the only agency that answered
with its status -- INFOCON ALPHA.

The HQ Air Intelligence Agency refused to disclose their
INFOCON status on the grounds that Unauthorized disclosure of
such information could reasonably be 

[Full-disclosure] apple.com xss

2006-08-11 Thread Thomas Pollet
apple.com search form xss ( POST var )-- mac scriptalert(1)/script
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Re: apple.com xss

2006-08-11 Thread Thomas Pollet
http://searchcgi.apple.com/cgi-bin/sp/nph-searchpre11.pl?q=--+mac+script
alert(1)/scriptoutput=xml_no_dtdclient=default_frontendsite=us_only
lr=lang_ensort=start=access=poe=utf-8On 11/08/06, 
Thomas Pollet [EMAIL PROTECTED] wrote:
apple.com search form xss ( POST var )-- mac scriptalert(1)/script


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] BlackBerry Vulnerabilities

2006-08-11 Thread Nicolas RUFF
 Does anyone have any details on the 2 BB vulnerabilities.  Some more
 substantial then rumors?

Which one ? ;)

If you are talking about the DEFCON buzz, have a look at:
http://www.praetoriang.net/presentations/blackjack.html

Regards,
- Nicolas RUFF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [WEB SECURITY] Re: [Full-disclosure] Top sites for Application security news

2006-08-11 Thread bugtraq
Shameless Site Plug
http://www.cgisecurity.com / 

Mailing List
The Web Security mailing List
http://www.webappsec.org/lists/websecurity/

- Z

 
 and mailing lists?
 
 On 8/11/06, KT [EMAIL PROTECTED] wrote:
  what are they? I am tasked with keeping up on application security news.
 
  Here are few I can think of, but I am sure there are more
 
  securityfocus.com
  owasp.org
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
 
 The Web Security Mailing List: 
 http://www.webappsec.org/lists/websecurity/
 
 The Web Security Mailing List Archives: 
 http://www.webappsec.org/lists/websecurity/archive/
 http://www.webappsec.org/rss/websecurity.rss [RSS Feed]
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit for MS06-040 Out?

2006-08-11 Thread Brendan Dolan-Gavitt

Is there any technical reason that an exploit cannot be developed
against XP SP2 and Server 2003 SP1? Or is this only a limitation of
the current Metasploit exploit?

Thanks,
 Brendan

On 8/10/06, H D Moore [EMAIL PROTECTED] wrote:

On Wednesday 09 August 2006 13:10, Matt Davis wrote:
 Did I completely miss exploit code being released in the wild for that
 vulnerability?

The Metasploit Framework module is now public, I included a copy of the
email I sent to the Framework mailing list below.

For the lazy:
http://metasploit.com/projects/Framework/modules/exploits/netapi_ms06_040.pm

--  Forwarded Message  --

Subject: [framework] Metasploit Framework Updates
Date: Thursday 10 August 2006 02:52
From: H D Moore [EMAIL PROTECTED]
To: [EMAIL PROTECTED]

Hello everyone,

I just pushed out a new round of updates for version 2.6 of the
 Metasploit Framework. This update includes new exploits, new features,
 and massive bug fixes. If it wasn't 3:00am on my birthday I would try
 for a 2.7 release :-)

New exploits:

netapi_ms06-040:
 - This exploit module should work against all Windows 2000 systems and
Windows XP SP0 and SP1. It will not work on XP SP2 or 2003 SP1. There is
a slim chance it can work with modification on 2003 SP0 and NT 4.0 SP6.
The automatic target should be reliable for most users. The cool thing
about this exploit is how it uses a strcpy call to place the shellcode
into a static buffer and then return straight back into it. I have
another version of this exploit that uses a more traditional exploit
method, but there doesn't seem to be much point in releasing it now.

ie_createobject:
 - This exploit module is capable of exploiting any generic
 CreateObject vulnerability in an ActiveX control. The current targets
 allow it to exploit MS06-014 and various controls that don't seem to be
 documented or often found vulnerable. This exploit uses the PE wrapper
 to download a generated executable containing the selected payload.

eiq_license:
 - This exploit module is one of many for the recent EIQ vulnerabilities.
I pushed this one out because of the amount of work the author put into
it and the lack of cleanup I had to do before including it. The rest of
the EIQ modules will be added and merged as I get time. Thanks again to
everyone who submitted modules for these issues.

realvnc_client:
 - This exploits an older client-side vulnerability in the VNC viewer for
Windows. Thanks again to MC for writing this up.

securecrt_ssh1:
 - This exploits an older client-side vulnerability in SecureCRT. Another
great module provided by MC.

mercury_imap:
 - This exploit module is capable of exploiting the RENAME command
overflow found in older versions of the Mercury IMAP software. Yet
another exploit by MC.

A dozen small bug fixes, new targets, and cosmetic improvements were
included with this update. Thanks to David Maciejak for sending in many
of these and having the patience to deal with my update schedule.

Matt Miller (skape) tracked down a long-time bug in the 'EXE' output mode
of msfpayload. The template executable had an invalid stack size set,
which caused all DLL Inject payloads to crash when initialized from
inside the PE template. This fix should allow you to use the vncinject
and metepreter payloads with the msfpayload X mode (standalone exe).

The msfpayload tool now has a javascript output format. Simply pass 'J'
 as the output mode of msfpayload to get an unescape()-ready string.

The next 3.0 beta should be ready sometime next week. If I get over my
fear of being owned via subversion, the actual source code respository
for 3.0 will also become public.

Enjoy!

-HD

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Top sites for Application security news

2006-08-11 Thread Alice Bryson [EMAIL PROTECTED]

hi there
i've collected a lot of pretty good security site, FYI.
Please see my blog here:
http://lwangdotorg.spaces.live.com/Lists/cns!C2277416A864A62F!118/


--
mailto:[EMAIL PROTECTED]
http://www.lwang.org

2006/8/11, KT [EMAIL PROTECTED]:

what are they? I am tasked with keeping up on application security news.

Here are few I can think of, but I am sure there are more

securityfocus.com
owasp.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/




--
Have a Good Day

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] BlackBerry Vulnerabilities

2006-08-11 Thread Peter Dawson
this is the last BB vulnerabilities (thatI know of) which was deemed to be elevated.

http://www.kb.cert.org/vuls/id/570768
On 8/11/06, Nicolas RUFF [EMAIL PROTECTED] wrote:
 Does anyone have any details on the 2 BB vulnerabilities.Some more substantial then rumors?
Which one ? ;)If you are talking about the DEFCON buzz, have a look at:http://www.praetoriang.net/presentations/blackjack.html
Regards,- Nicolas RUFF___Full-Disclosure - We believe in it.Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/-- http://peterdawson.typepad.com
PeterDawson Home of ThoughtFlickr's This message is printed on Recycled Electrons. 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Exploit for MS06-040 Out?

2006-08-11 Thread Dude VanWinkle

On 8/11/06, Brendan Dolan-Gavitt [EMAIL PROTECTED] wrote:

Is there any technical reason that an exploit cannot be developed
against XP SP2 and Server 2003 SP1? Or is this only a limitation of
the current Metasploit exploit?


I think the poster you are referring to was talking about Core IMPACT
only having an NT4 exploit.

-JP

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit for MS06-040 Out?

2006-08-11 Thread H D Moore
The DLLs for XP SP2 and 2003 SP1 were compiled with Visual Studio's stack 
protection flag (/GS). This prevents a standard return address overwrite 
from working. The wcscpy() method everyone is using in their exploits is 
also blocked by another change in how the compiler orders and passes 
arguments.  The standard way to bypass /GS is to use a SEH ptr overwrite, 
but so far, it doesn't seem possible to reach a SEH ptr with the 
overflow, when using the PathCanonicalize method. 


On Friday 11 August 2006 08:40, Brendan Dolan-Gavitt wrote:
 Is there any technical reason that an exploit cannot be developed
 against XP SP2 and Server 2003 SP1? Or is this only a limitation of
 the current Metasploit exploit?

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!

2006-08-11 Thread Philosophil

Why is this on the Full Disclosure mailing list?  What does this have
to do with Info Sec?

I have to read through a *ton* of mailing lists every day and crap
like this just wastes my time.

On 8/9/06, J.A. Terranson [EMAIL PROTECTED] wrote:


(This was sent in reponse to a mass email sent out by Joe - even though me
and him have had nothing to do with each other for a *long*, LONG, time.

---

Joe -

If you check your records, you'll see that I contributed to your campaign
(last time) at the same rate I gave to the Lamont campaign *this* time
[about $1,500.00].

My change of heart wasn't brought about by your support of the Angry
Midget in the White House.  It wasn't a result of your support of many
Republican policies and positions.  I didn't dump you because of *any*
of your political positions.  I left you because you left us first!

Joe Lieberman hasn't been a supporter of the State of Connecticut for
several years now - unfortunately, Joe has been supporting ONLY Joe
himself.  Lieberman for Lieberman through thick and thin.  Your current
plan to run as an independent, rather that the honorable thing (support
the fairly elected candidate, just like YOU were DEMANDING just a few
short months ago) is a great illustration of this point.

Frankly Joe, you've become disgusting.  An overgrown self-centered child,
who's sole interest is to loook out for your own fat and greasy hide.

How do you sleep at night?  How does Hadassah sleep by your side?  The
stench of hypocrisy is thick by your feet.

I urge you to rethink this ill advised plan to turn your back on what you
claim has been decades of loyalty to both the constituency and the
Democratic party: there is still time to accept your current situation and
to stand up as an honorable man - supporting your family, party, and
constituency.

With respect for the Joe Lieberman I used to support, I am, sincerely
yours -

Alif Terranson

___
Antisocial mailing list
[EMAIL PROTECTED]
http://lists.mfn.org/mailman/listinfo/antisocial

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] New Laptop Polices

2006-08-11 Thread Cullen, Michael








Greetings all,



Given the new threats and the change in policy with the airlines
and traveling in and around the UK, has anyone changed their laptop and portable
computing device policy? We are being questioned about the safety of
executives traveling with their laptops.





Thank You,



Michael Cullen

Global Security, Universal Music
Group

818286-5473 (w) | 818
919-6974 (c)

UMG GSO Michael (aim) |
UMG.GSO.Michael (gtalk) | [EMAIL PROTECTED] (msn)

The information contained in this message may be privileged and
confidential and protected from disclosure. If the reader of this message is
not the intended recipient, or an employee or agent responsible for delivering
this message to the intended recipient, you are hereby notified that it is
strictly prohibited (a) to disseminate, distribute or copy this communication
or any of the information contained in it, or (b) to take any action based on
the information in it. If you have received this communication in error, please
notify us immediately by replying to the message and deleting it from your
computer.








___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] RE: [WEB SECURITY] Top sites for Application security news

2006-08-11 Thread Ory Segal
You should also check:

http://www.cgisecurity.net
http://www.webappsec.org
http://www.watchfire.com/securityzone/default.aspx
http://secunia.com/advisories/



Good Luck,

Ory Segal
Director of Security Research
Watchfire (Israel) LTD.
Tel: +972-9-9586077, Ext.236
Mobile: +972-54-7739359
e-mail: [EMAIL PROTECTED]

 

-Original Message-
From: KT [mailto:[EMAIL PROTECTED] 
Sent: Friday, August 11, 2006 7:12 AM
To: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.uk
Subject: [WEB SECURITY] Top sites for Application security news

what are they? I am tasked with keeping up on application security news.

Here are few I can think of, but I am sure there are more

securityfocus.com
owasp.org




The Web Security Mailing List: 
http://www.webappsec.org/lists/websecurity/

The Web Security Mailing List Archives: 
http://www.webappsec.org/lists/websecurity/archive/
http://www.webappsec.org/rss/websecurity.rss [RSS Feed]


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Laptop Polices

2006-08-11 Thread Bob Radvanovsky
You mean the fact that you are *erquired* now to *check* your laptop along with 
your baggage?  Take into account that most laptops aren't easy to remove the 
hard disk drives, and that most laptops of corporate and/or government 
executives contain either sensitive or classified information, I don't 
seriously think that the UK government, nor its corporations, have taken into 
consideration all of the consequences involved.  Take for example the ongoing 
issues of laptops mysteriously disappearing (esp. the Veteran's 
Administration...I lost count, how many has it been, 5 times?) that contains 
spreadsheets and/or databases that contains *private* information.

The UK needs to consider the implications about *how* they will cover the loss 
of financial, sensitive or classified information...

Just my 2 cents worth, which by today's standards doesn't even get you a piece 
of gum any more...sad, isn't it?

-r

P.S.  I think that corporations now need to state that corporate executives 
should NOT have corporate data on their hard disk drives; further locking down 
corporate assets.  I think that they should make it easier for the removal of 
hard disk drives to be removed so they aren't stolen.

- Original Message -
From: Cullen, Michael [mailto:[EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] New Laptop Polices


 Greetings all,
 
  
 
 Given the new threats and the change in policy with the airlines and
 traveling in and around the UK, has anyone changed their laptop and
 portable computing device policy?  We are being questioned about the
 safety of executives traveling with their laptops.
 
  
 
  
 
 Thank You,
 
  
 
 Michael Cullen
 
 Global Security, Universal Music Group
 
 818 286-5473 (w) | 818 919-6974 (c)
 
 UMG GSO Michael (aim) | UMG.GSO.Michael (gtalk) |
 [EMAIL PROTECTED] (msn)
 
 The information contained in this message may be privileged and
 confidential and protected from disclosure. If the reader of this
 message is not the intended recipient, or an employee or agent
 responsible for delivering this message to the intended recipient, you
 are hereby notified that it is strictly prohibited (a) to disseminate,
 distribute or copy this communication or any of the information
 contained in it, or (b) to take any action based on the information in
 it. If you have received this communication in error, please notify us
 immediately by replying to the message and deleting it from your
 computer.
 
  
 
 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Laptop Polices

2006-08-11 Thread Simon Richter
Hello,

Cullen, Michael wrote:

 Given the new threats and the change in policy with the airlines and
 traveling in and around the UK, has anyone changed their laptop and
 portable computing device policy?  We are being questioned about the
 safety of executives traveling with their laptops.

Last thing I heard was that the new policy was no electronics in hand
luggage.

I just had an idea for an interesting venture: At the airport, offer a
service that takes laptops, creates an image, sends that image to the
destination airport where it is put onto a new laptop that is then
rented to the client. On return, do the same thing in the other
direction. Couple with optional virus scanning for $5 extra.

Pointy-haired bosses are going to love this.

   Simon



signature.asc
Description: OpenPGP digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New Laptop Polices

2006-08-11 Thread J. Oquendo

Bob Radvanovsky wrote:

You mean the fact that you are *erquired* now to *check* your laptop along with 
your baggage?  Take into account that most laptops aren't easy to remove the 
hard disk drives, and that most laptops of corporate and/or government 
executives contain either sensitive or classified information, I don't 
seriously think that the UK government, nor its corporations, have taken into 
consideration all of the consequences involved.  Take for example the ongoing 
issues of laptops mysteriously disappearing (esp. the Veteran's 
Administration...I lost count, how many has it been, 5 times?) that contains 
spreadsheets and/or databases that contains *private* information.
  


You're confusing two things here. What one corporation and their 
policies concerning securing information have to do with his initial 
question is obsolete. I'm under the impression of his message he didn't 
mean the safety of his data. But in case he did then he needs a lot of 
reading to do going back in time to days of the rainbow series books.

The UK needs to consider the implications about *how* they will cover the loss 
of financial, sensitive or classified information...

  
I don't believe (again) this was his initial question, whether or not 
the officials in the airline industry give a rats rear of whether or not 
corporate/private data is secure.

Just my 2 cents worth, which by today's standards doesn't even get you a piece 
of gum any more...sad, isn't it?

-r

P.S.  I think that corporations now need to state that corporate executives 
should NOT have corporate data on their hard disk drives; further locking down 
corporate assets.  I think that they should make it easier for the removal of 
hard disk drives to be removed so they aren't stolen.

  
And you hope to accomplish this how? I can agree that data needs to be 
minimized but there are plenty of options available to completely lock 
down any laptop from the BIOS on up so I fail to see what you were truly 
hoping to state.



J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
GPG Key ID 0x1383A743
Fingerprint:
7B02 28CF 24D3 ACA7 9907  789A 8772 7736 1383 A743
26:0608031813:J. Oquendo::fNaE6zH/HDTggYKS:005zLMj

sil . infiltrated @ net
http://www.infiltrated.net


The happiness of society is the end of government.
John Adams

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] New Laptop Polices

2006-08-11 Thread North, Quinn
Why not just encrypt the laptop drives ??
There's plenty of options out there ...

http://www.pointsec.com/

http://utimaco.com/

--=Q=--

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of J.
Oquendo
Sent: Friday, August 11, 2006 12:37 PM
To: Bob Radvanovsky
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] New Laptop Polices

Bob Radvanovsky wrote:
 You mean the fact that you are *erquired* now to *check* your laptop
along with your baggage?  Take into account that most laptops aren't
easy to remove the hard disk drives, and that most laptops of corporate
and/or government executives contain either sensitive or classified
information, I don't seriously think that the UK government, nor its
corporations, have taken into consideration all of the consequences
involved.  Take for example the ongoing issues of laptops mysteriously
disappearing (esp. the Veteran's Administration...I lost count, how many
has it been, 5 times?) that contains spreadsheets and/or databases that
contains *private* information.
   

You're confusing two things here. What one corporation and their 
policies concerning securing information have to do with his initial 
question is obsolete. I'm under the impression of his message he didn't 
mean the safety of his data. But in case he did then he needs a lot of 
reading to do going back in time to days of the rainbow series books.
 The UK needs to consider the implications about *how* they will cover
the loss of financial, sensitive or classified information...

   
I don't believe (again) this was his initial question, whether or not 
the officials in the airline industry give a rats rear of whether or not

corporate/private data is secure.
 Just my 2 cents worth, which by today's standards doesn't even get you
a piece of gum any more...sad, isn't it?

 -r

 P.S.  I think that corporations now need to state that corporate
executives should NOT have corporate data on their hard disk drives;
further locking down corporate assets.  I think that they should make it
easier for the removal of hard disk drives to be removed so they aren't
stolen.

   
And you hope to accomplish this how? I can agree that data needs to be 
minimized but there are plenty of options available to completely lock 
down any laptop from the BIOS on up so I fail to see what you were truly

hoping to state.


J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
GPG Key ID 0x1383A743
Fingerprint:
7B02 28CF 24D3 ACA7 9907  789A 8772 7736 1383 A743
26:0608031813:J. Oquendo::fNaE6zH/HDTggYKS:005zLMj

sil . infiltrated @ net
http://www.infiltrated.net


The happiness of society is the end of government.
John Adams

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] New Laptop Polices

2006-08-11 Thread Glenn.Everhart
If the data is encrypted on laptop that mitigates loss. If you have never heard 
of
truecrypt (as one possibility that is free), go learn (and use!) now.

However I fail to see the governments doing much to see that whatever gets 
checked
through in fact GETS to the destination with the passenger, is 
un-rifled-through,
un stolen-from, and in fact also GETS to the passenger again. Much better 
safety of
the materials ought to be as high a priority as the interference. They need 
also to
consider that for example piezoelectric quartz could be an igniter. Those bits 
are
tiny (would be hard to see in sand). Probably scores or more of other ways to 
generate
ignition are doable also. Detective work to keep attackers from getting on 
planes in
the first place seems more effective.

If instead of just taking things from people they would pack them and carry 
them on
the plane (perhaps in a resistant box) and deliver back to passengers, the pain 
of finding
you have some contraband du jour and must either lose it forever or not fly 
could be
lessened. Such actions would go a rather long way to mitigate, in turn, the 
problems
being caused for travellers.
Glenn Everhart
(speaking for myself)


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Simon
Richter
Sent: Friday, August 11, 2006 12:34 PM
To: Cullen, Michael
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] New Laptop Polices


Hello,

Cullen, Michael wrote:

 Given the new threats and the change in policy with the airlines and
 traveling in and around the UK, has anyone changed their laptop and
 portable computing device policy?  We are being questioned about the
 safety of executives traveling with their laptops.

Last thing I heard was that the new policy was no electronics in hand
luggage.

I just had an idea for an interesting venture: At the airport, offer a
service that takes laptops, creates an image, sends that image to the
destination airport where it is put onto a new laptop that is then
rented to the client. On return, do the same thing in the other
direction. Couple with optional virus scanning for $5 extra.

Pointy-haired bosses are going to love this.

   Simon



**
This communication is for informational purposes only. It is not intended as an 
offer or solicitation for the purchase or sale of any financial instrument or 
as an official confirmation of any transaction. All market prices, data and 
other information are not warranted as to completeness or accuracy and are 
subject to change without notice. Any comments or statements made herein do not 
necessarily reflect those of JPMorgan Chase  Co., its subsidiaries and 
affiliates.
This transmission may contain information that is privileged, confidential, 
legally privileged, and/or exempt from disclosure under applicable law. If you 
are not the intended recipient, you are hereby notified that any disclosure, 
copying, distribution, or use of the information contained herein (including 
any reliance thereon) is STRICTLY PROHIBITED. Although this transmission and 
any attachments are believed to be free of any virus or other defect that might 
affect any computer system into which it is received and opened, it is the 
responsibility of the recipient to ensure that it is virus free and no 
responsibility is accepted by JPMorgan Chase  Co., its subsidiaries and 
affiliates, as applicable, for any loss or damage arising in any way from its 
use. If you received this transmission in error, please immediately contact the 
sender and destroy the material in its entirety, whether in electronic or hard 
copy format. Thank you.
**

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Laptop Polices

2006-08-11 Thread Bob Radvanovsky
I was always under the impression that BIOS security features could always be 
circumvented.  See further comments below...

-r

- Original Message -
From: J. Oquendo [mailto:[EMAIL PROTECTED]
To: Bob Radvanovsky [mailto:[EMAIL PROTECTED]
Cc: Cullen, Michael [mailto:[EMAIL PROTECTED], 
full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] New Laptop Polices


 Bob Radvanovsky wrote:
  You mean the fact that you are *erquired* now to *check* your laptop along
 with your baggage?  Take into account that most laptops aren't easy to
 remove the hard disk drives, and that most laptops of corporate and/or
 government executives contain either sensitive or classified information, I
 don't seriously think that the UK government, nor its corporations, have
 taken into consideration all of the consequences involved.  Take for example
 the ongoing issues of laptops mysteriously disappearing (esp. the Veteran's
 Administration...I lost count, how many has it been, 5 times?) that contains
 spreadsheets and/or databases that contains *private* information.

 
 You're confusing two things here. What one corporation and their 
 policies concerning securing information have to do with his initial 
 question is obsolete. I'm under the impression of his message he didn't 
 mean the safety of his data. But in case he did then he needs a lot of 
 reading to do going back in time to days of the rainbow series books.

You may be right, but I was confused as to what his objectives were here, of 
which, one of the more important aspects should be data security, so this 
raises a *whole* can 'o worms.

  The UK needs to consider the implications about *how* they will cover the
 loss of financial, sensitive or classified information...
 

 I don't believe (again) this was his initial question, whether or not 
 the officials in the airline industry give a rats rear of whether or not 
 corporate/private data is secure.

True, a moot point.

  Just my 2 cents worth, which by today's standards doesn't even get you a
 piece of gum any more...sad, isn't it?
 
  -r
 
  P.S.  I think that corporations now need to state that corporate
 executives should NOT have corporate data on their hard disk drives; further
 locking down corporate assets.  I think that they should make it easier for
 the removal of hard disk drives to be removed so they aren't stolen.
 

 And you hope to accomplish this how? I can agree that data needs to be 
 minimized but there are plenty of options available to completely lock 
 down any laptop from the BIOS on up so I fail to see what you were truly 
 hoping to state.

Actually, wasn't there a mention about a self-destructing DVD just recently?  
This would be worthwhile to investigate into, or the other idea about imaging 
the laptop in case it's stolen or damaged during transport.

 
 
 J. Oquendo
 http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
 GPG Key ID 0x1383A743
 Fingerprint:
 7B02 28CF 24D3 ACA7 9907  789A 8772 7736 1383 A743
 26:0608031813:J. Oquendo::fNaE6zH/HDTggYKS:005zLMj
 
 sil . infiltrated @ net
 http://www.infiltrated.net
 
 
 The happiness of society is the end of government.
 John Adams
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Laptop Polices

2006-08-11 Thread Valdis . Kletnieks
On Fri, 11 Aug 2006 11:32:50 CDT, Bob Radvanovsky said:
 corporate assets.  I think that they should make it easier for the removal of
 hard disk drives to be removed so they aren't stolen.

OK, so you pull the hard drive - where do you *put* it?  Remember, if it's
packaged to be removable, it's going to look a lot like an MP3 player or some
other thing-with-a-battery, and you end up having to check it.


pgpAA8YUfowbi.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New Laptop Polices

2006-08-11 Thread Michael Holstein
 OK, so you pull the hard drive - where do you *put* it?  Remember, if it's
 packaged to be removable, it's going to look a lot like an MP3 player or some
 other thing-with-a-battery, and you end up having to check it.

Being as the original email came from an exec at Universal Music, I
think the intent is to require airlines to 'rm -r *.mp3' to you before
boarding with any electronic device ;)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Laptop Polices

2006-08-11 Thread Peter Dawson
We have done some storming on this issue. The issue is basically forked in terms of
1) Airline security
2) Data Security

Wrt to item(1) , it is deemed to be possible that IATA will move to banning any electronic devices as carryon. This certainly is the way that other entities are looking into risk negation from a view point on airlines security. As someone mentioned, IATA gives a rats ass about your corporate data 


This leave us with the delimma of protecting localized dataon a Laptop, Blackberry. iPod and/or other hand held devices. Checked in luggage can easily be stolen. misplaced and/or HDD yanked out

Corporate Policy changes are needed- its just a matter of time 

On 8/11/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

On Fri, 11 Aug 2006 11:32:50 CDT, Bob Radvanovsky said: corporate assets.I think that they should make it easier for the removal of
 hard disk drives to be removed so they aren't stolen.OK, so you pull the hard drive - where do you *put* it?Remember, if it'spackaged to be removable, it's going to look a lot like an MP3 player or some
other thing-with-a-battery, and you end up having to check it.___Full-Disclosure - We believe in it.Charter: 
http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/-- 
http://peterdawson.typepad.comPeterDawson Home of ThoughtFlickr's This message is printed on Recycled Electrons. 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New Laptop Polices

2006-08-11 Thread Michael Holstein
Well, how about this :

build a PXE type CD/DVD with all your business applications (you could
automate a nightly build to keep antivirus, patches, etc current). Do
folder redirection or similar to mount all user-specific bits from a
USB thumb drive (itself an encrypted volume).

Then your traveling salesman needs only the DVD and thumbdrive --
neither of which contain batteries.

You could go one better and write a wrapper around the bootloader so
that the contents of the CD/DVD (the O/S part, where you might have a
corporate VPN client or something) are encrypted as well [in linux this
would be easy .. in Windows I'm not so sure?]

Personally, I'm worried about what happens when some wacky terrorist
gets caught with a stick of Semtex in his keister...

/mike.

Peter Dawson wrote:
 We have done some storming on this issue. The issue is basically forked
 in terms of
 1) Airline security
 2) Data Security

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Re: [WEB SECURITY] Top sites for Application security news

2006-08-11 Thread Anurag Agarwal
searchappsecurity.com

- Original Message From: KT [EMAIL PROTECTED]To: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.ukSent: Thursday, August 10, 2006 9:12:22 PMSubject: [WEB SECURITY] Top sites for Application security news
what are they? I am tasked with keeping up on application security news.Here are few I can think of, but I am sure there are moresecurityfocus.comowasp.orgThe Web Security Mailing List: http://www.webappsec.org/lists/websecurity/The Web Security Mailing List Archives: http://www.webappsec.org/lists/websecurity/archive/http://www.webappsec.org/rss/websecurity.rss [RSS Feed]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] ScatterChat Advisory 2006-01: Cryptanalytic Attack Vulnerability

2006-08-11 Thread ScatterChat Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ScatterChat Advisory 2006-01:  Cryptanalytic Attack Vulnerability
Technical Report
CVE ID: CVE-2006-4021
August 11th, 2006
http://www.scatterchat.com/



SUMMARY

ScatterChat (http://www.scatterchat.com/) is an instant messaging project
that aims to provide encryption and anonymity support with Tor to
non-technical users such as human rights activists and political
dissidents.

Steven Murdoch, a security researcher with the University of Cambridge,
discovered a theoretical weakness in ScatterChat's cryptographic module.
He found that an eavesdropper might locate patterns in a private
communications channel if extraordinarily large amounts of messages were
exchanged in a single conversation.

Note that this does not allow an eavesdropper to decrypt messages, nor
determine a user's identity if anonymity is used.

The practical impact of this vulnerability is very low.



DETAILS

It was found that the birthday attack could be used against the
custom padding mechanism on the ECB-mode encryption of messages.

After 114KB of data is sent in a single conversation the probability
of a collision between two 16-byte blocks is 1% and will reach 50%
after 904KB, then 99% after 2.3MB (approximately).  Note that
conversations are reset when one or both peers sign off from the
instant messaging service.

The above figures are calculated assuming that messages do not
contain any entropy, which is unrealistic for an instant messaging
environment.  Assuming a rate of one bit of entropy per character,
the probability of a collision is 1% after 580KB is exchanged and
will reach 50% after 4,822KB, then 99% after 12,431KB (approximately).

Note that if each instant message was filled to its 500-byte capacity
(as enforced by the system), then 580KB would be transfered after
1,188 messages.



IMPACT

The end-user impact of this issue is very low.

It is important to note that this issue does NOT allow an eavesdropper
to decrypt any messages, nor does it allow them to discover the user's
identity if the anonymity feature is used.

In general, this type of cryptanalytic attack allows an eavesdropper to
determine patterns in an encrypted conversation, which in theory could
yield information about messages if enough patterns were found and
correlated.  However, this issue only allows two 16-byte segments to be
matched with 1% probability when at least 1,188 instant messages are
exchanged in a single, uninterrupted session.  In most cases, more than
1,188 instant messages would need to be sent.

The information leaked in the above situation would be negligible.

This issue also affects any application that is built upon ScatterChat's
encryption module.

Note that secure file transfers are not affected.



SOLUTION

The ScatterChat project takes both practical and theoretical
vulnerabilities very seriously.  However, due to the low impact of this
vulnerability, and the high risk of introducing other subtle security
problems in updating the protocol, this issue will not be fixed in the
v1.0.x branch.

This issue will be rectified in the v2.0 series, which will replace
the current cryptographic module with the well-tested OTR encryption
module (http://www.cypherpunks.ca/otr/).  A release date for v2.0
is not yet known.

Optionally, this issue can be mitigated through the use of the anonymity
feature, as traffic analysis often requires a known context to make
sense of patterns.  Without the knowledge of who is communicating,
an eavesdropper's attempts at interpreting patterns can be frustrated.

ScatterChat v1.0.x remains safe to use in the overwhelming majority of
cases.  However, for high risk, non-technical users, i.e., users operating
behind national firewalls, we recommend extra caution.



ACKNOWLEDGEMENTS

A special thanks goes out to Steven Murdoch for his professionalism in
dealing with this matter.  His web page can be found at:
http://www.cl.cam.ac.uk/users/sjm217/



CONTACT

J. Salvatore Testa II
jtesta--at--hacktivismo--dot--com

http://www.scatterchat.com/jtesta_2006.asc
3428 E58E 715E C37D 2AA7 C55E 97D1 DE8C 4B26 2B62


- 
A less technical summary of this advisory can be found at:
http://www.scatterchat.com/advisories/2006-01_non_tech.html



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE3H61l9HejEsmK2IRAsEtAJ9kX3PDigpPb+aaPWlfQ5IqwyskYgCgiKZ2
Kf0CYKzvc80KAKtBkT7zVgc=
=335D
-END PGP SIGNATURE-



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!

2006-08-11 Thread bkfsec

Philosophil wrote:


Why is this on the Full Disclosure mailing list?  What does this have
to do with Info Sec?

I have to read through a *ton* of mailing lists every day and crap
like this just wastes my time.

And now you're wasting the rest of our time whining about it.  What does 
your e-mail have to do with Full Disclosure?


Hitting the delete button's quicker, you know.

-bkfsec


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] rPSA-2006-0152-1 squirrelmail

2006-08-11 Thread Justin M. Forbes
rPath Security Advisory: 2006-0152-1
Published: 2006-08-11
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
User Deterministic Vulnerability
Updated Versions:
squirrelmail=/[EMAIL PROTECTED]:devel//1/1.4.6-2.2-1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4019
https://issues.rpath.com/browse/RPL-577
http://www.squirrelmail.org/security/issue/2006-08-11

Description:
Previous versions of the squirrelmail package contain a vulnerability
exposure that allows authenticated users to read and write other
users' preferences and attachments.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!

2006-08-11 Thread evilrabbi
We should build a shrine for Joe Lieberman and bask in it's glory. He is probably the best politician of our generation.On 8/9/06, J.A. Terranson 
[EMAIL PROTECTED] wrote:(This was sent in reponse to a mass email sent out by Joe - even though me
and him have had nothing to do with each other for a *long*, LONG, time.---Joe -If you check your records, you'll see that I contributed to your campaign
(last time) at the same rate I gave to the Lamont campaign *this* time[about $1,500.00].My change of heart wasn't brought about by your support of the AngryMidget in the White House.It wasn't a result of your support of many
Republican policies and positions.I didn't dump you because of *any*of your political positions.I left you because you left us first!Joe Lieberman hasn't been a supporter of the State of Connecticut for
several years now - unfortunately, Joe has been supporting ONLY Joehimself.Lieberman for Lieberman through thick and thin.Your currentplan to run as an independent, rather that the honorable thing (support
the fairly elected candidate, just like YOU were DEMANDING just a fewshort months ago) is a great illustration of this point.Frankly Joe, you've become disgusting.An overgrown self-centered child,who's sole interest is to loook out for your own fat and greasy hide.
How do you sleep at night?How does Hadassah sleep by your side?Thestench of hypocrisy is thick by your feet.I urge you to rethink this ill advised plan to turn your back on what youclaim has been decades of loyalty to both the constituency and the
Democratic party: there is still time to accept your current situation andto stand up as an honorable man - supporting your family, party, andconstituency.With respect for the Joe Lieberman I used to support, I am, sincerely
yours -Alif Terranson___Antisocial mailing list[EMAIL PROTECTED]
http://lists.mfn.org/mailman/listinfo/antisocial___Full-Disclosure - We believe in it.Charter: 
http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/-- -- h0 h0 h0 --
www.nopsled.net
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New Laptop Polices

2006-08-11 Thread Peter Dawson
LA time is reporting

If you're going international, stash your laptop; US airports are banning carry-on electronics for overseas flights !!


On 8/11/06, Jeremy Bishop [EMAIL PROTECTED] wrote:
On Friday 11 August 2006 10:54, Michael Holstein wrote: Then your traveling salesman needs only the DVD and thumbdrive --
 neither of which contain batteries.Aside from the piezoelectric quartz earrings, it's only a matter of timebefore someone in DHS discovers static electricity.(Actually, Idecided to rely on USB + knoppix for my last trip, so it's perfectly
feasible for when you want an expendable solution.) Personally, I'm worried about what happens when some wacky terrorist gets caught with a stick of Semtex in his keister...Bend over sir; it's for America.
Jeremy--Andrea: Unhappy the land that has no heroes.Galileo: No, unhappy the land that needs heroes. -- Bertolt Brecht, Life of Galileo___
Full-Disclosure - We believe in it.Charter: http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - 
http://secunia.com/-- http://peterdawson.typepad.comPeterDawson Home of ThoughtFlickr's This message is printed on Recycled Electrons. 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Re: [WEB SECURITY] Top sites for Application security news

2006-08-11 Thread root

Some (web) security blogs/sites I like:

http://ha.ckers.org/ - in my opinion this is (by far) the best web 
security related blog. RSnake rocks!

http://isc.sans.org/ - security news, latest stuff
http://netsec.blogspot.com/ - latest links 
http://blog.washingtonpost.com/securityfix/ - very informative. Brian 
Krebs is a very good reporter. Sometimes, you can find here exclusive 
information.

http://blogs.securiteam.com/ - funny
http://www.darknet.org.uk/ - informative

KT wrote:

what are they? I am tasked with keeping up on application security news.

Here are few I can think of, but I am sure there are more

securityfocus.com
owasp.org


 

The Web Security Mailing List: 
http://www.webappsec.org/lists/websecurity/


The Web Security Mailing List Archives: 
http://www.webappsec.org/lists/websecurity/archive/

http://www.webappsec.org/rss/websecurity.rss [RSS Feed]




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] RSA tokens.

2006-08-11 Thread Mike Hoye

FYI, I have just received news that SecurID tokens are not permitted in 
carry-on on red (which apparently means via the UK) flights. Nor, 
apparently, are the electronic keyfobs for luxury cars. 

I sure feel safer.

-- 
The problem with defending the purity of the English language is
that English is about as pure as a cribhouse whore. We don't just
borrow words; on occasion, English has pursued other languages down
alleyways to beat them unconscious and rifle their pockets for new
vocabulary. - James D. Nicoll

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!

2006-08-11 Thread b . hines

What a maroon

http://www.google.com/search?hl=enq=%22Alif+Terranson%22btnG=Google+Search

-- Original message -- From: evilrabbi [EMAIL PROTECTED] We should build a shrine for Joe Lieberman and bask in it's glory. He is probably the best politician of our generation.
On 8/9/06, J.A. Terranson  [EMAIL PROTECTED] wrote:
(This was sent in reponse to a mass email sent out by Joe - even though me and him have had nothing to do with each other for a *long*, LONG, time.---Joe -If you check your records, you'll see that I contributed to your campaign (last time) at the same rate I gave to the Lamont campaign *this* time[about $1,500.00].My change of heart wasn't brought about by your support of the AngryMidget in the White House.It wasn't a result of your support of many Republican policies and positions.I didn't "dump" you because of *any*of your political positions.I left you because you left us first!Joe Lieberman hasn't been a supporter of the State of Connecticut for several years now - unf
 ortuna
tely, Joe has been supporting ONLY Joehimself.Lieberman for Lieberman through thick and thin.Your currentplan to run as an independent, rather that the honorable thing (support the fairly elected candidate, just like YOU were DEMANDING just a fewshort months ago) is a great illustration of this point.Frankly Joe, you've become disgusting.An overgrown self-centered child,who's sole interest is to loook out for your own fat and greasy hide. How do you sleep at night?How does Hadassah sleep by your side?Thestench of hypocrisy is thick by your feet.I urge you to rethink this ill advised plan to turn your back on what youclaim has been decades of loyalty to both the constituency and the Democratic party: there is still time to accept your current situation andto stand up as an honorable man - supporting your family, party, andconstituency.With respect
  for t
he Joe Lieberman I used to support, I am, sincerely yours -Alif Terranson___Antisocial mailing list[EMAIL PROTECTED]http://lists.mfn.org/mailman/listinfo/antisocial___Full-Disclosure - We believe in it.Charter: http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/-- -- h0 h0 h0 --www.nopsled.net 

---BeginMessage---
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/---End Message---
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!

2006-08-11 Thread Peter Dawson
ACK that !! :)-
On 8/11/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:



What a maroon

http://www.google.com/search?hl=enq=%22Alif+Terranson%22btnG=Google+Search


-- http://peterdawson.typepad.com
PeterDawson Home of ThoughtFlickr's This message is printed on Recycled Electrons. 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!

2006-08-11 Thread Dude VanWinkle

On 8/11/06, Peter Dawson [EMAIL PROTECTED] wrote:

ACK that !! :)-



On 8/11/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:



 What a maroon


http://www.google.com/search?hl=enq=%22Alif+Terranson%22btnG=Google+Search




from the listed google search, 1st hit

Alif Terranson, a former Savvis employee who was responsible for
keeping the network clean, objected to the spammers and wrote a
200-page report detailing his complaints about the spammers.

He told the BBC: One of the Vice Presidents told me, 'Take no action
against any Cable  wireless customer - they are profitable and they
are off limits.'

He was talking specifically about that 200-page report which at the
time was 95 spammers. When I left Savvis in April it was almost 100,
today it is 148.

In my opinion there's no way they could go and add 60 spammers to
their service without actively looking for that business, he said.

Mr Terranson went to Steve Linford, who runs the Spamhaus block list
from a small house boat on the River Thames near London.

Spam king

Around the world 260 million users are protected from spam by the
Spamhaus block list, which identifies where spam is coming from.

In three long conversations with Savvis executives last Friday, Mr
Linford persuaded them to ditch its spamming clients after threatening
to block all Savvis e-mails, making it very difficult for them to
communicate with the outside world

-

Yeah, that sounds like a maroon who cares more about the net than his paycheck.

I doubt you have that much honor.

-JPwho thinks razzing on lieberman is better than [EMAIL PROTECTED] anyday

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: [WEB SECURITY] Top sites for Application security news

2006-08-11 Thread Dude VanWinkle

On 8/11/06, root [EMAIL PROTECTED] wrote:

Some (web) security blogs/sites I like:

http://ha.ckers.org/ - in my opinion this is (by far) the best web
security related blog. RSnake rocks!
http://isc.sans.org/ - security news, latest stuff
http://netsec.blogspot.com/ - latest links
http://blog.washingtonpost.com/securityfix/ - very informative. Brian
Krebs is a very good reporter. Sometimes, you can find here exclusive
information.
http://blogs.securiteam.com/ - funny
http://www.darknet.org.uk/ - informative




Dont forget my fav:

http://security.microsoft.com/

-JP

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: [WEB SECURITY] Top sites for Application security news

2006-08-11 Thread sick b0y
...andhttp://metasploit.blogspot.comhttp://www.liquidmatrix.org/blog/
http://blogs.zdnet.com/threatchaos/http://www.cultdeadcow.com/cms/main.php3-sbDude VanWinkle wrote:
On 8/11/06, root [EMAIL PROTECTED] wrote:
  
  Some (web) security blogs/sites I like:

http://ha.ckers.org/ - in my opinion this is (by far) the best web
security related blog. RSnake rocks!
http://isc.sans.org/ - security news, latest stuff
http://netsec.blogspot.com/ - latest links
http://blog.washingtonpost.com/securityfix/ - very informative. Brian
Krebs is a very good reporter. Sometimes, you can find here exclusive
information.
http://blogs.securiteam.com/ - funny
http://www.darknet.org.uk/ - informative


  

  

  
Dont forget my fav:
  

  
http://security.microsoft.com/
  

  
-JP
  

  
___
  
Full-Disclosure - We believe in it.
  
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  
Hosted and sponsored by Secunia - http://secunia.com/
  

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/