RE: [Full-disclosure] RE: when will AV vendors fix this???
On Mon, 7 Aug 2006, Thomas D. wrote: And even if you hide the file, if it hide the way you describe, you aren't able to execute the file, until you give access to yourself. If you do this, the anti-virus program will also have access Keep in mind: If it is an unknown file (zero-day), you don't even think about hiding, because it isn't necessary. You have other problems... = I don't think it is a security related problem nor a problem itself. Remember: some years ago off by one was treated as useless for exploits. Any type of data/file hiding (of course, alternate data streams in the first place) can become the last brick required for some new attack vector. So, while currently I can't present any workable scenario, I wouldn't consider such type of data hiding as not a security-relate problem. _ Dmitry Yu. Bolkhovityanov The Budker Institute of Nuclear Physics Novosibirsk, Russia ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Server Redundancy
Yo! wac wrote: Isn't there a way to map a name to several IPs? Or use aliases? I'm interested in the subject because I want to do the same thing. read this: http://www.supersparrow.org/ss_paper/ -- Siim Põder ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] live.com xss
http://boards.live.com/Travelboards/search.aspx?search=\;--/scriptscriptalert(1)/script ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] (Fwd) CWD--Save the Nation; Eat a hacker
[flashback - not much has changed - FUD has a new face, but his modus operandi remains the same. See also: http://en.wikipedia.org/wiki/FUD - Stu] --- Forwarded message follows --- From: Meeks, Brock [EMAIL PROTECTED] To: '[EMAIL PROTECTED]' [EMAIL PROTECTED] Subject:CWD--Save the Nation; Eat a hacker Date sent: Fri, 24 Sep 1999 11:25:39 -0700 CyberWire Dispatch // Copyright © 1999 // September 24, 1999 Jacking in from the Snake in the Grass Port: Save the Nation; Eat a Hacker By George Smith CWD special correspondent Richard Clarke, President Clinton's baleful counter-terrorism guru on the National Security Council, has a plan to save us from computerized terrorists. Actually, he appears to have lots of plans but we're only going to talk about one today. And while it's not particularly original, it's a real viper. To save the nation from electronic Pearl Harbor -- you know, that nebulous electronic doom that's supposed to be creeping toward us from out of the gibbering dark of the Internet -- Clarke democratically suggested recently that the U.S. government could change laws that are impediments to information assurance and security. And these impediment laws would be? Why, just the Freedom of Information Act, as well as antitrust regulations and liability law. Clarke was speaking for an extended interview published in the August edition of Signal magazine, a quasi-military trade publication whose editors get hard-ons over Pentagon electronic technology and anything that would aid in the smiting of the Department of Defense's alleged manifold computer enemies. Signal is best known for an utterly weird April 1998 howler on an alleged piece of attack software, called Blitzkrieg, which was, the magazine seriously told a readership of easily-gulled Pentagon contractors, more dangerous than nuclear weapons. In one form or another the venomous idea to tamper with FOIA has been bandied around in documents and studies on information warfare since at least 1996, well before the appearance of Clarke on the cyberscene. It is generally coupled to the linking of the military and law enforcement to select industry groups. The intelligence agencies, Department of Defense and law enforcement would then share classified or supposedly sensitive materials with these ill-defined industrial groups so they could pool resources to quickly thwart potential electronic Pearl Harbors. The head of the Federation of American Scientists' Secrecy and Government Project, Steven Aftergood, explained the rationale, or rather the lack of it, behind screwing with the FOIA. Modifying FOIA is the first thing everyone thinks of, said Aftergood. It's the one thing everyone can agree upon. Whenever someone in the government or military writes something on electronic Pearl Harbor, they have to come up with a set of recommendations, added Aftergood. The no-brainer is to rip up FOIA, one of the final ramparts used by citizens, as well as journalists, in the preservation of open government. The belief driving this, said Aftergood, is that, (1), industry won't share any information on computer security problems with government if it isn't shielded from FOIA because of the potential for misuse by competitors, and, (2); It's already too easy to obtain information through FOIA . . . which is ridiculous. How ridiculous? Rob Rosenberger, a well-known independent computer security analyst and one of the U.S. military's first information warriors, recently tried to use FOIA to dig up some simple information about how the Air Force reacted to the Melissa virus. The Department of Defense has a rating system known as INFOCON. It tries, emphasis on the word tries, to emulate the old DEFCON system in that it is a way the military rates a threat and its posture regarding the threat. The conditions range from NORMAL, notes Rosenberger, which means no significant activity (a theoretical optimum, he notes dryly on his website, [that] we cannot achieve if we accept 14-yr-old hackers as a national security threat) to ALPHA, an increased risk of attack, -- all the way up to DELTA, signifying a general attack. INFOCON DELTA computer incidents would undermine [DoD's] ability to function effectively [and would create a] significant risk of mission failure, Rosenberger explains on his website. INFOCON DELTA means the military treats the Internet as a battlefield, complete with damaged PCs and smoldering mousepads, added Rosenberger. Rosenberger's FOIA request was simple. He asked a number of Air Force agencies what their INFOCON status was from March 15 to April 15, a window that covered the incidence of the Melissa virus. U.S. Air Force HQ in Europe was the only agency that answered with its status -- INFOCON ALPHA. The HQ Air Intelligence Agency refused to disclose their INFOCON status on the grounds that Unauthorized disclosure of such information could reasonably be
[Full-disclosure] apple.com xss
apple.com search form xss ( POST var )-- mac scriptalert(1)/script ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Re: apple.com xss
http://searchcgi.apple.com/cgi-bin/sp/nph-searchpre11.pl?q=--+mac+script alert(1)/scriptoutput=xml_no_dtdclient=default_frontendsite=us_only lr=lang_ensort=start=access=poe=utf-8On 11/08/06, Thomas Pollet [EMAIL PROTECTED] wrote: apple.com search form xss ( POST var )-- mac scriptalert(1)/script ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] BlackBerry Vulnerabilities
Does anyone have any details on the 2 BB vulnerabilities. Some more substantial then rumors? Which one ? ;) If you are talking about the DEFCON buzz, have a look at: http://www.praetoriang.net/presentations/blackjack.html Regards, - Nicolas RUFF ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [WEB SECURITY] Re: [Full-disclosure] Top sites for Application security news
Shameless Site Plug http://www.cgisecurity.com / Mailing List The Web Security mailing List http://www.webappsec.org/lists/websecurity/ - Z and mailing lists? On 8/11/06, KT [EMAIL PROTECTED] wrote: what are they? I am tasked with keeping up on application security news. Here are few I can think of, but I am sure there are more securityfocus.com owasp.org ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ The Web Security Mailing List: http://www.webappsec.org/lists/websecurity/ The Web Security Mailing List Archives: http://www.webappsec.org/lists/websecurity/archive/ http://www.webappsec.org/rss/websecurity.rss [RSS Feed] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Exploit for MS06-040 Out?
Is there any technical reason that an exploit cannot be developed against XP SP2 and Server 2003 SP1? Or is this only a limitation of the current Metasploit exploit? Thanks, Brendan On 8/10/06, H D Moore [EMAIL PROTECTED] wrote: On Wednesday 09 August 2006 13:10, Matt Davis wrote: Did I completely miss exploit code being released in the wild for that vulnerability? The Metasploit Framework module is now public, I included a copy of the email I sent to the Framework mailing list below. For the lazy: http://metasploit.com/projects/Framework/modules/exploits/netapi_ms06_040.pm -- Forwarded Message -- Subject: [framework] Metasploit Framework Updates Date: Thursday 10 August 2006 02:52 From: H D Moore [EMAIL PROTECTED] To: [EMAIL PROTECTED] Hello everyone, I just pushed out a new round of updates for version 2.6 of the Metasploit Framework. This update includes new exploits, new features, and massive bug fixes. If it wasn't 3:00am on my birthday I would try for a 2.7 release :-) New exploits: netapi_ms06-040: - This exploit module should work against all Windows 2000 systems and Windows XP SP0 and SP1. It will not work on XP SP2 or 2003 SP1. There is a slim chance it can work with modification on 2003 SP0 and NT 4.0 SP6. The automatic target should be reliable for most users. The cool thing about this exploit is how it uses a strcpy call to place the shellcode into a static buffer and then return straight back into it. I have another version of this exploit that uses a more traditional exploit method, but there doesn't seem to be much point in releasing it now. ie_createobject: - This exploit module is capable of exploiting any generic CreateObject vulnerability in an ActiveX control. The current targets allow it to exploit MS06-014 and various controls that don't seem to be documented or often found vulnerable. This exploit uses the PE wrapper to download a generated executable containing the selected payload. eiq_license: - This exploit module is one of many for the recent EIQ vulnerabilities. I pushed this one out because of the amount of work the author put into it and the lack of cleanup I had to do before including it. The rest of the EIQ modules will be added and merged as I get time. Thanks again to everyone who submitted modules for these issues. realvnc_client: - This exploits an older client-side vulnerability in the VNC viewer for Windows. Thanks again to MC for writing this up. securecrt_ssh1: - This exploits an older client-side vulnerability in SecureCRT. Another great module provided by MC. mercury_imap: - This exploit module is capable of exploiting the RENAME command overflow found in older versions of the Mercury IMAP software. Yet another exploit by MC. A dozen small bug fixes, new targets, and cosmetic improvements were included with this update. Thanks to David Maciejak for sending in many of these and having the patience to deal with my update schedule. Matt Miller (skape) tracked down a long-time bug in the 'EXE' output mode of msfpayload. The template executable had an invalid stack size set, which caused all DLL Inject payloads to crash when initialized from inside the PE template. This fix should allow you to use the vncinject and metepreter payloads with the msfpayload X mode (standalone exe). The msfpayload tool now has a javascript output format. Simply pass 'J' as the output mode of msfpayload to get an unescape()-ready string. The next 3.0 beta should be ready sometime next week. If I get over my fear of being owned via subversion, the actual source code respository for 3.0 will also become public. Enjoy! -HD ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Top sites for Application security news
hi there i've collected a lot of pretty good security site, FYI. Please see my blog here: http://lwangdotorg.spaces.live.com/Lists/cns!C2277416A864A62F!118/ -- mailto:[EMAIL PROTECTED] http://www.lwang.org 2006/8/11, KT [EMAIL PROTECTED]: what are they? I am tasked with keeping up on application security news. Here are few I can think of, but I am sure there are more securityfocus.com owasp.org ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- Have a Good Day ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] BlackBerry Vulnerabilities
this is the last BB vulnerabilities (thatI know of) which was deemed to be elevated. http://www.kb.cert.org/vuls/id/570768 On 8/11/06, Nicolas RUFF [EMAIL PROTECTED] wrote: Does anyone have any details on the 2 BB vulnerabilities.Some more substantial then rumors? Which one ? ;)If you are talking about the DEFCON buzz, have a look at:http://www.praetoriang.net/presentations/blackjack.html Regards,- Nicolas RUFF___Full-Disclosure - We believe in it.Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/-- http://peterdawson.typepad.com PeterDawson Home of ThoughtFlickr's This message is printed on Recycled Electrons. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Exploit for MS06-040 Out?
On 8/11/06, Brendan Dolan-Gavitt [EMAIL PROTECTED] wrote: Is there any technical reason that an exploit cannot be developed against XP SP2 and Server 2003 SP1? Or is this only a limitation of the current Metasploit exploit? I think the poster you are referring to was talking about Core IMPACT only having an NT4 exploit. -JP ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Exploit for MS06-040 Out?
The DLLs for XP SP2 and 2003 SP1 were compiled with Visual Studio's stack protection flag (/GS). This prevents a standard return address overwrite from working. The wcscpy() method everyone is using in their exploits is also blocked by another change in how the compiler orders and passes arguments. The standard way to bypass /GS is to use a SEH ptr overwrite, but so far, it doesn't seem possible to reach a SEH ptr with the overflow, when using the PathCanonicalize method. On Friday 11 August 2006 08:40, Brendan Dolan-Gavitt wrote: Is there any technical reason that an exploit cannot be developed against XP SP2 and Server 2003 SP1? Or is this only a limitation of the current Metasploit exploit? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!
Why is this on the Full Disclosure mailing list? What does this have to do with Info Sec? I have to read through a *ton* of mailing lists every day and crap like this just wastes my time. On 8/9/06, J.A. Terranson [EMAIL PROTECTED] wrote: (This was sent in reponse to a mass email sent out by Joe - even though me and him have had nothing to do with each other for a *long*, LONG, time. --- Joe - If you check your records, you'll see that I contributed to your campaign (last time) at the same rate I gave to the Lamont campaign *this* time [about $1,500.00]. My change of heart wasn't brought about by your support of the Angry Midget in the White House. It wasn't a result of your support of many Republican policies and positions. I didn't dump you because of *any* of your political positions. I left you because you left us first! Joe Lieberman hasn't been a supporter of the State of Connecticut for several years now - unfortunately, Joe has been supporting ONLY Joe himself. Lieberman for Lieberman through thick and thin. Your current plan to run as an independent, rather that the honorable thing (support the fairly elected candidate, just like YOU were DEMANDING just a few short months ago) is a great illustration of this point. Frankly Joe, you've become disgusting. An overgrown self-centered child, who's sole interest is to loook out for your own fat and greasy hide. How do you sleep at night? How does Hadassah sleep by your side? The stench of hypocrisy is thick by your feet. I urge you to rethink this ill advised plan to turn your back on what you claim has been decades of loyalty to both the constituency and the Democratic party: there is still time to accept your current situation and to stand up as an honorable man - supporting your family, party, and constituency. With respect for the Joe Lieberman I used to support, I am, sincerely yours - Alif Terranson ___ Antisocial mailing list [EMAIL PROTECTED] http://lists.mfn.org/mailman/listinfo/antisocial ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] New Laptop Polices
Greetings all, Given the new threats and the change in policy with the airlines and traveling in and around the UK, has anyone changed their laptop and portable computing device policy? We are being questioned about the safety of executives traveling with their laptops. Thank You, Michael Cullen Global Security, Universal Music Group 818286-5473 (w) | 818 919-6974 (c) UMG GSO Michael (aim) | UMG.GSO.Michael (gtalk) | [EMAIL PROTECTED] (msn) The information contained in this message may be privileged and confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that it is strictly prohibited (a) to disseminate, distribute or copy this communication or any of the information contained in it, or (b) to take any action based on the information in it. If you have received this communication in error, please notify us immediately by replying to the message and deleting it from your computer. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] RE: [WEB SECURITY] Top sites for Application security news
You should also check: http://www.cgisecurity.net http://www.webappsec.org http://www.watchfire.com/securityzone/default.aspx http://secunia.com/advisories/ Good Luck, Ory Segal Director of Security Research Watchfire (Israel) LTD. Tel: +972-9-9586077, Ext.236 Mobile: +972-54-7739359 e-mail: [EMAIL PROTECTED] -Original Message- From: KT [mailto:[EMAIL PROTECTED] Sent: Friday, August 11, 2006 7:12 AM To: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.uk Subject: [WEB SECURITY] Top sites for Application security news what are they? I am tasked with keeping up on application security news. Here are few I can think of, but I am sure there are more securityfocus.com owasp.org The Web Security Mailing List: http://www.webappsec.org/lists/websecurity/ The Web Security Mailing List Archives: http://www.webappsec.org/lists/websecurity/archive/ http://www.webappsec.org/rss/websecurity.rss [RSS Feed] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] New Laptop Polices
You mean the fact that you are *erquired* now to *check* your laptop along with your baggage? Take into account that most laptops aren't easy to remove the hard disk drives, and that most laptops of corporate and/or government executives contain either sensitive or classified information, I don't seriously think that the UK government, nor its corporations, have taken into consideration all of the consequences involved. Take for example the ongoing issues of laptops mysteriously disappearing (esp. the Veteran's Administration...I lost count, how many has it been, 5 times?) that contains spreadsheets and/or databases that contains *private* information. The UK needs to consider the implications about *how* they will cover the loss of financial, sensitive or classified information... Just my 2 cents worth, which by today's standards doesn't even get you a piece of gum any more...sad, isn't it? -r P.S. I think that corporations now need to state that corporate executives should NOT have corporate data on their hard disk drives; further locking down corporate assets. I think that they should make it easier for the removal of hard disk drives to be removed so they aren't stolen. - Original Message - From: Cullen, Michael [mailto:[EMAIL PROTECTED] To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] New Laptop Polices Greetings all, Given the new threats and the change in policy with the airlines and traveling in and around the UK, has anyone changed their laptop and portable computing device policy? We are being questioned about the safety of executives traveling with their laptops. Thank You, Michael Cullen Global Security, Universal Music Group 818 286-5473 (w) | 818 919-6974 (c) UMG GSO Michael (aim) | UMG.GSO.Michael (gtalk) | [EMAIL PROTECTED] (msn) The information contained in this message may be privileged and confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that it is strictly prohibited (a) to disseminate, distribute or copy this communication or any of the information contained in it, or (b) to take any action based on the information in it. If you have received this communication in error, please notify us immediately by replying to the message and deleting it from your computer. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] New Laptop Polices
Hello, Cullen, Michael wrote: Given the new threats and the change in policy with the airlines and traveling in and around the UK, has anyone changed their laptop and portable computing device policy? We are being questioned about the safety of executives traveling with their laptops. Last thing I heard was that the new policy was no electronics in hand luggage. I just had an idea for an interesting venture: At the airport, offer a service that takes laptops, creates an image, sends that image to the destination airport where it is put onto a new laptop that is then rented to the client. On return, do the same thing in the other direction. Couple with optional virus scanning for $5 extra. Pointy-haired bosses are going to love this. Simon signature.asc Description: OpenPGP digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] New Laptop Polices
Bob Radvanovsky wrote: You mean the fact that you are *erquired* now to *check* your laptop along with your baggage? Take into account that most laptops aren't easy to remove the hard disk drives, and that most laptops of corporate and/or government executives contain either sensitive or classified information, I don't seriously think that the UK government, nor its corporations, have taken into consideration all of the consequences involved. Take for example the ongoing issues of laptops mysteriously disappearing (esp. the Veteran's Administration...I lost count, how many has it been, 5 times?) that contains spreadsheets and/or databases that contains *private* information. You're confusing two things here. What one corporation and their policies concerning securing information have to do with his initial question is obsolete. I'm under the impression of his message he didn't mean the safety of his data. But in case he did then he needs a lot of reading to do going back in time to days of the rainbow series books. The UK needs to consider the implications about *how* they will cover the loss of financial, sensitive or classified information... I don't believe (again) this was his initial question, whether or not the officials in the airline industry give a rats rear of whether or not corporate/private data is secure. Just my 2 cents worth, which by today's standards doesn't even get you a piece of gum any more...sad, isn't it? -r P.S. I think that corporations now need to state that corporate executives should NOT have corporate data on their hard disk drives; further locking down corporate assets. I think that they should make it easier for the removal of hard disk drives to be removed so they aren't stolen. And you hope to accomplish this how? I can agree that data needs to be minimized but there are plenty of options available to completely lock down any laptop from the BIOS on up so I fail to see what you were truly hoping to state. J. Oquendo http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743 GPG Key ID 0x1383A743 Fingerprint: 7B02 28CF 24D3 ACA7 9907 789A 8772 7736 1383 A743 26:0608031813:J. Oquendo::fNaE6zH/HDTggYKS:005zLMj sil . infiltrated @ net http://www.infiltrated.net The happiness of society is the end of government. John Adams ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
RE: [Full-disclosure] New Laptop Polices
Why not just encrypt the laptop drives ?? There's plenty of options out there ... http://www.pointsec.com/ http://utimaco.com/ --=Q=-- -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of J. Oquendo Sent: Friday, August 11, 2006 12:37 PM To: Bob Radvanovsky Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] New Laptop Polices Bob Radvanovsky wrote: You mean the fact that you are *erquired* now to *check* your laptop along with your baggage? Take into account that most laptops aren't easy to remove the hard disk drives, and that most laptops of corporate and/or government executives contain either sensitive or classified information, I don't seriously think that the UK government, nor its corporations, have taken into consideration all of the consequences involved. Take for example the ongoing issues of laptops mysteriously disappearing (esp. the Veteran's Administration...I lost count, how many has it been, 5 times?) that contains spreadsheets and/or databases that contains *private* information. You're confusing two things here. What one corporation and their policies concerning securing information have to do with his initial question is obsolete. I'm under the impression of his message he didn't mean the safety of his data. But in case he did then he needs a lot of reading to do going back in time to days of the rainbow series books. The UK needs to consider the implications about *how* they will cover the loss of financial, sensitive or classified information... I don't believe (again) this was his initial question, whether or not the officials in the airline industry give a rats rear of whether or not corporate/private data is secure. Just my 2 cents worth, which by today's standards doesn't even get you a piece of gum any more...sad, isn't it? -r P.S. I think that corporations now need to state that corporate executives should NOT have corporate data on their hard disk drives; further locking down corporate assets. I think that they should make it easier for the removal of hard disk drives to be removed so they aren't stolen. And you hope to accomplish this how? I can agree that data needs to be minimized but there are plenty of options available to completely lock down any laptop from the BIOS on up so I fail to see what you were truly hoping to state. J. Oquendo http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743 GPG Key ID 0x1383A743 Fingerprint: 7B02 28CF 24D3 ACA7 9907 789A 8772 7736 1383 A743 26:0608031813:J. Oquendo::fNaE6zH/HDTggYKS:005zLMj sil . infiltrated @ net http://www.infiltrated.net The happiness of society is the end of government. John Adams ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
RE: [Full-disclosure] New Laptop Polices
If the data is encrypted on laptop that mitigates loss. If you have never heard of truecrypt (as one possibility that is free), go learn (and use!) now. However I fail to see the governments doing much to see that whatever gets checked through in fact GETS to the destination with the passenger, is un-rifled-through, un stolen-from, and in fact also GETS to the passenger again. Much better safety of the materials ought to be as high a priority as the interference. They need also to consider that for example piezoelectric quartz could be an igniter. Those bits are tiny (would be hard to see in sand). Probably scores or more of other ways to generate ignition are doable also. Detective work to keep attackers from getting on planes in the first place seems more effective. If instead of just taking things from people they would pack them and carry them on the plane (perhaps in a resistant box) and deliver back to passengers, the pain of finding you have some contraband du jour and must either lose it forever or not fly could be lessened. Such actions would go a rather long way to mitigate, in turn, the problems being caused for travellers. Glenn Everhart (speaking for myself) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Simon Richter Sent: Friday, August 11, 2006 12:34 PM To: Cullen, Michael Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] New Laptop Polices Hello, Cullen, Michael wrote: Given the new threats and the change in policy with the airlines and traveling in and around the UK, has anyone changed their laptop and portable computing device policy? We are being questioned about the safety of executives traveling with their laptops. Last thing I heard was that the new policy was no electronics in hand luggage. I just had an idea for an interesting venture: At the airport, offer a service that takes laptops, creates an image, sends that image to the destination airport where it is put onto a new laptop that is then rented to the client. On return, do the same thing in the other direction. Couple with optional virus scanning for $5 extra. Pointy-haired bosses are going to love this. Simon ** This communication is for informational purposes only. It is not intended as an offer or solicitation for the purchase or sale of any financial instrument or as an official confirmation of any transaction. All market prices, data and other information are not warranted as to completeness or accuracy and are subject to change without notice. Any comments or statements made herein do not necessarily reflect those of JPMorgan Chase Co., its subsidiaries and affiliates. This transmission may contain information that is privileged, confidential, legally privileged, and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or use of the information contained herein (including any reliance thereon) is STRICTLY PROHIBITED. Although this transmission and any attachments are believed to be free of any virus or other defect that might affect any computer system into which it is received and opened, it is the responsibility of the recipient to ensure that it is virus free and no responsibility is accepted by JPMorgan Chase Co., its subsidiaries and affiliates, as applicable, for any loss or damage arising in any way from its use. If you received this transmission in error, please immediately contact the sender and destroy the material in its entirety, whether in electronic or hard copy format. Thank you. ** ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] New Laptop Polices
I was always under the impression that BIOS security features could always be circumvented. See further comments below... -r - Original Message - From: J. Oquendo [mailto:[EMAIL PROTECTED] To: Bob Radvanovsky [mailto:[EMAIL PROTECTED] Cc: Cullen, Michael [mailto:[EMAIL PROTECTED], full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] New Laptop Polices Bob Radvanovsky wrote: You mean the fact that you are *erquired* now to *check* your laptop along with your baggage? Take into account that most laptops aren't easy to remove the hard disk drives, and that most laptops of corporate and/or government executives contain either sensitive or classified information, I don't seriously think that the UK government, nor its corporations, have taken into consideration all of the consequences involved. Take for example the ongoing issues of laptops mysteriously disappearing (esp. the Veteran's Administration...I lost count, how many has it been, 5 times?) that contains spreadsheets and/or databases that contains *private* information. You're confusing two things here. What one corporation and their policies concerning securing information have to do with his initial question is obsolete. I'm under the impression of his message he didn't mean the safety of his data. But in case he did then he needs a lot of reading to do going back in time to days of the rainbow series books. You may be right, but I was confused as to what his objectives were here, of which, one of the more important aspects should be data security, so this raises a *whole* can 'o worms. The UK needs to consider the implications about *how* they will cover the loss of financial, sensitive or classified information... I don't believe (again) this was his initial question, whether or not the officials in the airline industry give a rats rear of whether or not corporate/private data is secure. True, a moot point. Just my 2 cents worth, which by today's standards doesn't even get you a piece of gum any more...sad, isn't it? -r P.S. I think that corporations now need to state that corporate executives should NOT have corporate data on their hard disk drives; further locking down corporate assets. I think that they should make it easier for the removal of hard disk drives to be removed so they aren't stolen. And you hope to accomplish this how? I can agree that data needs to be minimized but there are plenty of options available to completely lock down any laptop from the BIOS on up so I fail to see what you were truly hoping to state. Actually, wasn't there a mention about a self-destructing DVD just recently? This would be worthwhile to investigate into, or the other idea about imaging the laptop in case it's stolen or damaged during transport. J. Oquendo http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743 GPG Key ID 0x1383A743 Fingerprint: 7B02 28CF 24D3 ACA7 9907 789A 8772 7736 1383 A743 26:0608031813:J. Oquendo::fNaE6zH/HDTggYKS:005zLMj sil . infiltrated @ net http://www.infiltrated.net The happiness of society is the end of government. John Adams ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] New Laptop Polices
On Fri, 11 Aug 2006 11:32:50 CDT, Bob Radvanovsky said: corporate assets. I think that they should make it easier for the removal of hard disk drives to be removed so they aren't stolen. OK, so you pull the hard drive - where do you *put* it? Remember, if it's packaged to be removable, it's going to look a lot like an MP3 player or some other thing-with-a-battery, and you end up having to check it. pgpAA8YUfowbi.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] New Laptop Polices
OK, so you pull the hard drive - where do you *put* it? Remember, if it's packaged to be removable, it's going to look a lot like an MP3 player or some other thing-with-a-battery, and you end up having to check it. Being as the original email came from an exec at Universal Music, I think the intent is to require airlines to 'rm -r *.mp3' to you before boarding with any electronic device ;) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] New Laptop Polices
We have done some storming on this issue. The issue is basically forked in terms of 1) Airline security 2) Data Security Wrt to item(1) , it is deemed to be possible that IATA will move to banning any electronic devices as carryon. This certainly is the way that other entities are looking into risk negation from a view point on airlines security. As someone mentioned, IATA gives a rats ass about your corporate data This leave us with the delimma of protecting localized dataon a Laptop, Blackberry. iPod and/or other hand held devices. Checked in luggage can easily be stolen. misplaced and/or HDD yanked out Corporate Policy changes are needed- its just a matter of time On 8/11/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: On Fri, 11 Aug 2006 11:32:50 CDT, Bob Radvanovsky said: corporate assets.I think that they should make it easier for the removal of hard disk drives to be removed so they aren't stolen.OK, so you pull the hard drive - where do you *put* it?Remember, if it'spackaged to be removable, it's going to look a lot like an MP3 player or some other thing-with-a-battery, and you end up having to check it.___Full-Disclosure - We believe in it.Charter: http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/-- http://peterdawson.typepad.comPeterDawson Home of ThoughtFlickr's This message is printed on Recycled Electrons. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] New Laptop Polices
Well, how about this : build a PXE type CD/DVD with all your business applications (you could automate a nightly build to keep antivirus, patches, etc current). Do folder redirection or similar to mount all user-specific bits from a USB thumb drive (itself an encrypted volume). Then your traveling salesman needs only the DVD and thumbdrive -- neither of which contain batteries. You could go one better and write a wrapper around the bootloader so that the contents of the CD/DVD (the O/S part, where you might have a corporate VPN client or something) are encrypted as well [in linux this would be easy .. in Windows I'm not so sure?] Personally, I'm worried about what happens when some wacky terrorist gets caught with a stick of Semtex in his keister... /mike. Peter Dawson wrote: We have done some storming on this issue. The issue is basically forked in terms of 1) Airline security 2) Data Security ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Re: [WEB SECURITY] Top sites for Application security news
searchappsecurity.com - Original Message From: KT [EMAIL PROTECTED]To: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.ukSent: Thursday, August 10, 2006 9:12:22 PMSubject: [WEB SECURITY] Top sites for Application security news what are they? I am tasked with keeping up on application security news.Here are few I can think of, but I am sure there are moresecurityfocus.comowasp.orgThe Web Security Mailing List: http://www.webappsec.org/lists/websecurity/The Web Security Mailing List Archives: http://www.webappsec.org/lists/websecurity/archive/http://www.webappsec.org/rss/websecurity.rss [RSS Feed] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] ScatterChat Advisory 2006-01: Cryptanalytic Attack Vulnerability
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ScatterChat Advisory 2006-01: Cryptanalytic Attack Vulnerability Technical Report CVE ID: CVE-2006-4021 August 11th, 2006 http://www.scatterchat.com/ SUMMARY ScatterChat (http://www.scatterchat.com/) is an instant messaging project that aims to provide encryption and anonymity support with Tor to non-technical users such as human rights activists and political dissidents. Steven Murdoch, a security researcher with the University of Cambridge, discovered a theoretical weakness in ScatterChat's cryptographic module. He found that an eavesdropper might locate patterns in a private communications channel if extraordinarily large amounts of messages were exchanged in a single conversation. Note that this does not allow an eavesdropper to decrypt messages, nor determine a user's identity if anonymity is used. The practical impact of this vulnerability is very low. DETAILS It was found that the birthday attack could be used against the custom padding mechanism on the ECB-mode encryption of messages. After 114KB of data is sent in a single conversation the probability of a collision between two 16-byte blocks is 1% and will reach 50% after 904KB, then 99% after 2.3MB (approximately). Note that conversations are reset when one or both peers sign off from the instant messaging service. The above figures are calculated assuming that messages do not contain any entropy, which is unrealistic for an instant messaging environment. Assuming a rate of one bit of entropy per character, the probability of a collision is 1% after 580KB is exchanged and will reach 50% after 4,822KB, then 99% after 12,431KB (approximately). Note that if each instant message was filled to its 500-byte capacity (as enforced by the system), then 580KB would be transfered after 1,188 messages. IMPACT The end-user impact of this issue is very low. It is important to note that this issue does NOT allow an eavesdropper to decrypt any messages, nor does it allow them to discover the user's identity if the anonymity feature is used. In general, this type of cryptanalytic attack allows an eavesdropper to determine patterns in an encrypted conversation, which in theory could yield information about messages if enough patterns were found and correlated. However, this issue only allows two 16-byte segments to be matched with 1% probability when at least 1,188 instant messages are exchanged in a single, uninterrupted session. In most cases, more than 1,188 instant messages would need to be sent. The information leaked in the above situation would be negligible. This issue also affects any application that is built upon ScatterChat's encryption module. Note that secure file transfers are not affected. SOLUTION The ScatterChat project takes both practical and theoretical vulnerabilities very seriously. However, due to the low impact of this vulnerability, and the high risk of introducing other subtle security problems in updating the protocol, this issue will not be fixed in the v1.0.x branch. This issue will be rectified in the v2.0 series, which will replace the current cryptographic module with the well-tested OTR encryption module (http://www.cypherpunks.ca/otr/). A release date for v2.0 is not yet known. Optionally, this issue can be mitigated through the use of the anonymity feature, as traffic analysis often requires a known context to make sense of patterns. Without the knowledge of who is communicating, an eavesdropper's attempts at interpreting patterns can be frustrated. ScatterChat v1.0.x remains safe to use in the overwhelming majority of cases. However, for high risk, non-technical users, i.e., users operating behind national firewalls, we recommend extra caution. ACKNOWLEDGEMENTS A special thanks goes out to Steven Murdoch for his professionalism in dealing with this matter. His web page can be found at: http://www.cl.cam.ac.uk/users/sjm217/ CONTACT J. Salvatore Testa II jtesta--at--hacktivismo--dot--com http://www.scatterchat.com/jtesta_2006.asc 3428 E58E 715E C37D 2AA7 C55E 97D1 DE8C 4B26 2B62 - A less technical summary of this advisory can be found at: http://www.scatterchat.com/advisories/2006-01_non_tech.html -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFE3H61l9HejEsmK2IRAsEtAJ9kX3PDigpPb+aaPWlfQ5IqwyskYgCgiKZ2 Kf0CYKzvc80KAKtBkT7zVgc= =335D -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!
Philosophil wrote: Why is this on the Full Disclosure mailing list? What does this have to do with Info Sec? I have to read through a *ton* of mailing lists every day and crap like this just wastes my time. And now you're wasting the rest of our time whining about it. What does your e-mail have to do with Full Disclosure? Hitting the delete button's quicker, you know. -bkfsec ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] rPSA-2006-0152-1 squirrelmail
rPath Security Advisory: 2006-0152-1 Published: 2006-08-11 Products: rPath Linux 1 Rating: Major Exposure Level Classification: User Deterministic Vulnerability Updated Versions: squirrelmail=/[EMAIL PROTECTED]:devel//1/1.4.6-2.2-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4019 https://issues.rpath.com/browse/RPL-577 http://www.squirrelmail.org/security/issue/2006-08-11 Description: Previous versions of the squirrelmail package contain a vulnerability exposure that allows authenticated users to read and write other users' preferences and attachments. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!
We should build a shrine for Joe Lieberman and bask in it's glory. He is probably the best politician of our generation.On 8/9/06, J.A. Terranson [EMAIL PROTECTED] wrote:(This was sent in reponse to a mass email sent out by Joe - even though me and him have had nothing to do with each other for a *long*, LONG, time.---Joe -If you check your records, you'll see that I contributed to your campaign (last time) at the same rate I gave to the Lamont campaign *this* time[about $1,500.00].My change of heart wasn't brought about by your support of the AngryMidget in the White House.It wasn't a result of your support of many Republican policies and positions.I didn't dump you because of *any*of your political positions.I left you because you left us first!Joe Lieberman hasn't been a supporter of the State of Connecticut for several years now - unfortunately, Joe has been supporting ONLY Joehimself.Lieberman for Lieberman through thick and thin.Your currentplan to run as an independent, rather that the honorable thing (support the fairly elected candidate, just like YOU were DEMANDING just a fewshort months ago) is a great illustration of this point.Frankly Joe, you've become disgusting.An overgrown self-centered child,who's sole interest is to loook out for your own fat and greasy hide. How do you sleep at night?How does Hadassah sleep by your side?Thestench of hypocrisy is thick by your feet.I urge you to rethink this ill advised plan to turn your back on what youclaim has been decades of loyalty to both the constituency and the Democratic party: there is still time to accept your current situation andto stand up as an honorable man - supporting your family, party, andconstituency.With respect for the Joe Lieberman I used to support, I am, sincerely yours -Alif Terranson___Antisocial mailing list[EMAIL PROTECTED] http://lists.mfn.org/mailman/listinfo/antisocial___Full-Disclosure - We believe in it.Charter: http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/-- -- h0 h0 h0 -- www.nopsled.net ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] New Laptop Polices
LA time is reporting If you're going international, stash your laptop; US airports are banning carry-on electronics for overseas flights !! On 8/11/06, Jeremy Bishop [EMAIL PROTECTED] wrote: On Friday 11 August 2006 10:54, Michael Holstein wrote: Then your traveling salesman needs only the DVD and thumbdrive -- neither of which contain batteries.Aside from the piezoelectric quartz earrings, it's only a matter of timebefore someone in DHS discovers static electricity.(Actually, Idecided to rely on USB + knoppix for my last trip, so it's perfectly feasible for when you want an expendable solution.) Personally, I'm worried about what happens when some wacky terrorist gets caught with a stick of Semtex in his keister...Bend over sir; it's for America. Jeremy--Andrea: Unhappy the land that has no heroes.Galileo: No, unhappy the land that needs heroes. -- Bertolt Brecht, Life of Galileo___ Full-Disclosure - We believe in it.Charter: http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/-- http://peterdawson.typepad.comPeterDawson Home of ThoughtFlickr's This message is printed on Recycled Electrons. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Re: [WEB SECURITY] Top sites for Application security news
Some (web) security blogs/sites I like: http://ha.ckers.org/ - in my opinion this is (by far) the best web security related blog. RSnake rocks! http://isc.sans.org/ - security news, latest stuff http://netsec.blogspot.com/ - latest links http://blog.washingtonpost.com/securityfix/ - very informative. Brian Krebs is a very good reporter. Sometimes, you can find here exclusive information. http://blogs.securiteam.com/ - funny http://www.darknet.org.uk/ - informative KT wrote: what are they? I am tasked with keeping up on application security news. Here are few I can think of, but I am sure there are more securityfocus.com owasp.org The Web Security Mailing List: http://www.webappsec.org/lists/websecurity/ The Web Security Mailing List Archives: http://www.webappsec.org/lists/websecurity/archive/ http://www.webappsec.org/rss/websecurity.rss [RSS Feed] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] RSA tokens.
FYI, I have just received news that SecurID tokens are not permitted in carry-on on red (which apparently means via the UK) flights. Nor, apparently, are the electronic keyfobs for luxury cars. I sure feel safer. -- The problem with defending the purity of the English language is that English is about as pure as a cribhouse whore. We don't just borrow words; on occasion, English has pursued other languages down alleyways to beat them unconscious and rifle their pockets for new vocabulary. - James D. Nicoll ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!
What a maroon http://www.google.com/search?hl=enq=%22Alif+Terranson%22btnG=Google+Search -- Original message -- From: evilrabbi [EMAIL PROTECTED] We should build a shrine for Joe Lieberman and bask in it's glory. He is probably the best politician of our generation. On 8/9/06, J.A. Terranson [EMAIL PROTECTED] wrote: (This was sent in reponse to a mass email sent out by Joe - even though me and him have had nothing to do with each other for a *long*, LONG, time.---Joe -If you check your records, you'll see that I contributed to your campaign (last time) at the same rate I gave to the Lamont campaign *this* time[about $1,500.00].My change of heart wasn't brought about by your support of the AngryMidget in the White House.It wasn't a result of your support of many Republican policies and positions.I didn't "dump" you because of *any*of your political positions.I left you because you left us first!Joe Lieberman hasn't been a supporter of the State of Connecticut for several years now - unf ortuna tely, Joe has been supporting ONLY Joehimself.Lieberman for Lieberman through thick and thin.Your currentplan to run as an independent, rather that the honorable thing (support the fairly elected candidate, just like YOU were DEMANDING just a fewshort months ago) is a great illustration of this point.Frankly Joe, you've become disgusting.An overgrown self-centered child,who's sole interest is to loook out for your own fat and greasy hide. How do you sleep at night?How does Hadassah sleep by your side?Thestench of hypocrisy is thick by your feet.I urge you to rethink this ill advised plan to turn your back on what youclaim has been decades of loyalty to both the constituency and the Democratic party: there is still time to accept your current situation andto stand up as an honorable man - supporting your family, party, andconstituency.With respect for t he Joe Lieberman I used to support, I am, sincerely yours -Alif Terranson___Antisocial mailing list[EMAIL PROTECTED]http://lists.mfn.org/mailman/listinfo/antisocial___Full-Disclosure - We believe in it.Charter: http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/-- -- h0 h0 h0 --www.nopsled.net ---BeginMessage--- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/---End Message--- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!
ACK that !! :)- On 8/11/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: What a maroon http://www.google.com/search?hl=enq=%22Alif+Terranson%22btnG=Google+Search -- http://peterdawson.typepad.com PeterDawson Home of ThoughtFlickr's This message is printed on Recycled Electrons. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!
On 8/11/06, Peter Dawson [EMAIL PROTECTED] wrote: ACK that !! :)- On 8/11/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: What a maroon http://www.google.com/search?hl=enq=%22Alif+Terranson%22btnG=Google+Search from the listed google search, 1st hit Alif Terranson, a former Savvis employee who was responsible for keeping the network clean, objected to the spammers and wrote a 200-page report detailing his complaints about the spammers. He told the BBC: One of the Vice Presidents told me, 'Take no action against any Cable wireless customer - they are profitable and they are off limits.' He was talking specifically about that 200-page report which at the time was 95 spammers. When I left Savvis in April it was almost 100, today it is 148. In my opinion there's no way they could go and add 60 spammers to their service without actively looking for that business, he said. Mr Terranson went to Steve Linford, who runs the Spamhaus block list from a small house boat on the River Thames near London. Spam king Around the world 260 million users are protected from spam by the Spamhaus block list, which identifies where spam is coming from. In three long conversations with Savvis executives last Friday, Mr Linford persuaded them to ditch its spamming clients after threatening to block all Savvis e-mails, making it very difficult for them to communicate with the outside world - Yeah, that sounds like a maroon who cares more about the net than his paycheck. I doubt you have that much honor. -JPwho thinks razzing on lieberman is better than [EMAIL PROTECTED] anyday ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Re: [WEB SECURITY] Top sites for Application security news
On 8/11/06, root [EMAIL PROTECTED] wrote: Some (web) security blogs/sites I like: http://ha.ckers.org/ - in my opinion this is (by far) the best web security related blog. RSnake rocks! http://isc.sans.org/ - security news, latest stuff http://netsec.blogspot.com/ - latest links http://blog.washingtonpost.com/securityfix/ - very informative. Brian Krebs is a very good reporter. Sometimes, you can find here exclusive information. http://blogs.securiteam.com/ - funny http://www.darknet.org.uk/ - informative Dont forget my fav: http://security.microsoft.com/ -JP ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Re: [WEB SECURITY] Top sites for Application security news
...andhttp://metasploit.blogspot.comhttp://www.liquidmatrix.org/blog/ http://blogs.zdnet.com/threatchaos/http://www.cultdeadcow.com/cms/main.php3-sbDude VanWinkle wrote: On 8/11/06, root [EMAIL PROTECTED] wrote: Some (web) security blogs/sites I like: http://ha.ckers.org/ - in my opinion this is (by far) the best web security related blog. RSnake rocks! http://isc.sans.org/ - security news, latest stuff http://netsec.blogspot.com/ - latest links http://blog.washingtonpost.com/securityfix/ - very informative. Brian Krebs is a very good reporter. Sometimes, you can find here exclusive information. http://blogs.securiteam.com/ - funny http://www.darknet.org.uk/ - informative Dont forget my fav: http://security.microsoft.com/ -JP ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/