Re: [Full-disclosure] Cirque du 0day HIJACKED!!!

2008-04-26 Thread Micheal Chatner
Don't play coy to me and don't give me no sass. I told you once and
I'll tell you again, don't fuck with me cause i'm bad. You don't want
to know the world of pain you're stepping into you autistic dracula
lookin motherfucker.

Stealing my motherfucking CFP? Guess what, asshole. I was one of the
earliest hackers in the 1980s. I KNEW Kevin Mitnick. Phone Phreaking
is as secondary to me as skullfucking your daughter. I'm going to keep
calling your house, OVER AND OVER, and the phone company will NEVER be
able to trace the call.

You're going down.




 On Fri, Apr 25, 2008 at 4:49 PM, I)ruid [EMAIL PROTECTED] wrote:

 
  On Thu, 2008-04-24 at 14:40 -0700, Andrew A wrote:
   Stop lying to everyone. Caughq.org got owned and rm'd. Looks like
   Michael Chatner is a more fitting individual to run the Cirque than
   you, buddy.
 
  Rght... that's why when I put a new power supply in it this morning
  it booted with it's filesystem intact, right? (:
 
  --
  I)ruid, C²ISSP
  [EMAIL PROTECTED]
  http://druid.caughq.org
 



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Could n3td3v win a Pwnie award?

2008-04-26 Thread G. D. Fuego
On Fri, Apr 25, 2008 at 10:48 PM, n3td3v [EMAIL PROTECTED] wrote:


 David, your research was responsible for the SQL Slammer Worm... but
 that makes you elite doesn't it, not a black hat.

 No wonder the UK security service is interested in you, but I wouldn't
 call it an achievement, that calls you irresponsible in my view.


David is responsible for the Slammer worm because he discovered the
vulnerability that it used?

Personally I would have placed the blame on either Microsoft's bad
development processes which allowed these types of bugs to be released
undiscovered.  In fact, after Slammer and Code Red worms, Microsoft
implemented a Security Development Lifecycle in order to prevent these types
of bugs going forward.

Or perhaps place the blame on Systems administrators who installed Microsoft
SQL server exposed to the Internet on so many systems, and failed to patch
them in the 6 months after the vulnerability was discovered.

Or perhaps blame the worm writer who turned a vulnerability into code that
made such a large impact on the net.

In fact, if Security Researchers are to blame for any bad uses of the
vulnerabilities they discovered then what are you doing here?  Why should
ANYONE want to take part in your vulnerability notification day if you
believe that the UK Security Service should be tracking these people.
Considering you claim to be so close to them, wouldn't that just be
registering with that agency?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Cirque du 0day HIJACKED!!!

2008-04-26 Thread Razi Shaban
*gets popcorn*

--
Razi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Could n3td3v win a Pwnie award?

2008-04-26 Thread wishi
G. D. Fuego schrieb:

 
 In fact, if Security Researchers are to blame for any bad uses of the
 vulnerabilities they discovered then what are you doing here?  

AND:

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


I thought exactly the same. Security is a process. If someone doesn't
understand, that it's better to know the vulnerabilities to defend, he
didn't understand it.

It's hard to protect yourself if you don't know what you're up
against. (Ed Felton)

I'd say: nominate the nominator!

Greetings,
wishi

---__-
wishinet.blogspot.com
just wishi - does Netninpo

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Could n3td3v win a Pwnie award?

2008-04-26 Thread wishi
G. D. Fuego schrieb:

 
 In fact, if Security Researchers are to blame for any bad uses of the
 vulnerabilities they discovered then what are you doing here?  

AND:

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


I thought exactly the same. Security is a process. If someone doesn't
understand, that it's better to know the vulnerabilities to defend, he
didn't understand it.

It's hard to protect yourself if you don't know what you're up
against. (Ed Felton)

I'd say: nominate the nominator!

Greetings,
wishi

---__-
wishinet.blogspot.com
just wishi - does Netninpo


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Could n3td3v win a Pwnie award?

2008-04-26 Thread wishi
n3td3v schrieb:

 David, your research was responsible for the SQL Slammer Worm... but
 that makes you elite doesn't it, not a black hat.
 
 No wonder the UK security service is interested in you, but I wouldn't
 call it an achievement, that calls you irresponsible in my view.

Never read such stupid comments here before :). You want this award, 
don't you? You seem to be qualified.


 He is a regular speaker at a number of computer security conferences
 and has delivered lectures to the National Security Agency, the UK's
 Security Service, GCHQ and the Bundesamt für Sicherheit in der
 Informationstechnik in Germany. David is a CHECK team leader and holds
 SC clearance.
 
 http://www.davidlitchfield.com/
 


Yes... I'd create a PWNIE for the best nomination to PWN.


Greetings,
wishi

---__-
wishinet.blogspot.com
just wishi - does Netninpo

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Could n3td3v win a Pwnie award?

2008-04-26 Thread wishi
n3td3v schrieb:

 David, your research was responsible for the SQL Slammer Worm... but
 that makes you elite doesn't it, not a black hat.
 
 No wonder the UK security service is interested in you, but I wouldn't
 call it an achievement, that calls you irresponsible in my view.

Never read such stupid comments here before :). You want this award, 
don't you? You seem to be qualified.


 He is a regular speaker at a number of computer security conferences
 and has delivered lectures to the National Security Agency, the UK's
 Security Service, GCHQ and the Bundesamt für Sicherheit in der
 Informationstechnik in Germany. David is a CHECK team leader and holds
 SC clearance.
 
 http://www.davidlitchfield.com/
 


Yes... I'd create a PWNIE for the best nomination to PWN.


Greetings,
wishi

---__-
wishinet.blogspot.com
just wishi - does Netninpo

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Could n3td3v win a Pwnie award?

2008-04-26 Thread Ferdinand Klinzer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

LoL

i think you mail client is fucked up!

cheers

Ferdinand

Am 26.04.2008 um 18:01 schrieb wishi:

 n3td3v schrieb:

 David, your research was responsible for the SQL Slammer Worm... but
 that makes you elite doesn't it, not a black hat.

 No wonder the UK security service is interested in you, but I  
 wouldn't
 call it an achievement, that calls you irresponsible in my view.

 Never read such stupid comments here before :). You want this award,
 don't you? You seem to be qualified.


 He is a regular speaker at a number of computer security conferences
 and has delivered lectures to the National Security Agency, the UK's
 Security Service, GCHQ and the Bundesamt für Sicherheit in der
 Informationstechnik in Germany. David is a CHECK team leader and  
 holds
 SC clearance.

 http://www.davidlitchfield.com/



 Yes... I'd create a PWNIE for the best nomination to PWN.


 Greetings,
 wishi

 ---__-
 wishinet.blogspot.com
 just wishi - does Netninpo

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (Darwin)

iD8DBQFIE2iZivpgT1glX4cRAlSkAJ9axiQkwcoJItpCstsY6J7vmIjlaACdHD6Z
x2paV/uoCfiVfKD+7OSYo7c=
=BllU
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Cirque du 0day HIJACKED!!!

2008-04-26 Thread reepex
you reply to everyone else but skip my email about your botnet? I guess that
means its up and running well?

On Fri, Apr 25, 2008 at 6:49 PM, I)ruid [EMAIL PROTECTED] wrote:

 On Thu, 2008-04-24 at 14:40 -0700, Andrew A wrote:
  Stop lying to everyone. Caughq.org got owned and rm'd. Looks like
  Michael Chatner is a more fitting individual to run the Cirque than
  you, buddy.

 Rght... that's why when I put a new power supply in it this morning
 it booted with it's filesystem intact, right? (:

 --
 I)ruid, C²ISSP
 [EMAIL PROTECTED]
 http://druid.caughq.org

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Fwd: Re: Could n3td3v win a Pwni e award?

2008-04-26 Thread wishi
Yes man, sorry for this.
 
That was no Spam attack, but a crazy smtpd - that rejected but sent. It's
fixed now.
I think every software contains it's own WTF experiences. That's one of
those ;)


 Original Message 
Subject: Re: [Full-disclosure] Could n3td3v win a Pwnie award?
Date: Sat, 26 Apr 2008 19:38:32 +0200
From: Ferdinand Klinzer [EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

LoL

i think you mail client is fucked up!

cheers

Ferdinand

Am 26.04.2008 um 18:01 schrieb wishi:

 n3td3v schrieb:

 David, your research was responsible for the SQL Slammer Worm... but
 that makes you elite doesn't it, not a black hat.

 No wonder the UK security service is interested in you, but I  
 wouldn't
 call it an achievement, that calls you irresponsible in my view.

 Never read such stupid comments here before :). You want this award,
 don't you? You seem to be qualified.


 He is a regular speaker at a number of computer security conferences
 and has delivered lectures to the National Security Agency, the UK's
 Security Service, GCHQ and the Bundesamt für Sicherheit in der
 Informationstechnik in Germany. David is a CHECK team leader and  
 holds
 SC clearance.

 http://www.davidlitchfield.com/



 Yes... I'd create a PWNIE for the best nomination to PWN.


 Greetings,
 wishi

 ---__-
 wishinet.blogspot.com
 just wishi - does Netninpo

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (Darwin)

iD8DBQFIE2iZivpgT1glX4cRAlSkAJ9axiQkwcoJItpCstsY6J7vmIjlaACdHD6Z
x2paV/uoCfiVfKD+7OSYo7c=
=BllU
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Its time to take rick rolling seriously

2008-04-26 Thread Razi Shaban
Actually, yes.

I made a video about something similar the other day, you can find it at:

http://www.youtube.com/watch?v=Yu_moia-oVI

It elaborates on a few of your ideas, but refutes some others.

--
Razi

On 4/26/08, n3td3v [EMAIL PROTECTED] wrote:
 -- Forwarded message --
  From: n3td3v [EMAIL PROTECTED]
  Date: Sat, Apr 5, 2008 at 2:17 AM
  Subject: Its time to take rick rolling seriously
  To: n3td3v [EMAIL PROTECTED]


  We need a big list of all the rick roll URL's, so we can protect the
   public against it.

   Network operators need a list of rick roll URL's to add to the block list.

   Can someone harvest all the rick roll URL's and post them as one list
   for folks to copypaste into their block lists?

   Some of the rick rolls don't go to Youtube, some of them are
   sophisticated javascript that we need to clampdown on, so not to waste
   productivity and resources on these sites getting executed
   accidentally.

   If you don't think this is a security issue, its time to wake up.

   RICK ROLLING HIGHLIGHTS THE EASE OF PHISHING ATTACKS

   If you look at how many hits the Youtube rick roll got alone, then
   that goes someway in showing your average joe how easy it is to
   compromise folks through phishing.

   Sure, it looks harmless enough, but the bottom like is, the Youtube
   link (don't click) http://youtube.com/watch?v=eBGIQ7ZuuiU has
   generated upto  9,290,352 views in only a few months since the craze
   took off via mostly social bookmarking sites such as Digg, Reddit.

   Those could easily equal into 9,290,352 malicious phishes, 9,290,352
   credit cards and 9,290,352 identity frauds.

   Now, what happens if the cyber criminals catch onto the rick roll and
   start cyber rolling everyone with malicious code or links to a
   forged banking site, then that's really going to be bad.

   So who is keeping track of rick rolling, so it doesn't turn into a
   cyber roll where folks get compromised?

   The media and others should use the rick rolling as a wake up call as
   to how easy it is for folks to be fooled, and if its just rick ashley
   this time, it might be more than never gonna give you up next time,
   because it could be your cyber security and bank info you're giving up
   in the future, so i'm calling on network security professionals and
   the media to use rick rolling as a highlight case of the dangers posed
   by social engineering and phishing by hackers, which can ultimately
   lead to data loss and disaster. rick rolling should be used to
   highlight awareness of the threat posed by link-based-phishing towards
   your everyday average single mom, retired couple or the 9,290,352
   folks who have to date been rick rolled, who are the next
   potentially phished.

   And, not all, rick rolling could be used be an attacker to see how
   gullible his target is to links, before carrying out a full on
   phishing attack, so there are many issues here with rick rolling which
   the security community may not have grasped up till now.

   If you think its stupid, 9,290,352 were and thats alarming says n3td3v.

   There are stupid people out there and rick rolling could be an easy
   way to find the stupid people before your ultimate attack.

   Carry on the uses of rick rolling below this e-mail by cyber attackers
   and the indications its giving out to folks on how easy phishing and
   socialing engineering really is on the internet today.

   I see a new craze of cyber rolling coming which hackers can exploit
   and i'm not sure if I like it very much, its fun and games at the
   moment, but just wait to the hackers catch on and things develop with
   the rick roll trend.

   I'm worried, are you?

   All the best,

   n3td3v

  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Could n3td3v win a Pwnie award?

2008-04-26 Thread Joey Mengele
wishi,

On Sat, 26 Apr 2008 12:19:46 -0400 wishi [EMAIL PROTECTED] 
wrote:


I thought exactly the same. Security is a process. If someone 
doesn't
understand, that it's better to know the vulnerabilities to 
defend, he
didn't understand it.


I think you have this mixed up. Security a destination, not a 
process.

J

--
Hotel pics, info and virtual tours.  Click here to book a hotel online.
http://tagline.hushmail.com/fc/Ioyw6h4eRCkobHLuhyV8XnOy1Ppjn6yp7M4ga0qmkoxDr5kJKim3dG/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Could n3td3v win a Pwnie award?

2008-04-26 Thread G. D. Fuego
On Sat, Apr 26, 2008 at 10:32 PM, Joey Mengele [EMAIL PROTECTED]
wrote:

 wishi,

 On Sat, 26 Apr 2008 12:19:46 -0400 wishi [EMAIL PROTECTED]
 wrote:

 
 I thought exactly the same. Security is a process. If someone
 doesn't
 understand, that it's better to know the vulnerabilities to
 defend, he
 didn't understand it.
 

 I think you have this mixed up. Security a destination, not a
 process.


If that was true then the system you secure today would be safe untouched a
year from now or the year after that.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Could n3td3v win a Pwnie award?

2008-04-26 Thread Micheal Cottingham
Indeed. There is no such thing as secure. Security is a process, one
that never ends. If it did, many of us would be out of a job. ;)

On Sun, Apr 27, 2008 at 12:01 AM, G. D. Fuego [EMAIL PROTECTED] wrote:



 On Sat, Apr 26, 2008 at 10:32 PM, Joey Mengele [EMAIL PROTECTED]
 wrote:
  wishi,
 
  On Sat, 26 Apr 2008 12:19:46 -0400 wishi [EMAIL PROTECTED]
  wrote:
 
 
  
  I thought exactly the same. Security is a process. If someone
  doesn't
  understand, that it's better to know the vulnerabilities to
  defend, he
  didn't understand it.
  
 
  I think you have this mixed up. Security a destination, not a
  process.
 
 

 If that was true then the system you secure today would be safe untouched a
 year from now or the year after that.

 ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Could n3td3v win a Pwnie award?

2008-04-26 Thread reepex
at least you wouldn't have to remove trojans and tracking cookies off your
customer's machines then

On Sat, Apr 26, 2008 at 11:39 PM, Micheal Cottingham 
[EMAIL PROTECTED] wrote:

 Indeed. There is no such thing as secure. Security is a process, one
 that never ends. If it did, many of us would be out of a job. ;)

 On Sun, Apr 27, 2008 at 12:01 AM, G. D. Fuego [EMAIL PROTECTED] wrote:
 
 
 
  On Sat, Apr 26, 2008 at 10:32 PM, Joey Mengele 
 [EMAIL PROTECTED]
  wrote:
   wishi,
  
   On Sat, 26 Apr 2008 12:19:46 -0400 wishi [EMAIL PROTECTED]
   wrote:
  
  
   
   I thought exactly the same. Security is a process. If someone
   doesn't
   understand, that it's better to know the vulnerabilities to
   defend, he
   didn't understand it.
   
  
   I think you have this mixed up. Security a destination, not a
   process.
  
  
 
  If that was true then the system you secure today would be safe
 untouched a
  year from now or the year after that.
 
  ___
   Full-Disclosure - We believe in it.
   Charter: http://lists.grok.org.uk/full-disclosure-charter.html
   Hosted and sponsored by Secunia - http://secunia.com/
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/