[Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!

2009-07-20 Thread Ant-Sec Movement
Dear Reader,
In 48 hours, the anti-sec movement will publicly unveil working exploit code
and full details for the zero-day OpenSSH vulnerability we discovered. It
will be posted to the Full-Disclosure security list.

Soon, the very foundations of Information Technology and Information
Security will be unearthed as millions upon million of systems running ANY
version of OpenSSH are compromised by wave after wave of script-kiddie and
malicious hacker.

Within 10 hours of the initial release of the OpenSSH 0-day exploit code,
anti-sec will be unleashing powerful computer worm source code with the
ability to auotmatically find and compromise systems running any and all
versions of OpenSSH.

This is an attack against all White Hat Hackers who think that running a
Penetration Test simply searching for known vulnerabilities is all they have
to do in order to receive their payment. Anti-sec will savor the moment when
White Hat Hackers are made to look like fools in the eyes of their clients.

Sincerely,

-anti-sec
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!

2009-07-20 Thread Gichuki John Chuksjonia
hahaha, now u r releasing it

I thought u guyz dont release or disclose vulnerabilities.

./Chuks

On 7/20/09, Ant-Sec Movement anti.sec.movem...@gmail.com wrote:
 Dear Reader,
 In 48 hours, the anti-sec movement will publicly unveil working exploit code
 and full details for the zero-day OpenSSH vulnerability we discovered. It
 will be posted to the Full-Disclosure security list.

 Soon, the very foundations of Information Technology and Information
 Security will be unearthed as millions upon million of systems running ANY
 version of OpenSSH are compromised by wave after wave of script-kiddie and
 malicious hacker.

 Within 10 hours of the initial release of the OpenSSH 0-day exploit code,
 anti-sec will be unleashing powerful computer worm source code with the
 ability to auotmatically find and compromise systems running any and all
 versions of OpenSSH.

 This is an attack against all White Hat Hackers who think that running a
 Penetration Test simply searching for known vulnerabilities is all they have
 to do in order to receive their payment. Anti-sec will savor the moment when
 White Hat Hackers are made to look like fools in the eyes of their clients.

 Sincerely,

 -anti-sec



-- 
-- 
Gichuki John Ndirangu,
I.T Security Analyst and Penetration Tester
infosig...@inbox.com

{FORUM}http://lists.my.co.ke/pipermail/security/
http://nspkenya.blogspot.com/
http://chuksjonia.blogspot.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] n3td3v making ass of himself on twitter

2009-07-20 Thread Charles Majola
Reminds me of that song from collegehumor.com We didn't start the flamewar

First post...

Fucking gay...

Second post...

Go away

snip

All  of you can suck my dick!!! 8D


heheheh, good times


On Sat, Jul 18, 2009 at 12:22 AM, ghostgho...@gmail.com wrote:
 Feel free to shut the fuck up, because no one cares about YOU or
 NETDEV. You're current posts polluting this list is just as bad as
 anything he has ever posted. MATCHING WITS WITH A RETARD IS NOT NEWS
 WORTHY.


 On Fri, Jul 17, 2009 at 2:30 PM, Ureleeturel...@gmail.com wrote:
 lol.  u r such an idiot.

 i call u a kid because u r much younger than i.  thats y ur a kid.  o,
 and cause u live @ home w/ ur mom and make false accusations all day
 on the twitter.

 why did i say what i said?  cause u do it all day on twitter, make
 false accusations, and lie.  i gave u a dose of ur own medicine.  not
 very nice is it?

 i dont know if u r ant sec, i dont know if ur anti-sec, i dont know if
 u r hdmoore, i dont know you from adam.  i still STILL dont care
 either.

 n3td3v isnt a group.  n3td3v is ur name, ur online name.  the fact
 that u have a group with 10 people on it that like u, and 3950 more
 that watch u to see how much u make a full of yourself is hilarious.
 you are a self-righteous troll who talks about himself in the 3rd
 person and is so stuck up his own ass that you had to give your group
 ur own name.  u conceited wh0re.

 u dont have a career, no one cares about ur life, and your reputation
 is shot to hell.  ur targeted because u target others.  u are being
 smeared because u smear others.  like i always have, i call u out
 about ur lies.

 am i stalking u on twitter?  nope, u invited me. you dumbazz.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Anti-Sec - We're not really Anti-Sec! Sorry Hackforums. It was all a big joke by anonymous!

2009-07-20 Thread Charles Majola
*gay voice* I'm stunned

On Thu, Jul 16, 2009 at 11:37 PM, Ronny Lawsonronnylaw...@gmail.com wrote:
 Gee, we didn't see that coming or anything.


 On Jul 16, 2009, at 2:32 PM, Ant-Sec Movement wrote:

 Yes, that's right, we're not really Anti-Sec.

 We have no 0-day exploits.

 We did not hack ImageShack or Blackhat-forums or Astalavista. That
 was the real Anti-Sec whomever they are.

 It was all a big joke.

 But our goal was achieved.

 We caused a huge stir on Hackforums.net. We've made them look like
 utter fools.

 Geez, some of them are like Let's go to the authorities! Mummy and
 Daddy I wanna go to authorities because my hacking forum has been
 threatened. What a bunch of wimps. You're on a hacking website.
 You've gotta expect these things. It's all part of the deal.

 We've proved one thing...none of you on Hackforums.net should be
 there...not even Jesse Labrocca. He should spend more time with his
 family rather then worry about a silly little hacking forum. Or
 maybe spend more time on your money-making business. Silly person.

 Sincerely,

 Anonymous People
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!

2009-07-20 Thread Ben Greenfield
Are people viewing this as a credible threat, or just FUD?

This claim that ANTI-SEC has a 0-day remote exploit for OpenSSH
spanning multiple versions is consistent with the logs that have been
released documenting these attacks.

Many people seem to have written those off as brute force attacks, but
as far as I'm concerned the jury is still out.



On Mon, Jul 20, 2009 at 2:52 AM, Gichuki John
Chuksjoniachuksjo...@gmail.com wrote:
 hahaha, now u r releasing it

 I thought u guyz dont release or disclose vulnerabilities.

 ./Chuks

 On 7/20/09, Ant-Sec Movement anti.sec.movem...@gmail.com wrote:
 Dear Reader,
 In 48 hours, the anti-sec movement will publicly unveil working exploit code
 and full details for the zero-day OpenSSH vulnerability we discovered. It
 will be posted to the Full-Disclosure security list.

 Soon, the very foundations of Information Technology and Information
 Security will be unearthed as millions upon million of systems running ANY
 version of OpenSSH are compromised by wave after wave of script-kiddie and
 malicious hacker.

 Within 10 hours of the initial release of the OpenSSH 0-day exploit code,
 anti-sec will be unleashing powerful computer worm source code with the
 ability to auotmatically find and compromise systems running any and all
 versions of OpenSSH.

 This is an attack against all White Hat Hackers who think that running a
 Penetration Test simply searching for known vulnerabilities is all they have
 to do in order to receive their payment. Anti-sec will savor the moment when
 White Hat Hackers are made to look like fools in the eyes of their clients.

 Sincerely,

 -anti-sec



 --
 --
 Gichuki John Ndirangu,
 I.T Security Analyst and Penetration Tester
 infosig...@inbox.com

 {FORUM}http://lists.my.co.ke/pipermail/security/
 http://nspkenya.blogspot.com/
 http://chuksjonia.blogspot.com/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!

2009-07-20 Thread Charles Majola
FUD as it seems to be synonymous with FTW these days.

Stupid kids, they are all alike.

On Mon, Jul 20, 2009 at 3:51 PM, Ben Greenfieldb...@struxural.com wrote:
 Are people viewing this as a credible threat, or just FUD?

 This claim that ANTI-SEC has a 0-day remote exploit for OpenSSH
 spanning multiple versions is consistent with the logs that have been
 released documenting these attacks.

 Many people seem to have written those off as brute force attacks, but
 as far as I'm concerned the jury is still out.



 On Mon, Jul 20, 2009 at 2:52 AM, Gichuki John
 Chuksjoniachuksjo...@gmail.com wrote:
 hahaha, now u r releasing it

 I thought u guyz dont release or disclose vulnerabilities.

 ./Chuks

 On 7/20/09, Ant-Sec Movement anti.sec.movem...@gmail.com wrote:
 Dear Reader,
 In 48 hours, the anti-sec movement will publicly unveil working exploit code
 and full details for the zero-day OpenSSH vulnerability we discovered. It
 will be posted to the Full-Disclosure security list.

 Soon, the very foundations of Information Technology and Information
 Security will be unearthed as millions upon million of systems running ANY
 version of OpenSSH are compromised by wave after wave of script-kiddie and
 malicious hacker.

 Within 10 hours of the initial release of the OpenSSH 0-day exploit code,
 anti-sec will be unleashing powerful computer worm source code with the
 ability to auotmatically find and compromise systems running any and all
 versions of OpenSSH.

 This is an attack against all White Hat Hackers who think that running a
 Penetration Test simply searching for known vulnerabilities is all they have
 to do in order to receive their payment. Anti-sec will savor the moment when
 White Hat Hackers are made to look like fools in the eyes of their clients.

 Sincerely,

 -anti-sec



 --
 --
 Gichuki John Ndirangu,
 I.T Security Analyst and Penetration Tester
 infosig...@inbox.com

 {FORUM}http://lists.my.co.ke/pipermail/security/
 http://nspkenya.blogspot.com/
 http://chuksjonia.blogspot.com/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!

2009-07-20 Thread BlackHawk
wasn't anti-sec the one fighting against guys who share exploits with
the world so script kiddies use them?
lol, now those guys will kill them selfs!

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [USN-805-1] Ruby vulnerabilities

2009-07-20 Thread Marc Deslauriers
===
Ubuntu Security Notice USN-805-1  July 20, 2009
ruby1.8, ruby1.9 vulnerabilities
CVE-2009-0642, CVE-2009-1904
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 8.10
Ubuntu 9.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libruby1.8  1.8.4-1ubuntu1.7
  ruby1.8 1.8.4-1ubuntu1.7

Ubuntu 8.04 LTS:
  libruby1.8  1.8.6.111-2ubuntu1.3
  ruby1.8 1.8.6.111-2ubuntu1.3

Ubuntu 8.10:
  libruby1.8  1.8.7.72-1ubuntu0.2
  libruby1.9  1.9.0.2-7ubuntu1.2
  ruby1.8 1.8.7.72-1ubuntu0.2
  ruby1.9 1.9.0.2-7ubuntu1.2

Ubuntu 9.04:
  libruby1.8  1.8.7.72-3ubuntu0.1
  libruby1.9  1.9.0.2-9ubuntu1.1
  ruby1.8 1.8.7.72-3ubuntu0.1
  ruby1.9 1.9.0.2-9ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

It was discovered that Ruby did not properly validate certificates. An
attacker could exploit this and present invalid or revoked X.509
certificates. (CVE-2009-0642)

It was discovered that Ruby did not properly handle string arguments that
represent large numbers. An attacker could exploit this and cause a denial
of service. (CVE-2009-1904)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.7.diff.gz
  Size/MD5:50134 5f4a5f8b0673daefc2d23f8a6c26de5b

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.7.dsc
  Size/MD5: 1037 bd31d154e2bf758ba2f4c70d4fb701de

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4.orig.tar.gz
  Size/MD5:  4308915 2994203e0815ea978965de34287c5ea2

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/irb1.8_1.8.4-1ubuntu1.7_all.deb
  Size/MD5:   207960 63fd11d90068191477668a8b94093133

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/rdoc1.8_1.8.4-1ubuntu1.7_all.deb
  Size/MD5:   272810 244403ec49ffed4bc7b6edfb42bdf3c1

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ri1.8_1.8.4-1ubuntu1.7_all.deb
  Size/MD5:   758734 40b1ddeeacc1edda07d86fbc80f9fa24

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-elisp_1.8.4-1ubuntu1.7_all.deb
  Size/MD5:   182718 ec46c528f8647433fb627568f26b2d8e

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-examples_1.8.4-1ubuntu1.7_all.deb
  Size/MD5:   214970 f28c3d8c6c50dfb8c4a0d02c2e29221c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-1ubuntu1.7_amd64.deb
  Size/MD5:  1041246 3d3c6df2d9abfa229fb2ac46545592dd

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-1ubuntu1.7_amd64.deb
  Size/MD5:  1508222 adae95adb02ac3c57fcafb4ee17fae16

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-1ubuntu1.7_amd64.deb
  Size/MD5:   718734 384c516841a05e15436d6ce962901dd0

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.7_amd64.deb
  Size/MD5:   189960 e3bd07da796d8a7b898c1ffabd957afb

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.4-1ubuntu1.7_amd64.deb
  Size/MD5:   170390 3793c0fa4350318de80fc4894567606a

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.4-1ubuntu1.7_amd64.deb
  Size/MD5:   171572 b2ed8ff5dc43d05c6a604c340a8c0eb6

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.4-1ubuntu1.7_amd64.deb
  Size/MD5:   275240 e45db5b9a283e609e301533ee807e04c

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.4-1ubuntu1.7_amd64.deb
  Size/MD5:   171018 2c4f774419fa7c5e7bc8f7dc6c868d82

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.4-1ubuntu1.7_amd64.deb
  Size/MD5:  1798814 81a0b86c8ca778f4f42e20d58e0b20e5

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-1ubuntu1.7_i386.deb
  Size/MD5:   871448 4d6f830a139d5667e4baadaff5ef0386

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-1ubuntu1.7_i386.deb
  Size/MD5:  1421876 65f3ea4868bbe4c84ecb69aa3638dfbc

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-1ubuntu1.7_i386.deb
  Size/MD5:   

Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!

2009-07-20 Thread T Biehn
1) Register 'Anti-Sec *' with Free Mail Provider
2) Claims to Full Disclosure
3) 
4) PROFIT.

On Mon, Jul 20, 2009 at 10:16 AM, BlackHawkhawkgot...@gmail.com wrote:
 wasn't anti-sec the one fighting against guys who share exploits with
 the world so script kiddies use them?
 lol, now those guys will kill them selfs!

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploitcode - 48 hours until it is publicly released!

2009-07-20 Thread epixoip
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

the level of ignorance on this list is overwhelming at times.

the individual posting as [anti.sec.movem...@gmail.com] is not
affiliated with, nor is a representative of, the anti-sec movement.
he is simply a troll. stop indulging this cockfag, and maybe he'll
fuck off.

it _is_ possible, even probable, that there is an openssh exploit
circulating among anti-sec groups -- we've seen evidence of this in
several logs that have been shared (not just those posted to Full-
Disclosure). but no anti-sec group has ever even bragged about
having $EXPLOIT, and they've certainly never shared $EXPLOIT code.
so there's really no reason for you skiddies to get your panties in
a twist since you'll never see the exploit code, and there's no
need for whitehats to incite fear and paranoia in their community --
 you should only be worried if you are being targeted by anti-sec.
oh, right -- that's most of you on this list.

do your research and know your shit. stop believing everything you
read.
-BEGIN PGP SIGNATURE-
Charset: UTF8
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 3.0

wpwEAQMCAAYFAkpkox4ACgkQacHgESW3wZpb2AP/bnmxzy16/EbkTEpesiRV+S70kZ95
wOSsayUMxjdah82320O9ihHqGn+23V4ps5pJb4okns354Xp4J05z12WhKL3uCYwy8/IV
OdEqJXF4M8BsRwmZcPbNU7Qs+QPmFYPpVSRuaMq2bJCF8jNsFyazk226zUWWDssFPOKV
RPWJn6E=
=0bZq
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] A brief message on the topic of Anti-Sec

2009-07-20 Thread the . defaced
Hi,

My name is DeadlyData. I enjoy long walks on the beach, getting 
pizzas delivered to my house when my d0x were dropped, and having 
anal sex with my buddy Sean/TD Debug. My 1337 hack group The 
Defaced (thedefaced.org) has been making threats and being homo-
erotic on F-D. I'm sure you've seen the email from 
anti.sec.movem...@gmail.com that said Please check out our website 
at: http://romeo.copyandpaste.info/; Well, that is RoMeO's website 
(a TheDefaced admin!) dedicated to posing as a 1337 blackhat haqr. 
He's got cool things on there like portions of phrack zines, anti-
sec ownages (that were done by the other anti-sec factions. You 
think we can hack? GOOD JOKE!!!), some zines from the olden days, 
and a speech by our buddy strayfe/n3w7yp3 (we love his dick, but we 
don't think he likes us ;( We lub you strayfe!). I just wanted to 
let you all know that our group has no 0days. Don't waste your time 
reading anti.sec.movem...@gmail.com's bullshit. Just worry about 
the other anti-sec factions. Ok? Well, then have a nice day and 
don't hold your breathe waiting for the OpenSSH 0day. 0pen0wn.c 
(http://www.nopaste.com/p/aDTdT5s1C) was it!

Sincerely,
 DeadlyData

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] A brief message on the topic of Anti-Sec

2009-07-20 Thread laurent gaffie
Ok? Well, then have a nice day and
don't hold your breathe waiting for the OpenSSH 0day. 0pen0wn.c
(http://www.nopaste.com/p/aDTdT5s1C) was it!

ya the hex encoded irc bot  rm -rf ? :)



2009/7/20 the.defa...@hushmail.com

 Hi,

 My name is DeadlyData. I enjoy long walks on the beach, getting
 pizzas delivered to my house when my d0x were dropped, and having
 anal sex with my buddy Sean/TD Debug. My 1337 hack group The
 Defaced (thedefaced.org) has been making threats and being homo-
 erotic on F-D. I'm sure you've seen the email from
 anti.sec.movem...@gmail.com that said Please check out our website
 at: http://romeo.copyandpaste.info/; Well, that is RoMeO's website
 (a TheDefaced admin!) dedicated to posing as a 1337 blackhat haqr.
 He's got cool things on there like portions of phrack zines, anti-
 sec ownages (that were done by the other anti-sec factions. You
 think we can hack? GOOD JOKE!!!), some zines from the olden days,
 and a speech by our buddy strayfe/n3w7yp3 (we love his dick, but we
 don't think he likes us ;( We lub you strayfe!). I just wanted to
 let you all know that our group has no 0days. Don't waste your time
 reading anti.sec.movem...@gmail.com's bullshit. Just worry about
 the other anti-sec factions. Ok? Well, then have a nice day and
 don't hold your breathe waiting for the OpenSSH 0day. 0pen0wn.c
 (http://www.nopaste.com/p/aDTdT5s1C) was it!

 Sincerely,
  DeadlyData

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] A brief message on the topic of Anti-Sec

2009-07-20 Thread moto kawasaki

Hey!!

$ cc -o 0pen0wn 0pen0wn.c
$ strings 0pen0wn |grep rm
rm -rf ~ /* 2 /dev/null 
$

moto kawasaki m...@kawasaki3.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] A brief message on the topic of Anti-Sec

2009-07-20 Thread root
the.defa...@hushmail.com wrote:
 Hi,
 
 My name is DeadlyData. I enjoy long walks on the beach, getting 
 pizzas delivered to my house when my d0x were dropped, and having 
 anal sex with my buddy Sean/TD Debug. My 1337 hack group The 
 Defaced (thedefaced.org) has been making threats and being homo-
 erotic on F-D. I'm sure you've seen the email from 
 anti.sec.movem...@gmail.com that said Please check out our website 
 at: http://romeo.copyandpaste.info/; Well, that is RoMeO's website 
 (a TheDefaced admin!) dedicated to posing as a 1337 blackhat haqr. 
 He's got cool things on there like portions of phrack zines, anti-
 sec ownages (that were done by the other anti-sec factions. You 
 think we can hack? GOOD JOKE!!!), some zines from the olden days, 
 and a speech by our buddy strayfe/n3w7yp3 (we love his dick, but we 
 don't think he likes us ;( We lub you strayfe!). I just wanted to 
 let you all know that our group has no 0days. Don't waste your time 
 reading anti.sec.movem...@gmail.com's bullshit. Just worry about 
 the other anti-sec factions. Ok? Well, then have a nice day and 
 don't hold your breathe waiting for the OpenSSH 0day. 0pen0wn.c 
 (http://www.nopaste.com/p/aDTdT5s1C) was it!
 
 Sincerely,
  DeadlyData
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 


if (geteuid()) {
puts(need root for raw socket, etc...);
return 1;
}


Yeah right. Except that there is no raw socket created.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] A brief message on the topic of Anti-Sec

2009-07-20 Thread Ed Carp
Then I can understand completely why you don't like Anti-Suck, or whatever
his name is...

On Mon, Jul 20, 2009 at 5:29 PM, the.defa...@hushmail.com wrote:


 My name is DeadlyData. I enjoy long walks on the beach, getting
 pizzas delivered to my house when my d0x were dropped, and having
 anal sex with my buddy Sean/TD Debug. My 1337 hack group The

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] http://cms.netrix.hu - hacked by anti-sec

2009-07-20 Thread Ant-Sec Movement
Dear Reader,

The anti-sec movement has officially pwned http://cms.netrix.hu in order to
spread our message and our goals.

Sincerely,

-anti-sec
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/