Re: [Full-disclosure] stupid question again
On Fri, Dec 11, 2009 at 10:13:09PM -0600, Randall M spake thusly: On Dec 11, 2009, at 9:26 PM, Tim tim-secur...@sentinelchicken.org wrote: The answer is: Once you're infected, you shouldn't be trying to clean things. Reinstall. Need files off of that box first? Mount the drive under another OS, or better yet, use the sleuthkit to get them off. NO!! Not the answer. Average user won't and don't know how and usually don't recieve install disks It most definitely IS the answer. Just because the average user doesn't know how to do it doesn't mean it isn't the answer. They shouldn't be entering their credit card info and other personal data onto a machine which may still be infected. If they can't do it they need to pay someone who can. And nobody should be buying software that doesn't come with install disks. That is just setting yourself up for failure. I know those people do. And they are getting their personal info stolen too. -- Tracy Reed http://tracyreed.org pgpIYWBtyYODU.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Gadi Evron: SecuriTeam: The Mossad: IE 0day for sale
Please don't give to Gadi Evron and/or The Mossad that would be a crime against humanity and the west. Remember folks, Securiteam.com is a front for Gadi Evron and The Mossad, do _not_ send to them under any circumstances. Only last month The Mossad were caught planting fake car bombs in Tel Aviv, thats not a people you want to be associated with. They fake car bombs could be a prep for anywhere, you don't know where they were training for, it could be against any of us. Report from BBC: http://news.bbc.co.uk/1/hi/world/middle_east/8377746.stm Analysis by Reuters: http://blogs.reuters.com/axismundi/2009/11/25/frayed-cloak-rusty-dagger/ On Sat, Dec 12, 2009 at 3:12 AM, Jeff Williams jeffwilli...@gmail.com wrote: And the question is now: should the Mossad, NSA, etc be considered as bad guys ? 2009/12/12 Jeff Williams jeffwilli...@gmail.com If idefense pay 7000$ for a RCE on IE, it's possibly because they sell theses bugs to the NSA, MOSSAD, MI10 ? From my understanding, MS do not pay for any reported vulnerability, or maybe i missed the make a donation icon on idefense website ? 2009/12/12 Shyaam shy...@gmail.com :) Good one Valdis. That is what I was exactly trying to do. #1. If his intent was good, he would have sent it to the vendor and to the US Cert. #2. His aim is to get money: a. Instead of selling it directly to black market and not getting any returns, or having some legal agency stepping onto his doors he could as well sell it to these companies. b. These companies DO NOT sell stuff to BLACK MARKET. Straighten your facts before you accuse any of the below: zdi,idefense,securiteam,immunity,etc. They have better things to do than to sell it off to the bad guys. Besides, many people have that kind of a notion only because there are many hollywood movie fanatics out there, who suspect every single entity around you. Thanks for your creative response though :). You really cracked me up :) Shyaam On Sat, Dec 12, 2009 at 2:31 AM, valdis.kletni...@vt.edu wrote: On Fri, 11 Dec 2009 20:13:52 EST, Jeff Williams said: zdi,idefense,securiteam,immunity,etc is a front, your exploit will anyways end up on the blackmarket by selling it to theses company. How can you be that naive ? You're talking to somebody willing to sell to the highest bidder on F-D. Draw your own conclusions about whether they actually care if it ends up on the black market. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Gadi Evron: SecuriTeam: The Mossad: IE 0day for sale
Obviously you were banned for a reason, n3td3v. Spread your bullshit elsewhere. On Sat, Dec 12, 2009 at 12:56 PM, cyber armageddon cyberarmaged...@googlemail.com wrote: Please don't give to Gadi Evron and/or The Mossad that would be a crime against humanity and the west. Remember folks, Securiteam.com is a front for Gadi Evron and The Mossad, do _not_ send to them under any circumstances. Only last month The Mossad were caught planting fake car bombs in Tel Aviv, thats not a people you want to be associated with. They fake car bombs could be a prep for anywhere, you don't know where they were training for, it could be against any of us. Report from BBC: http://news.bbc.co.uk/1/hi/world/middle_east/8377746.stm Analysis by Reuters: http://blogs.reuters.com/axismundi/2009/11/25/frayed-cloak-rusty-dagger/ On Sat, Dec 12, 2009 at 3:12 AM, Jeff Williams jeffwilli...@gmail.com wrote: And the question is now: should the Mossad, NSA, etc be considered as bad guys ? 2009/12/12 Jeff Williams jeffwilli...@gmail.com If idefense pay 7000$ for a RCE on IE, it's possibly because they sell theses bugs to the NSA, MOSSAD, MI10 ? From my understanding, MS do not pay for any reported vulnerability, or maybe i missed the make a donation icon on idefense website ? 2009/12/12 Shyaam shy...@gmail.com :) Good one Valdis. That is what I was exactly trying to do. #1. If his intent was good, he would have sent it to the vendor and to the US Cert. #2. His aim is to get money: a. Instead of selling it directly to black market and not getting any returns, or having some legal agency stepping onto his doors he could as well sell it to these companies. b. These companies DO NOT sell stuff to BLACK MARKET. Straighten your facts before you accuse any of the below: zdi,idefense,securiteam,immunity,etc. They have better things to do than to sell it off to the bad guys. Besides, many people have that kind of a notion only because there are many hollywood movie fanatics out there, who suspect every single entity around you. Thanks for your creative response though :). You really cracked me up :) Shyaam On Sat, Dec 12, 2009 at 2:31 AM, valdis.kletni...@vt.edu wrote: On Fri, 11 Dec 2009 20:13:52 EST, Jeff Williams said: zdi,idefense,securiteam,immunity,etc is a front, your exploit will anyways end up on the blackmarket by selling it to theses company. How can you be that naive ? You're talking to somebody willing to sell to the highest bidder on F-D. Draw your own conclusions about whether they actually care if it ends up on the black market. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- Best wishes, Freddie Vicious http://twitter.com/viciousf ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Gadi Evron: SecuriTeam: The Mossad: IE 0day for sale
Oh which part of it is _bullshit_? Do you research before replying. On Sat, Dec 12, 2009 at 11:29 AM, Freddie Vicious fred.vici...@gmail.com wrote: Obviously you were banned for a reason, n3td3v. Spread your bullshit elsewhere. On Sat, Dec 12, 2009 at 12:56 PM, cyber armageddon cyberarmaged...@googlemail.com wrote: Please don't give to Gadi Evron and/or The Mossad that would be a crime against humanity and the west. Remember folks, Securiteam.com is a front for Gadi Evron and The Mossad, do _not_ send to them under any circumstances. Only last month The Mossad were caught planting fake car bombs in Tel Aviv, thats not a people you want to be associated with. They fake car bombs could be a prep for anywhere, you don't know where they were training for, it could be against any of us. Report from BBC: http://news.bbc.co.uk/1/hi/world/middle_east/8377746.stm Analysis by Reuters: http://blogs.reuters.com/axismundi/2009/11/25/frayed-cloak-rusty-dagger/ On Sat, Dec 12, 2009 at 3:12 AM, Jeff Williams jeffwilli...@gmail.com wrote: And the question is now: should the Mossad, NSA, etc be considered as bad guys ? 2009/12/12 Jeff Williams jeffwilli...@gmail.com If idefense pay 7000$ for a RCE on IE, it's possibly because they sell theses bugs to the NSA, MOSSAD, MI10 ? From my understanding, MS do not pay for any reported vulnerability, or maybe i missed the make a donation icon on idefense website ? 2009/12/12 Shyaam shy...@gmail.com :) Good one Valdis. That is what I was exactly trying to do. #1. If his intent was good, he would have sent it to the vendor and to the US Cert. #2. His aim is to get money: a. Instead of selling it directly to black market and not getting any returns, or having some legal agency stepping onto his doors he could as well sell it to these companies. b. These companies DO NOT sell stuff to BLACK MARKET. Straighten your facts before you accuse any of the below: zdi,idefense,securiteam,immunity,etc. They have better things to do than to sell it off to the bad guys. Besides, many people have that kind of a notion only because there are many hollywood movie fanatics out there, who suspect every single entity around you. Thanks for your creative response though :). You really cracked me up :) Shyaam On Sat, Dec 12, 2009 at 2:31 AM, valdis.kletni...@vt.edu wrote: On Fri, 11 Dec 2009 20:13:52 EST, Jeff Williams said: zdi,idefense,securiteam,immunity,etc is a front, your exploit will anyways end up on the blackmarket by selling it to theses company. How can you be that naive ? You're talking to somebody willing to sell to the highest bidder on F-D. Draw your own conclusions about whether they actually care if it ends up on the black market. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- Best wishes, Freddie Vicious http://twitter.com/viciousf ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Gadi Evron's professional profile exposed
Security Evangelist at Beyond Security IDF, Military Intelligence (Government Agency; 10,001 or more employees; Defense Space industry) 2000 — 2003 (3 years ) http://il.linkedin.com/in/gadievron IP address: 192.117.232.213 Host name: securiteam.com Alias: securiteam.com 192.117.232.213 is from Israel(IL) in region Middle East http://network-tools.com/default.asp?prog=expresshost=securiteam.com The SecuriTeam web portal is a vital part of Beyond Security's activities and an essential competitive advantage. http://www.beyondsecurity.com/company_overview.html Aman: the supreme military intelligence branch of the Israeli Defense Forces (IDF). Mossad: the agency responsible primarily for overseas intelligence work. http://en.wikipedia.org/wiki/Israeli_Intelligence_Community ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Gadi Evron's professional profile exposed
--On December 12, 2009 7:37:08 AM -0600 cyber armageddon cyberarmaged...@googlemail.com wrote: Security Evangelist at Beyond Security IDF, Military Intelligence (Government Agency; 10,001 or more employees; Defense Space industry) 2000 — 2003 (3 years ) ^ That was six years ago. Do the math doofus. Paul Schmehl, If it isn't already obvious, my opinions are my own and not those of my employer. ** WARNING: Check the headers before replying ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Gadi Evron's professional profile exposed
On Sat, Dec 12, 2009 at 5:08 PM, Paul Schmehl pschmehl_li...@tx.rr.com wrote: --On December 12, 2009 7:37:08 AM -0600 cyber armageddon cyberarmaged...@googlemail.com wrote: IDF, Military Intelligence (Government Agency; 10,001 or more employees; Defense Space industry) 2000 — 2003 (3 years ) ^ That was six years ago. Do the math doofus. Gadi Evron’s Specialties: I'm a campaign manager and an _agent_ of change. http://il.linkedin.com/in/gadievron ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Gadi Evron's professional profile exposed
On Sat, 12 Dec 2009 11:08:36 CST, Paul Schmehl said: 2000 â 2003 (3 years ) ^ That was six years ago. Do the math doofus. Yes, but he was in fact in the position for 3 years. Do the math doofus. :) pgpPkIK0xdy6y.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Gadi Evron's professional profile exposed
--On December 12, 2009 5:24:27 PM + cyber armageddon cyberarmaged...@googlemail.com wrote: On Sat, Dec 12, 2009 at 5:08 PM, Paul Schmehl pschmehl_li...@tx.rr.com wrote: --On December 12, 2009 7:37:08 AM -0600 cyber armageddon cyberarmaged...@googlemail.com wrote: IDF, Military Intelligence (Government Agency; 10,001 or more employees; Defense Space industry) 2000 — 2003 (3 years ) ^ That was six years ago. Do the math doofus. Gadi Evron’s Specialties: I'm a campaign manager and an _agent_ of change. http://il.linkedin.com/in/gadievron Oh, well that clinches it then. Cause only spy agencies employ campaign managers and agents of change. You're hilarious. Paul Schmehl, If it isn't already obvious, my opinions are my own and not those of my employer. ** WARNING: Check the headers before replying ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Brilliant attack bypasses bitlocker
http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/ Research grant ideas for 2010: 1) Replacing not only the computer, but victim's entire apartment, with cardboard cutouts to intercept passwords, You know your continued innovation continues to inspire and amaze us. In order to ensure you're properly credited everytime this attack is conducted/referenced, I propose that we should call this Zalewski Complex Jacking. I could totally see DARPA funding this :) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [SECURITY] [DSA 1949-1] New php-net-ping packages fix arbitrary code execution
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1949-1 secur...@debian.org http://www.debian.org/security/ Raphael Geissert December 12, 2009 http://www.debian.org/security/faq - Package: php-net-ping Vulnerability : programming error Problem type : remote Debian-specific: no CVE Id : CVE-2009-4024 It was discovered that php-net-ping, a PHP PEAR module to execute ping independently of the Operating System, performs insufficient input sanitising, which might be used to inject arguments (no CVE yet) or execute arbitrary commands (CVE-2009-4024) on a system that uses php-net-ping. For the stable distribution (lenny), this problem has been fixed in version 2.4.2-1+lenny1. For the oldstable distribution (etch), this problem has been fixed in version 2.4.2-1+etch1. For the testing distribution (squeeze), this problem will be fixed soon. For the unstable distribution (sid), this problem has been fixed in version 2.4.2-1.1. We recommend that you upgrade your php-net-ping packages. Upgrade instructions - wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - --- Debian (oldstable) - -- Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+etch1.diff.gz Size/MD5 checksum: 3270 b53c3677d3d7d44c472cd395d710748d http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2.orig.tar.gz Size/MD5 checksum: 9309 5bfd8d695c35d30d353b51134ad8ca35 http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+etch1.dsc Size/MD5 checksum: 607 e7e1d01e802bc6108c1faea148f3e25a Architecture independent packages: http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+etch1_all.deb Size/MD5 checksum:13924 4ef13559e1412c0811c33f36ddaa6f23 Debian GNU/Linux 5.0 alias lenny - Debian (stable) - --- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2.orig.tar.gz Size/MD5 checksum: 9309 5bfd8d695c35d30d353b51134ad8ca35 http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+lenny1.dsc Size/MD5 checksum: 1015 9c912fc0bbfcd10c8ab71f52f320ba48 http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+lenny1.diff.gz Size/MD5 checksum: 3269 0097b6d5920a4cf32439cd9bf6e95bac Architecture independent packages: http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+lenny1_all.deb Size/MD5 checksum:13920 d0492ed51494045583f0fb99fc75d753 These files will probably be moved into the stable distribution on its next update. - - For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-annou...@lists.debian.org Package info: `apt-cache show pkg' and http://packages.debian.org/pkg -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAksjWMwACgkQ62zWxYk/rQcZaQCbBQPolJjoUjWzNqk/cYUeYtqF /vQAn20tcbvwRT3g2yzsvOpJklYJ0A6H =wbii -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [SECURITY] [DSA-1950-1] New webkit packages fix several vulnerabilities
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1950 secur...@debian.org http://www.debian.org/security/ Giuseppe Iuculano December 12, 2009 http://www.debian.org/security/faq - Package: webkit Vulnerability : several Problem type : remote (local) Debian-specific: no CVE Id : CVE-2009-0945 CVE-2009-1687 CVE-2009-1690 CVE-2009-1698 CVE-2009-1711 CVE-2009-1712 CVE-2009-1725 CVE-2009-1714 CVE-2009-1710 CVE-2009-1697 CVE-2009-1695 CVE-2009-1693 CVE-2009-1694 CVE-2009-1681 CVE-2009-1684 CVE-2009-1692 Debian Bug : 532724 532725 534946 535793 538346 Several vulnerabilities have been discovered in webkit, a Web content engine library for Gtk+. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-0945 Array index error in the insertItemBefore method in WebKit, allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the SVGTransformList, SVGStringList, SVGNumberList, SVGPathSegList, SVGPointList, or SVGLengthList SVGList object, which triggers memory corruption. CVE-2009-1687 The JavaScript garbage collector in WebKit does not properly handle allocation failures, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document that triggers write access to an offset of a NULL pointer. CVE-2009-1690 Use-after-free vulnerability in WebKit, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to recursion in certain DOM event handlers. CVE-2009-1698 WebKit does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document. CVE-2009-1711 WebKit does not properly initialize memory for Attr DOM objects, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document. CVE-2009-1712 WebKit does not prevent remote loading of local Java applets, which allows remote attackers to execute arbitrary code, gain privileges, or obtain sensitive information via an APPLET or OBJECT element. CVE-2009-1725 WebKit do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document. CVE-2009-1714 Cross-site scripting (XSS) vulnerability in Web Inspector in WebKit allows user-assisted remote attackers to inject arbitrary web script or HTML, and read local files, via vectors related to the improper escaping of HTML attributes. CVE-2009-1710 WebKit allows remote attackers to spoof the browser's display of the host name, security indicators, and unspecified other UI elements via a custom cursor in conjunction with a modified CSS3 hotspot property. CVE-2009-1697 CRLF injection vulnerability in WebKit allows remote attackers to inject HTTP headers and bypass the Same Origin Policy via a crafted HTML document, related to cross-site scripting (XSS) attacks that depend on communication with arbitrary web sites on the same server through use of XMLHttpRequest without a Host header. CVE-2009-1695 Cross-site scripting (XSS) vulnerability in WebKit allows remote attackers to inject arbitrary web script or HTML via vectors involving access to frame contents after completion of a page transition. CVE-2009-1693 WebKit allows remote attackers to read images from arbitrary web sites via a CANVAS element with an SVG image, related to a cross-site image capture issue. CVE-2009-1694 WebKit does not properly handle redirects, which allows remote attackers to read images from arbitrary web sites via vectors involving a CANVAS element and redirection, related to a cross-site image capture issue. CVE-2009-1681 WebKit does not prevent web sites from loading third-party content into a subframe, which allows remote attackers to bypass the Same Origin Policy and conduct clickjacking attacks via a crafted HTML document. CVE-2009-1684 Cross-site scripting (XSS) vulnerability in WebKit allows remote attackers to inject arbitrary web script or HTML via an event handler that triggers script execution in the context of the next loaded document. CVE-2009-1692 WebKit allows remote attackers to
[Full-disclosure] [gif2png] long filename Buffer Overrun
DESCRIPTION: The gif2png program converts files from the obsolescent Graphic Interchange Format to Portable Network Graphics http://www.libpng.org/pub/png/. The conversion preserves all graphic information, including transparency, perfectly. The gif2png program can even recover data from corrupted GIFs. homepage: http://catb.org/~esr/gif2png/ http://catb.org/%7Eesr/gif2png/ VULNERABILITY: gif2png does not perform proper bounds checking on the size of input filename. The buffer (1025 in size) is easily overrun with a strcpy function. AFFECTED VERSION: latest: 2.5.2 POC: $ ./gif2png $(perl -e 'print A x 1053') #Razuel ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE 0day for sale
2009/12/12 Jeff Williams jeffwilli...@gmail.com: And the question is now: should the Mossad, NSA, etc be considered as bad guys ? that is a definately YES gregor -- just because your paranoid, doesn't mean they're not after you... gpgp-fp: 79A84FA526807026795E4209D3B3FE028B3170B2 gpgp-key available @ http://pgpkeys.pca.dfn.de:11371 @ http://pgp.mit.edu:11371/ skype:rc46fi ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Gadi Evron's professional profile exposed
You can't beat MI6 behavioural / psychological profiling. ...This is probably the last you'll see of the real n3td3v because there is sure to be a contract killer out to silence me...My last words to you is, don't let this matter rest, they have got rid of n3td3v, but there are bound to be people who will investigate what im saying, and I hope they do. Because my last request before I finish this rant is, don't forget the things ive been talking about and continue to investigate people while im gone. [Andrew Wallace as n3td3v, 1] .. Silence. Ah. But according to his profile... ...Intelligence agency intrigue innuendo is a classic manifestation, along with imaginary friends, martyr glamorizations, alternate personalities and repeated exclamations that they will curtail their behaviors, only to come back, roaringly, foisting themselves upon a group/friend circle with a different guise or mission. Some have said it resembles alcoholic behavior in the promises 'to quit...' [Anonymous profiler, 1] .. Not even a month later: Please don't give to Gadi Evron and/or The Mossad that would be a crime against humanity and the west... Insert rambling, paranoid bullshit [Andrew Wallace as n3td3v as CyberArmageddon, 3][4] Andrew Wallace (n3td3v / cyberarmageddon / whatever-fuckin-alias-you-decide-to-troll-on-that-week), consider a regimen of antipsychotics. Professor Halderf, iPsyD, CISSP [1] http://lists.grok.org.uk/pipermail/full-disclosure/2009-November/071660.html [2] http://lists.grok.org.uk/pipermail/full-disclosure/2009-November/071542.html [3] http://lists.grok.org.uk/pipermail/full-disclosure/2009-December/071991.html [4] http://lists.grok.org.uk/pipermail/full-disclosure/2009-December/071994.html Von: cyber armageddon cyberarmaged...@googlemail.com An: Paul Schmehl pschmehl_li...@tx.rr.com; full-disclosure@lists.grok.org.uk Gesendet: Samstag, den 12. Dezember 2009, 17:24:27 Uhr Betreff: Re: [Full-disclosure] Gadi Evron's professional profile exposed On Sat, Dec 12, 2009 at 5:08 PM, Paul Schmehl pschmehl_li...@tx.rr.com wrote: --On December 12, 2009 7:37:08 AM -0600 cyber armageddon cyberarmaged...@googlemail.com wrote: IDF, Military Intelligence (Government Agency; 10,001 or more employees; Defense Space industry) 2000 — 2003 (3 years ) ^ That was six years ago. Do the math doofus. Gadi Evron’s Specialties: I'm a campaign manager and an _agent_ of change. http://il.linkedin.com/in/gadievron ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ __ Do You Yahoo!? Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen Massenmails. http://mail.yahoo.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Gadi Evron's professional profile exposed
On Sat, 12 Dec 2009 13:37:08 GMT, cyber armageddon said: Security Evangelist at Beyond Security IDF, Military Intelligence Umm... You *do* realize that everybody in the security community who didn't just fall out of a frikking tree *knows* all that already, so it's hardly exposed. Dood. Take your meds. Please. :) pgpMKYK4Y6D8H.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/