[Full-disclosure] Very minor heap address disclosure; measuring time to fix for [Firefox] [Internet Explorer] [Safari]
Hi, It's unusual to get both conditions: - The exact same bug across multiple different codebases. - Already partially disclosed. So the rare opportunity will be seized to provide a direct comparison of response quality and response time. Some might argue that this is a much better metric than other common metrics such as "bug counting". It's not serious by any stretch of the imagination, so those looking for pwnage can stop reading. Full details, http://scarybeastsecurity.blogspot.com/2011/03/multi-browser-heap-address-leak-in-xslt.html Who will handle it best? Results via @scarybeasts Cheers Chris ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Buying Web Malware Samples
On Wed, 09 Mar 2011 20:56:15 +0100, John Harwold said: > 0. ) I need that malware for research stuff. Go to Google. Search for pr0n of whatever sort you enjoy. Click on all the links that have "this site may harm your computer". That should get you enough pr0n and malware to keep you busy for a while. pgpfnFgn2j7bH.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Buying Web Malware Samples
He would be better off starting up a VirusTotal / Anubis clone then report all the viruses to be undetectable while he keeps all the samples ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Buying Web Malware Samples
It sounds like you are looking for drive by kit samples. Why not just write your own crawler? Find an AV (which has drive by kit detection and passive scanning), check to see how many requests you can send to it per minute, then pipe in a shit load of random URLs based on crawled links from ads (ads links are the most common for having drive by kits), see which requests were blocked, and queue them for mirroring later. Some AVs will do drive by kit detection without needing to call a remote API, which would be quite nice. Obviously, the AVs aren't going to give you a nice API which you can call directly, so there would be some tinkering and possibly memory injection involved. This approach isn't exactly going to have a high hit rate, and you will still need to de-obfuscate / decompile and analyse any malware you find, but it'd be a giggle either way. There's probably a better way of doing it, but this would certainly be fun to make :D On Wed, Mar 9, 2011 at 7:56 PM, John Harwold wrote: > 0. ) I need that malware for research stuff. > > 1. ) There is no way for me to prove that I'm speaking truth. > > 2. ) What's wrong with gmail address? > > 3. ) 500$ offer is still active. > > > Sincerely, > J.H. > > > > On Wed, Mar 9, 2011 at 8:23 PM, Cal Leeming wrote: > >> Actually, just out of curiosity, why do you need to purchase malware >> samples? >> >> On Wed, Mar 9, 2011 at 7:19 PM, Cal Leeming wrote: >> >>> 1) You are requesting this from a gmail address. Not a good look. >>> >>> 2) You aren't representing yourself as a company entity, which indicates >>> you might want this malware for malicious purposes. >>> >>> 3) Looks like you're trying to bullshit tbh. >>> >>> Just my two cents. >>> >>> On Wed, Mar 9, 2011 at 6:34 PM, John Harwold wrote: >>> I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater. If I say that I'll pay 500$ for best submission, I'll pay 500$ for it. I won't pay before I see the stuff. I don't want to pay 500$ for big zip file with garbage in it. Best submission will be rewarded with 500$. That's it. If you have what I need, and you are not satisfied with this arrangement, find a way in which we'll both be satisfied... give me access to place where I can inspect them or something like that. Sincerely, J.H. On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote: > Yes lets all send out malware samples and *hope* you actually pay the > best submission, tell you what send me the $500 and ill send you a pretty > comprehensive tar full of samples. > > > -- > *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: > full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John Harwold > *Sent:* 09 March 2011 16:35 > *To:* full-disclosure@lists.grok.org.uk > *Subject:* [Full-disclosure] Buying Web Malware Samples > > Hi folks, > > I'm buying web malware samples... obfuscated malicious javascript, web > exploit kits, pdf malware, browser/activex exploits, etc. > I'm not interested in executable (PE/ELF) malware. > Contact me on email with download URL, or send ZIP/TAR/RAR malware > archive directly to my email (with changed archive extension to .MAL > because > of gmail filtering). > > After two weeks, contributions will be revisited and person with > largest collection of real web malware will receive prize of 500$. > > Bye, > J.H. > > > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ >>> >>> >> > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Buying Web Malware Samples
Oh, just a side note, there is probably some term somewhere in the TCs/AUP of the anti virus you are using, that states you will be sued by over 9000 lawyers if you do this. I'd strongly recommend seeking legal advice before hand lol. On Wed, Mar 9, 2011 at 8:15 PM, Cal Leeming wrote: > It sounds like you are looking for drive by kit samples. > > Why not just write your own crawler? Find an AV (which has drive by kit > detection and passive scanning), check to see how many requests you can send > to it per minute, then pipe in a shit load of random URLs based on crawled > links from ads (ads links are the most common for having drive by kits), see > which requests were blocked, and queue them for mirroring later. > > Some AVs will do drive by kit detection without needing to call a remote > API, which would be quite nice. > > Obviously, the AVs aren't going to give you a nice API which you can call > directly, so there would be some tinkering and possibly memory injection > involved. > > This approach isn't exactly going to have a high hit rate, and you will > still need to de-obfuscate / decompile and analyse any malware you find, but > it'd be a giggle either way. > > There's probably a better way of doing it, but this would certainly be fun > to make :D > > On Wed, Mar 9, 2011 at 7:56 PM, John Harwold wrote: > >> 0. ) I need that malware for research stuff. >> >> 1. ) There is no way for me to prove that I'm speaking truth. >> >> 2. ) What's wrong with gmail address? >> >> 3. ) 500$ offer is still active. >> >> >> Sincerely, >> J.H. >> >> >> >> On Wed, Mar 9, 2011 at 8:23 PM, Cal Leeming wrote: >> >>> Actually, just out of curiosity, why do you need to purchase malware >>> samples? >>> >>> On Wed, Mar 9, 2011 at 7:19 PM, Cal Leeming wrote: >>> 1) You are requesting this from a gmail address. Not a good look. 2) You aren't representing yourself as a company entity, which indicates you might want this malware for malicious purposes. 3) Looks like you're trying to bullshit tbh. Just my two cents. On Wed, Mar 9, 2011 at 6:34 PM, John Harwold wrote: > I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater. > If I say that I'll pay 500$ for best submission, I'll pay 500$ for it. > > I won't pay before I see the stuff. > I don't want to pay 500$ for big zip file with garbage in it. > > Best submission will be rewarded with 500$. That's it. > If you have what I need, and you are not satisfied with this > arrangement, find a way in which we'll both be satisfied... > give me access to place where I can inspect them or something like > that. > > Sincerely, > J.H. > > > On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote: > >> Yes lets all send out malware samples and *hope* you actually pay >> the best submission, tell you what send me the $500 and ill send you a >> pretty comprehensive tar full of samples. >> >> >> -- >> *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: >> full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John >> Harwold >> *Sent:* 09 March 2011 16:35 >> *To:* full-disclosure@lists.grok.org.uk >> *Subject:* [Full-disclosure] Buying Web Malware Samples >> >> Hi folks, >> >> I'm buying web malware samples... obfuscated malicious javascript, web >> exploit kits, pdf malware, browser/activex exploits, etc. >> I'm not interested in executable (PE/ELF) malware. >> Contact me on email with download URL, or send ZIP/TAR/RAR malware >> archive directly to my email (with changed archive extension to .MAL >> because >> of gmail filtering). >> >> After two weeks, contributions will be revisited and person with >> largest collection of real web malware will receive prize of 500$. >> >> Bye, >> J.H. >> >> >> > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > >>> >> > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Buying Web Malware Samples
0. ) I need that malware for research stuff. 1. ) There is no way for me to prove that I'm speaking truth. 2. ) What's wrong with gmail address? 3. ) 500$ offer is still active. Sincerely, J.H. On Wed, Mar 9, 2011 at 8:23 PM, Cal Leeming wrote: > Actually, just out of curiosity, why do you need to purchase malware > samples? > > On Wed, Mar 9, 2011 at 7:19 PM, Cal Leeming wrote: > >> 1) You are requesting this from a gmail address. Not a good look. >> >> 2) You aren't representing yourself as a company entity, which indicates >> you might want this malware for malicious purposes. >> >> 3) Looks like you're trying to bullshit tbh. >> >> Just my two cents. >> >> On Wed, Mar 9, 2011 at 6:34 PM, John Harwold wrote: >> >>> I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater. >>> If I say that I'll pay 500$ for best submission, I'll pay 500$ for it. >>> >>> I won't pay before I see the stuff. >>> I don't want to pay 500$ for big zip file with garbage in it. >>> >>> Best submission will be rewarded with 500$. That's it. >>> If you have what I need, and you are not satisfied with this arrangement, >>> find a way in which we'll both be satisfied... >>> give me access to place where I can inspect them or something like that. >>> >>> Sincerely, >>> J.H. >>> >>> >>> On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote: >>> Yes lets all send out malware samples and *hope* you actually pay the best submission, tell you what send me the $500 and ill send you a pretty comprehensive tar full of samples. -- *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John Harwold *Sent:* 09 March 2011 16:35 *To:* full-disclosure@lists.grok.org.uk *Subject:* [Full-disclosure] Buying Web Malware Samples Hi folks, I'm buying web malware samples... obfuscated malicious javascript, web exploit kits, pdf malware, browser/activex exploits, etc. I'm not interested in executable (PE/ELF) malware. Contact me on email with download URL, or send ZIP/TAR/RAR malware archive directly to my email (with changed archive extension to .MAL because of gmail filtering). After two weeks, contributions will be revisited and person with largest collection of real web malware will receive prize of 500$. Bye, J.H. >>> >>> ___ >>> Full-Disclosure - We believe in it. >>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >>> Hosted and sponsored by Secunia - http://secunia.com/ >>> >> >> > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Buying Web Malware Samples
Actually, just out of curiosity, why do you need to purchase malware samples? On Wed, Mar 9, 2011 at 7:19 PM, Cal Leeming wrote: > 1) You are requesting this from a gmail address. Not a good look. > > 2) You aren't representing yourself as a company entity, which indicates > you might want this malware for malicious purposes. > > 3) Looks like you're trying to bullshit tbh. > > Just my two cents. > > On Wed, Mar 9, 2011 at 6:34 PM, John Harwold wrote: > >> I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater. >> If I say that I'll pay 500$ for best submission, I'll pay 500$ for it. >> >> I won't pay before I see the stuff. >> I don't want to pay 500$ for big zip file with garbage in it. >> >> Best submission will be rewarded with 500$. That's it. >> If you have what I need, and you are not satisfied with this arrangement, >> find a way in which we'll both be satisfied... >> give me access to place where I can inspect them or something like that. >> >> Sincerely, >> J.H. >> >> >> On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote: >> >>> Yes lets all send out malware samples and *hope* you actually pay the >>> best submission, tell you what send me the $500 and ill send you a pretty >>> comprehensive tar full of samples. >>> >>> >>> -- >>> *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: >>> full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John Harwold >>> *Sent:* 09 March 2011 16:35 >>> *To:* full-disclosure@lists.grok.org.uk >>> *Subject:* [Full-disclosure] Buying Web Malware Samples >>> >>> Hi folks, >>> >>> I'm buying web malware samples... obfuscated malicious javascript, web >>> exploit kits, pdf malware, browser/activex exploits, etc. >>> I'm not interested in executable (PE/ELF) malware. >>> Contact me on email with download URL, or send ZIP/TAR/RAR malware >>> archive directly to my email (with changed archive extension to .MAL because >>> of gmail filtering). >>> >>> After two weeks, contributions will be revisited and person with largest >>> collection of real web malware will receive prize of 500$. >>> >>> Bye, >>> J.H. >>> >>> >>> >> >> ___ >> Full-Disclosure - We believe in it. >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >> Hosted and sponsored by Secunia - http://secunia.com/ >> > > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Buying Web Malware Samples
1) You are requesting this from a gmail address. Not a good look. 2) You aren't representing yourself as a company entity, which indicates you might want this malware for malicious purposes. 3) Looks like you're trying to bullshit tbh. Just my two cents. On Wed, Mar 9, 2011 at 6:34 PM, John Harwold wrote: > I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater. > If I say that I'll pay 500$ for best submission, I'll pay 500$ for it. > > I won't pay before I see the stuff. > I don't want to pay 500$ for big zip file with garbage in it. > > Best submission will be rewarded with 500$. That's it. > If you have what I need, and you are not satisfied with this arrangement, > find a way in which we'll both be satisfied... > give me access to place where I can inspect them or something like that. > > Sincerely, > J.H. > > > On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote: > >> Yes lets all send out malware samples and *hope* you actually pay the >> best submission, tell you what send me the $500 and ill send you a pretty >> comprehensive tar full of samples. >> >> >> -- >> *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: >> full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John Harwold >> *Sent:* 09 March 2011 16:35 >> *To:* full-disclosure@lists.grok.org.uk >> *Subject:* [Full-disclosure] Buying Web Malware Samples >> >> Hi folks, >> >> I'm buying web malware samples... obfuscated malicious javascript, web >> exploit kits, pdf malware, browser/activex exploits, etc. >> I'm not interested in executable (PE/ELF) malware. >> Contact me on email with download URL, or send ZIP/TAR/RAR malware archive >> directly to my email (with changed archive extension to .MAL because of >> gmail filtering). >> >> After two weeks, contributions will be revisited and person with largest >> collection of real web malware will receive prize of 500$. >> >> Bye, >> J.H. >> >> >> > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Accidental disclosure of the French Ministry of Foreign affairs computer security plans
Accidental disclosure of the French Ministry of Foreign affairs computer security plans from http://www.linformaticien.com/Actualités/tabid/58/newsid496/10517/ex clusif-le-si-des-affaires-etrangeres-en-acces-libre/Default.aspx Archive is DCE_partiel_maee_10266_DSI_MSA.zip (main file is CCTP 10266_MAE.pdf) http://rapidshare.com/files/451787863/DCE_partiel_maee_10266_DSI_MSA .zip http://hidemyass.com/files/5Bwh2/ http://www.zshare.net/download/87591417f0d3306b/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [Onapsis Research Labs] New SAP Security In-Depth issue and Tool - The Silent Threat: SAP Backdoors and Rootkits
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear colleague, We are happy to announce the third issue of the Onapsis SAP Security In-Depth publication. Onapsis' SAP Security In-Depth is a free technical publication leaded by the Onapsis Research Labs with the purpose of providing specialized information about the current and future risks in the SAP security field, allowing all the different actors (financial managers, information security managers, SAP administrators, auditors, consultants and the general professional community) to better understand the involved risks and the techniques and tools available to assess and mitigate them. In this edition: "The Silent Threat: SAP Backdoors and Rootkits", by Mariano Nuñez Di Croce. "Backdoors and rootkits have existed for a long time. From PCI cards to the most modern operating systems, almost every system is susceptible of being attacked and modified to hold a malicious program that will secure future access for the attacker and even perform unauthorized activities, while trying to remain undetected. As SAP business solutions run the most critical business information and processes in the organization, a backdoor in this platform would imply severe impacts for the business. If the organization is not securing its systems properly, it would be possible for a remote, anonymous attacker to perform continuous espionage, fraud and sabotage attacks through the injection of a backdoor or rootkit in the SAP platform. This publication analyzes some of the different attack vectors that malicious parties can use to try to inject backdoors and rootkits in the SAP platform, in order to understand which are the necessary protection measures that need to be implemented to protect the business crown jewels." The full publication can be downloaded from http://www.onapsis.com/resources/get.php?resid=ssid03 At the same time, we have released a new free tool: Onapsis Integrity Analyzer for SAP. This proof-of-concept will help you identify future unauthorized modifications of standard ABAP programs in your SAP systems, which could be the result of backdoor or rootkit attacks. The tool can be downloaded from http://www.onapsis.com/ianalyzer We hope you can enjoy these new resources! We would also love to get your feedback. Feel free to write us back with your comments and ideas. Kindest regards, - -- - The Onapsis Research Labs Team Onapsis S.R.L Email: resea...@onapsis.com Web: www.onapsis.com PGP: http://www.onapsis.com/pgp/research.asc - -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk137zQACgkQz3i6WNVBcDV0RACdHgigAxhnix2h31TYRI7jpEAH wDMAn2k6iiVK92RlVmkwcDGB5d2VCE8j =oPVY -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] need good web browser fuzzing tools
hi,anyone who can tell me a useful browser fuzzing tool especially for firefox? Thanks. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Buying Web Malware Samples
I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater. If I say that I'll pay 500$ for best submission, I'll pay 500$ for it. I won't pay before I see the stuff. I don't want to pay 500$ for big zip file with garbage in it. Best submission will be rewarded with 500$. That's it. If you have what I need, and you are not satisfied with this arrangement, find a way in which we'll both be satisfied... give me access to place where I can inspect them or something like that. Sincerely, J.H. On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote: > Yes lets all send out malware samples and *hope* you actually pay the > best submission, tell you what send me the $500 and ill send you a pretty > comprehensive tar full of samples. > > > -- > *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: > full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John Harwold > *Sent:* 09 March 2011 16:35 > *To:* full-disclosure@lists.grok.org.uk > *Subject:* [Full-disclosure] Buying Web Malware Samples > > Hi folks, > > I'm buying web malware samples... obfuscated malicious javascript, web > exploit kits, pdf malware, browser/activex exploits, etc. > I'm not interested in executable (PE/ELF) malware. > Contact me on email with download URL, or send ZIP/TAR/RAR malware archive > directly to my email (with changed archive extension to .MAL because of > gmail filtering). > > After two weeks, contributions will be revisited and person with largest > collection of real web malware will receive prize of 500$. > > Bye, > J.H. > > > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Buying Web Malware Samples
Yes lets all send out malware samples and *hope* you actually pay the best submission, tell you what send me the $500 and ill send you a pretty comprehensive tar full of samples. From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of John Harwold Sent: 09 March 2011 16:35 To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] Buying Web Malware Samples Hi folks, I'm buying web malware samples... obfuscated malicious javascript, web exploit kits, pdf malware, browser/activex exploits, etc. I'm not interested in executable (PE/ELF) malware. Contact me on email with download URL, or send ZIP/TAR/RAR malware archive directly to my email (with changed archive extension to .MAL because of gmail filtering). After two weeks, contributions will be revisited and person with largest collection of real web malware will receive prize of 500$. Bye, J.H. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Buying Web Malware Samples
Hi folks, I'm buying web malware samples... obfuscated malicious javascript, web exploit kits, pdf malware, browser/activex exploits, etc. I'm not interested in executable (PE/ELF) malware. Contact me on email with download URL, or send ZIP/TAR/RAR malware archive directly to my email (with changed archive extension to .MAL because of gmail filtering). After two weeks, contributions will be revisited and person with largest collection of real web malware will receive prize of 500$. Bye, J.H. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] List Charter
[Full-Disclosure] Mailing List Charter John Cartwright - Introduction & Purpose - This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.grok.org.uk. The list was created on 9th July 2002 by Len Rose, and is primarily concerned with security issues and their discussion. The list is administered by John Cartwright. The Full-Disclosure list is hosted and sponsored by Secunia. - Subscription Information - Subscription/unsubscription may be performed via the HTTP interface located at http://lists.grok.org.uk/mailman/listinfo/full-disclosure. Alternatively, commands may be emailed to full-disclosure-requ...@lists.grok.org.uk, send the word 'help' in either the message subject or body for details. - Moderation & Management - The [Full-Disclosure] list is unmoderated. Typically posting will be restricted to members only, however the administrators may choose to accept submissions from non-members based on individual merit and relevance. It is expected that the list will be largely self-policing, however in special circumstances (eg spamming, misappropriation) then offending members may be removed from the list by the management. An archive of postings is available at http://lists.grok.org.uk/pipermail/full-disclosure/. - Acceptable Content - Any information pertaining to vulnerabilities is acceptable, for instance announcement and discussion thereof, exploit techniques and code, related tools and papers, and other useful information. Gratuitous advertisement, product placement, or self-promotion is forbidden. Disagreements, flames, arguments, and off-topic discussion should be taken off-list wherever possible. Humour is acceptable in moderation, providing it is inoffensive. Politics should be avoided at all costs. Members are reminded that due to the open nature of the list, they should use discretion in executing any tools or code distributed via this list. - Posting Guidelines - The primary language of this list is English. Members are expected to maintain a reasonable standard of netiquette when posting to the list. Quoting should not exceed that which is necessary to convey context, this is especially relevant to members subscribed to the digested version of the list. The use of HTML is discouraged, but not forbidden. Signatures will preferably be short and to the point, and those containing 'disclaimers' should be avoided where possible. Attachments may be included if relevant or necessary (e.g. PGP or S/MIME signatures, proof-of-concept code, etc) but must not be active (in the case of a worm, for example) or malicious to the recipient. Vacation messages should be carefully configured to avoid replying to list postings. Offenders will be excluded from the mailing list until the problem is corrected. Members may post to the list by emailing full-disclosure@lists.grok.org.uk. Do not send subscription/ unsubscription mails to this address, use the -request address mentioned above. - Charter Additions/Changes - The list charter will be published at http://lists.grok.org.uk/full-disclosure-charter.html. In addition, the charter will be posted monthly to the list by the management. Alterations will be made after consultation with list members and a consensus has been reached. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Call for Papers: i-Society 2011!
Call for Papers: i-Society 2011! Apologies for cross-postings. Please send it to interested colleagues and students. Thanks! CALL FOR PAPERS *** International Conference on Information Society (i-Society 2011), Technically Co-Sponsored by IEEE UK/RI Computer Chapter 27-29 June, 2011, London, UK www.i-society.eu *** The International Conference on Information Society (i-Society 2011) is Technically Co-Sponsored by IEEE UK/RI Computer Chapter. The i-Society is a global knowledge-enriched collaborative effort that has its roots from both academia and industry. The conference covers a wide spectrum of topics that relate to information society, which includes technical and non-technical research areas. The mission of i-Society 2011 conference is to provide opportunities for collaboration of professionals and researchers to share existing and generate new knowledge in the field of information society. The conference encapsulates the concept of interdisciplinary science that studies the societal and technological dimensions of knowledge evolution in digital society. The i-Society bridges the gap between academia and industry with regards to research collaboration and awareness of current development in secure information management in the digital society. The topics in i-Society 2011 include but are not confined to the following areas: *New enabling technologies - Internet technologies - Wireless applications - Mobile Applications - Multimedia Applications - Protocols and Standards - Ubiquitous Computing - Virtual Reality - Human Computer Interaction - Geographic information systems - e-Manufacturing *Intelligent data management - Intelligent Agents - Intelligent Systems - Intelligent Organisations - Content Development - Data Mining - e-Publishing and Digital Libraries - Information Search and Retrieval - Knowledge Management - e-Intelligence - Knowledge networks *Secure Technologies - Internet security - Web services and performance - Secure transactions - Cryptography - Payment systems - Secure Protocols - e-Privacy - e-Trust - e-Risk - Cyber law - Forensics - Information assurance - Mobile social networks - Peer-to-peer social networks - Sensor networks and social sensing *e-Learning - Collaborative Learning - Curriculum Content Design and Development - Delivery Systems and Environments - Educational Systems Design - e-Learning Organisational Issues - Evaluation and Assessment - Virtual Learning Environments and Issues - Web-based Learning Communities - e-Learning Tools - e-Education *e-Society - Global Trends - Social Inclusion - Intellectual Property Rights - Social Infonomics - Computer-Mediated Communication - Social and Organisational Aspects - Globalisation and developmental IT - Social Software *e-Health - Data Security Issues - e-Health Policy and Practice - e-Healthcare Strategies and Provision - Medical Research Ethics - Patient Privacy and Confidentiality - e-Medicine *e-Governance - Democracy and the Citizen - e-Administration - Policy Issues - Virtual Communities *e-Business - Digital Economies - Knowledge economy - eProcurement - National and International Economies - e-Business Ontologies and Models - Digital Goods and Services - e-Commerce Application Fields - e-Commerce Economics - e-Commerce Services - Electronic Service Delivery - e-Marketing - Online Auctions and Technologies - Virtual Organisations - Teleworking - Applied e-Business - Electronic Data Interchange (EDI) *e-Art - Legal Issues - Patents - Enabling technologies and tools *e-Science - Natural sciences in digital society - Biometrics - Bioinformatics - Collaborative research *Industrial developments - Trends in learning - Applied research - Cutting-edge technologies * Research in progress - Ongoing research from undergraduates, graduates/postgraduates and professionals Important Dates: Paper Submission Date: March 31, 2011 Short Paper (Extended Abstract or Work in Progress): March 20, 2011 Notification of Paper Acceptance /Rejection: April 15, 2011 Notification of Short Paper (Extended Abstract or Work in Progress) Acceptance /Rejection: April 10, 2011 Camera Ready Paper and Short Paper Due: April 30, 2011 Participant(s) Registration (Open): January 1, 2011 Early Bird Attendee Registration Deadline (Authors only): February 1 to April 30, 2011 Late Bird Attendee Registration Deadline (Authors only): May 1 to June 1, 2011 Conference Dates: June 27-29, 2011 For more details, please visit www.i-society.eu ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Insect Pro 2.1 : New version release
Could you elaborate on your thoughts? (have you tried the product etc?) On Tue, Mar 8, 2011 at 2:45 PM, Hyperion Hyp wrote: > msf rip imo > > > On 7 March 2011 17:07, Juan Sacco wrote: > >> The Insect Pro 2.1 new version is now accessible on Insecurity Research >> servers! >> Get it now to enjoy the positive changes that this update brings, based >> directly on user feedback >> >> Insect Pro is a penetration security auditing and testing software >> solution designed to allow organizations of all sizes mitigate, monitor >> and manage the latest security threats vulnerabilities and implement >> active security policies by performing penetration tests across their >> infrastructure and applications. >> >> Insect Pro 2.1 includes: >> Minimize to systray to work in background >> Video recording >> Capture screenshots >> Keylogging feature >> Command-line based control >> GUI improved >> >> Read full patch notes on our site to learn more about what's new and >> improved. >> >> Also, anyone that has not yet donate to get a license may do it now and >> obtain a free version of the new stealth keylogger! >> >> Juan Sacco >> -- >> _ >> Insecurity Research - Security auditing and testing software >> Web: http://www.insecurityresearch.com >> Insect Pro 2.1 was released stay tunned >> >> ___ >> Full-Disclosure - We believe in it. >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >> Hosted and sponsored by Secunia - http://secunia.com/ >> > > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [SECURITY] [DSA 2185-1] proftpd-dfsg security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2185-1 secur...@debian.org http://www.debian.org/security/Moritz Muehlenhoff March 07, 2011 http://www.debian.org/security/faq - - Package: proftpd-dfsg Vulnerability : integer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2011-1137 It was discovered that an integer overflow in the SFTP file transfer module of the ProFTPD daemon could lead to denial of service. The oldstable distribution (lenny) is not affected. For the stable distribution (squeeze), this problem has been fixed in version 1.3.3a-6squeeze1. For the unstable distribution (sid), this problem has been fixed in version 1.3.3d-4. We recommend that you upgrade your proftpd-dfsg packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-annou...@lists.debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk11cy8ACgkQXm3vHE4uylp2YACfcrFp88qmWgSfXjL9lXHRKN79 XmkAoMnyDATfVMtscO/ZWc3Uo+YGZHiM =S1pq -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/