[Full-disclosure] Very minor heap address disclosure; measuring time to fix for [Firefox] [Internet Explorer] [Safari]

2011-03-09 Thread Chris Evans
Hi,

It's unusual to get both conditions:

- The exact same bug across multiple different codebases.
- Already partially disclosed.

So the rare opportunity will be seized to provide a direct comparison of
response quality and response time. Some might argue that this is a much
better metric than other common metrics such as "bug counting".

It's not serious by any stretch of the imagination, so those looking for
pwnage can stop reading.

Full details,
http://scarybeastsecurity.blogspot.com/2011/03/multi-browser-heap-address-leak-in-xslt.html

Who will handle it best? Results via @scarybeasts


Cheers
Chris
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Buying Web Malware Samples

2011-03-09 Thread Valdis . Kletnieks
On Wed, 09 Mar 2011 20:56:15 +0100, John Harwold said:

> 0. ) I need that malware for research stuff.

Go to Google.  Search for pr0n of whatever sort you enjoy. Click on all the
links that have "this site may harm your computer". That should get you enough
pr0n and malware to keep you busy for a while.



pgpfnFgn2j7bH.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Buying Web Malware Samples

2011-03-09 Thread Eyeballing Weev
He would be better off starting up a VirusTotal / Anubis clone then 
report all the viruses to be undetectable while he keeps all the samples

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Buying Web Malware Samples

2011-03-09 Thread Cal Leeming
It sounds like you are looking for drive by kit samples.

Why not just write your own crawler? Find an AV (which has drive by kit
detection and passive scanning), check to see how many requests you can send
to it per minute, then pipe in a shit load of random URLs based on crawled
links from ads (ads links are the most common for having drive by kits), see
which requests were blocked, and queue them for mirroring later.

Some AVs will do drive by kit detection without needing to call a remote
API, which would be quite nice.

Obviously, the AVs aren't going to give you a nice API which you can call
directly, so there would be some tinkering and possibly memory injection
involved.

This approach isn't exactly going to have a high hit rate, and you will
still need to de-obfuscate / decompile and analyse any malware you find, but
it'd be a giggle either way.

There's probably a better way of doing it, but this would certainly be fun
to make :D

On Wed, Mar 9, 2011 at 7:56 PM, John Harwold  wrote:

> 0. ) I need that malware for research stuff.
>
> 1. ) There is no way for me to prove that I'm speaking truth.
>
> 2. ) What's wrong with gmail address?
>
> 3. )  500$ offer is still active.
>
>
> Sincerely,
> J.H.
>
>
>
> On Wed, Mar 9, 2011 at 8:23 PM, Cal Leeming  wrote:
>
>> Actually, just out of curiosity, why do you need to purchase malware
>> samples?
>>
>> On Wed, Mar 9, 2011 at 7:19 PM, Cal Leeming  wrote:
>>
>>> 1) You are requesting this from a gmail address. Not a good look.
>>>
>>> 2) You aren't representing yourself as a company entity, which indicates
>>> you might want this malware for malicious purposes.
>>>
>>> 3) Looks like you're trying to bullshit tbh.
>>>
>>> Just my two cents.
>>>
>>> On Wed, Mar 9, 2011 at 6:34 PM, John Harwold wrote:
>>>
 I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater.
 If I say that I'll pay 500$ for best submission, I'll pay 500$ for it.

 I won't pay before I see the stuff.
 I don't want to pay 500$ for big zip file with garbage in it.

 Best submission will be rewarded with 500$. That's it.
 If you have what I need, and you are not satisfied with this
 arrangement, find a way in which we'll both be satisfied...
 give me access to place where I can inspect them or something like that.

 Sincerely,
 J.H.


 On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote:

>  Yes lets all send out malware samples and *hope* you actually pay the
> best submission, tell you what send me the $500 and ill send you a pretty
> comprehensive tar full of samples.
>
>
>  --
> *From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
> full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John Harwold
> *Sent:* 09 March 2011 16:35
> *To:* full-disclosure@lists.grok.org.uk
> *Subject:* [Full-disclosure] Buying Web Malware Samples
>
> Hi folks,
>
> I'm buying web malware samples... obfuscated malicious javascript, web
> exploit kits, pdf malware, browser/activex exploits, etc.
> I'm not interested in executable (PE/ELF) malware.
> Contact me on email with download URL, or send ZIP/TAR/RAR malware
> archive directly to my email (with changed archive extension to .MAL 
> because
> of gmail filtering).
>
> After two weeks, contributions will be revisited and person with
> largest collection of real web malware will receive prize of 500$.
>
> Bye,
> J.H.
>
>
>

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

>>>
>>>
>>
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Buying Web Malware Samples

2011-03-09 Thread Cal Leeming
Oh, just a side note, there is probably some term somewhere in the TCs/AUP
of the anti virus you are using, that states you will be sued by over 9000
lawyers if you do this. I'd strongly recommend seeking legal advice before
hand lol.

On Wed, Mar 9, 2011 at 8:15 PM, Cal Leeming  wrote:

> It sounds like you are looking for drive by kit samples.
>
> Why not just write your own crawler? Find an AV (which has drive by kit
> detection and passive scanning), check to see how many requests you can send
> to it per minute, then pipe in a shit load of random URLs based on crawled
> links from ads (ads links are the most common for having drive by kits), see
> which requests were blocked, and queue them for mirroring later.
>
> Some AVs will do drive by kit detection without needing to call a remote
> API, which would be quite nice.
>
> Obviously, the AVs aren't going to give you a nice API which you can call
> directly, so there would be some tinkering and possibly memory injection
> involved.
>
> This approach isn't exactly going to have a high hit rate, and you will
> still need to de-obfuscate / decompile and analyse any malware you find, but
> it'd be a giggle either way.
>
> There's probably a better way of doing it, but this would certainly be fun
> to make :D
>
> On Wed, Mar 9, 2011 at 7:56 PM, John Harwold wrote:
>
>> 0. ) I need that malware for research stuff.
>>
>> 1. ) There is no way for me to prove that I'm speaking truth.
>>
>> 2. ) What's wrong with gmail address?
>>
>> 3. )  500$ offer is still active.
>>
>>
>> Sincerely,
>> J.H.
>>
>>
>>
>> On Wed, Mar 9, 2011 at 8:23 PM, Cal Leeming  wrote:
>>
>>> Actually, just out of curiosity, why do you need to purchase malware
>>> samples?
>>>
>>> On Wed, Mar 9, 2011 at 7:19 PM, Cal Leeming wrote:
>>>
 1) You are requesting this from a gmail address. Not a good look.

 2) You aren't representing yourself as a company entity, which indicates
 you might want this malware for malicious purposes.

 3) Looks like you're trying to bullshit tbh.

 Just my two cents.

 On Wed, Mar 9, 2011 at 6:34 PM, John Harwold wrote:

> I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater.
> If I say that I'll pay 500$ for best submission, I'll pay 500$ for it.
>
> I won't pay before I see the stuff.
> I don't want to pay 500$ for big zip file with garbage in it.
>
> Best submission will be rewarded with 500$. That's it.
> If you have what I need, and you are not satisfied with this
> arrangement, find a way in which we'll both be satisfied...
> give me access to place where I can inspect them or something like
> that.
>
> Sincerely,
> J.H.
>
>
> On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote:
>
>>  Yes lets all send out malware samples and *hope* you actually pay
>> the best submission, tell you what send me the $500 and ill send you a
>> pretty comprehensive tar full of samples.
>>
>>
>>  --
>> *From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
>> full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John
>> Harwold
>> *Sent:* 09 March 2011 16:35
>> *To:* full-disclosure@lists.grok.org.uk
>> *Subject:* [Full-disclosure] Buying Web Malware Samples
>>
>> Hi folks,
>>
>> I'm buying web malware samples... obfuscated malicious javascript, web
>> exploit kits, pdf malware, browser/activex exploits, etc.
>> I'm not interested in executable (PE/ELF) malware.
>> Contact me on email with download URL, or send ZIP/TAR/RAR malware
>> archive directly to my email (with changed archive extension to .MAL 
>> because
>> of gmail filtering).
>>
>> After two weeks, contributions will be revisited and person with
>> largest collection of real web malware will receive prize of 500$.
>>
>> Bye,
>> J.H.
>>
>>
>>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>


>>>
>>
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Buying Web Malware Samples

2011-03-09 Thread John Harwold
0. ) I need that malware for research stuff.

1. ) There is no way for me to prove that I'm speaking truth.

2. ) What's wrong with gmail address?

3. )  500$ offer is still active.


Sincerely,
J.H.


On Wed, Mar 9, 2011 at 8:23 PM, Cal Leeming  wrote:

> Actually, just out of curiosity, why do you need to purchase malware
> samples?
>
> On Wed, Mar 9, 2011 at 7:19 PM, Cal Leeming  wrote:
>
>> 1) You are requesting this from a gmail address. Not a good look.
>>
>> 2) You aren't representing yourself as a company entity, which indicates
>> you might want this malware for malicious purposes.
>>
>> 3) Looks like you're trying to bullshit tbh.
>>
>> Just my two cents.
>>
>> On Wed, Mar 9, 2011 at 6:34 PM, John Harwold wrote:
>>
>>> I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater.
>>> If I say that I'll pay 500$ for best submission, I'll pay 500$ for it.
>>>
>>> I won't pay before I see the stuff.
>>> I don't want to pay 500$ for big zip file with garbage in it.
>>>
>>> Best submission will be rewarded with 500$. That's it.
>>> If you have what I need, and you are not satisfied with this arrangement,
>>> find a way in which we'll both be satisfied...
>>> give me access to place where I can inspect them or something like that.
>>>
>>> Sincerely,
>>> J.H.
>>>
>>>
>>> On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote:
>>>
  Yes lets all send out malware samples and *hope* you actually pay the
 best submission, tell you what send me the $500 and ill send you a pretty
 comprehensive tar full of samples.


  --
 *From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
 full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John Harwold
 *Sent:* 09 March 2011 16:35
 *To:* full-disclosure@lists.grok.org.uk
 *Subject:* [Full-disclosure] Buying Web Malware Samples

 Hi folks,

 I'm buying web malware samples... obfuscated malicious javascript, web
 exploit kits, pdf malware, browser/activex exploits, etc.
 I'm not interested in executable (PE/ELF) malware.
 Contact me on email with download URL, or send ZIP/TAR/RAR malware
 archive directly to my email (with changed archive extension to .MAL 
 because
 of gmail filtering).

 After two weeks, contributions will be revisited and person with largest
 collection of real web malware will receive prize of 500$.

 Bye,
 J.H.



>>>
>>> ___
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>
>>
>>
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Buying Web Malware Samples

2011-03-09 Thread Cal Leeming
Actually, just out of curiosity, why do you need to purchase malware
samples?

On Wed, Mar 9, 2011 at 7:19 PM, Cal Leeming  wrote:

> 1) You are requesting this from a gmail address. Not a good look.
>
> 2) You aren't representing yourself as a company entity, which indicates
> you might want this malware for malicious purposes.
>
> 3) Looks like you're trying to bullshit tbh.
>
> Just my two cents.
>
> On Wed, Mar 9, 2011 at 6:34 PM, John Harwold wrote:
>
>> I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater.
>> If I say that I'll pay 500$ for best submission, I'll pay 500$ for it.
>>
>> I won't pay before I see the stuff.
>> I don't want to pay 500$ for big zip file with garbage in it.
>>
>> Best submission will be rewarded with 500$. That's it.
>> If you have what I need, and you are not satisfied with this arrangement,
>> find a way in which we'll both be satisfied...
>> give me access to place where I can inspect them or something like that.
>>
>> Sincerely,
>> J.H.
>>
>>
>> On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote:
>>
>>>  Yes lets all send out malware samples and *hope* you actually pay the
>>> best submission, tell you what send me the $500 and ill send you a pretty
>>> comprehensive tar full of samples.
>>>
>>>
>>>  --
>>> *From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
>>> full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John Harwold
>>> *Sent:* 09 March 2011 16:35
>>> *To:* full-disclosure@lists.grok.org.uk
>>> *Subject:* [Full-disclosure] Buying Web Malware Samples
>>>
>>> Hi folks,
>>>
>>> I'm buying web malware samples... obfuscated malicious javascript, web
>>> exploit kits, pdf malware, browser/activex exploits, etc.
>>> I'm not interested in executable (PE/ELF) malware.
>>> Contact me on email with download URL, or send ZIP/TAR/RAR malware
>>> archive directly to my email (with changed archive extension to .MAL because
>>> of gmail filtering).
>>>
>>> After two weeks, contributions will be revisited and person with largest
>>> collection of real web malware will receive prize of 500$.
>>>
>>> Bye,
>>> J.H.
>>>
>>>
>>>
>>
>> ___
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Buying Web Malware Samples

2011-03-09 Thread Cal Leeming
1) You are requesting this from a gmail address. Not a good look.

2) You aren't representing yourself as a company entity, which indicates you
might want this malware for malicious purposes.

3) Looks like you're trying to bullshit tbh.

Just my two cents.

On Wed, Mar 9, 2011 at 6:34 PM, John Harwold  wrote:

> I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater.
> If I say that I'll pay 500$ for best submission, I'll pay 500$ for it.
>
> I won't pay before I see the stuff.
> I don't want to pay 500$ for big zip file with garbage in it.
>
> Best submission will be rewarded with 500$. That's it.
> If you have what I need, and you are not satisfied with this arrangement,
> find a way in which we'll both be satisfied...
> give me access to place where I can inspect them or something like that.
>
> Sincerely,
> J.H.
>
>
> On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie wrote:
>
>>  Yes lets all send out malware samples and *hope* you actually pay the
>> best submission, tell you what send me the $500 and ill send you a pretty
>> comprehensive tar full of samples.
>>
>>
>>  --
>> *From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
>> full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John Harwold
>> *Sent:* 09 March 2011 16:35
>> *To:* full-disclosure@lists.grok.org.uk
>> *Subject:* [Full-disclosure] Buying Web Malware Samples
>>
>> Hi folks,
>>
>> I'm buying web malware samples... obfuscated malicious javascript, web
>> exploit kits, pdf malware, browser/activex exploits, etc.
>> I'm not interested in executable (PE/ELF) malware.
>> Contact me on email with download URL, or send ZIP/TAR/RAR malware archive
>> directly to my email (with changed archive extension to .MAL because of
>> gmail filtering).
>>
>> After two weeks, contributions will be revisited and person with largest
>> collection of real web malware will receive prize of 500$.
>>
>> Bye,
>> J.H.
>>
>>
>>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Accidental disclosure of the French Ministry of Foreign affairs computer security plans

2011-03-09 Thread victorlandre

Accidental disclosure of the French Ministry of Foreign affairs 
computer security plans
from 
http://www.linformaticien.com/Actualités/tabid/58/newsid496/10517/ex
clusif-le-si-des-affaires-etrangeres-en-acces-libre/Default.aspx
Archive is DCE_partiel_maee_10266_DSI_MSA.zip (main file is CCTP 
10266_MAE.pdf)

http://rapidshare.com/files/451787863/DCE_partiel_maee_10266_DSI_MSA
.zip
http://hidemyass.com/files/5Bwh2/
http://www.zshare.net/download/87591417f0d3306b/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [Onapsis Research Labs] New SAP Security In-Depth issue and Tool - The Silent Threat: SAP Backdoors and Rootkits

2011-03-09 Thread Onapsis Research Labs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Dear colleague,

We are happy to announce the third issue of the Onapsis SAP Security In-Depth 
publication.

Onapsis' SAP Security In-Depth is a free technical publication leaded by the 
Onapsis Research Labs with the purpose of providing specialized
information about the current and future risks in the SAP security field, 
allowing all the different actors (financial managers, information security
managers, SAP administrators, auditors, consultants and the general 
professional community) to better understand the involved risks  and the
techniques and tools available to assess and mitigate them.

In this edition: "The Silent Threat: SAP Backdoors and Rootkits", by Mariano 
Nuñez Di Croce.

"Backdoors and rootkits have existed for a long time. From PCI cards to the 
most modern operating systems, almost every system is susceptible of being
attacked and modified to hold a malicious program that will secure future 
access for the attacker and even perform unauthorized activities, while
trying to remain undetected.

As SAP business solutions run the most critical business information and 
processes in the organization, a backdoor in this platform would imply severe
impacts for the business. If the organization is not securing its systems 
properly, it would be possible for a remote, anonymous attacker to  perform
continuous espionage, fraud and sabotage attacks through the injection of a 
backdoor or rootkit in the SAP platform.

This publication analyzes some of the different attack vectors that malicious 
parties can use to try to inject backdoors and rootkits in the SAP
platform, in order to understand which are the necessary protection measures 
that need to be implemented to protect the business crown jewels."

The full publication can be downloaded from 
http://www.onapsis.com/resources/get.php?resid=ssid03

At the same time, we have released a new free tool: Onapsis Integrity Analyzer 
for SAP.
This proof-of-concept will help you identify future unauthorized modifications 
of standard ABAP programs in your SAP systems, which could be the
result of backdoor or rootkit attacks. The tool can be downloaded from 
http://www.onapsis.com/ianalyzer

We hope you can enjoy these new resources!
We would also love to get your feedback. Feel free to write us back with your 
comments and ideas.

Kindest regards,

- -- 
- 
The Onapsis Research Labs Team

Onapsis S.R.L
Email: resea...@onapsis.com
Web: www.onapsis.com
PGP: http://www.onapsis.com/pgp/research.asc
- 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk137zQACgkQz3i6WNVBcDV0RACdHgigAxhnix2h31TYRI7jpEAH
wDMAn2k6iiVK92RlVmkwcDGB5d2VCE8j
=oPVY
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] need good web browser fuzzing tools

2011-03-09 Thread supercodeing35271 supercodeing35271
hi,anyone who can tell me a useful browser fuzzing tool especially for firefox?

Thanks.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Buying Web Malware Samples

2011-03-09 Thread John Harwold
I need (JS/PDF/HTML/Exploit) malware samples, and I'm not a cheater.
If I say that I'll pay 500$ for best submission, I'll pay 500$ for it.

I won't pay before I see the stuff.
I don't want to pay 500$ for big zip file with garbage in it.

Best submission will be rewarded with 500$. That's it.
If you have what I need, and you are not satisfied with this arrangement,
find a way in which we'll both be satisfied...
give me access to place where I can inspect them or something like that.

Sincerely,
J.H.

On Wed, Mar 9, 2011 at 7:21 PM, McGhee, Eddie  wrote:

>  Yes lets all send out malware samples and *hope* you actually pay the
> best submission, tell you what send me the $500 and ill send you a pretty
> comprehensive tar full of samples.
>
>
>  --
> *From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
> full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *John Harwold
> *Sent:* 09 March 2011 16:35
> *To:* full-disclosure@lists.grok.org.uk
> *Subject:* [Full-disclosure] Buying Web Malware Samples
>
> Hi folks,
>
> I'm buying web malware samples... obfuscated malicious javascript, web
> exploit kits, pdf malware, browser/activex exploits, etc.
> I'm not interested in executable (PE/ELF) malware.
> Contact me on email with download URL, or send ZIP/TAR/RAR malware archive
> directly to my email (with changed archive extension to .MAL because of
> gmail filtering).
>
> After two weeks, contributions will be revisited and person with largest
> collection of real web malware will receive prize of 500$.
>
> Bye,
> J.H.
>
>
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Buying Web Malware Samples

2011-03-09 Thread McGhee, Eddie
Yes lets all send out malware samples and *hope* you actually pay the best 
submission, tell you what send me the $500 and ill send you a pretty 
comprehensive tar full of samples.



From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of John Harwold
Sent: 09 March 2011 16:35
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Buying Web Malware Samples

Hi folks,

I'm buying web malware samples... obfuscated malicious javascript, web exploit 
kits, pdf malware, browser/activex exploits, etc.
I'm not interested in executable (PE/ELF) malware.
Contact me on email with download URL, or send ZIP/TAR/RAR malware archive 
directly to my email (with changed archive extension to .MAL because of gmail 
filtering).

After two weeks, contributions will be revisited and person with largest 
collection of real web malware will receive prize of 500$.

Bye,
J.H.



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Buying Web Malware Samples

2011-03-09 Thread John Harwold
Hi folks,

I'm buying web malware samples... obfuscated malicious javascript, web
exploit kits, pdf malware, browser/activex exploits, etc.
I'm not interested in executable (PE/ELF) malware.
Contact me on email with download URL, or send ZIP/TAR/RAR malware archive
directly to my email (with changed archive extension to .MAL because of
gmail filtering).

After two weeks, contributions will be revisited and person with largest
collection of real web malware will receive prize of 500$.

Bye,
J.H.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] List Charter

2011-03-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter
John Cartwright 
 

- Introduction & Purpose -

This document serves as a charter for the [Full-Disclosure] mailing 
list hosted at lists.grok.org.uk.

The list was created on 9th July 2002 by Len Rose, and is primarily 
concerned with security issues and their discussion.  The list is 
administered by John Cartwright.

The Full-Disclosure list is hosted and sponsored by Secunia.


- Subscription Information -

Subscription/unsubscription may be performed via the HTTP interface 
located at http://lists.grok.org.uk/mailman/listinfo/full-disclosure.

Alternatively, commands may be emailed to 
full-disclosure-requ...@lists.grok.org.uk, send the word 'help' in 
either the message subject or body for details.

 
- Moderation & Management -

The [Full-Disclosure] list is unmoderated. Typically posting will be
restricted to members only, however the administrators may choose to 
accept submissions from non-members based on individual merit and 
relevance.

It is expected that the list will be largely self-policing, however in
special circumstances (eg spamming, misappropriation) then offending 
members may be removed from the list by the management.

An archive of postings is available at 
http://lists.grok.org.uk/pipermail/full-disclosure/.
 

- Acceptable Content -

Any information pertaining to vulnerabilities is acceptable, for 
instance announcement and discussion thereof, exploit techniques and 
code, related tools and papers, and other useful information.

Gratuitous advertisement, product placement, or self-promotion is 
forbidden.  Disagreements, flames, arguments, and off-topic discussion 
should be taken off-list wherever possible.

Humour is acceptable in moderation, providing it is inoffensive. 
Politics should be avoided at all costs.

Members are reminded that due to the open nature of the list, they 
should use discretion in executing any tools or code distributed via
this list.
 

- Posting Guidelines -

The primary language of this list is English. Members are expected to 
maintain a reasonable standard of netiquette when posting to the list. 

Quoting should not exceed that which is necessary to convey context, 
this is especially relevant to members subscribed to the digested 
version of the list.

The use of HTML is discouraged, but not forbidden. Signatures will 
preferably be short and to the point, and those containing 
'disclaimers' should be avoided where possible.

Attachments may be included if relevant or necessary (e.g. PGP or 
S/MIME signatures, proof-of-concept code, etc) but must not be active 
(in the case of a worm, for example) or malicious to the recipient.

Vacation messages should be carefully configured to avoid replying to 
list postings. Offenders will be excluded from the mailing list until 
the problem is corrected.

Members may post to the list by emailing 
full-disclosure@lists.grok.org.uk. Do not send subscription/
unsubscription mails to this address, use the -request address 
mentioned above.


- Charter Additions/Changes -

The list charter will be published at 
http://lists.grok.org.uk/full-disclosure-charter.html.

In addition, the charter will be posted monthly to the list by the 
management.

Alterations will be made after consultation with list members and a 
consensus has been reached.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Call for Papers: i-Society 2011!

2011-03-09 Thread Call for papers
Call for Papers: i-Society 2011!

Apologies for cross-postings. Please send it to interested
colleagues and students. Thanks!

CALL FOR PAPERS

***
International Conference on Information Society (i-Society 2011),
Technically Co-Sponsored by IEEE UK/RI Computer Chapter
27-29 June, 2011, London, UK
www.i-society.eu
***

The International Conference on Information Society (i-Society 2011)
is Technically Co-Sponsored by IEEE UK/RI Computer Chapter.
The i-Society is a global knowledge-enriched collaborative effort
that has its roots from both academia and industry. The conference
covers a wide spectrum of topics that relate to information society,
which includes technical and non-technical research areas.

The mission of i-Society 2011 conference is to provide opportunities
for collaboration of professionals and researchers to share existing
and generate new knowledge in the field of information society.
The conference encapsulates the concept of interdisciplinary science
that studies the societal and technological dimensions of knowledge
evolution in digital society. The i-Society bridges the gap
between academia and industry with regards to research collaboration
and awareness of current development in secure information management
in the digital society.

The topics in i-Society 2011 include but are not confined to the
following areas:

*New enabling technologies
- Internet technologies
- Wireless applications
- Mobile Applications
- Multimedia Applications
- Protocols and Standards
- Ubiquitous Computing
- Virtual Reality
- Human Computer Interaction
- Geographic information systems
- e-Manufacturing

*Intelligent data management
- Intelligent Agents
- Intelligent Systems
- Intelligent Organisations
- Content Development
- Data Mining
- e-Publishing and Digital Libraries
- Information Search and Retrieval
- Knowledge Management
- e-Intelligence
- Knowledge networks

*Secure Technologies
- Internet security
- Web services and performance
- Secure transactions
- Cryptography
- Payment systems
- Secure Protocols
- e-Privacy
- e-Trust
- e-Risk
- Cyber law
- Forensics
- Information assurance
- Mobile social networks
- Peer-to-peer social networks
- Sensor networks and social sensing

*e-Learning
- Collaborative Learning
- Curriculum Content Design and Development
- Delivery Systems and Environments
- Educational Systems Design
- e-Learning Organisational Issues
- Evaluation and Assessment
- Virtual Learning Environments and Issues
- Web-based Learning Communities
- e-Learning Tools
- e-Education

*e-Society
- Global Trends
- Social Inclusion
- Intellectual Property Rights
- Social Infonomics
- Computer-Mediated Communication
- Social and Organisational Aspects
- Globalisation and developmental IT
- Social Software

*e-Health
- Data Security Issues
- e-Health Policy and Practice
- e-Healthcare Strategies and Provision
- Medical Research Ethics
- Patient Privacy and Confidentiality
- e-Medicine

*e-Governance
- Democracy and the Citizen
- e-Administration
- Policy Issues
- Virtual Communities

*e-Business
- Digital Economies
- Knowledge economy
- eProcurement
- National and International Economies
- e-Business Ontologies and Models
- Digital Goods and Services
- e-Commerce Application Fields
- e-Commerce Economics
- e-Commerce Services
- Electronic Service Delivery
- e-Marketing
- Online Auctions and Technologies
- Virtual Organisations
- Teleworking
- Applied e-Business
- Electronic Data Interchange (EDI)

*e-Art
- Legal Issues
- Patents
- Enabling technologies and tools

*e-Science
- Natural sciences in digital society
- Biometrics
- Bioinformatics
- Collaborative research

*Industrial developments
- Trends in learning
- Applied research
- Cutting-edge technologies

* Research in progress
- Ongoing research from undergraduates, graduates/postgraduates and 
professionals

Important Dates:

Paper Submission Date: March 31, 2011
Short Paper (Extended Abstract or Work in Progress): March 20, 2011
Notification of Paper Acceptance /Rejection: April 15, 2011
Notification of Short Paper (Extended Abstract or Work in Progress) 
Acceptance /Rejection: April 10, 2011
Camera Ready Paper and Short Paper Due: April 30, 2011
Participant(s) Registration (Open):  January 1, 2011
Early Bird Attendee Registration Deadline (Authors only): February 1 to 
April 30, 2011
Late Bird Attendee Registration Deadline (Authors only): May 1 to June 
1, 2011
Conference Dates: June 27-29, 2011

For more details, please visit www.i-society.eu

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Insect Pro 2.1 : New version release

2011-03-09 Thread Cal Leeming
Could you elaborate on your thoughts? (have you tried the product etc?)

On Tue, Mar 8, 2011 at 2:45 PM, Hyperion Hyp wrote:

> msf rip imo
>
>
> On 7 March 2011 17:07, Juan Sacco  wrote:
>
>>  The Insect Pro 2.1 new version is now accessible on Insecurity Research
>>  servers!
>>  Get it now to enjoy the positive changes that this update brings, based
>>  directly on user feedback
>>
>>  Insect Pro is a penetration security auditing and testing software
>>  solution designed to allow organizations of all sizes mitigate, monitor
>>  and manage the latest security threats vulnerabilities and implement
>>  active security policies by performing penetration tests across their
>>  infrastructure and applications.
>>
>>  Insect Pro 2.1 includes:
>>  Minimize to systray to work in background
>>  Video recording
>>  Capture screenshots
>>  Keylogging feature
>>  Command-line based control
>>  GUI improved
>>
>>  Read full patch notes on our site to learn more about what's new and
>>  improved.
>>
>>  Also, anyone that has not yet donate to get a license may do it now and
>>  obtain a free version of the new stealth keylogger!
>>
>>  Juan Sacco
>> --
>>  _
>>  Insecurity Research - Security auditing and testing software
>>  Web: http://www.insecurityresearch.com
>>  Insect Pro 2.1 was released stay tunned
>>
>> ___
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [SECURITY] [DSA 2185-1] proftpd-dfsg security update

2011-03-09 Thread Moritz Mühlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2185-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
March 07, 2011 http://www.debian.org/security/faq
- -

Package: proftpd-dfsg
Vulnerability  : integer overflow
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2011-1137

It was discovered that an integer overflow in the SFTP file transfer
module of the ProFTPD daemon could lead to denial of service. 

The oldstable distribution (lenny) is not affected. 

For the stable distribution (squeeze), this problem has been fixed in
version 1.3.3a-6squeeze1.

For the unstable distribution (sid), this problem has been fixed in
version 1.3.3d-4.

We recommend that you upgrade your proftpd-dfsg packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk11cy8ACgkQXm3vHE4uylp2YACfcrFp88qmWgSfXjL9lXHRKN79
XmkAoMnyDATfVMtscO/ZWc3Uo+YGZHiM
=S1pq
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/