Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Jeffrey Walton
RFC 2142 offers a number of well known mailboxes that should be
monitored. Tyr secure@, security@, and support@.

WHOIS offers technical and administrative contacts.

$ whois bankofthewest.com

Whois Server Version 2.0

Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to http://www.internic.net
for detailed information.

   Domain Name: BANKOFTHEWEST.COM
   Registrar: NETWORK SOLUTIONS, LLC.
   Whois Server: whois.networksolutions.com
   Referral URL: http://www.networksolutions.com/en_US/
   Name Server: A1.VERISIGNDNS.COM
   Name Server: A2.VERISIGNDNS.COM
   Name Server: A3.VERISIGNDNS.COM
   Name Server: DNS1.BANKOFTHEWEST.COM
   Name Server: DNS2.BANKOFTHEWEST.COM
   Name Server: DNS3.BANKOFTHEWEST.COM
   Name Server: DNS4.BANKOFTHEWEST.COM
   Status: clientTransferProhibited
   Updated Date: 13-jul-2013
   Creation Date: 23-jan-1996
   Expiration Date: 24-jan-2020

 Last update of whois database: Sat, 08 Feb 2014 09:19:03 UTC 

NOTICE: The expiration date displayed in this record is the date the
registrar's sponsorship of the domain name registration in the registry is
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar.  Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.

TERMS OF USE: You are not authorized to ...

The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.

Domain Name: BANKOFTHEWEST.COM
Registry Domain ID:
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://www.networksolutions.com/en_US/
Updated Date: 2011-01-04T00:00:00Z
Creation Date: 1996-01-23T00:00:00Z
Registrar Registration Expiration Date: 2020-01-25T00:00:00Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrar Abuse Contact Email: ab...@web.com
Registrar Abuse Contact Phone: 800-333-7680
Reseller:
Domain Status: clientTransferProhibited
Registry Registrant ID:
Registrant Name: the West, Bank of
Registrant Organization: Bank of the West / William Scanlin
Registrant Street: 2527 Camino Ramon
Registrant City: San Ramon
Registrant State/Province: CA
Registrant Postal Code: 94583
Registrant Country: US
Registrant Phone: (925) 843-2358
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: regist...@bankofthewest.com
Registry Admin ID:
Admin Name: the West, Bank of
Admin Organization: Bank of the West / William Scanlin
Admin Street: 2527 Camino Ramon
Admin City: San Ramon
Admin State/Province: CA
Admin Postal Code: 94583
Admin Country: US
Admin Phone: (925) 843-2358
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: regist...@bankofthewest.com
Registry Tech ID:
Tech Name: the West, Bank of
Tech Organization: Bank of the West / William Scanlin
Tech Street: 2527 Camino Ramon
Tech City: San Ramon
Tech State/Province: CA
Tech Postal Code: 94583
Tech Country: US
Tech Phone: (925) 843-2358
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: regist...@bankofthewest.com
Name Server: DNS1.BANKOFTHEWEST.COM
Name Server: DNS2.BANKOFTHEWEST.COM
Name Server: DNS3.BANKOFTHEWEST.COM
Name Server: DNS4.BANKOFTHEWEST.COM
Name Server: A1.VERISIGNDNS.COM
Name Server: A2.VERISIGNDNS.COM
Name Server: A3.VERISIGNDNS.COM
DNSSEC: not signed
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
 Last update of whois database: Sat, 08 Feb 2014 09:19:03 UTC 

The data in Networksolutions.com's WHOIS database ...

On Sat, Feb 8, 2014 at 12:27 AM, Kristian Erik Hermansen
kristian.herman...@gmail.com wrote:
 Anyone have security contact at Bank of the West?
 --
 Kristian Erik Hermansen
 https://www.linkedin.com/in/kristianhermansen
 https://profiles.google.com/kristian.hermansen


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Justin Ferguson
well, not to be outdone by the RFC parroting and amazing whois. If you
google @bankofthewest.com or (at)bankofthewest(dot)com you'll pull
a bazillion email addresses that you can spam. Alternatively
c...@bankofthewest.com c...@bankofthewest.com or
kirsten.ga...@bankofthewest.com or duke.da...@bankofthewest.com as
firstname.lastn...@bankofthwest.com is the apparent format.

That said, unlike turbo here, I recognize you're looking for confirmed
contacts, and I don't have any there. He thought you possibly didn't
know how to whois, I suggested to him that he could also look up their
CSR number in the phone book, because perhaps you didn't know how to
do that either; of course, American banks don't actually get that +1
is a country code.. so, yeah.

Best of Luck.

On Sat, Feb 8, 2014 at 5:45 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Sat, Feb 8, 2014 at 12:27 AM, Kristian Erik Hermansen
 kristian.herman...@gmail.com wrote:
 Anyone have security contact at Bank of the West?

 You might also try reaching out to Justin Ferguson. The impression I
 got is he is masterful at infosec; and he can probably put you in
 touch with someone in about 3 degrees - perhaps even 1 (that beats the
 snot out of six degrees for other famous people).

 Jeff

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



-- 
--

Am I not destroying my enemies when I make friends of them?
-- Abraham Lincoln

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Jann Horn
On Sat, Feb 08, 2014 at 04:21:52AM -0500, Jeffrey Walton wrote:
 RFC 2142 offers a number of well known mailboxes that should be
 monitored. Tyr secure@, security@, and support@.

Doesn't look as it any of those addresses would work:

RCPT TO:secur...@bankofthewest.com
550 Mailbox unavailable or access denied - secur...@bankofthewest.com
RCPT TO:sec...@bankofthewest.com
550 Mailbox unavailable or access denied - sec...@bankofthewest.com
RCPT TO:supp...@bankofthewest.com
550 Mailbox unavailable or access denied - supp...@bankofthewest.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Jeffrey Walton
On Sat, Feb 8, 2014 at 6:05 AM, Justin Ferguson j...@ownco.net wrote:
 well, not to be outdone by the RFC parroting and amazing whois. If you
 google @bankofthewest.com or (at)bankofthewest(dot)com you'll pull
 a bazillion email addresses that you can spam. Alternatively
 c...@bankofthewest.com c...@bankofthewest.com or
 kirsten.ga...@bankofthewest.com or duke.da...@bankofthewest.com as
 firstname.lastn...@bankofthwest.com is the apparent format.

 That said, unlike turbo here, I recognize you're looking for confirmed
 contacts, and I don't have any there. He thought you possibly didn't
 know how to whois, I suggested to him that he could also look up their
 CSR number in the phone book, because perhaps you didn't know how to
 do that either; of course, American banks don't actually get that +1
 is a country code.. so, yeah.
You should also provide some of that crack legal advice, too.

Jeff

 On Sat, Feb 8, 2014 at 5:45 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Sat, Feb 8, 2014 at 12:27 AM, Kristian Erik Hermansen
 kristian.herman...@gmail.com wrote:
 Anyone have security contact at Bank of the West?

 You might also try reaching out to Justin Ferguson. The impression I
 got is he is masterful at infosec; and he can probably put you in
 touch with someone in about 3 degrees - perhaps even 1 (that beats the
 snot out of six degrees for other famous people).


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Justin Ferguson
i think we need valdis' expert opinion here.

On Sat, Feb 8, 2014 at 6:33 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Sat, Feb 8, 2014 at 6:05 AM, Justin Ferguson j...@ownco.net wrote:
 well, not to be outdone by the RFC parroting and amazing whois. If you
 google @bankofthewest.com or (at)bankofthewest(dot)com you'll pull
 a bazillion email addresses that you can spam. Alternatively
 c...@bankofthewest.com c...@bankofthewest.com or
 kirsten.ga...@bankofthewest.com or duke.da...@bankofthewest.com as
 firstname.lastn...@bankofthwest.com is the apparent format.

 That said, unlike turbo here, I recognize you're looking for confirmed
 contacts, and I don't have any there. He thought you possibly didn't
 know how to whois, I suggested to him that he could also look up their
 CSR number in the phone book, because perhaps you didn't know how to
 do that either; of course, American banks don't actually get that +1
 is a country code.. so, yeah.
 You should also provide some of that crack legal advice, too.

 Jeff

 On Sat, Feb 8, 2014 at 5:45 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Sat, Feb 8, 2014 at 12:27 AM, Kristian Erik Hermansen
 kristian.herman...@gmail.com wrote:
 Anyone have security contact at Bank of the West?

 You might also try reaching out to Justin Ferguson. The impression I
 got is he is masterful at infosec; and he can probably put you in
 touch with someone in about 3 degrees - perhaps even 1 (that beats the
 snot out of six degrees for other famous people).




-- 
--

Am I not destroying my enemies when I make friends of them?
-- Abraham Lincoln

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Jeffrey Walton
On Sat, Feb 8, 2014 at 6:05 AM, Justin Ferguson j...@ownco.net wrote:
 well, not to be outdone by the RFC parroting and amazing whois. If you
 google @bankofthewest.com ...
Google does not allow you to search for the '@' symbol.
https://productforums.google.com/forum/#!topic/websearch/Dj-lKNCKK8o.

That's why there are email harvesters out there.

Perhaps you were using the amphora symbol, or you meant bankofthewest.com.

Jeff

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Justin Ferguson
 Google does not allow you to search for the '@' symbol.

funny, there is a marked difference between when you search for
domain.com and @domain.com, one of which is that it includes a lot
of email addresses. Google is even so kind as to link in common email
address distortions.

Try before you speak please, turbo.

On Sat, Feb 8, 2014 at 6:57 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Sat, Feb 8, 2014 at 6:05 AM, Justin Ferguson j...@ownco.net wrote:
 well, not to be outdone by the RFC parroting and amazing whois. If you
 google @bankofthewest.com ...
 Google does not allow you to search for the '@' symbol.
 https://productforums.google.com/forum/#!topic/websearch/Dj-lKNCKK8o.

 That's why there are email harvesters out there.

 Perhaps you were using the amphora symbol, or you meant bankofthewest.com.

 Jeff



-- 
--

Am I not destroying my enemies when I make friends of them?
-- Abraham Lincoln

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Jeffrey Walton
On Sat, Feb 8, 2014 at 7:05 AM, Justin Ferguson j...@ownco.net wrote:
 Google does not allow you to search for the '@' symbol.

 funny, there is a marked difference between when you search for
 domain.com and @domain.com, one of which is that it includes a lot
 of email addresses. Google is even so kind as to link in common email
 address distortions.

 Try before you speak please, turbo.
Oh, got it. Google's policies and rules don't apply to you. Silly me.

You'll have to forgive me. I'm a slow learner at times.

Jeff

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Justin Ferguson
 Oh, got it. Google's policies and rules don't apply to you. Silly me.

feel free to try it yourself, probably takes less time than you know,
reading policies they quite obviously bend. I mean, seriously, this is
on the first page of hits:
http://webcache.googleusercontent.com/search?q=cache:_iETEKI6kCkJ:www.sharkonline.org/index.php/take-action/contact-corporate-sponsors/1332-get-bank-of-the-west-out-of-rodeo+cd=12hl=enct=clnkgl=us

This is on the second:
http://webcache.googleusercontent.com/search?q=cache:h1khHCwhgBQJ:leasingnews.org/PDF/Email_Capitalwerks.pdf+cd=19hl=enct=clnkgl=us

et cetera, but hey, cool story bro.

 You'll have to forgive me. I'm a slow learner at times.

probably because, per you, you dont read webpages due to evil ToS' ..

On Sat, Feb 8, 2014 at 7:07 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Sat, Feb 8, 2014 at 7:05 AM, Justin Ferguson j...@ownco.net wrote:
 Google does not allow you to search for the '@' symbol.

 funny, there is a marked difference between when you search for
 domain.com and @domain.com, one of which is that it includes a lot
 of email addresses. Google is even so kind as to link in common email
 address distortions.

 Try before you speak please, turbo.
 Oh, got it. Google's policies and rules don't apply to you. Silly me.

 You'll have to forgive me. I'm a slow learner at times.

 Jeff



-- 
--

Am I not destroying my enemies when I make friends of them?
-- Abraham Lincoln

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Jeffrey Walton
On Sat, Feb 8, 2014 at 7:11 AM, Justin Ferguson j...@ownco.net wrote:
 ...
 You'll have to forgive me. I'm a slow learner at times.

 probably because, per you, you dont read webpages due to evil ToS' ..
That's not what I said when you were trolling offline. You could cite
it if you'd like.

Jeff

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Justin Ferguson
p.s.

add an additional word, any word, for instance +the, magic happens.

try also CSO
http://vscso.org/pipermail/staff_vscso.org/2011-October/54.html
http://nebraskafbla.org/contact-us/advisory-council/
https://www.bankofthewest.com/static_files/botw2/home/about-us/our-company/annual-reports/annual-report-current.pdf
http://www.sba.gov/sites/default/files/SBA%20Lender%20List%20for%20San%20Diego%20and%20Imperial%20Counties_1.pdf
http://www.oldtownchinatown.org/pdf/newsletter-2005-winter.pdf
http://sdsbdcnetwork.org/sponsors/

etc

some rules can be bent, others broken.

On Sat, Feb 8, 2014 at 7:07 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Sat, Feb 8, 2014 at 7:05 AM, Justin Ferguson j...@ownco.net wrote:
 Google does not allow you to search for the '@' symbol.

 funny, there is a marked difference between when you search for
 domain.com and @domain.com, one of which is that it includes a lot
 of email addresses. Google is even so kind as to link in common email
 address distortions.

 Try before you speak please, turbo.
 Oh, got it. Google's policies and rules don't apply to you. Silly me.

 You'll have to forgive me. I'm a slow learner at times.

 Jeff



-- 
--

Am I not destroying my enemies when I make friends of them?
-- Abraham Lincoln

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Justin Ferguson
 That's not what I said when you were trolling offline. You could cite
 it if you'd like.

its cool, i actually didnt click reply-all for a reason. you elected
to go for group consensus, old one.

On Sat, Feb 8, 2014 at 7:14 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Sat, Feb 8, 2014 at 7:11 AM, Justin Ferguson j...@ownco.net wrote:
 ...
 You'll have to forgive me. I'm a slow learner at times.

 probably because, per you, you dont read webpages due to evil ToS' ..
 That's not what I said when you were trolling offline. You could cite
 it if you'd like.

 Jeff



-- 
--

Am I not destroying my enemies when I make friends of them?
-- Abraham Lincoln

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Jeffrey Walton
On Sat, Feb 8, 2014 at 7:17 AM, Justin Ferguson j...@ownco.net wrote:
 That's not what I said when you were trolling offline. You could cite
 it if you'd like.

 its cool, i actually didnt click reply-all for a reason. you elected
 to go for group consensus, old one.
I thought it was selfish keeping your cornucopia of knowledge to
myself. Hence the reason I suggested Kristian engage you.

Jeff

 On Sat, Feb 8, 2014 at 7:14 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Sat, Feb 8, 2014 at 7:11 AM, Justin Ferguson j...@ownco.net wrote:
 ...
 You'll have to forgive me. I'm a slow learner at times.

 probably because, per you, you dont read webpages due to evil ToS' ..
 That's not what I said when you were trolling offline. You could cite
 it if you'd like.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] extension for Firefox to force HTTPS always?

2014-02-08 Thread Kristian Erik Hermansen
On Fri, Oct 12, 2007 at 6:55 PM, valdis.kletni...@vt.edu wrote:
 What should this hypothetical extension do if it automagically redirects
 http: to https:, but the target server is something that is only listening
 on port 80 because it doesn't have https: enabled?

 https://www.cnn.com just sorta sits there for me.

Hello from the future! This hypothetical extension would handle such
cases...and will eventually be called HTTPS Everywhere :) [1] Keep an
eye out for it in a few years...

[1] https://www.eff.org/https-everywhere
-- 
Kristian Erik Hermansen
https://www.linkedin.com/in/kristianhermansen
https://google.com/+KristianHermansen

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 2857-1] libspring-java security update

2014-02-08 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2857-1   secur...@debian.org
http://www.debian.org/security/   Markus Koschany
February 08, 2014  http://www.debian.org/security/faq
- -

Package: libspring-java
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-6429 CVE-2013-6430

It was discovered by the Spring development team that the fix for the
XML External Entity (XXE) Injection (CVE-2013-4152) in the Spring
Framework was incomplete.

Spring MVC's SourceHttpMessageConverter also processed user provided XML
and neither disabled XML external entities nor provided an option to
disable them. SourceHttpMessageConverter has been modified to provide an
option to control the processing of XML external entities and that
processing is now disabled by default.

In addition Jon Passki discovered a possible XSS vulnerability:
The JavaScriptUtils.javaScriptEscape() method did not escape all
characters that are sensitive within either a JS single quoted string,
JS double quoted string, or HTML script data context. In most cases this
will result in an unexploitable parse error but in some cases it could
result in an XSS vulnerability.

For the stable distribution (wheezy), these problems have been fixed in
version 3.0.6.RELEASE-6+deb7u2.

For the testing distribution (jessie), these problems have been fixed in
version 3.0.6.RELEASE-11.

For the unstable distribution (sid), these problems have been fixed in
version 3.0.6.RELEASE-11.

We recommend that you upgrade your libspring-java packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iEYEARECAAYFAlL2QfYACgkQXm3vHE4uylrKVwCgl0VC2bcFi0cw8M+ENuNdBUtN
rdYAnjKXZ48KA8HONA3iDlymTMFYpogz
=SI4k
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Daniel Wood
Keep this list professional guys. I hate seeing it turn into an IRC chat room. 

Justin, you should really stop this type of behavior, you're not doing yourself 
any favors. I let it go when you decided you wanted to repeatedly bash me 
privately over one of my CVE's posted here, however I can see it's starting to 
look like a pattern for you. 

Daniel

On Feb 8, 2014, at 6:17 AM, Justin Ferguson j...@ownco.net wrote:

 That's not what I said when you were trolling offline. You could cite
 it if you'd like.
 
 its cool, i actually didnt click reply-all for a reason. you elected
 to go for group consensus, old one.
 
 On Sat, Feb 8, 2014 at 7:14 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Sat, Feb 8, 2014 at 7:11 AM, Justin Ferguson j...@ownco.net wrote:
 ...
 You'll have to forgive me. I'm a slow learner at times.
 
 probably because, per you, you dont read webpages due to evil ToS' ..
 That's not what I said when you were trolling offline. You could cite
 it if you'd like.
 
 Jeff
 
 
 
 -- 
 --
 
 Am I not destroying my enemies when I make friends of them?
 -- Abraham Lincoln
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Justin Ferguson
...

Oh noes. Owasp guy wants to admonish me.

And yes, I called your local data at rest is not encrypted despite there
being no way to secure a key unless you think the subway app deserves it's
own password bullshit because well it was bullshit. I was at least
respectful enough to tell you that it was bullshit clogging my inbox
privately instead of pulling some imaginary weight on the n3td3v all stars
mailing list.

There is nothing professional about F-D. But yes, from time to time when I
happen to read particularly absurd piles of crap sent to me, I do respond
by saying this is a giant pile of crap. In all earnest if you Google a
bit, this is pretty tame, I've not once saw fit to include a picture of my
bare backside.

At any rate, I appreciate your maternal behavior, what the world needs is
more CISSP-esque discussion on professional behavior on the internet. I'm
fairly positive that at this point, anyone whose opinion I care about is
well aware that I am at times outspoken, and the rest (*@owasp.com) are
irrelevant.

You have to be polite to random people who don't deserve it, such is life
with subway app bug finders.

Sincerely,

Justin N. Ferguson I
On Feb 8, 2014 11:32 AM, Daniel Wood daniel.w...@owasp.org wrote:

 Keep this list professional guys. I hate seeing it turn into an IRC chat
 room.

 Justin, you should really stop this type of behavior, you're not doing
 yourself any favors. I let it go when you decided you wanted to repeatedly
 bash me privately over one of my CVE's posted here, however I can see it's
 starting to look like a pattern for you.

 Daniel

 On Feb 8, 2014, at 6:17 AM, Justin Ferguson j...@ownco.net wrote:

  That's not what I said when you were trolling offline. You could cite
  it if you'd like.
 
  its cool, i actually didnt click reply-all for a reason. you elected
  to go for group consensus, old one.
 
  On Sat, Feb 8, 2014 at 7:14 AM, Jeffrey Walton noloa...@gmail.com
 wrote:
  On Sat, Feb 8, 2014 at 7:11 AM, Justin Ferguson j...@ownco.net wrote:
  ...
  You'll have to forgive me. I'm a slow learner at times.
 
  probably because, per you, you dont read webpages due to evil ToS' ..
  That's not what I said when you were trolling offline. You could cite
  it if you'd like.
 
  Jeff
 
 
 
  --
  --
 
  Am I not destroying my enemies when I make friends of them?
  -- Abraham Lincoln
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Fwd: Re: Bank of the West security contact?

2014-02-08 Thread Justin Ferguson
For the record, while the real bugs are hard crowd tries to make my
private posts sound netdevish, here was my incessant trolling.

There's really no need to respond further, none of this was worth this
pretty lame attempt at character assassination.

You're on the internet, when you say really dense crap, sometimes people
say mean things.
-- Forwarded message --
From: Justin Ferguson j...@ownco.net
Date: Feb 8, 2014 4:31 AM
Subject: Re: [Full-disclosure] Bank of the West security contact?
To: noloa...@gmail.com
Cc:

did you really reply to an email to show that you know how to whois??

...

unsubscribe.

On Sat, Feb 8, 2014 at 4:21 AM, Jeffrey Walton noloa...@gmail.com wrote:
 RFC 2142 offers a number of well known mailboxes that should be
 monitored. Tyr secure@, security@, and support@.

 WHOIS offers technical and administrative contacts.

 $ whois bankofthewest.com

 Whois Server Version 2.0

 Domain names in the .com and .net domains can now be registered
 with many different competing registrars. Go to http://www.internic.net
 for detailed information.

Domain Name: BANKOFTHEWEST.COM
Registrar: NETWORK SOLUTIONS, LLC.
Whois Server: whois.networksolutions.com
Referral URL: http://www.networksolutions.com/en_US/
Name Server: A1.VERISIGNDNS.COM
Name Server: A2.VERISIGNDNS.COM
Name Server: A3.VERISIGNDNS.COM
Name Server: DNS1.BANKOFTHEWEST.COM
Name Server: DNS2.BANKOFTHEWEST.COM
Name Server: DNS3.BANKOFTHEWEST.COM
Name Server: DNS4.BANKOFTHEWEST.COM
Status: clientTransferProhibited
Updated Date: 13-jul-2013
Creation Date: 23-jan-1996
Expiration Date: 24-jan-2020

 Last update of whois database: Sat, 08 Feb 2014 09:19:03 UTC 

 NOTICE: The expiration date displayed in this record is the date the
 registrar's sponsorship of the domain name registration in the registry is
 currently set to expire. This date does not necessarily reflect the
expiration
 date of the domain name registrant's agreement with the sponsoring
 registrar.  Users may consult the sponsoring registrar's Whois database to
 view the registrar's reported date of expiration for this registration.

 TERMS OF USE: You are not authorized to ...

 The Registry database contains ONLY .COM, .NET, .EDU domains and
 Registrars.

 Domain Name: BANKOFTHEWEST.COM
 Registry Domain ID:
 Registrar WHOIS Server: whois.networksolutions.com
 Registrar URL: http://www.networksolutions.com/en_US/
 Updated Date: 2011-01-04T00:00:00Z
 Creation Date: 1996-01-23T00:00:00Z
 Registrar Registration Expiration Date: 2020-01-25T00:00:00Z
 Registrar: NETWORK SOLUTIONS, LLC.
 Registrar IANA ID: 2
 Registrar Abuse Contact Email: ab...@web.com
 Registrar Abuse Contact Phone: 800-333-7680
 Reseller:
 Domain Status: clientTransferProhibited
 Registry Registrant ID:
 Registrant Name: the West, Bank of
 Registrant Organization: Bank of the West / William Scanlin
 Registrant Street: 2527 Camino Ramon
 Registrant City: San Ramon
 Registrant State/Province: CA
 Registrant Postal Code: 94583
 Registrant Country: US
 Registrant Phone: (925) 843-2358
 Registrant Phone Ext:
 Registrant Fax:
 Registrant Fax Ext:
 Registrant Email: regist...@bankofthewest.com
 Registry Admin ID:
 Admin Name: the West, Bank of
 Admin Organization: Bank of the West / William Scanlin
 Admin Street: 2527 Camino Ramon
 Admin City: San Ramon
 Admin State/Province: CA
 Admin Postal Code: 94583
 Admin Country: US
 Admin Phone: (925) 843-2358
 Admin Phone Ext:
 Admin Fax:
 Admin Fax Ext:
 Admin Email: regist...@bankofthewest.com
 Registry Tech ID:
 Tech Name: the West, Bank of
 Tech Organization: Bank of the West / William Scanlin
 Tech Street: 2527 Camino Ramon
 Tech City: San Ramon
 Tech State/Province: CA
 Tech Postal Code: 94583
 Tech Country: US
 Tech Phone: (925) 843-2358
 Tech Phone Ext:
 Tech Fax:
 Tech Fax Ext:
 Tech Email: regist...@bankofthewest.com
 Name Server: DNS1.BANKOFTHEWEST.COM
 Name Server: DNS2.BANKOFTHEWEST.COM
 Name Server: DNS3.BANKOFTHEWEST.COM
 Name Server: DNS4.BANKOFTHEWEST.COM
 Name Server: A1.VERISIGNDNS.COM
 Name Server: A2.VERISIGNDNS.COM
 Name Server: A3.VERISIGNDNS.COM
 DNSSEC: not signed
 URL of the ICANN WHOIS Data Problem Reporting System:
http://wdprs.internic.net/
 Last update of whois database: Sat, 08 Feb 2014 09:19:03 UTC 

 The data in Networksolutions.com's WHOIS database ...

 On Sat, Feb 8, 2014 at 12:27 AM, Kristian Erik Hermansen
 kristian.herman...@gmail.com wrote:
 Anyone have security contact at Bank of the West?
 --
 Kristian Erik Hermansen
 https://www.linkedin.com/in/kristianhermansen
 https://profiles.google.com/kristian.hermansen


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



--
--

Am I not destroying my enemies when I make friends of them?
-- Abraham Lincoln
___

[Full-disclosure] Fwd: Re: [CVE-2013-6986] Insecure Data Storage in Subway Ordering

2014-02-08 Thread Justin Ferguson
And to call woody on his claim of my trolling him, here's the text there.
The entire thread was four emails long, inclusive of his original post.

Apparently if you say fuck the owasp nanny police gets butthurt.
-- Forwarded message --
From: Justin Ferguson j...@ownco.net
Date: Dec 19, 2013 12:11 PM
Subject: Re: [Full-disclosure] [CVE-2013-6986] Insecure Data Storage in
Subway Ordering
To: Daniel Wood daniel.w...@owasp.org
Cc:

 Storing cardholder data in cleartext is not a bullshit bug -  read PCI

No, it's a bullshit bug. PCI doesn't regulate how the data is stored
on consumer devices, perhaps *you* should read it instead of web 2.0
drone blather. What are you going to have them do, encrypt it and
where the fuck are you storing the key? Oh great, so now I need to
have a password for all of my 34324234324 apps? or I need to give my
apps my password to a central keystore for all of my keys? ... Do you
people think or just live to see your names in psuedo e-fame lights..

 if you don't like OWASP or really any 'best practices' document or
utilize some
 common sense.

The problem isnt OWASP, its that its brought on an apocalypse of
retarded people working in security and validated them and insanely
stupid bugs like yours. Funny you should reference common sense here.

   Read the news lately...Target?

The hack doesn't even make sense. Stay tuned.

 Not sure how using a publicly available app from the Apple App Store
qualifies as signing an NDA, a legal document.

EULA dope.

 It's locally exploitable, and it includes credentials.

BREAKING: your computer stores sensitive data and you cannot store
other sensitive data (crypto keys) next to the sensitive data it
stores to secure the sensitive data.

 You apparently didn't read the full disclosure details carefully enough.

Of course not, its a fucking local bug about data at rest being
clear text on a local device where there is really no sane way to
secure the data other than to make the entire device more insecure.
And, its a subway application, which is a clever way of saying a
crappy web-browser for people who know how to write javascript and are
too lazy to write proper HTML to work with mobile web browsers.

 really all severity ratings are subjective anyways.

The amusing part is that you saw fit to write up a fucking advisory
for it. Seriously I didn't even write up an advisory for this
http://marc.info/?l=openbsd-bugsm=131435177207230 even though it
would've been hilarious considering the entire internet went looking
for backdoors put in by the USG in that exact code like a month
earlier.

I'm not saying your severity rating is a joke mate, I'm saying the
fucking bug is. Couldn't you be more productive and like pull apart a
banks app and audit its xml-rpc interfaces or something? ...

 I'll give you the benefit of the doubt this time, but if you don't have
anything constructive to say you'll quickly find yourself voided as
irrelevant with me
 and within this industry.

oh noes. subway doesnt crypto its data on local storage guy is worried
i will be voided as irrelevant by someone whom himself is ...
irrelevant and proclaims to speak for an entire industry ... Don't
worry fellah, I'm sure Jeremiah Grossman still has some VC to give out
welfare to you kids.

On Thu, Dec 19, 2013 at 11:59 AM, Daniel Wood daniel.w...@owasp.org wrote:
 Justin,

 Storing cardholder data in cleartext is not a bullshit bug - read PCI
if you don't like OWASP or really any 'best practices' document or utilize
some common sense.  Read the news lately...Target?

 Not sure how using a publicly available app from the Apple App Store
qualifies as signing an NDA, a legal document.

 It's locally exploitable, and it includes credentials.  You apparently
didn't read the full disclosure details carefully enough.  Maybe you should
follow your own advice you posted (sic Neutron Star commentary). What the
severity of this vulnerability is doesn't really matter in the long run. It
was fixed by the vendor and really all severity ratings are subjective
anyways.

 I'll give you the benefit of the doubt this time, but if you don't have
anything constructive to say you'll quickly find yourself voided as
irrelevant with me and within this industry.

 -D

 On Dec 19, 2013, at 9:43 AM, Justin Ferguson j...@ownco.net wrote:

 (a) its a bullshit bug, but whatever. air-quotes owasp ... air-quotes

 (b)  I have yet to receive this.  I asked for a copy of the allegedly
 signed NDA last week as well.  Failure to provide a legitimate copy of
 my sent email with a signed NDA proves to me that they forgot to have
 me sign an NDA.. Actually, assuming there is one, and what I'm
 reading is 3rd party company X is saying its violating an NDA they
 signed, BUT, assuming they're just badly worded, you potentially
 agreed to the NDA when you installed and used the application.

 Either way, its a client local mobile bug, rating somewhere below
 XSS on a website without login credentials. golf 

[Full-disclosure] Fwd: Fwd: Re: [CVE-2013-6986] Insecure Data Storage in Subway Ordering

2014-02-08 Thread kaveh ghaemmaghami
WDH
-- Forwarded message --
From: Justin Ferguson j...@ownco.net
Date: Feb 9, 2014 12:48 AM
Subject: [Full-disclosure] Fwd: Re: [CVE-2013-6986] Insecure Data Storage
in Subway Ordering
To: full-disclosure full-disclosure@lists.grok.org.uk
Cc:

And to call woody on his claim of my trolling him, here's the text there.
The entire thread was four emails long, inclusive of his original post.

Apparently if you say fuck the owasp nanny police gets butthurt.
-- Forwarded message --
From: Justin Ferguson j...@ownco.net
Date: Dec 19, 2013 12:11 PM
Subject: Re: [Full-disclosure] [CVE-2013-6986] Insecure Data Storage in
Subway Ordering
To: Daniel Wood daniel.w...@owasp.org
Cc:

 Storing cardholder data in cleartext is not a bullshit bug -  read PCI

No, it's a bullshit bug. PCI doesn't regulate how the data is stored
on consumer devices, perhaps *you* should read it instead of web 2.0
drone blather. What are you going to have them do, encrypt it and
where the fuck are you storing the key? Oh great, so now I need to
have a password for all of my 34324234324 apps? or I need to give my
apps my password to a central keystore for all of my keys? ... Do you
people think or just live to see your names in psuedo e-fame lights..

 if you don't like OWASP or really any 'best practices' document or
utilize some
 common sense.

The problem isnt OWASP, its that its brought on an apocalypse of
retarded people working in security and validated them and insanely
stupid bugs like yours. Funny you should reference common sense here.

   Read the news lately...Target?

The hack doesn't even make sense. Stay tuned.

 Not sure how using a publicly available app from the Apple App Store
qualifies as signing an NDA, a legal document.

EULA dope.

 It's locally exploitable, and it includes credentials.

BREAKING: your computer stores sensitive data and you cannot store
other sensitive data (crypto keys) next to the sensitive data it
stores to secure the sensitive data.

 You apparently didn't read the full disclosure details carefully enough.

Of course not, its a fucking local bug about data at rest being
clear text on a local device where there is really no sane way to
secure the data other than to make the entire device more insecure.
And, its a subway application, which is a clever way of saying a
crappy web-browser for people who know how to write javascript and are
too lazy to write proper HTML to work with mobile web browsers.

 really all severity ratings are subjective anyways.

The amusing part is that you saw fit to write up a fucking advisory
for it. Seriously I didn't even write up an advisory for this
http://marc.info/?l=openbsd-bugsm=131435177207230 even though it
would've been hilarious considering the entire internet went looking
for backdoors put in by the USG in that exact code like a month
earlier.

I'm not saying your severity rating is a joke mate, I'm saying the
fucking bug is. Couldn't you be more productive and like pull apart a
banks app and audit its xml-rpc interfaces or something? ...

 I'll give you the benefit of the doubt this time, but if you don't have
anything constructive to say you'll quickly find yourself voided as
irrelevant with me
 and within this industry.

oh noes. subway doesnt crypto its data on local storage guy is worried
i will be voided as irrelevant by someone whom himself is ...
irrelevant and proclaims to speak for an entire industry ... Don't
worry fellah, I'm sure Jeremiah Grossman still has some VC to give out
welfare to you kids.

On Thu, Dec 19, 2013 at 11:59 AM, Daniel Wood daniel.w...@owasp.org wrote:
 Justin,

 Storing cardholder data in cleartext is not a bullshit bug - read PCI
if you don't like OWASP or really any 'best practices' document or utilize
some common sense.  Read the news lately...Target?

 Not sure how using a publicly available app from the Apple App Store
qualifies as signing an NDA, a legal document.

 It's locally exploitable, and it includes credentials.  You apparently
didn't read the full disclosure details carefully enough.  Maybe you should
follow your own advice you posted (sic Neutron Star commentary). What the
severity of this vulnerability is doesn't really matter in the long run. It
was fixed by the vendor and really all severity ratings are subjective
anyways.

 I'll give you the benefit of the doubt this time, but if you don't have
anything constructive to say you'll quickly find yourself voided as
irrelevant with me and within this industry.

 -D

 On Dec 19, 2013, at 9:43 AM, Justin Ferguson j...@ownco.net wrote:

 (a) its a bullshit bug, but whatever. air-quotes owasp ... air-quotes

 (b)  I have yet to receive this.  I asked for a copy of the allegedly
 signed NDA last week as well.  Failure to provide a legitimate copy of
 my sent email with a signed NDA proves to me that they forgot to have
 me sign an NDA.. Actually, assuming there is one, and what I'm
 reading is 3rd party company X is saying its violating an 

Re: [Full-disclosure] Bank of the West security contact?

2014-02-08 Thread Jeffrey Walton
On Sat, Feb 8, 2014 at 11:32 AM, Daniel Wood daniel.w...@owasp.org wrote:
 Keep this list professional guys. I hate seeing it turn into an IRC chat room.

 Justin, you should really stop this type of behavior, you're not doing 
 yourself any favors. I let it go when you decided you wanted to repeatedly 
 bash me privately over one of my CVE's posted here, however I can see it's 
 starting to look like a pattern for you.

http://www.collegehumor.com/video/5817726/internet-bridge-troll

Jeff

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/