Re: [Full-disclosure] scanning

2006-06-02 Thread 0x80
There have been people charged wtih less in the past.  So depending 
on where you live get permission.

On Thu, 01 Jun 2006 18:28:24 -0700 [EMAIL PROTECTED] wrote:

Phrased differently - do you really want to gamble spending the 
next
3-5 with a big hairy dude named Bubba?

Leave your mom out of this.



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Files keep appearing

2006-06-02 Thread 0x80
You've been owned

On Thu, 01 Jun 2006 21:08:54 -0700 Stephen Johnson 
[EMAIL PROTECTED] wrote:
I keep having a phishing website appear on my web server.

They keep showing up in a Resources folder of one of the sites 
that I host.
I have gone through the logs and I am not seeing any connections.  

I deleted
the files this morning and this evening they re-appeared ‹ no 
connections
were made on my server during that period of time.

Also, there are no cron jobs that I noticed that looked out of the 

ordinary.

I am running MySQL, PHP, Apache2 on a debian linux server.

Any thoughts? 

-- 
Stephen Johnson
--



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] VulnSale: IE 6.0.2900.2180.yeahlatestversion

2006-05-29 Thread 0x80
So I just found another IE vulnerability.  This time working on the 
latest patched up verison of 6.0.  It allows for my code to be ran 
and all that pretty shit.

Let the bidding begin.

PS:  Vista zero day sale ends Wednesday as I am already getting 
more bids than I can keep track of. For the sake of making a 
statement I have named the POC for this bug: 
litchfieldcantbypassaslrcauseheslame.c

-kkk



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] VulnSale: IE 6.0.2900.2180.yeahlatestversion

2006-05-29 Thread 0x80
you are just angry because I got 3x more money for my bugs than you 
will ever get you stupid fucking chink.



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] VulnSale: Windows Vista Exploit

2006-05-29 Thread 0x80
cunt.

whore.

rape.

sodomy.

fuck

anussex

horserape

rapeyoursister

daveaitel

How is that?



On Mon, 29 May 2006 02:47:35 -0700 poo [EMAIL PROTECTED] wrote:
yes could you please turn up the pottymouth!!!

On 5/29/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

 Oh I am fucking sorry for my fucking cunt mouth.

 On Sun, 28 May 2006 18:34:41 -0700 Aaron Gray [EMAIL PROTECTED]
 wrote:
 Language please.
 
 - Original Message -
 From: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Cc: full-disclosure@lists.grok.org.uk
 Sent: Monday, May 29, 2006 2:07 AM
 Subject: Re: [Full-disclosure] VulnSale: Windows Vista Exploit
 
 
  No, I have not been interviewed.  I am the fag that you gave 
a
 blow
  job too last night in that truckstop bathroom.
 
  On Fri, 26 May 2006 07:38:41 -0700 evilrabbi
 [EMAIL PROTECTED]
  wrote:
 are you the fag that was interviewed by the washington post?
 
 On 5/25/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 
  Due to the sucess of my IE vuln sale I have decided to sell 

a
  Windows Vista exploit I discovered.  This one work remote 
and
 will
  run code.
 
 
 
 
  Concerned about your privacy? Instantly send FREE secure
 email,
 no account
  required
  http://www.hushmail.com/send?l=480
 
  Get the best prices on SSL certificates from Hushmail
  https://www.hushssl.com?l=485
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-
charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
 
 
 --
 -- h0 h0 h0 --
 www.nopsled.net
 
 
 
  Concerned about your privacy? Instantly send FREE secure 
email,
 no account
  required
  http://www.hushmail.com/send?l=480
 
  Get the best prices on SSL certificates from Hushmail
  https://www.hushssl.com?l=485
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-
charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
  --
  No virus found in this incoming message.
  Checked by AVG Free Edition.
  Version: 7.1.394 / Virus Database: 268.7.2/349 - Release 
Date:
 26/05/2006
 



 Concerned about your privacy? Instantly send FREE secure email, 
no account
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
smile tomorrow will be worse



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] VulnSale: IE 6.0.2900.2180.yeahlatestversion

2006-05-29 Thread 0x80
Nah, I quit both my jobs after I sold my last group of vulns.  So 
let me guess we have yet another fag who has never found his own 
vulns trying to judge while sucking the dick of a has-been internet 
rock star sellout.



On Mon, 29 May 2006 03:20:42 -0700 [EMAIL PROTECTED] wrote:
From: [EMAIL PROTECTED]
Sent: Monday, May 29, 2006 10:40 AM

 litchfieldcantbypassaslrcauseheslame.c

Hey - litchfield just got insulted by a pizza delivery boy. Or was 


it a lawn mowing kid? Pizza-lawn-bitch, I'll give you $10 to come 
polish my boots!

-- bad eddie



Concerned about your privacy? Instantly send FREE secure email, no 

account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Internet Explorer Ver 6.0.2800.1106 vulnerability

2006-05-28 Thread 0x80
How is a simple crash a vulnerability?  you can make IE crash 
 different ways.  The trick is making it run your code.


On Fri, 26 May 2006 05:49:39 -0700 r k [EMAIL PROTECTED] wrote:
Hi All,


IE Ver 6.0.2800.1106 crashs when we try to resizeby() in the html 
page.

the following is the code

+++

+

html
head
titleInternet Explorer Ver 6.0.2800.1106/title
/head
body
script
  var wwidth = (window.innerWidth)?window.innerWidth: 
((document.all
)?document.body.offsetWidth:null);

  while (wwidth)
  {
 self.resizeBy(-99, -1);
  }

/script

/body
/html



tested on windows 2000,windows XP



thank you

antar



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] VulnSale: Windows Vista Exploit

2006-05-28 Thread 0x80
No, I have not been interviewed.  I am the fag that you gave a blow 
job too last night in that truckstop bathroom.

On Fri, 26 May 2006 07:38:41 -0700 evilrabbi [EMAIL PROTECTED] 
wrote:
are you the fag that was interviewed by the washington post?

On 5/25/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

 Due to the sucess of my IE vuln sale I have decided to sell a
 Windows Vista exploit I discovered.  This one work remote and 
will
 run code.




 Concerned about your privacy? Instantly send FREE secure email, 
no account
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
-- h0 h0 h0 --
www.nopsled.net



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] VulnSale: Windows Vista Exploit

2006-05-28 Thread 0x80
Oh I am fucking sorry for my fucking cunt mouth.

On Sun, 28 May 2006 18:34:41 -0700 Aaron Gray [EMAIL PROTECTED] 
wrote:
Language please.

- Original Message - 
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Sent: Monday, May 29, 2006 2:07 AM
Subject: Re: [Full-disclosure] VulnSale: Windows Vista Exploit


 No, I have not been interviewed.  I am the fag that you gave a 
blow
 job too last night in that truckstop bathroom.

 On Fri, 26 May 2006 07:38:41 -0700 evilrabbi 
[EMAIL PROTECTED]
 wrote:
are you the fag that was interviewed by the washington post?

On 5/25/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

 Due to the sucess of my IE vuln sale I have decided to sell a
 Windows Vista exploit I discovered.  This one work remote and
will
 run code.




 Concerned about your privacy? Instantly send FREE secure 
email,
no account
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
-- h0 h0 h0 --
www.nopsled.net



 Concerned about your privacy? Instantly send FREE secure email, 
no account 
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


 -- 
 No virus found in this incoming message.
 Checked by AVG Free Edition.
 Version: 7.1.394 / Virus Database: 268.7.2/349 - Release Date: 
26/05/2006




Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ASLR now built into Vista

2006-05-26 Thread 0x80
So is this a paid Microsoft advertisment?

On Fri, 26 May 2006 13:22:49 +1000 David Litchfield 
[EMAIL PROTECTED] wrote:
Address Space Layout Randomization is now part of Vista as of beta 

2 [1] . I 
wrote about ASLR on the Windows platform back in September last 
year [2] and 
noted that unless you rebase the image exe then little (not none!) 

is added. 
ASLR in Vista solves this so remote exploitation of overflows has 
just got a 
lot harder. I've not done a thorough analysis yet but, all going 
well, this 
is a fantastic way for Microsoft to go and builds on the work done 

with 
NX/DEP and stack cookies/canaries.

Cheers,
David Litchfield

[1] 
http://msdn.microsoft.com/windowsvista/downloads/products/getthebet

a/default.aspx
[2] http://www.ngssoftware.com/papers/xpms.pdf



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] VulnSale: Windows Vista Exploit

2006-05-25 Thread 0x80
Due to the sucess of my IE vuln sale I have decided to sell a 
Windows Vista exploit I discovered.  This one work remote and will 
run code.




Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability

2006-05-20 Thread 0x80
I sold both of them to the same buyer and we figured out why I 
wasn't able to exploit it on IE 6.0.

On Wed, 17 May 2006 01:48:38 -0700 Rajesh V [EMAIL PROTECTED] 
wrote:
Since this has turned into a spam thread anyway, does anyone know
whatever happend to that IE7 exploit this guy was trying to sell 
here?



On 5/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I
 BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING
 YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  
AM I
 BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING
 YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  
AM I
 BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING
 YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  
AM I
 BUGGING YOU?

 On Tue, 16 May 2006 00:57:27 -0700 . Solo [EMAIL PROTECTED]
 wrote:
 Shut the fuck up  please~~
 
 
 
 
 
 2006/5/16, [EMAIL PROTECTED] [EMAIL PROTECTED]:
 
  Ahhh there is a mature response.
 
 
  On Thu, 11 May 2006 20:14:49 -0700 . Solo 
[EMAIL PROTECTED]
  wrote:
  Shut the fuck up!!
  
  
  
  
  2006/5/11, [EMAIL PROTECTED] [EMAIL PROTECTED]:
  
   Shouldnt this be considered low risk and not medium?
  
 
 



 Concerned about your privacy? Instantly send FREE secure email, 
no account required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] blue security folds

2006-05-20 Thread 0x80
for the amount of so called experts in this industry there are sure 
a lot of idiots on this list.

blue security was a bad idea from the start.  this was a great 
thing it proves that not all bad ideas suceed although there are 
still a ton of bad ideas out there.

spam won a long time ago.  long befor the internet.  just got look 
in your physical mailbox.

On Wed, 17 May 2006 09:16:46 -0700 Mike Adams [EMAIL PROTECTED] 
wrote:
I'm really disappointed. 

All this will do is give all the other scumbag spammers out there 
proof
that using these tactics will work, and they will be able to 
extort
anyone.

Who will be next, Trend Micro? Fortinet? Symantec? SANS? 

-Original Message-
From: Gadi Evron [mailto:[EMAIL PROTECTED]
Sent: Wednesday, May 17, 2006 1:14 AM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] blue security folds


I just got this in email:
http://wired.com/news/technology/0,70913-0.html?tw=wn_index_1

   Gadi.

-- 
/~\ The Green
\ / Ribbon Campaign
  X  Against Purple
/ \ Ribbons!-- The Geometry of Shadows, Babylon 5.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] **LosseChange::Debunk it??**

2006-05-20 Thread 0x80
who gives a flying fuck?

planes hit building.  buildings fall.  people die.  families cry.  
who fucking cares and why is this stupid subject still coming up.

everyone's life ends in death

On Wed, 17 May 2006 11:26:32 -0700 Paul Schmehl 
[EMAIL PROTECTED] wrote:
Pete Simpson wrote:
 You have confirmed that the data are correct, you have no way to 

attack
 the principles, so where is the logical error? Be very precise.

Pete, are you even reading what I wrote?  A building the size of 
the 
twin towers would fall to the ground in under 10 seconds, per the 
standard calculations that, as you say, any high school student 
would know.

How much more precise do I need to be?  Your calculations are 
incorrect 
by an order of ten.  Instead of 90+ seconds, the answer is 9.0+ - 
IOW, 
precisely the same amount of time it took for the buildings to 
actually 
fall.

Furthermore, you have a logical fallacy in your argument, because 
you 
are insisting that a controlled demolition collapse would be 
faster than 
an accidental collapse.  Which part of the equation tells you 
that? 
Objects faill at 32 feet per second per second.  The *cause* of 
the fall 
is irrelevant.

Now, you're obviously wedded to this believe of yours that the 
government conspired to collapse the buildings.  Why is 
irrelevant.  But 
until you can deal with the facts staring you in the face, there 
isn't 
much point in continuing this discussion.

BTW, there's no need to cc me on your posts.  I can read the list 
just fine.

-- 
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ThreatCon at Normal level now - Was: MS06-019 - How long before this develops into a self propagating email worm

2006-05-20 Thread 0x80
ahh yes we should all pay attention and trust a threat meter 
designed to sell products.

On Wed, 17 May 2006 16:26:51 -0700 Juha-Matti Laurio juha-
[EMAIL PROTECTED] wrote:
ThreatCon meter is at basic, Normal level now. People at Symantec 
had their meter at Level 2/4 since May 11th.
ISS's AlertCon went to level 1/4 on Monday.

- Juha-Matti

 
 On Thursday morning (local time in Finland) Symantec ThreatCon 
is at ('Elevated') Level 2 now:
 
 http://www.symantec.com/avcenter/threatcon/learnabout.html
 
 including details about the role of MS06-019.
 
 - Juha-Matti
 
  
  All,
  
  I have read the Microsoft advisory and the alarm bells started 

to
  whistle ;)
  
  As fas a I can read this open the door to fully self 
propagating
  email worms with whatever payload you desire.
  
  Yet, sans.org, symantec and
  us-cert.gov still have their threat levels on 1.
  
  What am I missing, surely
  this superseeds the IE7 0-day action (sorry couldn't resist).
  
  Schanulleke


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability

2006-05-20 Thread 0x80
Damn hushmail.

$18,500.00 US was the final selling price.  They offered a bit more 
for exlusivity for any future bugs but I turned them down.  The 
buyer wishes to remain anonymous.

All funds have been recieved in my account.  More bugs are coming 
soon.

On Sat, 20 May 2006 19:26:04 -0700 [EMAIL PROTECTED] 
[EMAIL PROTECTED] wrote:
try to check the list archive which got it correctly

http://lists.grok.org.uk/pipermail/full-disclosure/2006-
May/046196.html


huhu


[EMAIL PROTECTED] wrote:
 What is with the constant blank replies from this guy?  Is he a 
 chink who doesn't know how to use email?

 On Sat, 20 May 2006 16:47:10 -0700 [EMAIL PROTECTED] 
 [EMAIL PROTECTED] wrote:
   
 [EMAIL PROTECTED] wrote:
 
 I sold both of them to the same buyer and we figured out why I
 wasn't able to exploit it on IE 6.0.

 On Wed, 17 May 2006 01:48:38 -0700 Rajesh V 
[EMAIL PROTECTED]
 wrote:
   
 Since this has turned into a spam thread anyway, does anyone 
 
 know
 
 whatever happend to that IE7 exploit this guy was trying to 
 
 sell
   
 here?



 On 5/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 
 AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM 
I
 BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I 
   
 BUGGING
 
 YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING 
YOU? 
   
 AM I
 
 BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I 
   
 BUGGING
 
 YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING 
YOU? 
   
 AM I
 
 BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I 
   
 BUGGING
 
 YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING 
YOU? 
   
 AM I
 
 BUGGING YOU?

 On Tue, 16 May 2006 00:57:27 -0700 . Solo 
   
 [EMAIL PROTECTED]
 
 wrote:
   
 Shut the fuck up  please~~





 2006/5/16, [EMAIL PROTECTED] [EMAIL PROTECTED]:
 
 Ahhh there is a mature response.


 On Thu, 11 May 2006 20:14:49 -0700 . Solo
   
 [EMAIL PROTECTED]
 
 wrote:
   
 Shut the fuck up!!




 2006/5/11, [EMAIL PROTECTED] [EMAIL PROTECTED]:
 
 Shouldnt this be considered low risk and not medium?

   
 Concerned about your privacy? Instantly send FREE secure 
   
 email,
   
 no account required
 
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-
charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

   
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-
charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 

 Concerned about your privacy? Instantly send FREE secure 
email, 
   
 no
 account required
 
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


 __ NOD32 1.1550 (20060520) Information __

 This message was checked by NOD32 antivirus system.
 http://www.eset.com



   



 Concerned about your privacy? Instantly send FREE secure email, 
no account required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485



 __ NOD32 1.1551 (20060521) Information __

 This message was checked by NOD32 antivirus system.
 http://www.eset.com







Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability

2006-05-17 Thread 0x80
AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I 
BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING 
YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I 
BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING 
YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I 
BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING 
YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I BUGGING YOU?  AM I 
BUGGING YOU?  

On Tue, 16 May 2006 00:57:27 -0700 . Solo [EMAIL PROTECTED] 
wrote:
Shut the fuck up  please~~





2006/5/16, [EMAIL PROTECTED] [EMAIL PROTECTED]:

 Ahhh there is a mature response.


 On Thu, 11 May 2006 20:14:49 -0700 . Solo [EMAIL PROTECTED]
 wrote:
 Shut the fuck up!!
 
 
 
 
 2006/5/11, [EMAIL PROTECTED] [EMAIL PROTECTED]:
 
  Shouldnt this be considered low risk and not medium?
 





Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability

2006-05-15 Thread 0x80
Ahhh there is a mature response.


On Thu, 11 May 2006 20:14:49 -0700 . Solo [EMAIL PROTECTED] 
wrote:
Shut the fuck up!!




2006/5/11, [EMAIL PROTECTED] [EMAIL PROTECTED]:

 Shouldnt this be considered low risk and not medium?

 On Wed, 10 May 2006 17:01:09 -0700 Avert [EMAIL PROTECTED]
 wrote:
 McAfee, Inc.
 McAfee Avert(tm) Labs Security Advisory
 Public Release Date: 2006-05-09
 
 Microsoft MSDTC NdrAllocate Validation Vulnerability
 
 CVE-2006-0034
 
__

_

 ___
 
 *  Synopsis
 
 There is an RPC procedure within the MSDTC interface in
 msdtcprx.dll
 that may be called remotely without user credentials in such a 
way

 that
 triggers a denial-of-service in the Distributed Transaction
 Coordinator
 (MSDTC) service.
 
 Exploitation can at most lead to a denial of service and 
therefore

 the
 risk factor is at medium.
 
__

_

 ___
 
 *  Vulnerable Systems
 
 Microsoft Windows 2000
 Microsoft Windows XP
 Microsoft Windows Server 2003
 
 
__

_

 ___
 
 *  Vulnerability Information
 
 The msdtcprx.dll shared library contains RPC procedures for use
 with
 the Distributed Transaction Coordinator (MSDTC) service 
utilized
 in
 Microsoft Windows.
 
 By sending a large (greater than 4k) request to 
BuildContextW(), a
 size check can be bypassed and a bug in NdrAllocate() may be
 reached.
 
 This vulnerability was reported to Microsoft on October 12, 
2005
 
 
__

_

 ___
 
 *  Resolution
 
 Microsoft has provided a patch for this issue.  Please see 
their
 bulletin, KB913580, for more information on obtaining and
 installing
 the patch.
 
 
 
__

_

 ___
 
 *  Credits
 
 This vulnerability was discovered by Chen Xiaobo of McAfee 
Avert
 Labs.
 
 
__

_

 ___
 
 
__

_

 ___
 
 *  Legal Notice
 
 Copyright (C) 2006 McAfee, Inc.
 The information contained within this advisory is provided for 
the
 convenience of McAfee's customers, and may be redistributed
 provided
 that no fee is charged for distribution and that the advisory 
is
 not
 modified in any way.  McAfee makes no representations or
 warranties
 regarding the accuracy of the information referenced in this
 document,
 or the suitability of that information for your purposes.
 
 McAfee, Inc. and McAfee Avert Labs are registered Trademarks of
 McAfee,
 Inc. and/or its affiliated companies in the United States 
and/or
 other
 Countries.  All other registered and unregistered trademarks in
 this
 document are the sole property of their respective owners.
 
 
__

_

 ___
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 Concerned about your privacy? Instantly send FREE secure email, 
no account
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability

2006-05-11 Thread 0x80
Shouldnt this be considered low risk and not medium?

On Wed, 10 May 2006 17:01:09 -0700 Avert [EMAIL PROTECTED] 
wrote:
McAfee, Inc.
McAfee Avert(tm) Labs Security Advisory
Public Release Date: 2006-05-09

Microsoft MSDTC NdrAllocate Validation Vulnerability

CVE-2006-0034
___

___

*  Synopsis

There is an RPC procedure within the MSDTC interface in 
msdtcprx.dll
that may be called remotely without user credentials in such a way 

that
triggers a denial-of-service in the Distributed Transaction 
Coordinator
(MSDTC) service.

Exploitation can at most lead to a denial of service and therefore 

the
risk factor is at medium.
___

___

*  Vulnerable Systems

Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003

___

___

*  Vulnerability Information

The msdtcprx.dll shared library contains RPC procedures for use 
with
the Distributed Transaction Coordinator (MSDTC) service utilized 
in
Microsoft Windows.

By sending a large (greater than 4k) request to BuildContextW(), a
size check can be bypassed and a bug in NdrAllocate() may be 
reached.

This vulnerability was reported to Microsoft on October 12, 2005

___

___

*  Resolution

Microsoft has provided a patch for this issue.  Please see their 
bulletin, KB913580, for more information on obtaining and 
installing
the patch.


___

___

*  Credits

This vulnerability was discovered by Chen Xiaobo of McAfee Avert 
Labs.

___

___

___

___

*  Legal Notice

Copyright (C) 2006 McAfee, Inc.
The information contained within this advisory is provided for the
convenience of McAfee's customers, and may be redistributed 
provided
that no fee is charged for distribution and that the advisory is 
not
modified in any way.  McAfee makes no representations or 
warranties
regarding the accuracy of the information referenced in this 
document,
or the suitability of that information for your purposes.

McAfee, Inc. and McAfee Avert Labs are registered Trademarks of 
McAfee,
Inc. and/or its affiliated companies in the United States and/or 
other
Countries.  All other registered and unregistered trademarks in 
this
document are the sole property of their respective owners.

___

___

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-09 Thread 0x80
But not a big enough threat to outbid the highest bidder who 
incidentally will be recieing full PoC by morning.



On Mon, 08 May 2006 18:04:02 -0700 n3td3v [EMAIL PROTECTED] wrote:
On 5/8/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 There is no skin to save.  No law is being broken and I am not
 holding anyone ransom.

 Microsoft is not the only vendor that can fix this bug either, 
it
 would be easy to patch the DLLs involved.

 No one is monitoring anything because I have not broken any laws 

in
 any country.  You reply simply dances around the issue because 
as
 usual, you have zero idea what you are talking about.

Symantec see you as threat:



ThreatCon Level is 1

A researcher has made a post to the Full-Disclosure mailing list
claiming that he has discovered two unknown and unpatched
vulnerabilities in Microsoft Internet Explorer 7, which is 
currently
in beta. He also states that at least one of the issues is present 

in
Microsoft Internet Explorer version 6.x, but circumstances unknown 

to
the researcher prevent him from being able to successfully exploit 

it.
The discoverer of these issues has stated that they will be 
privately
sold to the highest bidder. Internet Explorer 7 is beta software, 
and
as such, should not be used on sensitive systems. Though the
possibility of exploitation against version 6.x may exist, it 
should
always be assumed that there may be latent vulnerabilities in 
client
software. Users are advised to employ best practices such as 
avoiding
untrusted websites, links from untrusted sources, and running such
software with the least possible privileges.



http://www.symantec.com/avcenter/threatcon/learnabout.html

Regards,

n3td3v

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-07 Thread 0x80
Have you e-mailed [EMAIL PROTECTED] and asked them if they want 

to
make an offer? I know they've done private deals with security
researchers in the past, and trust me, they were offered a lot 
more

No I have not emailed Microsoft.  They are not entitled to any 
exlusivity.

illegal auction. I think its in your best interest to e-mail
[EMAIL PROTECTED]

Illegal?  Tell me what law in what country I have broken.


1) You don't want to make as much money as you could by offering
Microsoft to buy your vulnerability in private.

Like I said.  MS can offer just like anyone else but they do not 
get any special treatment.

2) You want to be held responsible for selling an exploit which 
leads
to a major incident, worm, virus outrage.

The vulnerabilities I have for sale could be used in such a way but 
I am in no way responsible for what the purhcaser uses it for.  Are 
bullet manufacturers responsible when someone shoots someone else?


3) Microsoft just contact the FBI and get your actual home address
from your e-mail server logs because you didn't initially offer
Microsoft to buy the exploit, and you end up getting arrested.

Again.  What law have I broken here?





Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-07 Thread 0x80
Come lick my asshole.

On Sun, 07 May 2006 10:21:30 -0700 [EMAIL PROTECTED] wrote:
Come cut my lawn.

On 5/5/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 Yes, this is a beta product but I have reason to believe that 
this
 issue will not be discovered of fixed by M$ before it goes to 
gold.
 Why do I believe this?  Because the issue is found in IE 6 but
 doesnt seem to exploit.  Not saying it is not exploitable I am
 saying that I cant make it exploit.

 I work as a pizza delivery driver at night and work part time
 landscaping in my days.  So I feel it is only fair that I be
 compensated for this vulnerability.

 Highest bidder that can convince me that you will actually pay
 wins.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-07 Thread 0x80
There is no skin to save.  No law is being broken and I am not 
holding anyone ransom.

Microsoft is not the only vendor that can fix this bug either, it 
would be easy to patch the DLLs involved.

No one is monitoring anything because I have not broken any laws in 
any country.  You reply simply dances around the issue because as 
usual, you have zero idea what you are talking about.

On Sun, 07 May 2006 13:59:47 -0700 n3td3v [EMAIL PROTECTED] wrote:
On 5/7/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 Have you e-mailed [EMAIL PROTECTED] and asked them if they 
want

 to
 make an offer? I know they've done private deals with security
 researchers in the past, and trust me, they were offered a lot
 more

 No I have not emailed Microsoft.  They are not entitled to any
 exlusivity.

Why not? Its their software that has the bug and they're the only 
ones
who can fix it. Its not just Microsoft you're going against here, 
its
the millions of Microsoft users you're holding to ransom here.


 illegal auction. I think its in your best interest to e-mail
 [EMAIL PROTECTED]

 Illegal?  Tell me what law in what country I have broken.

Tell me which country you're in, and then we can talk about how
illegal your ransom against Microsoft and its consumers is.


 
 1) You don't want to make as much money as you could by 
offering
 Microsoft to buy your vulnerability in private.

 Like I said.  MS can offer just like anyone else but they do not
 get any special treatment.

Thats not the way it works. You must contact Microsoft first to 
setup
a dialog between each other.


 2) You want to be held responsible for selling an exploit which
 leads
 to a major incident, worm, virus outrage.

 The vulnerabilities I have for sale could be used in such a way 
but
 I am in no way responsible for what the purhcaser uses it for.

Don't be so sure of your legal saftey.
I don't think you would ever get the chance to risk a major 
incident,
you would just be arrested, have the money and vulnerability 
handed to
Microsoft and you slammed into jail. Any which way, you're going 
to be
the loser out of this, not Microsoft. Trust me, the intelligence
services are already monitoring communications between you and 
anyone
else regarding your sale, do the right thing, save your own skin,
e-mail [EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Information Disclosure - For sale

2006-05-06 Thread 0x80
Eliah,

You dumb fucking cunt.

Did you expect that subscribers to the FULL DISCLOSURE mailing 
list
would support your plan to make money off of withholding 
disclosure?

Yes I do.  Considering the fact that half these faggots including 
the so called owner of this list make money by not disclosing shit 
until it suits them.

Do you not see the hypocrasy in your horseshit?

 Wait...what about all the people you said had already bid? Are 
you
just going to screw them over?

Nope.  all of my high bidders are those that use this shit for 
spyware and adware.  I was worried about selling to them until I 
came to this list.


How do you intend to enforce the terms of your discount deal? Are 
you
going to require the buyer to sign a nondisclosure agreement to 
get
the discount?

I don't.  Its called being pissed.

I'm not any more sure that you're really offering this discount 
than I
am that you've discovered a vulnerability, but it would be 

The vulnerabilities are real.  Those that have bid have the proof 
of such.

interesting
to follow the court proceedings should you be indicted along with 
the
spyware author or spammer. Although you don't really have to sell
it--you're already soliciting people to engage in criminal 
behavior.

Oh really?  So lets hear the precidence... lets hear the case and 
court this was proved in.  What criminal behaviour is this?  

(1) You have developed a vulnerability and intend to sell it to a
spyware author or spammer.

Why would I do anything different?  You so called professionals 
would rather make jokes and call bullshit when the reality is that 
there are people far smarter with way more skills than 99.99% of 
the CISSPs out there.  What you and the rest of your so called 
community need to realize is that you are the scum.. the bottom of 
the fuckin barrel.

(2) The so called security professionals oppose you.

That is the point.  They don't oppose.  They make fun and be stupid 
because they are not smart enough to find shit on their own.  One 
of my bidders was able to come up with at least the first part.. 
the very basic root of the problem on their own I would not 
expect you dumb cunts to do that.

I gave the honest a chance.  Now I go where the money takes me... 
guess what.. the honest are poor.





Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-06 Thread 0x80
So now that you are done wasting my time and bullshitting for info.

What do you think?  What context does IE run in?  Sure, this gives 
admin rights... if the user running IE has admin rights...

But I shouldn't have to tell you that.  BTW, I CCed the FD list so 
others can see yet another dumb cunt trying to get info with no 
cash and no intent to buy.



On Fri, 05 May 2006 19:23:05 -0700 Simon Smith [EMAIL PROTECTED] 
wrote:
Very interesting,
But, my buyer is looking for exploits which yeild remote
administrative access to the targeted systems. Do either of these 
do this?

[EMAIL PROTECTED] wrote:
 OK.

 There are two issues with IE 7.  The first issue is also found 
in 
 IE 6 but in IE 6 I believe it is not exploitable (seems to be a 
 null pointer). 

 Issue 1 - IE 6.0 Crash.  IE 7 (all ver) remote code execution.  
 Lets call this one a malformed file type that IE considers safe.

 Issue 2 - IE 7.0 Information Stealing.  Target visits malicious 
web 
 site and contents of all tabbed pages, including related cookies 


 and cache information, can be yanked.  Perhaps we can coin this 
one 
 to be Cross Tab Scripting but no user interaction is required.

 Consider this exploit scenario:  User is doing online banking in 


 one tab.  User is checking gmail in another.  User opens third 
tab 
 and visits malicious web site.  I now have a copy of all data 
from 
 the first two tabs.

 My current high bid is $12,500.00 2% of any profits made by the 
use 
 of the exploit although I suspect that sort of thing would be 
tough 
 to audit.

 On Fri, 05 May 2006 15:30:17 -0700 Simon Smith 
[EMAIL PROTECTED] 
 wrote:
   
 Well,
My buyers require temporary exclusivity during the
 vetting/validation process and permanent exclusivity and 
secrecy 
 if they
 purchase the tool. If they do not purchase the tool, the the 
tool 
 is
 yours. My buyers will also most probably out bid your buyers by 

a
 significant amount. What is your current highest bid? Describe 
 this
 exploit to me at a very high level without giving away any 
 technical
 details.


 -Simon



 BullGuard Anti-virus has scanned this e-mail and found it 
clean.
 Try BullGuard for free: www.bullguard.com
 



 Concerned about your privacy? Instantly send FREE secure email, 
no account required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

   




BullGuard Anti-virus has scanned this e-mail and found it clean.
Try BullGuard for free: www.bullguard.com



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: WRONG MARKET BUDDY Re: [Full-disclosure] IE7 Information Disclosure - For sale

2006-05-06 Thread 0x80
Wow.. yet another stupid cunt.

On Fri, 05 May 2006 21:26:43 -0700 donnydark [EMAIL PROTECTED] 
wrote:
You are not reaching your target market.  This mailing list is 
the
wrong place.

I happen to know for a fact that you have not posted your auction 
in
the places that count such as the active carding forums.

You are right.  I did not post this in the carding forums.  I 
attempted to give the good guys a chance.  If this is the wrong 
forum then why do I have bids?

you would have posted some screenshots and sent the url to this
mailing list.  Of course, the url would contain the live exploit 
and
you would own as much of this list as you could and they go to 
look at
whatever you put there.  A few years back I had the ie object 
exploit

Jesus you are stupid.  Sure I could say go to www.youareowned.com 
to prove shit. Guess what dumb cunt?  everyone can easily see the 
exploit and even the most brain dead fucks can figure out what it 
is based on the proof.

Those that are serious about bidding get the proof they need to bid

ago.  (hi fools:)

You are the only fool I see.  OK, I take that back.. This entire 
list is full of fools.


I don't care about some browser no one uses.

No one uses IE7?  Wow.  You truly are stupid.  Why don't you go 
check the download stats on that before you open your stupid 
cockhole.


If you get a 0day firefox I'll give you 1k for it.
If you get a 0day IIS6 remote, I'll give you 10k for it.

So you can't afford me.  The bidding for these two are already 
beyond your offer.


otherwise shut the hell up you lying troll :)

Yup... dumbass.



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Full Disclosure Code of conduct

2006-05-06 Thread 0x80
No selling of exploits and vulnerabilities?

ahahahahaha... jesus fucking christ on a cross you are truly a dumb 
cunt.  Guess I just fucked your other two rules didn't I.

On Sat, 06 May 2006 18:01:20 -0700 Aaron Gray [EMAIL PROTECTED] 
wrote:
I am suggesting that we all cooperate and produce a Code of 
Conduct for participating on the Full Disclosure mailing list.

Suggested start :-

1) No Swearing
2) No slagging others off
3) No selling of exploits and vulnerabilities

Regards,

Aaron



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-05 Thread 0x80
I do not support nor do I wish to participate in anything iDefense 
does.  They are the original parasites of your industry.


On Fri, 05 May 2006 02:14:49 -0700 Thor Larholm 
[EMAIL PROTECTED] wrote:
Sell it to iDefense through their VCP program. A reproduceable 
code 
execution vulnerability will fetch you anywhere between $1.000 to 
$10.000. With the uncertainty of whether this makes it into IE7 
final 
I'm guessing you'll get 2-3K.

http://labs.idefense.com/vcp.php

Say hi to Ken Dunham or Michael Sutton from me :)

Cheers
Thor Larholm

[EMAIL PROTECTED] wrote:

Yes, this is a beta product but I have reason to believe that 
this 
issue will not be discovered of fixed by M$ before it goes to 
gold. 
Why do I believe this?  Because the issue is found in IE 6 but 
doesnt seem to exploit.  Not saying it is not exploitable I am 
saying that I cant make it exploit.

I work as a pizza delivery driver at night and work part time 
landscaping in my days.  So I feel it is only fair that I be 
compensated for this vulnerability.

Highest bidder that can convince me that you will actually pay 
wins.



Concerned about your privacy? Instantly send FREE secure email, 
no account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
  



-- 
Med venlig hilsen

Thor Larholm
CFO, Futurematch ApS
+45 3123 5504



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-05 Thread 0x80
Good guess.

But no.



On Fri, 05 May 2006 02:42:25 -0700 Romain Le Guen [EMAIL PROTECTED] 
wrote:
Is it a problem with digest.dll and Authentification ?

- Original Message - 
From: [EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Sent: Friday, May 05, 2006 1:46 AM
Subject: [Full-disclosure] IE7 Zero Day


 Yes, this is a beta product but I have reason to believe that 
this
 issue will not be discovered of fixed by M$ before it goes to 
gold.
 Why do I believe this?  Because the issue is found in IE 6 but
 doesnt seem to exploit.  Not saying it is not exploitable I am
 saying that I cant make it exploit.

 I work as a pizza delivery driver at night and work part time
 landscaping in my days.  So I feel it is only fair that I be
 compensated for this vulnerability.

 Highest bidder that can convince me that you will actually pay
 wins.



 Concerned about your privacy? Instantly send FREE secure email, 
no account 
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] does somebody know of php cross site vulnerability

2006-05-05 Thread 0x80
I heart vulnerabilities.

On Fri, 05 May 2006 04:32:50 -0700 azrael goblin 
[EMAIL PROTECTED] wrote:
Today, a friend of mine told me php cross site vulnerablity maybe 
exist,
That made me shocked .Because i has never heart of it.

is there somebody well knowing of that?

your ,

azrael



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability

2006-05-05 Thread 0x80
Got to love the cock smoking kiddies on this list.  So when you say 
you do penetration testing does that mean you scan networks with 
Nessess and insert your company logo into a report.

Or when you say penetration testing do you mean being fucked in the 
ass by a large nigger named bubba

On Fri, 05 May 2006 09:29:21 -0700 Tim Bilbro 
[EMAIL PROTECTED] wrote:
I have discovered that [EMAIL PROTECTED]'s girlfriend has a sexually
transmitted disease. I know who gave it to her.

I work as a SOC engineer at night and work part time
doing *ahem* penatration testing in my days. So I feel it is only 
fair
that I be
compensated for this information.

Highest bidder that can convince me that you will actually pay
wins. 

TB
http://Iainsidethebeltway.typepad.com



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability

2006-05-05 Thread 0x80
Wow, only the third faggot to make that joke.  How original

On Fri, 05 May 2006 13:22:09 -0700 Tim Bilbro 
[EMAIL PROTECTED] wrote:
I'll take two large pizza's with pepperoni and green peppers. And, 

yeah,
I'll take a couple of those IE vulnerabilities on the side. Oh, 
and
could you finish mulching my azaleas when you bring them over? 
Thanks.

http://iainsidethebeltway.typepad.com

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Sent: Friday, May 05, 2006 4:09 PM
To: [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Subject: RE: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag
vulnerability


Got to love the cock smoking kiddies on this list.  So when you 
say 
you do penetration testing does that mean you scan networks with 
Nessess and insert your company logo into a report.

Or when you say penetration testing do you mean being fucked in 
the 
ass by a large nigger named bubba

On Fri, 05 May 2006 09:29:21 -0700 Tim Bilbro 
[EMAIL PROTECTED] wrote:
I have discovered that [EMAIL PROTECTED]'s girlfriend has a sexually 
transmitted disease. I know who gave it to her.

I work as a SOC engineer at night and work part time
doing *ahem* penatration testing in my days. So I feel it is only
fair
that I be
compensated for this information.

Highest bidder that can convince me that you will actually pay 
wins.

TB
http://Iainsidethebeltway.typepad.com



Concerned about your privacy? Instantly send FREE secure email, no
account required http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-05 Thread 0x80
Ahhh there we go.  Yes, so because a bunch of idiots who couldn't 
exploit themselves out of a paper bag are pissed off because I 
won't share my exploit you assume that no one wants to buy it.

So far the bidding is up to a substantial number.  The three 
parties bidding on the exploit have been given enough proof that 
both do exist and I am currently waiting their counter-offers.

I'll let you wanna-be whitehat faggots (how low is it to be a wanna-
be whitehat faggot and not a real whitehat faggot?) back to your 
XSS vulnerabilities and your flame wars about college admins and of 
course your favorite passtime of thinking you are some elite group 
of technogeeks when the reality is that even among the technogeeks 
you are the bottom of the barrel.  The losers, the slime, the cock 
smoking fucking fucks.

On Fri, 05 May 2006 13:41:48 -0700 Ryan Whelan [EMAIL PROTECTED] 
wrote:
It is very apparent to me that no one wants to buy, your 
'exploit'. I don't
think calling the industry 'pathetic' or the people associated 
with it
'stupid' is going to win you any supporters. I would suggest you 
either
fully disclose what you found, or just save what little dignity 
you have
left and be quiet.


On 5/5/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

 It is amazing at the collective stupidity of so called security
 professionals.  Yet I get questioned as to why I don't want to 
join
 your pathetic industry.

 Yeah, but since he can't sploit this vuln he claims to have
 found, it's
 perhaps not going to net him much interest nor cash from 
others,
 being
 he's also holding his cards so close4 to his vest.

 I said that it is not exploitable on IE 6.0.  It is exploitable 
on
 IE 7 all versions.  Perhaps reading comprehension would be good 
for
 you.


 One might as well post it this way:
 
 someplace, somewhere is a pc with a vulnerable application, 
guess
 where it
 is and you can own it.  Oh, but, pay me big bucks first so I 
can
 eat well
 for a day or two.

 Are you the product of a broken condom during a gang rape?  
Learn
 how to read before you pass judgement.  Better yet, learn how to
 find your own vulnerabilities instead of wasting your time
 researching other people's wireless security issues.



 Concerned about your privacy? Instantly send FREE secure email, 
no account
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Information Disclosure - For sale

2006-05-05 Thread 0x80
Congradulations.

You have won an award for being the sixth clueless wanna-be 
whitehat faggot to crack that joke.

Based on all of the feedback on this cess-pool called a mailing 
list.  I am now offering my vulnerabilities for sale only to those 
that a.) will not report it to the vendor and b.) will only use it 
for their own profit via spyware installations and spambots. 

I will discount the price to anyone using it in the above manner to 
target so called security professionals subscribed to this list.

On Fri, 05 May 2006 15:32:42 -0700 Travis Good 
[EMAIL PROTECTED] wrote:
I'll give you 10.99+tip for it if you also throw in a large 
sausage 
pizza.

On Thu, 4 May 2006, [EMAIL PROTECTED] wrote:


 I just found a second bug that allows one to remotely retrieve 
the
 contents of other tabs inside of IE7.

 Again, for sale.  Highest bidder.

 Exploit example is to trick luser to visiting website which 
would
 then download contents of all open tabs including cookie and
 session information.



 Concerned about your privacy? Instantly send FREE secure email, 
no account required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


Travis Good, CISSP, IAM, IEM



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] IE7 Zero Day

2006-05-04 Thread 0x80
Yes, this is a beta product but I have reason to believe that this 
issue will not be discovered of fixed by M$ before it goes to gold. 
Why do I believe this?  Because the issue is found in IE 6 but 
doesnt seem to exploit.  Not saying it is not exploitable I am 
saying that I cant make it exploit.

I work as a pizza delivery driver at night and work part time 
landscaping in my days.  So I feel it is only fair that I be 
compensated for this vulnerability.

Highest bidder that can convince me that you will actually pay 
wins.



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-04 Thread 0x80
What do you do for work?  Are you paid to work with computers?  

Do not judge others and how they choose to make a living.  I am 
doing nothing different than anyone else who has a skill and needs 
to support family.

If you were smarter you wouldn't need me to share my knowledge in 
any way now would you?

On Thu, 04 May 2006 16:52:57 -0700 FRLinux [EMAIL PROTECTED] 
wrote:
On 5/5/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 Highest bidder that can convince me that you will actually pay
 wins.

Whatever happened to sharing knowledge in a common way ... Honest, 
get
a life ...

Steph



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] IE7 Information Disclosure - For sale

2006-05-04 Thread 0x80

I just found a second bug that allows one to remotely retrieve the 
contents of other tabs inside of IE7.

Again, for sale.  Highest bidder.

Exploit example is to trick luser to visiting website which would 
then download contents of all open tabs including cookie and 
session information.



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-04 Thread 0x80
I can prove that I have the goods to those that are seriously 
interested in buying.

On Thu, 04 May 2006 19:26:53 -0700 [EMAIL PROTECTED] wrote:
On Thu, 04 May 2006 16:46:28 PDT, [EMAIL PROTECTED] said:
 Highest bidder that can convince me that you will actually pay 
 wins.

As a spectator, I wonder who's going to bid on it, and how much, 
without any
clues as to what exactly the extent is (crash, code execution as 
user, code
exec as system, etc), or even any proof you have the goods.. ;)



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-04 Thread 0x80
If you are interested in bidding.  I can provide you wtih an 
account to provide the funds.  Social Security numbers are for 
American citizens only so don't assume I am such a person.



On Thu, 04 May 2006 20:58:26 -0700 Peter Besenbruch [EMAIL PROTECTED] 
wrote:
[EMAIL PROTECTED] wrote:
 As a spectator, I wonder who's going to bid on it, and how much, 

without any
 clues as to what exactly the extent is (crash, code execution as 

user, code
 exec as system, etc), or even any proof you have the goods.. ;)

If the guy provided more information, such as his full name, 
address, 
and phone number, his bank account info, his social security 
number, 
that sort of thing, I might trust him. ;)
-- 
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE7 Zero Day

2006-05-04 Thread 0x80
Ahh and here come the clueless posts from those that have never 
found a vulnerability themselves.

Sigh... 

On Thu, 04 May 2006 21:51:50 -0700 Randal T. Rioux 
[EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] wrote:
 If you are interested in bidding.  I can provide you wtih an 
 account to provide the funds.  Social Security numbers are for 
 American citizens only so don't assume I am such a person.
 

I'll start the bidding at $1.25 USD. Do you take checks?

I have a slighty used half-liter bottle of Mountain Dew for trade 
if
you're willing to barter.

Let me know... I'm serious.

Randy

PS I found that the rotors on my Jeep wear down faster than they 
should.
Does anyone know a contact at Daimler/Chrylser that would be 
interested
in buying this vulnerability information? I don't have a fix yet 
though.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability

2006-05-02 Thread 0x80
CERT has more leaks than a whore who has been anally fucked with a 
loaded shotgun.

On Mon, 01 May 2006 12:31:50 -0700 [EMAIL PROTECTED] wrote:
On Mon, 01 May 2006 14:51:23 EDT, Tim Bilbro said:

 Some have suggested a 'Vulnerability Escrow' A third party that 
tracks
 and holds vulnerability discoveries and works with the vendor. I 

think
 that is an idea worth exploring. 

http://www.cert.org/reporting/vulnerability_form.txt

BTDT.



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Hola Distro Help me

2006-05-02 Thread 0x80
Should you not be downtown NYC protesting or something?

www.redhat.com

is probably a better place to start than on here.  But as the 
saying goes, if you have to ask -- you probably aren't smart enough 
to do.

On Tue, 02 May 2006 12:31:41 -0700 Edgardo Zavala 
[EMAIL PROTECTED] wrote:
 en espanol mi idioma ---
Suplico su ayuda
Como crear mi propia distribucion basada en fedora?
Auxilio, se que se puede modificar, pero como.

Perdonen mi ignorancia.
Pero les agradezco me den informacion.

Gracias.

--- en ingles --- :( --
I need your help
How can I create my own distribution based on fedora?
Aid, that it is possible to be modified, but how?

Pardon my ignorance.
But I am thankful to them give information me.

Thanks.


jejejeje, bye.



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Hello gents

2006-05-01 Thread 0x80


On Sun, 30 Apr 2006 09:18:16 -0700 MR BABS [EMAIL PROTECTED] 
wrote:

*Bantown is in no way affiliated with Dave Aitel or Immunity, Inc.

Just like Gobbles isnt right?

Oh wait... he works there now doesnt he.



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability

2006-04-29 Thread 0x80
Oh fuck.  I am so motherfucking sorry for my goddamn fucking cunt 
mouth language.

Won't happen a fucking again.



On Fri, 28 Apr 2006 05:32:28 -0700 Sol Invictus 
[EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] wrote:

[EMAIL PROTECTED]@%!^@ fuck up whiner.

Mr. C.I.S.S.P... Mr. M.C.S.E

What the fuck [EMAIL PROTECTED](*%^*(^(*(^*(%^ 
vulnerabilities?  Jack and shit.. that is what you know.

[EMAIL PROTECTED]@#$^%^*$%^(*%e.. then fuckin pay for it newb.
  

Excuse me but can we watch our language here?  Some of us are 
professionals and are trying to teach our children what's right.  
This 
IS an excellent way to show that there are people who are just too 

low 
to learn how to speak the language properly.

By the Way,  What does Fornication Under Command of the King have 
to do 
with Security???



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability

2006-04-28 Thread 0x80
Blah blah blah... shut the fuck up whiner.

Mr. C.I.S.S.P... Mr. M.C.S.E

What the fuck do you know about working with vendors and 
vulnerabilities?  Jack and shit.. that is what you know.

You want a service.. then fuckin pay for it newb.

On Wed, 26 Apr 2006 08:06:09 -0700 Tim Bilbro 
[EMAIL PROTECTED] wrote:
You do a disservice to all IT shops by announcing these 
vulnerabilities
before contacting the vendor. I am sure it would not generate as 
much
web traffic to your site, but it is only fair and right to allow 
at
least some amount of time for the vendor to respond. If you think 
you
are helping, you are wrong. Would you go around town checking 
which
stores are unlocked at night and then publish the list in the news
before letting the shop owners know? That's pretty much what you 
are
doing. It's just not helping. There is no proof that it is either.

Tim Bilbro
Information Security Specialist
CISSP, MCSE
[EMAIL PROTECTED]
web: www.bloglines.com/blog/Bilbro
RSS: www.bloglines.com/blog/Bilbro/rss



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: MSIE (mshtml.dll) OBJECT tag vulnerability

2006-04-26 Thread 0x80
How did this get from a bunch of euro cock smokers selling out to 
Microsoft to arguing over an old, and amusing, quote?


On Tue, 25 Apr 2006 23:03:33 -0700 [EMAIL PROTECTED] wrote:
On Wed, 26 Apr 2006 09:22:30 +0400, Raoul Nakhmanson-Kulish said:
 Hello, [EMAIL PROTECTED]
 
  There are two major products that come out of Berkeley: LSD 
and UNIX.
 It's well-know fact that D-lysergic acid diethylamide is come 
out from
 Sandoz company lab and is synthesized by Dr. Albert Hoffmann in 
1943.

And the drug culture of Berkeley and San Francisco (Grateful Dead, 

anybody?)
right across the bay certainly popularized it.  LSD wasn't widely 
used before that.

Similarly, UNIX actually came out of Bell Labs in Cherry Hill, New 

Jersey, on
the other side of the continent - but BSD certainly helped 
popularize it...

And in any case, I was merely correcting the misquote.  You don't 
like like
the quote, take it up with Jeremy Anderson and the person who 
misquoted him. ;)



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Should I Be Worried?

2006-04-26 Thread 0x80
If you didnt break the law who cares.

On Wed, 26 Apr 2006 11:30:02 -0700 CrYpTiC MauleR 
[EMAIL PROTECTED] wrote:
After reading http://www.securityfocus.com/news/11389 it made me 
think twice about actually going public with my school's security 
hole by having school notify students, parents and/or faculty at 
risk due to it.

I mean I didnt access any records, just knew that it was possible 
for someone to access my account or anyone elses. I did not even 
exploit the hole to steal, modify etc any records. Does this still 

put me in the same boat at the USC guy? If so I am really not 
wanting to butt heads with the school in case they try to turn 
around and bite the hand that tried to help them. Even if my 
intentions were good, they might even make something up saying I 
accessed entire database or something. I have nothing to prove me 
otherwise since they have access to the logs. Already it seems 
like the school is trying to sweep the incident under the rug, so 
very wary as to what they might do if they were pushed into a 
corner and forced to go public. Anyone has any idea what I can do 
or should I just let this slide? I am already putting my credit 
report and such on fraud alert just in case, and definelty do not 
plan on attending this school after my degree or school year is 
over. A transfer is better than having me risk my data.

Regards,
CM

-- 
___
Check out the latest SMS services @ http://www.linuxmail.org
This allows you to send and receive SMS through your mailbox.

Powered by Outblaze

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] selling ms office bug

2006-04-21 Thread 0x80
Ahaha.

Not really because I am pretty sure that he is talking about either 
an unpatched PPT overflow (malformed powerpoint file) or perhaps 
even an older one that was found and never reported to MS in Visio.

I do understand that its easy to trick users into clicking on 
something to be owned and yes you can embed any office document in 
html and have it auto-execute but these types of vulnerabilities 
are as common as lame XSS vulns or rambling n3td3v posts. 

Have you ever ran tests on IE?  I can crash IE in thousands of ways 
with malformed content.  Some might be exploitable, most are null 
pointers.  But the point is... these issues will probably always 
exists and there is no real defense against tricking a user into 
doing something.

By the way, I am typing this email after spending the day at the 
beach in 35 celsius weather getting a sunburn so if they want to 
join me they can. heh

On Thu, 20 Apr 2006 23:25:41 -0700 [EMAIL PROTECTED] wrote:
On Thu, 20 Apr 2006 22:05:23 PDT, [EMAIL PROTECTED] said:
 You open a file and shellcode runs?

 Wow... hey guys I have a executable to sell.. all you need to do 

is
 get the user to open it and the code runs compromising the
 system...

 sigh..

You're just jealous because he's probably going to make enough 
money to
pay for a nice trip to the tropical beach of his choice, *and* be 
able
to brag about how he pwn'ed a whole mess of white hat's boxes and 
got
away with it.. ;)



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-21 Thread 0x80
Listen up froggy.

Zone-H is no better than Secunia and no better than those cock 
smokers at Attrition.  Perhaps you should follow their lead.  
Internet thermometer indeed rectal thermometer that is.

On Fri, 21 Apr 2006 02:06:30 -0700 Siegfried [EMAIL PROTECTED] 
wrote:
See, you realized you judged them without even opening your 
browser, and
stop insulting, don't act like a kid thanks.
And yes, they contribute more than you, even if you play the 
blackhat
game, i talked about publishing vulns, did you read the name of 
the
mailing list? it's called full disclosure. They published a lot 
of
advisories, they're maybe the best posters (of advisories) here.
I didn't mean to talk about you, but to say hey look, your 
critics aren't
correct, but you have a too big ego to say you were wrong when 
you said
they published nothing.
This list really shows how everybody behaves in the community, 
ready to
shoot in each other's head and flame the others. When they publish 

an
advisory, nobody says hey nice one, some of you even didn't 
believe they
were their OWN advisories, but when n3td3v says they're fucking
spamming, many people start criticizing..


Le Ven 21 avril 2006 07:02, [EMAIL PROTECTED] a écrit :
 n3td3v is a kid and a troll.  But you my stupid dumb fucking 
fuck
 need to check yourself before you lip off about shit you know
 nothing about.  you have no clue who I am and no clue what I 
have
 or have not done.  you on the other hand. bah... too easy..



 On Wed, 19 Apr 2006 06:09:30 -0700 Siegfried [EMAIL PROTECTED]
 wrote:
http://secunia.com/secunia_research/
one vulnerability? not even a remote system one? did you do
better?
and did n3tv3d with his xss advisories and trolls do better?
Be respectful because they contribute more than you

Le Mer 19 avril 2006 15:01, [EMAIL PROTECTED] a écrit :
 So releasing one vulnerability... and not even a remote system
 one... makes them legitimate? They are just as bad as that
n3td3v
 faggot.

 On Tue, 18 Apr 2006 17:56:42 -0700 Aaron Gray
angray_at_beeb.net
 wrote:
Kill Secunia, the illegal high jackers of FD.

Yes they release real vulnerablities.

See 
Internet_Explorer_Address_Bar_Spoofing_Vulnerability_Test:-



 http://secunia.com/advisories/19521/

Will disabling or removing Flash till its solved prevent this 
?

Aaron

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 Concerned about your privacy? Instantly send FREE secure 
email,
no account
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



 Concerned about your privacy? Instantly send FREE secure email, 
no account
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485




-- 
Zone-H Admin
[EMAIL PROTECTED]
www.zone-h.org
www.zone-h.fr



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] hiya

2006-04-21 Thread 0x80
So does the look alike have the big goofy forehead and stupid grin 
all the time?  What about the receeding hair?



On Fri, 21 Apr 2006 18:41:36 -0700 Robert Lemos 
[EMAIL PROTECTED] wrote:
just a quick one to say netdev is a great guy, he sends 
securityfocus
great stuff for my articles!

moreover, he setup a blog to support my journalism
http://360.yahoo.com/robert.lemos

before i go, netdev is really going places and i don't just mean 
in
peoples mail filters, i mean real places!

please don't look at my mail headers.

koochie coo,

robert lemos look-a-like

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-20 Thread 0x80
n3td3v is a kid and a troll.  But you my stupid dumb fucking fuck 
need to check yourself before you lip off about shit you know 
nothing about.  you have no clue who I am and no clue what I have 
or have not done.  you on the other hand. bah... too easy..



On Wed, 19 Apr 2006 06:09:30 -0700 Siegfried [EMAIL PROTECTED] 
wrote:
http://secunia.com/secunia_research/
one vulnerability? not even a remote system one? did you do 
better?
and did n3tv3d with his xss advisories and trolls do better?
Be respectful because they contribute more than you

Le Mer 19 avril 2006 15:01, [EMAIL PROTECTED] a écrit :
 So releasing one vulnerability... and not even a remote system
 one... makes them legitimate? They are just as bad as that 
n3td3v
 faggot.

 On Tue, 18 Apr 2006 17:56:42 -0700 Aaron Gray 
angray_at_beeb.net
 wrote:
Kill Secunia, the illegal high jackers of FD.

Yes they release real vulnerablities.

See Internet_Explorer_Address_Bar_Spoofing_Vulnerability_Test:-



 http://secunia.com/advisories/19521/

Will disabling or removing Flash till its solved prevent this ?

Aaron

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 Concerned about your privacy? Instantly send FREE secure email, 
no account
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] selling ms office bug

2006-04-20 Thread 0x80
You open a file and shellcode runs?

Wow... hey guys I have a executable to sell.. all you need to do is 
get the user to open it and the code runs compromising the 
system...

sigh..

On Wed, 19 Apr 2006 14:19:32 -0700 [EMAIL PROTECTED] 
[EMAIL PROTECTED] wrote:
auction is up for whitehat industry only, proof required, you open 

a 
file, the shellcode runs, included are some explanations and the 
poc 
exploit.
You are welcome to message me to my email or on the forum for much 


informations.

Arnaud Dovi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] selling ms office bug

2006-04-20 Thread 0x80
Why not just say that it is either the unpatched PPT bug or the 
Visio one that has been known by others.  Unless of course you have 
a 1337 Excel one again

On Wed, 19 Apr 2006 14:24:31 -0700 [EMAIL PROTECTED] 
[EMAIL PROTECTED] wrote:
forgot to mention so the format of the file is popular , in 
security at 
least a lot ;

[EMAIL PROTECTED] wrote:
 auction is up for whitehat industry only, proof required, you 
open a 
 file, the shellcode runs, included are some explanations and the 

poc 
 exploit.
 You are welcome to message me to my email or on the forum for 
much 
 informations.

 Arnaud Dovi

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Secunia illegal spam and advisory republication

2006-04-20 Thread 0x80
PURCHASED...

So how do y'all who post real information here feel about someone 
else making money off of your work.  Nice community 
resource..


On Thu, 20 Apr 2006 14:45:57 -0700 Mike Owen [EMAIL PROTECTED] 
wrote:
On 4/20/06, [EMAIL PROTECTED] [EMAIL PROTECTED] 
wrote:

 as for this list being sponsored by Secunia. did n3td3v not 
actually READ the list
 at all before subscribing or posting to it?  who wouldn't take 
such preliminary cautions?


 alan


The list was purchased by Secunia a year or so ago. Many of the
subscribers have been on it since it's inception by Len on 
netsys.com
4 years ago, long before Secunia got their hands on it.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-19 Thread 0x80
There is no difference between secunia and securityfocus.

They are both bottom of the barrel slime

On Tue, 18 Apr 2006 22:11:36 -0700 n3td3v [EMAIL PROTECTED] wrote:
On 4/19/06, Aaron Gray [EMAIL PROTECTED] wrote:
 Kill Secunia, the illegal high jackers of FD.

 Personally I would thank them for providing a good secure server 

and hosting
 the list.

 Aaron

Thank you for spamming us Secunia via the Full-Disclosure footer 
message.

Furthermore, Secunia are the biggest scene whore professional
website in the industry.

Theres nothing on their site that wasn't available via other 
public sources.

With Secunia, its all about republish, republish, republish 
peoples shiz.

And you want everyone to thank them for secure hosting? Don't 
kid a kidder...

If they did something special with their website like 
Securityfocus
does, then I might be able to bare their illegal footer message 
spam,
and their scene whore republication of advisories they claim are
Secunia exclusives.

Regards,

n3td3v

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-19 Thread 0x80
So when you are done with your temper tantrum read what you wrote 
here:


I don't think the industry needs someone to verify an advisory 
for them.

Secunia collects, validates, and verifies all vulnerability 
reports
issued by security research groups, vendors, and others.

People are more than capable of doing that themselves, or do 
Secunia
underestimate the intelligence of the security community?

Secunia, as slimy and bullshit as it is, sells a service to IT 
Adminstrators which sadly are stupid and cannot perform 
verification themselves.  Add that to the droves of idiot 
consultants who also cannot verify the info themsevles but make 
millions reselling it as knowlege.

So Secunia, SecurityFuckus and others exist to feed the snakes who 
produce the snake oil.


This is my last ever Full-Disclosure post... i'm no longer going 
to
give Secunia the spam satisfaction of adding their web address to 
the
bottom of my messages.

Good bye to the All-New Secunia sponsored Full-dIsclosure mailing 
list.

Please unsubscribe n3td3v_at_gmail and xploitable_at_gmail

Ding dong the faggot is gone.  Please take the chinkfocusteam with 
you too.  Perhaps y'all can go suck some aiteldick over at 
DailyWhitehat



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] kiddie porn warning [was: Fwd: Re: montspace -- child porn (site still up)]

2006-04-18 Thread 0x80
Morning wood is a perfectly normal thing.  In fact it is morning 
here and I am sitting here naked with a massive erection.  Nothing 
wrong with that.  The fact that I am using it to press the space 
bar is a bit creepy however.


On Mon, 17 Apr 2006 22:54:20 -0700 Andrew A [EMAIL PROTECTED] 
wrote:
With a name like Morning Wood he HAS to be a pedophile.

On 4/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

 It gave me wood.  Morning Wood.

 Yeah that was a bad joke wasn't it.

 On Mon, 17 Apr 2006 18:55:54 -0700 Gadi Evron [EMAIL PROTECTED]
 wrote:
 Gary E. Miller wrote:
  And how long did it take that mole to pop back up?  Tompa.com 

is

 already
  back on the air.  Montspace.com is not back up yet, but that 
was

 just
 
 Guys, please refrain from going to that site or downloading it. 

In

 some
 western countries just having CP on your PC means your life can 

be

 
 completely ruined without much further evidence or 
investigation
 before-hand.
 
 Motive is irrelevant. Leave this to the proper authorities.
 
 Plus, it will give you nightmares.
 
Gadi.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 Concerned about your privacy? Instantly send FREE secure email, 
no account
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Attn Xfocus

2006-04-17 Thread 0x80
The nice thing is I can use any word I want and there isn't much 
you can do about it.

Who said you were gov?  Aren't you violating laws by posting on 
here?

On Sun, 16 Apr 2006 22:41:15 -0700 [EMAIL PROTECTED] 
[EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] wrote:
 information security',
 
 Now you must leave. By by chinks.
 
you can talk about how china gov undemocratic is.
but NOT USE THE WORD chinks,if you don't respect chinese 
people,you
will
don't be respected by us.Unfortunately,How stupid u are!!!

ps: xfoucs not gov,xfocus just is xfocus,Xfocus just is a non-
profit and
free technology organization which was founded in 1998 in China
--

Kind Regards,

---
[EMAIL PROTECTED]

XFOCUS Security Team
http://www.xfocus.org



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Attn Xfocus

2006-04-17 Thread 0x80
Apparently someone need to beat y'all with a clue stick.



On Mon, 17 Apr 2006 00:04:03 -0700 Alice Bryson 
[EMAIL PROTECTED] wrote:
[EMAIL PROTECTED]:
Chinese government people and Chinese technical people are 
different,
you must be aware of this.



2006/4/17, [EMAIL PROTECTED] [EMAIL PROTECTED]:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 [EMAIL PROTECTED] wrote:
  information security',
 
  Now you must leave. By by chinks.
 
 you can talk about how china gov undemocratic is.
 but NOT USE THE WORD chinks,if you don't respect chinese 
people,you
 will
 don't be respected by us.Unfortunately,How stupid u are!!!

 ps: xfoucs not gov,xfocus just is xfocus,Xfocus just is a non-
profit and
 free technology organization which was founded in 1998 in China
 - --

 Kind Regards,

 - ---
 [EMAIL PROTECTED]

 XFOCUS Security Team
 http://www.xfocus.org

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.1 (GNU/Linux)

 iD8DBQFEQyp7sIGFlQFVy00RAgZAAKCWFKM09awv8/l1whQTk+nOH4nK2QCeMnfT
 Tt//MdxIQ/Uqs+7CsztgYmk=
 =0CWc
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



--
http://www.lwang.org
lwang.org provides free service of online base64 encode and 
decode,
crc32 md5 and sha1 hashing, online ciphers, encryption and 
decryption.
mailto:[EMAIL PROTECTED]



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] kiddie porn warning [was: Fwd: Re: montspace -- child porn (site still up)]

2006-04-17 Thread 0x80
It gave me wood.  Morning Wood.

Yeah that was a bad joke wasn't it.

On Mon, 17 Apr 2006 18:55:54 -0700 Gadi Evron [EMAIL PROTECTED] 
wrote:
Gary E. Miller wrote:
 And how long did it take that mole to pop back up?  Tompa.com is 

already
 back on the air.  Montspace.com is not back up yet, but that was 

just

Guys, please refrain from going to that site or downloading it. In 

some 
western countries just having CP on your PC means your life can be 


completely ruined without much further evidence or investigation 
before-hand.

Motive is irrelevant. Leave this to the proper authorities.

Plus, it will give you nightmares.

   Gadi.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Attn Xfocus

2006-04-16 Thread 0x80
fsk em... its not like you will be the one on the other end of the 
revolver.

On Sun, 16 Apr 2006 17:34:35 -0700 n3td3v [EMAIL PROTECTED] wrote:
On 4/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 http://www.vnunet.com/vnunet/news/2154063/china-outlaws-outlook

 China's new rules also prohibit use of email to discuss certain
 vaguely defined subjects related to 'network security' and '
 information security',

 Now you must leave. By by chinks.

I've been routing via China for a while 222.137.124.124, I guess I
should stop using this for security related mailing lists ;-)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Welcome to XCon2006!

2006-04-03 Thread 0x80
Fuck the chinks at XCom.  Stay behind the wall with your government 
sponsored attempt at gaining new knowlege.





Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] RE: Welcome to XCon2006!

2006-04-03 Thread 0x80 fk
Hi [EMAIL PROTECTED], fuucck your mother's asshole

You are welcome. emm


-Original Message-
From: full-disclosure-bounces at lists.grok.org.uk
[mailto:full-disclosure-bounces at lists.grok.org.uk] On Behalf Of
0x80 at hush.ai
Sent: Monday, April 03, 2006 2:32 AM
To: full-disclosure at lists.grok.org.uk; xcon at xfocus.org
Subject: Re: [Full-disclosure] Welcome to XCon2006!

Fuck the chinks at XCom.  Stay behind the wall with your government
sponsored attempt at gaining new knowlege.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Even TheRegister Agrees

2006-04-03 Thread 0x80
Nice headline.

http://www.theregister.co.uk/2006/04/03/anonymizer_china/

Anonymizer looks for chinks in Great Firewall of China
Google workaround

By John LeydenPublished Monday 3rd April 2006 22:41 GMTGet breaking 


Anonymizer has gone live with a service that aims to circumvent 
Chinese censorship restrictions. The online identity protection 
firm has released software (initially available at xifuchun.com, an 
English language site) designed specifically for Chinese citizens, 
that offers a way around the web filters put in place by Beijing.





Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] re: eeye temporary patch for current IE vulnerability

2006-03-28 Thread 0x80
Yes I installed the patch and looked at the source which is also 
available on the site.

Worked for me.

On Tue, 28 Mar 2006 04:38:05 -0800 Jay Libove [EMAIL PROTECTED] 
wrote:
Has anyone applied and tested the eeye patch? Verified that it 
works, and 
that it does not do anything else?

-Jay

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] re: eeye temporary patch for current IE vulnerability

2006-03-28 Thread 0x80
It not hard to monitor changes binary makes compared to source.  
Nor is it hard to reverse binary.

On Tue, 28 Mar 2006 08:55:28 -0800 [EMAIL PROTECTED] wrote:
On Tue, 28 Mar 2006 07:49:15 PST, [EMAIL PROTECTED] said:
 Yes I installed the patch and looked at the source which is also 


 available on the site.
 
 Worked for me.

And you convinced yourself that the patch and the source matched, 
how, exactly? :)



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread 0x80
Oh here we go.

My life is better now that I get to bone KF's mom.



On Sat, 25 Mar 2006 05:22:35 -0800 KF (lists) 
[EMAIL PROTECTED] wrote:
Andrew A wrote:


  Hey BlueBoar, how has life been since we got you fired from 
 SecurityFocus?

  

How about yours since you stopped beating your wife?

-KF


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread 0x80
Yeah but you do like to choke on fat cocks.

Perhaps its time for a new mail spool to be posted.

On Sat, 25 Mar 2006 09:33:22 -0800 Blue Boar [EMAIL PROTECTED] 
wrote:
Stan Bubrouski wrote:
 On 3/24/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 Posting a private email to a mailing list is pretty slimeball 
Ryan.
  Funny you would do such a thing when you lost your bullshit 
job at
 Security Focus over getting owned.
 
 Sadly more and more people are posting off-list messages back to 

the
 list to get themselves more attention (n3td3v).

Except that I didn't.

   BB

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Industry calls on Microsoft to scrap Patch Tuesday for Critical flaws

2006-03-25 Thread 0x80
WE?

You are one guy.  Actually you are one stupid guy who obviously has 
zero clue about how real enterprise level infrastructures handle 
patch management.

Patch Tuesday is a good thing as it supports a sound patch 
management methodology.  I wouldn't expect you to know this because 
it is clear that you are some idiotic kid.

On Sat, 25 Mar 2006 14:12:23 -0800 n3td3v [EMAIL PROTECTED] wrote:
Dear Microsoft and Security Community,


In light of WMF and recent HTA flaws, we n3td3v group are calling 
on the
following:


We are calling for Microsoft to scrap Patch Tuesday officially for
critical flaws in its product line(s).

You Microsoft must officially agree that all flaws marked as 
Critical must
have a patch within 7 to 14 days of public disclosure.


People power will change policy by forwarding this e-mail to:

[EMAIL PROTECTED]


Reason for this e-mail:


Reports are coming into our intelligence body that mass HTA 
hacking is being
carried out world wide.

 of course unofficial patches cause a greater security risk than 
the flaw
its self:

http://groups.google.com/group/n3td3v/browse_thread/thread/83607ba8

33b697b0/8f0be3bc9c2436c4


Links:

n3td3v group HQ:
http://groups.google.com/group/n3td3v

Hackivism scene information:
http://en.wikipedia.org/wiki/Hacktivism



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Industry calls on Microsoft to scrap Patch Tuesday for Critical flaws

2006-03-25 Thread 0x80
Rogue employees?

Alright shit stain. Yeah.. MS is going to listen to a group of 
rogue employees lol

On Sat, 25 Mar 2006 19:34:43 -0800 n3td3v [EMAIL PROTECTED] wrote:
*I work with rogue employee vendors around the world to bring good 

Hack
active solution about within the community, if you can't under 
stand that,
then you need to sit down and realise that the n3td3v group is the 

biggest
thing you'll ever meet in your life time, in terms of rogue 
employees
getting together to make their voice heard.*

*We can agree in that one guy, has many voices, if that helps your 

cause mr
0x80!*
Or we can argue the crypto of the n3td3v group further if you wish 

to go
down that road...


On 3/26/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

 WE?

 You are one guy.  Actually you are one stupid guy who obviously 
has
 zero clue about how real enterprise level infrastructures handle
 patch management.

 Patch Tuesday is a good thing as it supports a sound patch
 management methodology.  I wouldn't expect you to know this 
because
 it is clear that you are some idiotic kid.

 On Sat, 25 Mar 2006 14:12:23 -0800 n3td3v [EMAIL PROTECTED] 
wrote:
 Dear Microsoft and Security Community,
 
 
 In light of WMF and recent HTA flaws, we n3td3v group are 
calling
 on the
 following:
 
 
 We are calling for Microsoft to scrap Patch Tuesday officially 
for
 critical flaws in its product line(s).
 
 You Microsoft must officially agree that all flaws marked as
 Critical must
 have a patch within 7 to 14 days of public disclosure.
 
 
 People power will change policy by forwarding this e-mail to:
 
 [EMAIL PROTECTED]
 
 
 Reason for this e-mail:
 
 
 Reports are coming into our intelligence body that mass HTA
 hacking is being
 carried out world wide.
 
  of course unofficial patches cause a greater security risk 
than
 the flaw
 its self:
 
 
http://groups.google.com/group/n3td3v/browse_thread/thread/83607ba

8

 33b697b0/8f0be3bc9c2436c4
 
 
 Links:
 
 n3td3v group HQ:
 http://groups.google.com/group/n3td3v
 
 Hackivism scene information:
 http://en.wikipedia.org/wiki/Hacktivism



 Concerned about your privacy? Instantly send FREE secure email, 
no account
 required
 http://www.hushmail.com/send?l=480

 Get the best prices on SSL certificates from Hushmail
 https://www.hushssl.com?l=485





Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread 0x80
I only wish I was your daddy so I could slap the shit out of you 
like you obviously deserve and never got enough of as a child.

On Sat, 25 Mar 2006 19:34:20 -0800 KF (lists) 
[EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] wrote:

Oh here we go.

My life is better now that I get to bone KF's mom.


  

Schweet! I always wanted a little brother!

0x80 is my step daddy. wh00t!
-KF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-24 Thread 0x80
 Sendmail vulnerabilities were released yesterday. No real public 
 announcements to speak of to the security community.

Do you live under a rock? There were a lot of public announcements 
about this.

 To begin with, anyone noticed the memory leak they (Sendmail) 
 silently patched?
 I wonder how many other unreported silently-patched 
vulnerabilities 
 are out there?

Yes.  There was a presentation at Blackhat Europe about this.  It 
happens all the time.  Vendors do not practice responsible 
disclosure but they expect you to.

 Sendmail is, as we know, the most used daemon for SMTP in the 
world. 
 This is an International Infrastructure vulnerability and should 
 have been treated that way. It wasn't. It was handled not only 
 poorly, but irresponsibly.

So in one sentence you say that the ISS bug is only a DoS and now 
you are crying that a bug is being handled irresponsibly?  Don't 
you have already talked to death DNS attacks to sound the alarm 
about?

 They say it's a remote code execution. They say it's a race 
 condition. No real data available to speak of. I can't see how 
it's 
 remotely exploitable, but well, no details, remember? From what 
we 
 can see it seems like a DoS.

So if in the best of your abilities this is only a DoS --- why cry 

over so called irresponsible disclosure of a bug?  Oh wait, the 
minor memory leak that you think you found is the issue.

 What they did behind the smoke-screen is replace a lot of 
setjmp() 
 and
 longjmp() functions (not very secure ones at that) with goto's 
 (interesting choice).

So what would you have done?  What smoke-screen are you talking 
about?

 The int overflow is possibly exploitable, not very sure about the 


 jumps. No idea why ISS says the Race Condition is, would love 
 insight.

You got that right.  We would all love you to get some insight.

 One could say ISS and Sendmail did good, obscuring the 
information 
 so that the vulnerability-to-exploit time will be longer. That 
 proved wrong, useless and pointless. They failed.

Obviously.  I mean if *you* couldn't figure out how to exploit the 
ISS issue then they must have failed.  Or wait, you couldn't figure 

it out so perhaps they failed but are still smarter than you.

 After looking at the available data for 30 minutes (more or 
less), 
 we know exactly what the vulnerabilities are. Exploiting them may 



So after 30 minutes you were wrong about an issue.  Tell me again 
how smart you are.

Not to mention the silently patched memory leak.

Alert the press.  DNS is can be attacked AND there is a memory leak 

in Sendmail.

 both ISS and Sendmail should look good and hard at the coming 
 massive exploitation of Sendmail servers.

Nah the 1337 h4x0rs will be too busy going after DNS right?

 With issues relating to the Internet Infrastructure I'd be 
willing 
 to go even with the evil of non-disclosure, as long as something 
 gets done and then reported publically when it finally scaled 
down 
 in a roll-back after a couple of years.

Yeah, that will work.  Because, no offense Mark Dowd, no one else 
could have found the problem.  Well at least we know that the world 

is safe from you.

 If not, and you are going to make it public, make the effort and 
fix 
 it as soon as you can, and give information to help the process 
of 
 healing. Don't do it a mounth late and obscure data.

So if you find a bug, it should be fixed and released on the same 
day you find it.  Yeah right.

 It took Sendmail a mounth to fix this. A mounth.

A whole month?  The horror!  Babies will die and our women will 
raped if vendors continue to take an entire month to address as 
many issues addressed in the Sendmail patch.

 A mounth!

Mounth?  So first you say no details should have been released for 
at least 2 years and now you are crying because it took a month to 
come up with a patch.  Do you even read the shit that seems to flow 

from your brain to your keyboard?

 With such Vendor Responsibility, perhaps it is indeed a Good 
Thing 
 to go Full Disclosure. It seems like history is repeating itself 
and 
 Full Disclosure is once again not only a choice, but necessary to 


 make vendors become responsible.

WTF are you talking about?  The bug has been disclosed.  The patch 
released.  Why are you complaining?  How was Sendmail irresponsible 

by fixing an issue and releasing a patch?  I think you have lost 
your meds.

 I wish we could somehow avoid all the guys who will inevitably 
shout 
 in the press end of the world. The Internet is, was and will 
stay 

Except for you right?  Answer your phone.  Its the kettle calling.  

Speaking of pot perhaps you should smoke less before sending emails 

to lists.  Have you not shouted about DNS have you not shouted in 
this tripe filled email about how irresponsible Sendmail and ISS 
are because the issue is so dangerous and that Sendmail and ISS 
should watch the mass exploitation that their evil ways will cause?

One could hope that someone will take 

Re: [Full-disclosure] Phun! Search

2006-03-23 Thread 0x80
On could hope that the two of you will get cancer and die and soon.

On Thu, 23 Mar 2006 21:56:13 -0800 Stan Bubrouski 
[EMAIL PROTECTED] wrote:
How come when people make comments off-list you re-add FD to the
replies?  You are cancer.

On 3/23/06, n3td3v [EMAIL PROTECTED] wrote:
 I have exploit code for this issue, which the list won't be 
getting hold of.
 The disclosure was to show that I can ask the slurp robot to 
cache an
 account on the public index, so I can retrieve account 
information. I ask
 the code to cache a copy of 'x user', when 'x' is at critical 
information
 page to obtain access to the yahoo users account. Of course with 

such a good
 0-day, I use it seldom and only on specific targets like yahoo 
users with
 'paid' services and or Yahoo employees.



 On 3/22/06, Stan Bubrouski [EMAIL PROTECTED] wrote:
 How old are you?  Seriously.  I don't know whether you realize 
just
 how completely stupid you come off as to even people new in the
 security field.  You are a joke.  Quit filling this list with 
crap.
 BTW did you even check to see if you Yahoo! will let you view 
OTHER
 people's account stuff?  Otherwise it seems pretty useless.

 -sb



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/