Re: [Full-disclosure] scanning
There have been people charged wtih less in the past. So depending on where you live get permission. On Thu, 01 Jun 2006 18:28:24 -0700 [EMAIL PROTECTED] wrote: Phrased differently - do you really want to gamble spending the next 3-5 with a big hairy dude named Bubba? Leave your mom out of this. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Files keep appearing
You've been owned On Thu, 01 Jun 2006 21:08:54 -0700 Stephen Johnson [EMAIL PROTECTED] wrote: I keep having a phishing website appear on my web server. They keep showing up in a Resources folder of one of the sites that I host. I have gone through the logs and I am not seeing any connections. I deleted the files this morning and this evening they re-appeared no connections were made on my server during that period of time. Also, there are no cron jobs that I noticed that looked out of the ordinary. I am running MySQL, PHP, Apache2 on a debian linux server. Any thoughts? -- Stephen Johnson -- Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] VulnSale: IE 6.0.2900.2180.yeahlatestversion
So I just found another IE vulnerability. This time working on the latest patched up verison of 6.0. It allows for my code to be ran and all that pretty shit. Let the bidding begin. PS: Vista zero day sale ends Wednesday as I am already getting more bids than I can keep track of. For the sake of making a statement I have named the POC for this bug: litchfieldcantbypassaslrcauseheslame.c -kkk Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] VulnSale: IE 6.0.2900.2180.yeahlatestversion
you are just angry because I got 3x more money for my bugs than you will ever get you stupid fucking chink. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] VulnSale: Windows Vista Exploit
cunt. whore. rape. sodomy. fuck anussex horserape rapeyoursister daveaitel How is that? On Mon, 29 May 2006 02:47:35 -0700 poo [EMAIL PROTECTED] wrote: yes could you please turn up the pottymouth!!! On 5/29/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Oh I am fucking sorry for my fucking cunt mouth. On Sun, 28 May 2006 18:34:41 -0700 Aaron Gray [EMAIL PROTECTED] wrote: Language please. - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: full-disclosure@lists.grok.org.uk Sent: Monday, May 29, 2006 2:07 AM Subject: Re: [Full-disclosure] VulnSale: Windows Vista Exploit No, I have not been interviewed. I am the fag that you gave a blow job too last night in that truckstop bathroom. On Fri, 26 May 2006 07:38:41 -0700 evilrabbi [EMAIL PROTECTED] wrote: are you the fag that was interviewed by the washington post? On 5/25/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Due to the sucess of my IE vuln sale I have decided to sell a Windows Vista exploit I discovered. This one work remote and will run code. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure- charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- -- h0 h0 h0 -- www.nopsled.net Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure- charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- No virus found in this incoming message. Checked by AVG Free Edition. Version: 7.1.394 / Virus Database: 268.7.2/349 - Release Date: 26/05/2006 Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- smile tomorrow will be worse Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] VulnSale: IE 6.0.2900.2180.yeahlatestversion
Nah, I quit both my jobs after I sold my last group of vulns. So let me guess we have yet another fag who has never found his own vulns trying to judge while sucking the dick of a has-been internet rock star sellout. On Mon, 29 May 2006 03:20:42 -0700 [EMAIL PROTECTED] wrote: From: [EMAIL PROTECTED] Sent: Monday, May 29, 2006 10:40 AM litchfieldcantbypassaslrcauseheslame.c Hey - litchfield just got insulted by a pizza delivery boy. Or was it a lawn mowing kid? Pizza-lawn-bitch, I'll give you $10 to come polish my boots! -- bad eddie Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Internet Explorer Ver 6.0.2800.1106 vulnerability
How is a simple crash a vulnerability? you can make IE crash different ways. The trick is making it run your code. On Fri, 26 May 2006 05:49:39 -0700 r k [EMAIL PROTECTED] wrote: Hi All, IE Ver 6.0.2800.1106 crashs when we try to resizeby() in the html page. the following is the code +++ + html head titleInternet Explorer Ver 6.0.2800.1106/title /head body script var wwidth = (window.innerWidth)?window.innerWidth: ((document.all )?document.body.offsetWidth:null); while (wwidth) { self.resizeBy(-99, -1); } /script /body /html tested on windows 2000,windows XP thank you antar Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] VulnSale: Windows Vista Exploit
No, I have not been interviewed. I am the fag that you gave a blow job too last night in that truckstop bathroom. On Fri, 26 May 2006 07:38:41 -0700 evilrabbi [EMAIL PROTECTED] wrote: are you the fag that was interviewed by the washington post? On 5/25/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Due to the sucess of my IE vuln sale I have decided to sell a Windows Vista exploit I discovered. This one work remote and will run code. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- -- h0 h0 h0 -- www.nopsled.net Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] VulnSale: Windows Vista Exploit
Oh I am fucking sorry for my fucking cunt mouth. On Sun, 28 May 2006 18:34:41 -0700 Aaron Gray [EMAIL PROTECTED] wrote: Language please. - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: full-disclosure@lists.grok.org.uk Sent: Monday, May 29, 2006 2:07 AM Subject: Re: [Full-disclosure] VulnSale: Windows Vista Exploit No, I have not been interviewed. I am the fag that you gave a blow job too last night in that truckstop bathroom. On Fri, 26 May 2006 07:38:41 -0700 evilrabbi [EMAIL PROTECTED] wrote: are you the fag that was interviewed by the washington post? On 5/25/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Due to the sucess of my IE vuln sale I have decided to sell a Windows Vista exploit I discovered. This one work remote and will run code. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- -- h0 h0 h0 -- www.nopsled.net Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- No virus found in this incoming message. Checked by AVG Free Edition. Version: 7.1.394 / Virus Database: 268.7.2/349 - Release Date: 26/05/2006 Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] ASLR now built into Vista
So is this a paid Microsoft advertisment? On Fri, 26 May 2006 13:22:49 +1000 David Litchfield [EMAIL PROTECTED] wrote: Address Space Layout Randomization is now part of Vista as of beta 2 [1] . I wrote about ASLR on the Windows platform back in September last year [2] and noted that unless you rebase the image exe then little (not none!) is added. ASLR in Vista solves this so remote exploitation of overflows has just got a lot harder. I've not done a thorough analysis yet but, all going well, this is a fantastic way for Microsoft to go and builds on the work done with NX/DEP and stack cookies/canaries. Cheers, David Litchfield [1] http://msdn.microsoft.com/windowsvista/downloads/products/getthebet a/default.aspx [2] http://www.ngssoftware.com/papers/xpms.pdf ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] VulnSale: Windows Vista Exploit
Due to the sucess of my IE vuln sale I have decided to sell a Windows Vista exploit I discovered. This one work remote and will run code. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability
I sold both of them to the same buyer and we figured out why I wasn't able to exploit it on IE 6.0. On Wed, 17 May 2006 01:48:38 -0700 Rajesh V [EMAIL PROTECTED] wrote: Since this has turned into a spam thread anyway, does anyone know whatever happend to that IE7 exploit this guy was trying to sell here? On 5/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? On Tue, 16 May 2006 00:57:27 -0700 . Solo [EMAIL PROTECTED] wrote: Shut the fuck up please~~ 2006/5/16, [EMAIL PROTECTED] [EMAIL PROTECTED]: Ahhh there is a mature response. On Thu, 11 May 2006 20:14:49 -0700 . Solo [EMAIL PROTECTED] wrote: Shut the fuck up!! 2006/5/11, [EMAIL PROTECTED] [EMAIL PROTECTED]: Shouldnt this be considered low risk and not medium? Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
RE: [Full-disclosure] blue security folds
for the amount of so called experts in this industry there are sure a lot of idiots on this list. blue security was a bad idea from the start. this was a great thing it proves that not all bad ideas suceed although there are still a ton of bad ideas out there. spam won a long time ago. long befor the internet. just got look in your physical mailbox. On Wed, 17 May 2006 09:16:46 -0700 Mike Adams [EMAIL PROTECTED] wrote: I'm really disappointed. All this will do is give all the other scumbag spammers out there proof that using these tactics will work, and they will be able to extort anyone. Who will be next, Trend Micro? Fortinet? Symantec? SANS? -Original Message- From: Gadi Evron [mailto:[EMAIL PROTECTED] Sent: Wednesday, May 17, 2006 1:14 AM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] blue security folds I just got this in email: http://wired.com/news/technology/0,70913-0.html?tw=wn_index_1 Gadi. -- /~\ The Green \ / Ribbon Campaign X Against Purple / \ Ribbons!-- The Geometry of Shadows, Babylon 5. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] **LosseChange::Debunk it??**
who gives a flying fuck? planes hit building. buildings fall. people die. families cry. who fucking cares and why is this stupid subject still coming up. everyone's life ends in death On Wed, 17 May 2006 11:26:32 -0700 Paul Schmehl [EMAIL PROTECTED] wrote: Pete Simpson wrote: You have confirmed that the data are correct, you have no way to attack the principles, so where is the logical error? Be very precise. Pete, are you even reading what I wrote? A building the size of the twin towers would fall to the ground in under 10 seconds, per the standard calculations that, as you say, any high school student would know. How much more precise do I need to be? Your calculations are incorrect by an order of ten. Instead of 90+ seconds, the answer is 9.0+ - IOW, precisely the same amount of time it took for the buildings to actually fall. Furthermore, you have a logical fallacy in your argument, because you are insisting that a controlled demolition collapse would be faster than an accidental collapse. Which part of the equation tells you that? Objects faill at 32 feet per second per second. The *cause* of the fall is irrelevant. Now, you're obviously wedded to this believe of yours that the government conspired to collapse the buildings. Why is irrelevant. But until you can deal with the facts staring you in the face, there isn't much point in continuing this discussion. BTW, there's no need to cc me on your posts. I can read the list just fine. -- Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas http://www.utdallas.edu/ir/security/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] ThreatCon at Normal level now - Was: MS06-019 - How long before this develops into a self propagating email worm
ahh yes we should all pay attention and trust a threat meter designed to sell products. On Wed, 17 May 2006 16:26:51 -0700 Juha-Matti Laurio juha- [EMAIL PROTECTED] wrote: ThreatCon meter is at basic, Normal level now. People at Symantec had their meter at Level 2/4 since May 11th. ISS's AlertCon went to level 1/4 on Monday. - Juha-Matti On Thursday morning (local time in Finland) Symantec ThreatCon is at ('Elevated') Level 2 now: http://www.symantec.com/avcenter/threatcon/learnabout.html including details about the role of MS06-019. - Juha-Matti All, I have read the Microsoft advisory and the alarm bells started to whistle ;) As fas a I can read this open the door to fully self propagating email worms with whatever payload you desire. Yet, sans.org, symantec and us-cert.gov still have their threat levels on 1. What am I missing, surely this superseeds the IE7 0-day action (sorry couldn't resist). Schanulleke ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability
Damn hushmail. $18,500.00 US was the final selling price. They offered a bit more for exlusivity for any future bugs but I turned them down. The buyer wishes to remain anonymous. All funds have been recieved in my account. More bugs are coming soon. On Sat, 20 May 2006 19:26:04 -0700 [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: try to check the list archive which got it correctly http://lists.grok.org.uk/pipermail/full-disclosure/2006- May/046196.html huhu [EMAIL PROTECTED] wrote: What is with the constant blank replies from this guy? Is he a chink who doesn't know how to use email? On Sat, 20 May 2006 16:47:10 -0700 [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: I sold both of them to the same buyer and we figured out why I wasn't able to exploit it on IE 6.0. On Wed, 17 May 2006 01:48:38 -0700 Rajesh V [EMAIL PROTECTED] wrote: Since this has turned into a spam thread anyway, does anyone know whatever happend to that IE7 exploit this guy was trying to sell here? On 5/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? On Tue, 16 May 2006 00:57:27 -0700 . Solo [EMAIL PROTECTED] wrote: Shut the fuck up please~~ 2006/5/16, [EMAIL PROTECTED] [EMAIL PROTECTED]: Ahhh there is a mature response. On Thu, 11 May 2006 20:14:49 -0700 . Solo [EMAIL PROTECTED] wrote: Shut the fuck up!! 2006/5/11, [EMAIL PROTECTED] [EMAIL PROTECTED]: Shouldnt this be considered low risk and not medium? Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure- charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure- charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ __ NOD32 1.1550 (20060520) Information __ This message was checked by NOD32 antivirus system. http://www.eset.com Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 __ NOD32 1.1551 (20060521) Information __ This message was checked by NOD32 antivirus system. http://www.eset.com Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability
AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? AM I BUGGING YOU? On Tue, 16 May 2006 00:57:27 -0700 . Solo [EMAIL PROTECTED] wrote: Shut the fuck up please~~ 2006/5/16, [EMAIL PROTECTED] [EMAIL PROTECTED]: Ahhh there is a mature response. On Thu, 11 May 2006 20:14:49 -0700 . Solo [EMAIL PROTECTED] wrote: Shut the fuck up!! 2006/5/11, [EMAIL PROTECTED] [EMAIL PROTECTED]: Shouldnt this be considered low risk and not medium? Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability
Ahhh there is a mature response. On Thu, 11 May 2006 20:14:49 -0700 . Solo [EMAIL PROTECTED] wrote: Shut the fuck up!! 2006/5/11, [EMAIL PROTECTED] [EMAIL PROTECTED]: Shouldnt this be considered low risk and not medium? On Wed, 10 May 2006 17:01:09 -0700 Avert [EMAIL PROTECTED] wrote: McAfee, Inc. McAfee Avert(tm) Labs Security Advisory Public Release Date: 2006-05-09 Microsoft MSDTC NdrAllocate Validation Vulnerability CVE-2006-0034 __ _ ___ * Synopsis There is an RPC procedure within the MSDTC interface in msdtcprx.dll that may be called remotely without user credentials in such a way that triggers a denial-of-service in the Distributed Transaction Coordinator (MSDTC) service. Exploitation can at most lead to a denial of service and therefore the risk factor is at medium. __ _ ___ * Vulnerable Systems Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 __ _ ___ * Vulnerability Information The msdtcprx.dll shared library contains RPC procedures for use with the Distributed Transaction Coordinator (MSDTC) service utilized in Microsoft Windows. By sending a large (greater than 4k) request to BuildContextW(), a size check can be bypassed and a bug in NdrAllocate() may be reached. This vulnerability was reported to Microsoft on October 12, 2005 __ _ ___ * Resolution Microsoft has provided a patch for this issue. Please see their bulletin, KB913580, for more information on obtaining and installing the patch. __ _ ___ * Credits This vulnerability was discovered by Chen Xiaobo of McAfee Avert Labs. __ _ ___ __ _ ___ * Legal Notice Copyright (C) 2006 McAfee, Inc. The information contained within this advisory is provided for the convenience of McAfee's customers, and may be redistributed provided that no fee is charged for distribution and that the advisory is not modified in any way. McAfee makes no representations or warranties regarding the accuracy of the information referenced in this document, or the suitability of that information for your purposes. McAfee, Inc. and McAfee Avert Labs are registered Trademarks of McAfee, Inc. and/or its affiliated companies in the United States and/or other Countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. __ _ ___ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability
Shouldnt this be considered low risk and not medium? On Wed, 10 May 2006 17:01:09 -0700 Avert [EMAIL PROTECTED] wrote: McAfee, Inc. McAfee Avert(tm) Labs Security Advisory Public Release Date: 2006-05-09 Microsoft MSDTC NdrAllocate Validation Vulnerability CVE-2006-0034 ___ ___ * Synopsis There is an RPC procedure within the MSDTC interface in msdtcprx.dll that may be called remotely without user credentials in such a way that triggers a denial-of-service in the Distributed Transaction Coordinator (MSDTC) service. Exploitation can at most lead to a denial of service and therefore the risk factor is at medium. ___ ___ * Vulnerable Systems Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 ___ ___ * Vulnerability Information The msdtcprx.dll shared library contains RPC procedures for use with the Distributed Transaction Coordinator (MSDTC) service utilized in Microsoft Windows. By sending a large (greater than 4k) request to BuildContextW(), a size check can be bypassed and a bug in NdrAllocate() may be reached. This vulnerability was reported to Microsoft on October 12, 2005 ___ ___ * Resolution Microsoft has provided a patch for this issue. Please see their bulletin, KB913580, for more information on obtaining and installing the patch. ___ ___ * Credits This vulnerability was discovered by Chen Xiaobo of McAfee Avert Labs. ___ ___ ___ ___ * Legal Notice Copyright (C) 2006 McAfee, Inc. The information contained within this advisory is provided for the convenience of McAfee's customers, and may be redistributed provided that no fee is charged for distribution and that the advisory is not modified in any way. McAfee makes no representations or warranties regarding the accuracy of the information referenced in this document, or the suitability of that information for your purposes. McAfee, Inc. and McAfee Avert Labs are registered Trademarks of McAfee, Inc. and/or its affiliated companies in the United States and/or other Countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. ___ ___ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
But not a big enough threat to outbid the highest bidder who incidentally will be recieing full PoC by morning. On Mon, 08 May 2006 18:04:02 -0700 n3td3v [EMAIL PROTECTED] wrote: On 5/8/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: There is no skin to save. No law is being broken and I am not holding anyone ransom. Microsoft is not the only vendor that can fix this bug either, it would be easy to patch the DLLs involved. No one is monitoring anything because I have not broken any laws in any country. You reply simply dances around the issue because as usual, you have zero idea what you are talking about. Symantec see you as threat: ThreatCon Level is 1 A researcher has made a post to the Full-Disclosure mailing list claiming that he has discovered two unknown and unpatched vulnerabilities in Microsoft Internet Explorer 7, which is currently in beta. He also states that at least one of the issues is present in Microsoft Internet Explorer version 6.x, but circumstances unknown to the researcher prevent him from being able to successfully exploit it. The discoverer of these issues has stated that they will be privately sold to the highest bidder. Internet Explorer 7 is beta software, and as such, should not be used on sensitive systems. Though the possibility of exploitation against version 6.x may exist, it should always be assumed that there may be latent vulnerabilities in client software. Users are advised to employ best practices such as avoiding untrusted websites, links from untrusted sources, and running such software with the least possible privileges. http://www.symantec.com/avcenter/threatcon/learnabout.html Regards, n3td3v ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
Have you e-mailed [EMAIL PROTECTED] and asked them if they want to make an offer? I know they've done private deals with security researchers in the past, and trust me, they were offered a lot more No I have not emailed Microsoft. They are not entitled to any exlusivity. illegal auction. I think its in your best interest to e-mail [EMAIL PROTECTED] Illegal? Tell me what law in what country I have broken. 1) You don't want to make as much money as you could by offering Microsoft to buy your vulnerability in private. Like I said. MS can offer just like anyone else but they do not get any special treatment. 2) You want to be held responsible for selling an exploit which leads to a major incident, worm, virus outrage. The vulnerabilities I have for sale could be used in such a way but I am in no way responsible for what the purhcaser uses it for. Are bullet manufacturers responsible when someone shoots someone else? 3) Microsoft just contact the FBI and get your actual home address from your e-mail server logs because you didn't initially offer Microsoft to buy the exploit, and you end up getting arrested. Again. What law have I broken here? Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
Come lick my asshole. On Sun, 07 May 2006 10:21:30 -0700 [EMAIL PROTECTED] wrote: Come cut my lawn. On 5/5/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Yes, this is a beta product but I have reason to believe that this issue will not be discovered of fixed by M$ before it goes to gold. Why do I believe this? Because the issue is found in IE 6 but doesnt seem to exploit. Not saying it is not exploitable I am saying that I cant make it exploit. I work as a pizza delivery driver at night and work part time landscaping in my days. So I feel it is only fair that I be compensated for this vulnerability. Highest bidder that can convince me that you will actually pay wins. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
There is no skin to save. No law is being broken and I am not holding anyone ransom. Microsoft is not the only vendor that can fix this bug either, it would be easy to patch the DLLs involved. No one is monitoring anything because I have not broken any laws in any country. You reply simply dances around the issue because as usual, you have zero idea what you are talking about. On Sun, 07 May 2006 13:59:47 -0700 n3td3v [EMAIL PROTECTED] wrote: On 5/7/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Have you e-mailed [EMAIL PROTECTED] and asked them if they want to make an offer? I know they've done private deals with security researchers in the past, and trust me, they were offered a lot more No I have not emailed Microsoft. They are not entitled to any exlusivity. Why not? Its their software that has the bug and they're the only ones who can fix it. Its not just Microsoft you're going against here, its the millions of Microsoft users you're holding to ransom here. illegal auction. I think its in your best interest to e-mail [EMAIL PROTECTED] Illegal? Tell me what law in what country I have broken. Tell me which country you're in, and then we can talk about how illegal your ransom against Microsoft and its consumers is. 1) You don't want to make as much money as you could by offering Microsoft to buy your vulnerability in private. Like I said. MS can offer just like anyone else but they do not get any special treatment. Thats not the way it works. You must contact Microsoft first to setup a dialog between each other. 2) You want to be held responsible for selling an exploit which leads to a major incident, worm, virus outrage. The vulnerabilities I have for sale could be used in such a way but I am in no way responsible for what the purhcaser uses it for. Don't be so sure of your legal saftey. I don't think you would ever get the chance to risk a major incident, you would just be arrested, have the money and vulnerability handed to Microsoft and you slammed into jail. Any which way, you're going to be the loser out of this, not Microsoft. Trust me, the intelligence services are already monitoring communications between you and anyone else regarding your sale, do the right thing, save your own skin, e-mail [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Information Disclosure - For sale
Eliah, You dumb fucking cunt. Did you expect that subscribers to the FULL DISCLOSURE mailing list would support your plan to make money off of withholding disclosure? Yes I do. Considering the fact that half these faggots including the so called owner of this list make money by not disclosing shit until it suits them. Do you not see the hypocrasy in your horseshit? Wait...what about all the people you said had already bid? Are you just going to screw them over? Nope. all of my high bidders are those that use this shit for spyware and adware. I was worried about selling to them until I came to this list. How do you intend to enforce the terms of your discount deal? Are you going to require the buyer to sign a nondisclosure agreement to get the discount? I don't. Its called being pissed. I'm not any more sure that you're really offering this discount than I am that you've discovered a vulnerability, but it would be The vulnerabilities are real. Those that have bid have the proof of such. interesting to follow the court proceedings should you be indicted along with the spyware author or spammer. Although you don't really have to sell it--you're already soliciting people to engage in criminal behavior. Oh really? So lets hear the precidence... lets hear the case and court this was proved in. What criminal behaviour is this? (1) You have developed a vulnerability and intend to sell it to a spyware author or spammer. Why would I do anything different? You so called professionals would rather make jokes and call bullshit when the reality is that there are people far smarter with way more skills than 99.99% of the CISSPs out there. What you and the rest of your so called community need to realize is that you are the scum.. the bottom of the fuckin barrel. (2) The so called security professionals oppose you. That is the point. They don't oppose. They make fun and be stupid because they are not smart enough to find shit on their own. One of my bidders was able to come up with at least the first part.. the very basic root of the problem on their own I would not expect you dumb cunts to do that. I gave the honest a chance. Now I go where the money takes me... guess what.. the honest are poor. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
So now that you are done wasting my time and bullshitting for info. What do you think? What context does IE run in? Sure, this gives admin rights... if the user running IE has admin rights... But I shouldn't have to tell you that. BTW, I CCed the FD list so others can see yet another dumb cunt trying to get info with no cash and no intent to buy. On Fri, 05 May 2006 19:23:05 -0700 Simon Smith [EMAIL PROTECTED] wrote: Very interesting, But, my buyer is looking for exploits which yeild remote administrative access to the targeted systems. Do either of these do this? [EMAIL PROTECTED] wrote: OK. There are two issues with IE 7. The first issue is also found in IE 6 but in IE 6 I believe it is not exploitable (seems to be a null pointer). Issue 1 - IE 6.0 Crash. IE 7 (all ver) remote code execution. Lets call this one a malformed file type that IE considers safe. Issue 2 - IE 7.0 Information Stealing. Target visits malicious web site and contents of all tabbed pages, including related cookies and cache information, can be yanked. Perhaps we can coin this one to be Cross Tab Scripting but no user interaction is required. Consider this exploit scenario: User is doing online banking in one tab. User is checking gmail in another. User opens third tab and visits malicious web site. I now have a copy of all data from the first two tabs. My current high bid is $12,500.00 2% of any profits made by the use of the exploit although I suspect that sort of thing would be tough to audit. On Fri, 05 May 2006 15:30:17 -0700 Simon Smith [EMAIL PROTECTED] wrote: Well, My buyers require temporary exclusivity during the vetting/validation process and permanent exclusivity and secrecy if they purchase the tool. If they do not purchase the tool, the the tool is yours. My buyers will also most probably out bid your buyers by a significant amount. What is your current highest bid? Describe this exploit to me at a very high level without giving away any technical details. -Simon BullGuard Anti-virus has scanned this e-mail and found it clean. Try BullGuard for free: www.bullguard.com Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 BullGuard Anti-virus has scanned this e-mail and found it clean. Try BullGuard for free: www.bullguard.com Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: WRONG MARKET BUDDY Re: [Full-disclosure] IE7 Information Disclosure - For sale
Wow.. yet another stupid cunt. On Fri, 05 May 2006 21:26:43 -0700 donnydark [EMAIL PROTECTED] wrote: You are not reaching your target market. This mailing list is the wrong place. I happen to know for a fact that you have not posted your auction in the places that count such as the active carding forums. You are right. I did not post this in the carding forums. I attempted to give the good guys a chance. If this is the wrong forum then why do I have bids? you would have posted some screenshots and sent the url to this mailing list. Of course, the url would contain the live exploit and you would own as much of this list as you could and they go to look at whatever you put there. A few years back I had the ie object exploit Jesus you are stupid. Sure I could say go to www.youareowned.com to prove shit. Guess what dumb cunt? everyone can easily see the exploit and even the most brain dead fucks can figure out what it is based on the proof. Those that are serious about bidding get the proof they need to bid ago. (hi fools:) You are the only fool I see. OK, I take that back.. This entire list is full of fools. I don't care about some browser no one uses. No one uses IE7? Wow. You truly are stupid. Why don't you go check the download stats on that before you open your stupid cockhole. If you get a 0day firefox I'll give you 1k for it. If you get a 0day IIS6 remote, I'll give you 10k for it. So you can't afford me. The bidding for these two are already beyond your offer. otherwise shut the hell up you lying troll :) Yup... dumbass. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Full Disclosure Code of conduct
No selling of exploits and vulnerabilities? ahahahahaha... jesus fucking christ on a cross you are truly a dumb cunt. Guess I just fucked your other two rules didn't I. On Sat, 06 May 2006 18:01:20 -0700 Aaron Gray [EMAIL PROTECTED] wrote: I am suggesting that we all cooperate and produce a Code of Conduct for participating on the Full Disclosure mailing list. Suggested start :- 1) No Swearing 2) No slagging others off 3) No selling of exploits and vulnerabilities Regards, Aaron Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
I do not support nor do I wish to participate in anything iDefense does. They are the original parasites of your industry. On Fri, 05 May 2006 02:14:49 -0700 Thor Larholm [EMAIL PROTECTED] wrote: Sell it to iDefense through their VCP program. A reproduceable code execution vulnerability will fetch you anywhere between $1.000 to $10.000. With the uncertainty of whether this makes it into IE7 final I'm guessing you'll get 2-3K. http://labs.idefense.com/vcp.php Say hi to Ken Dunham or Michael Sutton from me :) Cheers Thor Larholm [EMAIL PROTECTED] wrote: Yes, this is a beta product but I have reason to believe that this issue will not be discovered of fixed by M$ before it goes to gold. Why do I believe this? Because the issue is found in IE 6 but doesnt seem to exploit. Not saying it is not exploitable I am saying that I cant make it exploit. I work as a pizza delivery driver at night and work part time landscaping in my days. So I feel it is only fair that I be compensated for this vulnerability. Highest bidder that can convince me that you will actually pay wins. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- Med venlig hilsen Thor Larholm CFO, Futurematch ApS +45 3123 5504 Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
Good guess. But no. On Fri, 05 May 2006 02:42:25 -0700 Romain Le Guen [EMAIL PROTECTED] wrote: Is it a problem with digest.dll and Authentification ? - Original Message - From: [EMAIL PROTECTED] To: full-disclosure@lists.grok.org.uk Sent: Friday, May 05, 2006 1:46 AM Subject: [Full-disclosure] IE7 Zero Day Yes, this is a beta product but I have reason to believe that this issue will not be discovered of fixed by M$ before it goes to gold. Why do I believe this? Because the issue is found in IE 6 but doesnt seem to exploit. Not saying it is not exploitable I am saying that I cant make it exploit. I work as a pizza delivery driver at night and work part time landscaping in my days. So I feel it is only fair that I be compensated for this vulnerability. Highest bidder that can convince me that you will actually pay wins. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] does somebody know of php cross site vulnerability
I heart vulnerabilities. On Fri, 05 May 2006 04:32:50 -0700 azrael goblin [EMAIL PROTECTED] wrote: Today, a friend of mine told me php cross site vulnerablity maybe exist, That made me shocked .Because i has never heart of it. is there somebody well knowing of that? your , azrael Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
RE: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability
Got to love the cock smoking kiddies on this list. So when you say you do penetration testing does that mean you scan networks with Nessess and insert your company logo into a report. Or when you say penetration testing do you mean being fucked in the ass by a large nigger named bubba On Fri, 05 May 2006 09:29:21 -0700 Tim Bilbro [EMAIL PROTECTED] wrote: I have discovered that [EMAIL PROTECTED]'s girlfriend has a sexually transmitted disease. I know who gave it to her. I work as a SOC engineer at night and work part time doing *ahem* penatration testing in my days. So I feel it is only fair that I be compensated for this information. Highest bidder that can convince me that you will actually pay wins. TB http://Iainsidethebeltway.typepad.com Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
RE: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability
Wow, only the third faggot to make that joke. How original On Fri, 05 May 2006 13:22:09 -0700 Tim Bilbro [EMAIL PROTECTED] wrote: I'll take two large pizza's with pepperoni and green peppers. And, yeah, I'll take a couple of those IE vulnerabilities on the side. Oh, and could you finish mulching my azaleas when you bring them over? Thanks. http://iainsidethebeltway.typepad.com -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Friday, May 05, 2006 4:09 PM To: [EMAIL PROTECTED] Cc: full-disclosure@lists.grok.org.uk Subject: RE: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability Got to love the cock smoking kiddies on this list. So when you say you do penetration testing does that mean you scan networks with Nessess and insert your company logo into a report. Or when you say penetration testing do you mean being fucked in the ass by a large nigger named bubba On Fri, 05 May 2006 09:29:21 -0700 Tim Bilbro [EMAIL PROTECTED] wrote: I have discovered that [EMAIL PROTECTED]'s girlfriend has a sexually transmitted disease. I know who gave it to her. I work as a SOC engineer at night and work part time doing *ahem* penatration testing in my days. So I feel it is only fair that I be compensated for this information. Highest bidder that can convince me that you will actually pay wins. TB http://Iainsidethebeltway.typepad.com Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
Ahhh there we go. Yes, so because a bunch of idiots who couldn't exploit themselves out of a paper bag are pissed off because I won't share my exploit you assume that no one wants to buy it. So far the bidding is up to a substantial number. The three parties bidding on the exploit have been given enough proof that both do exist and I am currently waiting their counter-offers. I'll let you wanna-be whitehat faggots (how low is it to be a wanna- be whitehat faggot and not a real whitehat faggot?) back to your XSS vulnerabilities and your flame wars about college admins and of course your favorite passtime of thinking you are some elite group of technogeeks when the reality is that even among the technogeeks you are the bottom of the barrel. The losers, the slime, the cock smoking fucking fucks. On Fri, 05 May 2006 13:41:48 -0700 Ryan Whelan [EMAIL PROTECTED] wrote: It is very apparent to me that no one wants to buy, your 'exploit'. I don't think calling the industry 'pathetic' or the people associated with it 'stupid' is going to win you any supporters. I would suggest you either fully disclose what you found, or just save what little dignity you have left and be quiet. On 5/5/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: It is amazing at the collective stupidity of so called security professionals. Yet I get questioned as to why I don't want to join your pathetic industry. Yeah, but since he can't sploit this vuln he claims to have found, it's perhaps not going to net him much interest nor cash from others, being he's also holding his cards so close4 to his vest. I said that it is not exploitable on IE 6.0. It is exploitable on IE 7 all versions. Perhaps reading comprehension would be good for you. One might as well post it this way: someplace, somewhere is a pc with a vulnerable application, guess where it is and you can own it. Oh, but, pay me big bucks first so I can eat well for a day or two. Are you the product of a broken condom during a gang rape? Learn how to read before you pass judgement. Better yet, learn how to find your own vulnerabilities instead of wasting your time researching other people's wireless security issues. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Information Disclosure - For sale
Congradulations. You have won an award for being the sixth clueless wanna-be whitehat faggot to crack that joke. Based on all of the feedback on this cess-pool called a mailing list. I am now offering my vulnerabilities for sale only to those that a.) will not report it to the vendor and b.) will only use it for their own profit via spyware installations and spambots. I will discount the price to anyone using it in the above manner to target so called security professionals subscribed to this list. On Fri, 05 May 2006 15:32:42 -0700 Travis Good [EMAIL PROTECTED] wrote: I'll give you 10.99+tip for it if you also throw in a large sausage pizza. On Thu, 4 May 2006, [EMAIL PROTECTED] wrote: I just found a second bug that allows one to remotely retrieve the contents of other tabs inside of IE7. Again, for sale. Highest bidder. Exploit example is to trick luser to visiting website which would then download contents of all open tabs including cookie and session information. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Travis Good, CISSP, IAM, IEM Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] IE7 Zero Day
Yes, this is a beta product but I have reason to believe that this issue will not be discovered of fixed by M$ before it goes to gold. Why do I believe this? Because the issue is found in IE 6 but doesnt seem to exploit. Not saying it is not exploitable I am saying that I cant make it exploit. I work as a pizza delivery driver at night and work part time landscaping in my days. So I feel it is only fair that I be compensated for this vulnerability. Highest bidder that can convince me that you will actually pay wins. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
What do you do for work? Are you paid to work with computers? Do not judge others and how they choose to make a living. I am doing nothing different than anyone else who has a skill and needs to support family. If you were smarter you wouldn't need me to share my knowledge in any way now would you? On Thu, 04 May 2006 16:52:57 -0700 FRLinux [EMAIL PROTECTED] wrote: On 5/5/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Highest bidder that can convince me that you will actually pay wins. Whatever happened to sharing knowledge in a common way ... Honest, get a life ... Steph Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] IE7 Information Disclosure - For sale
I just found a second bug that allows one to remotely retrieve the contents of other tabs inside of IE7. Again, for sale. Highest bidder. Exploit example is to trick luser to visiting website which would then download contents of all open tabs including cookie and session information. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
I can prove that I have the goods to those that are seriously interested in buying. On Thu, 04 May 2006 19:26:53 -0700 [EMAIL PROTECTED] wrote: On Thu, 04 May 2006 16:46:28 PDT, [EMAIL PROTECTED] said: Highest bidder that can convince me that you will actually pay wins. As a spectator, I wonder who's going to bid on it, and how much, without any clues as to what exactly the extent is (crash, code execution as user, code exec as system, etc), or even any proof you have the goods.. ;) Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
If you are interested in bidding. I can provide you wtih an account to provide the funds. Social Security numbers are for American citizens only so don't assume I am such a person. On Thu, 04 May 2006 20:58:26 -0700 Peter Besenbruch [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: As a spectator, I wonder who's going to bid on it, and how much, without any clues as to what exactly the extent is (crash, code execution as user, code exec as system, etc), or even any proof you have the goods.. ;) If the guy provided more information, such as his full name, address, and phone number, his bank account info, his social security number, that sort of thing, I might trust him. ;) -- Hawaiian Astronomical Society: http://www.hawastsoc.org HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] IE7 Zero Day
Ahh and here come the clueless posts from those that have never found a vulnerability themselves. Sigh... On Thu, 04 May 2006 21:51:50 -0700 Randal T. Rioux [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: If you are interested in bidding. I can provide you wtih an account to provide the funds. Social Security numbers are for American citizens only so don't assume I am such a person. I'll start the bidding at $1.25 USD. Do you take checks? I have a slighty used half-liter bottle of Mountain Dew for trade if you're willing to barter. Let me know... I'm serious. Randy PS I found that the rotors on my Jeep wear down faster than they should. Does anyone know a contact at Daimler/Chrylser that would be interested in buying this vulnerability information? I don't have a fix yet though. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability
CERT has more leaks than a whore who has been anally fucked with a loaded shotgun. On Mon, 01 May 2006 12:31:50 -0700 [EMAIL PROTECTED] wrote: On Mon, 01 May 2006 14:51:23 EDT, Tim Bilbro said: Some have suggested a 'Vulnerability Escrow' A third party that tracks and holds vulnerability discoveries and works with the vendor. I think that is an idea worth exploring. http://www.cert.org/reporting/vulnerability_form.txt BTDT. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Hola Distro Help me
Should you not be downtown NYC protesting or something? www.redhat.com is probably a better place to start than on here. But as the saying goes, if you have to ask -- you probably aren't smart enough to do. On Tue, 02 May 2006 12:31:41 -0700 Edgardo Zavala [EMAIL PROTECTED] wrote: en espanol mi idioma --- Suplico su ayuda Como crear mi propia distribucion basada en fedora? Auxilio, se que se puede modificar, pero como. Perdonen mi ignorancia. Pero les agradezco me den informacion. Gracias. --- en ingles --- :( -- I need your help How can I create my own distribution based on fedora? Aid, that it is possible to be modified, but how? Pardon my ignorance. But I am thankful to them give information me. Thanks. jejejeje, bye. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Hello gents
On Sun, 30 Apr 2006 09:18:16 -0700 MR BABS [EMAIL PROTECTED] wrote: *Bantown is in no way affiliated with Dave Aitel or Immunity, Inc. Just like Gobbles isnt right? Oh wait... he works there now doesnt he. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability
Oh fuck. I am so motherfucking sorry for my goddamn fucking cunt mouth language. Won't happen a fucking again. On Fri, 28 Apr 2006 05:32:28 -0700 Sol Invictus [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: [EMAIL PROTECTED]@%!^@ fuck up whiner. Mr. C.I.S.S.P... Mr. M.C.S.E What the fuck [EMAIL PROTECTED](*%^*(^(*(^*(%^ vulnerabilities? Jack and shit.. that is what you know. [EMAIL PROTECTED]@#$^%^*$%^(*%e.. then fuckin pay for it newb. Excuse me but can we watch our language here? Some of us are professionals and are trying to teach our children what's right. This IS an excellent way to show that there are people who are just too low to learn how to speak the language properly. By the Way, What does Fornication Under Command of the King have to do with Security??? Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability
Blah blah blah... shut the fuck up whiner. Mr. C.I.S.S.P... Mr. M.C.S.E What the fuck do you know about working with vendors and vulnerabilities? Jack and shit.. that is what you know. You want a service.. then fuckin pay for it newb. On Wed, 26 Apr 2006 08:06:09 -0700 Tim Bilbro [EMAIL PROTECTED] wrote: You do a disservice to all IT shops by announcing these vulnerabilities before contacting the vendor. I am sure it would not generate as much web traffic to your site, but it is only fair and right to allow at least some amount of time for the vendor to respond. If you think you are helping, you are wrong. Would you go around town checking which stores are unlocked at night and then publish the list in the news before letting the shop owners know? That's pretty much what you are doing. It's just not helping. There is no proof that it is either. Tim Bilbro Information Security Specialist CISSP, MCSE [EMAIL PROTECTED] web: www.bloglines.com/blog/Bilbro RSS: www.bloglines.com/blog/Bilbro/rss Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Re: MSIE (mshtml.dll) OBJECT tag vulnerability
How did this get from a bunch of euro cock smokers selling out to Microsoft to arguing over an old, and amusing, quote? On Tue, 25 Apr 2006 23:03:33 -0700 [EMAIL PROTECTED] wrote: On Wed, 26 Apr 2006 09:22:30 +0400, Raoul Nakhmanson-Kulish said: Hello, [EMAIL PROTECTED] There are two major products that come out of Berkeley: LSD and UNIX. It's well-know fact that D-lysergic acid diethylamide is come out from Sandoz company lab and is synthesized by Dr. Albert Hoffmann in 1943. And the drug culture of Berkeley and San Francisco (Grateful Dead, anybody?) right across the bay certainly popularized it. LSD wasn't widely used before that. Similarly, UNIX actually came out of Bell Labs in Cherry Hill, New Jersey, on the other side of the continent - but BSD certainly helped popularize it... And in any case, I was merely correcting the misquote. You don't like like the quote, take it up with Jeremy Anderson and the person who misquoted him. ;) Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Should I Be Worried?
If you didnt break the law who cares. On Wed, 26 Apr 2006 11:30:02 -0700 CrYpTiC MauleR [EMAIL PROTECTED] wrote: After reading http://www.securityfocus.com/news/11389 it made me think twice about actually going public with my school's security hole by having school notify students, parents and/or faculty at risk due to it. I mean I didnt access any records, just knew that it was possible for someone to access my account or anyone elses. I did not even exploit the hole to steal, modify etc any records. Does this still put me in the same boat at the USC guy? If so I am really not wanting to butt heads with the school in case they try to turn around and bite the hand that tried to help them. Even if my intentions were good, they might even make something up saying I accessed entire database or something. I have nothing to prove me otherwise since they have access to the logs. Already it seems like the school is trying to sweep the incident under the rug, so very wary as to what they might do if they were pushed into a corner and forced to go public. Anyone has any idea what I can do or should I just let this slide? I am already putting my credit report and such on fraud alert just in case, and definelty do not plan on attending this school after my degree or school year is over. A transfer is better than having me risk my data. Regards, CM -- ___ Check out the latest SMS services @ http://www.linuxmail.org This allows you to send and receive SMS through your mailbox. Powered by Outblaze ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] selling ms office bug
Ahaha. Not really because I am pretty sure that he is talking about either an unpatched PPT overflow (malformed powerpoint file) or perhaps even an older one that was found and never reported to MS in Visio. I do understand that its easy to trick users into clicking on something to be owned and yes you can embed any office document in html and have it auto-execute but these types of vulnerabilities are as common as lame XSS vulns or rambling n3td3v posts. Have you ever ran tests on IE? I can crash IE in thousands of ways with malformed content. Some might be exploitable, most are null pointers. But the point is... these issues will probably always exists and there is no real defense against tricking a user into doing something. By the way, I am typing this email after spending the day at the beach in 35 celsius weather getting a sunburn so if they want to join me they can. heh On Thu, 20 Apr 2006 23:25:41 -0700 [EMAIL PROTECTED] wrote: On Thu, 20 Apr 2006 22:05:23 PDT, [EMAIL PROTECTED] said: You open a file and shellcode runs? Wow... hey guys I have a executable to sell.. all you need to do is get the user to open it and the code runs compromising the system... sigh.. You're just jealous because he's probably going to make enough money to pay for a nice trip to the tropical beach of his choice, *and* be able to brag about how he pwn'ed a whole mess of white hat's boxes and got away with it.. ;) Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Google Groups e-mail disclosure in plain text
Listen up froggy. Zone-H is no better than Secunia and no better than those cock smokers at Attrition. Perhaps you should follow their lead. Internet thermometer indeed rectal thermometer that is. On Fri, 21 Apr 2006 02:06:30 -0700 Siegfried [EMAIL PROTECTED] wrote: See, you realized you judged them without even opening your browser, and stop insulting, don't act like a kid thanks. And yes, they contribute more than you, even if you play the blackhat game, i talked about publishing vulns, did you read the name of the mailing list? it's called full disclosure. They published a lot of advisories, they're maybe the best posters (of advisories) here. I didn't mean to talk about you, but to say hey look, your critics aren't correct, but you have a too big ego to say you were wrong when you said they published nothing. This list really shows how everybody behaves in the community, ready to shoot in each other's head and flame the others. When they publish an advisory, nobody says hey nice one, some of you even didn't believe they were their OWN advisories, but when n3td3v says they're fucking spamming, many people start criticizing.. Le Ven 21 avril 2006 07:02, [EMAIL PROTECTED] a écrit : n3td3v is a kid and a troll. But you my stupid dumb fucking fuck need to check yourself before you lip off about shit you know nothing about. you have no clue who I am and no clue what I have or have not done. you on the other hand. bah... too easy.. On Wed, 19 Apr 2006 06:09:30 -0700 Siegfried [EMAIL PROTECTED] wrote: http://secunia.com/secunia_research/ one vulnerability? not even a remote system one? did you do better? and did n3tv3d with his xss advisories and trolls do better? Be respectful because they contribute more than you Le Mer 19 avril 2006 15:01, [EMAIL PROTECTED] a écrit : So releasing one vulnerability... and not even a remote system one... makes them legitimate? They are just as bad as that n3td3v faggot. On Tue, 18 Apr 2006 17:56:42 -0700 Aaron Gray angray_at_beeb.net wrote: Kill Secunia, the illegal high jackers of FD. Yes they release real vulnerablities. See Internet_Explorer_Address_Bar_Spoofing_Vulnerability_Test:- http://secunia.com/advisories/19521/ Will disabling or removing Flash till its solved prevent this ? Aaron ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 -- Zone-H Admin [EMAIL PROTECTED] www.zone-h.org www.zone-h.fr Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] hiya
So does the look alike have the big goofy forehead and stupid grin all the time? What about the receeding hair? On Fri, 21 Apr 2006 18:41:36 -0700 Robert Lemos [EMAIL PROTECTED] wrote: just a quick one to say netdev is a great guy, he sends securityfocus great stuff for my articles! moreover, he setup a blog to support my journalism http://360.yahoo.com/robert.lemos before i go, netdev is really going places and i don't just mean in peoples mail filters, i mean real places! please don't look at my mail headers. koochie coo, robert lemos look-a-like ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Google Groups e-mail disclosure in plain text
n3td3v is a kid and a troll. But you my stupid dumb fucking fuck need to check yourself before you lip off about shit you know nothing about. you have no clue who I am and no clue what I have or have not done. you on the other hand. bah... too easy.. On Wed, 19 Apr 2006 06:09:30 -0700 Siegfried [EMAIL PROTECTED] wrote: http://secunia.com/secunia_research/ one vulnerability? not even a remote system one? did you do better? and did n3tv3d with his xss advisories and trolls do better? Be respectful because they contribute more than you Le Mer 19 avril 2006 15:01, [EMAIL PROTECTED] a écrit : So releasing one vulnerability... and not even a remote system one... makes them legitimate? They are just as bad as that n3td3v faggot. On Tue, 18 Apr 2006 17:56:42 -0700 Aaron Gray angray_at_beeb.net wrote: Kill Secunia, the illegal high jackers of FD. Yes they release real vulnerablities. See Internet_Explorer_Address_Bar_Spoofing_Vulnerability_Test:- http://secunia.com/advisories/19521/ Will disabling or removing Flash till its solved prevent this ? Aaron ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] selling ms office bug
You open a file and shellcode runs? Wow... hey guys I have a executable to sell.. all you need to do is get the user to open it and the code runs compromising the system... sigh.. On Wed, 19 Apr 2006 14:19:32 -0700 [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: auction is up for whitehat industry only, proof required, you open a file, the shellcode runs, included are some explanations and the poc exploit. You are welcome to message me to my email or on the forum for much informations. Arnaud Dovi ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] selling ms office bug
Why not just say that it is either the unpatched PPT bug or the Visio one that has been known by others. Unless of course you have a 1337 Excel one again On Wed, 19 Apr 2006 14:24:31 -0700 [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: forgot to mention so the format of the file is popular , in security at least a lot ; [EMAIL PROTECTED] wrote: auction is up for whitehat industry only, proof required, you open a file, the shellcode runs, included are some explanations and the poc exploit. You are welcome to message me to my email or on the forum for much informations. Arnaud Dovi ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Secunia illegal spam and advisory republication
PURCHASED... So how do y'all who post real information here feel about someone else making money off of your work. Nice community resource.. On Thu, 20 Apr 2006 14:45:57 -0700 Mike Owen [EMAIL PROTECTED] wrote: On 4/20/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: as for this list being sponsored by Secunia. did n3td3v not actually READ the list at all before subscribing or posting to it? who wouldn't take such preliminary cautions? alan The list was purchased by Secunia a year or so ago. Many of the subscribers have been on it since it's inception by Len on netsys.com 4 years ago, long before Secunia got their hands on it. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Google Groups e-mail disclosure in plain text
There is no difference between secunia and securityfocus. They are both bottom of the barrel slime On Tue, 18 Apr 2006 22:11:36 -0700 n3td3v [EMAIL PROTECTED] wrote: On 4/19/06, Aaron Gray [EMAIL PROTECTED] wrote: Kill Secunia, the illegal high jackers of FD. Personally I would thank them for providing a good secure server and hosting the list. Aaron Thank you for spamming us Secunia via the Full-Disclosure footer message. Furthermore, Secunia are the biggest scene whore professional website in the industry. Theres nothing on their site that wasn't available via other public sources. With Secunia, its all about republish, republish, republish peoples shiz. And you want everyone to thank them for secure hosting? Don't kid a kidder... If they did something special with their website like Securityfocus does, then I might be able to bare their illegal footer message spam, and their scene whore republication of advisories they claim are Secunia exclusives. Regards, n3td3v ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Google Groups e-mail disclosure in plain text
So when you are done with your temper tantrum read what you wrote here: I don't think the industry needs someone to verify an advisory for them. Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others. People are more than capable of doing that themselves, or do Secunia underestimate the intelligence of the security community? Secunia, as slimy and bullshit as it is, sells a service to IT Adminstrators which sadly are stupid and cannot perform verification themselves. Add that to the droves of idiot consultants who also cannot verify the info themsevles but make millions reselling it as knowlege. So Secunia, SecurityFuckus and others exist to feed the snakes who produce the snake oil. This is my last ever Full-Disclosure post... i'm no longer going to give Secunia the spam satisfaction of adding their web address to the bottom of my messages. Good bye to the All-New Secunia sponsored Full-dIsclosure mailing list. Please unsubscribe n3td3v_at_gmail and xploitable_at_gmail Ding dong the faggot is gone. Please take the chinkfocusteam with you too. Perhaps y'all can go suck some aiteldick over at DailyWhitehat Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] kiddie porn warning [was: Fwd: Re: montspace -- child porn (site still up)]
Morning wood is a perfectly normal thing. In fact it is morning here and I am sitting here naked with a massive erection. Nothing wrong with that. The fact that I am using it to press the space bar is a bit creepy however. On Mon, 17 Apr 2006 22:54:20 -0700 Andrew A [EMAIL PROTECTED] wrote: With a name like Morning Wood he HAS to be a pedophile. On 4/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: It gave me wood. Morning Wood. Yeah that was a bad joke wasn't it. On Mon, 17 Apr 2006 18:55:54 -0700 Gadi Evron [EMAIL PROTECTED] wrote: Gary E. Miller wrote: And how long did it take that mole to pop back up? Tompa.com is already back on the air. Montspace.com is not back up yet, but that was just Guys, please refrain from going to that site or downloading it. In some western countries just having CP on your PC means your life can be completely ruined without much further evidence or investigation before-hand. Motive is irrelevant. Leave this to the proper authorities. Plus, it will give you nightmares. Gadi. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Attn Xfocus
The nice thing is I can use any word I want and there isn't much you can do about it. Who said you were gov? Aren't you violating laws by posting on here? On Sun, 16 Apr 2006 22:41:15 -0700 [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: information security', Now you must leave. By by chinks. you can talk about how china gov undemocratic is. but NOT USE THE WORD chinks,if you don't respect chinese people,you will don't be respected by us.Unfortunately,How stupid u are!!! ps: xfoucs not gov,xfocus just is xfocus,Xfocus just is a non- profit and free technology organization which was founded in 1998 in China -- Kind Regards, --- [EMAIL PROTECTED] XFOCUS Security Team http://www.xfocus.org Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Attn Xfocus
Apparently someone need to beat y'all with a clue stick. On Mon, 17 Apr 2006 00:04:03 -0700 Alice Bryson [EMAIL PROTECTED] wrote: [EMAIL PROTECTED]: Chinese government people and Chinese technical people are different, you must be aware of this. 2006/4/17, [EMAIL PROTECTED] [EMAIL PROTECTED]: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [EMAIL PROTECTED] wrote: information security', Now you must leave. By by chinks. you can talk about how china gov undemocratic is. but NOT USE THE WORD chinks,if you don't respect chinese people,you will don't be respected by us.Unfortunately,How stupid u are!!! ps: xfoucs not gov,xfocus just is xfocus,Xfocus just is a non- profit and free technology organization which was founded in 1998 in China - -- Kind Regards, - --- [EMAIL PROTECTED] XFOCUS Security Team http://www.xfocus.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFEQyp7sIGFlQFVy00RAgZAAKCWFKM09awv8/l1whQTk+nOH4nK2QCeMnfT Tt//MdxIQ/Uqs+7CsztgYmk= =0CWc -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- http://www.lwang.org lwang.org provides free service of online base64 encode and decode, crc32 md5 and sha1 hashing, online ciphers, encryption and decryption. mailto:[EMAIL PROTECTED] Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] kiddie porn warning [was: Fwd: Re: montspace -- child porn (site still up)]
It gave me wood. Morning Wood. Yeah that was a bad joke wasn't it. On Mon, 17 Apr 2006 18:55:54 -0700 Gadi Evron [EMAIL PROTECTED] wrote: Gary E. Miller wrote: And how long did it take that mole to pop back up? Tompa.com is already back on the air. Montspace.com is not back up yet, but that was just Guys, please refrain from going to that site or downloading it. In some western countries just having CP on your PC means your life can be completely ruined without much further evidence or investigation before-hand. Motive is irrelevant. Leave this to the proper authorities. Plus, it will give you nightmares. Gadi. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Attn Xfocus
fsk em... its not like you will be the one on the other end of the revolver. On Sun, 16 Apr 2006 17:34:35 -0700 n3td3v [EMAIL PROTECTED] wrote: On 4/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: http://www.vnunet.com/vnunet/news/2154063/china-outlaws-outlook China's new rules also prohibit use of email to discuss certain vaguely defined subjects related to 'network security' and ' information security', Now you must leave. By by chinks. I've been routing via China for a while 222.137.124.124, I guess I should stop using this for security related mailing lists ;-) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Welcome to XCon2006!
Fuck the chinks at XCom. Stay behind the wall with your government sponsored attempt at gaining new knowlege. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] RE: Welcome to XCon2006!
Hi [EMAIL PROTECTED], fuucck your mother's asshole You are welcome. emm -Original Message- From: full-disclosure-bounces at lists.grok.org.uk [mailto:full-disclosure-bounces at lists.grok.org.uk] On Behalf Of 0x80 at hush.ai Sent: Monday, April 03, 2006 2:32 AM To: full-disclosure at lists.grok.org.uk; xcon at xfocus.org Subject: Re: [Full-disclosure] Welcome to XCon2006! Fuck the chinks at XCom. Stay behind the wall with your government sponsored attempt at gaining new knowlege. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Even TheRegister Agrees
Nice headline. http://www.theregister.co.uk/2006/04/03/anonymizer_china/ Anonymizer looks for chinks in Great Firewall of China Google workaround By John LeydenPublished Monday 3rd April 2006 22:41 GMTGet breaking Anonymizer has gone live with a service that aims to circumvent Chinese censorship restrictions. The online identity protection firm has released software (initially available at xifuchun.com, an English language site) designed specifically for Chinese citizens, that offers a way around the web filters put in place by Beijing. Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] re: eeye temporary patch for current IE vulnerability
Yes I installed the patch and looked at the source which is also available on the site. Worked for me. On Tue, 28 Mar 2006 04:38:05 -0800 Jay Libove [EMAIL PROTECTED] wrote: Has anyone applied and tested the eeye patch? Verified that it works, and that it does not do anything else? -Jay ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] re: eeye temporary patch for current IE vulnerability
It not hard to monitor changes binary makes compared to source. Nor is it hard to reverse binary. On Tue, 28 Mar 2006 08:55:28 -0800 [EMAIL PROTECTED] wrote: On Tue, 28 Mar 2006 07:49:15 PST, [EMAIL PROTECTED] said: Yes I installed the patch and looked at the source which is also available on the site. Worked for me. And you convinced yourself that the patch and the source matched, how, exactly? :) Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)
Oh here we go. My life is better now that I get to bone KF's mom. On Sat, 25 Mar 2006 05:22:35 -0800 KF (lists) [EMAIL PROTECTED] wrote: Andrew A wrote: Hey BlueBoar, how has life been since we got you fired from SecurityFocus? How about yours since you stopped beating your wife? -KF ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)
Yeah but you do like to choke on fat cocks. Perhaps its time for a new mail spool to be posted. On Sat, 25 Mar 2006 09:33:22 -0800 Blue Boar [EMAIL PROTECTED] wrote: Stan Bubrouski wrote: On 3/24/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Posting a private email to a mailing list is pretty slimeball Ryan. Funny you would do such a thing when you lost your bullshit job at Security Focus over getting owned. Sadly more and more people are posting off-list messages back to the list to get themselves more attention (n3td3v). Except that I didn't. BB ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Industry calls on Microsoft to scrap Patch Tuesday for Critical flaws
WE? You are one guy. Actually you are one stupid guy who obviously has zero clue about how real enterprise level infrastructures handle patch management. Patch Tuesday is a good thing as it supports a sound patch management methodology. I wouldn't expect you to know this because it is clear that you are some idiotic kid. On Sat, 25 Mar 2006 14:12:23 -0800 n3td3v [EMAIL PROTECTED] wrote: Dear Microsoft and Security Community, In light of WMF and recent HTA flaws, we n3td3v group are calling on the following: We are calling for Microsoft to scrap Patch Tuesday officially for critical flaws in its product line(s). You Microsoft must officially agree that all flaws marked as Critical must have a patch within 7 to 14 days of public disclosure. People power will change policy by forwarding this e-mail to: [EMAIL PROTECTED] Reason for this e-mail: Reports are coming into our intelligence body that mass HTA hacking is being carried out world wide. of course unofficial patches cause a greater security risk than the flaw its self: http://groups.google.com/group/n3td3v/browse_thread/thread/83607ba8 33b697b0/8f0be3bc9c2436c4 Links: n3td3v group HQ: http://groups.google.com/group/n3td3v Hackivism scene information: http://en.wikipedia.org/wiki/Hacktivism Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Industry calls on Microsoft to scrap Patch Tuesday for Critical flaws
Rogue employees? Alright shit stain. Yeah.. MS is going to listen to a group of rogue employees lol On Sat, 25 Mar 2006 19:34:43 -0800 n3td3v [EMAIL PROTECTED] wrote: *I work with rogue employee vendors around the world to bring good Hack active solution about within the community, if you can't under stand that, then you need to sit down and realise that the n3td3v group is the biggest thing you'll ever meet in your life time, in terms of rogue employees getting together to make their voice heard.* *We can agree in that one guy, has many voices, if that helps your cause mr 0x80!* Or we can argue the crypto of the n3td3v group further if you wish to go down that road... On 3/26/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: WE? You are one guy. Actually you are one stupid guy who obviously has zero clue about how real enterprise level infrastructures handle patch management. Patch Tuesday is a good thing as it supports a sound patch management methodology. I wouldn't expect you to know this because it is clear that you are some idiotic kid. On Sat, 25 Mar 2006 14:12:23 -0800 n3td3v [EMAIL PROTECTED] wrote: Dear Microsoft and Security Community, In light of WMF and recent HTA flaws, we n3td3v group are calling on the following: We are calling for Microsoft to scrap Patch Tuesday officially for critical flaws in its product line(s). You Microsoft must officially agree that all flaws marked as Critical must have a patch within 7 to 14 days of public disclosure. People power will change policy by forwarding this e-mail to: [EMAIL PROTECTED] Reason for this e-mail: Reports are coming into our intelligence body that mass HTA hacking is being carried out world wide. of course unofficial patches cause a greater security risk than the flaw its self: http://groups.google.com/group/n3td3v/browse_thread/thread/83607ba 8 33b697b0/8f0be3bc9c2436c4 Links: n3td3v group HQ: http://groups.google.com/group/n3td3v Hackivism scene information: http://en.wikipedia.org/wiki/Hacktivism Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)
I only wish I was your daddy so I could slap the shit out of you like you obviously deserve and never got enough of as a child. On Sat, 25 Mar 2006 19:34:20 -0800 KF (lists) [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: Oh here we go. My life is better now that I get to bone KF's mom. Schweet! I always wanted a little brother! 0x80 is my step daddy. wh00t! -KF ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)
Sendmail vulnerabilities were released yesterday. No real public announcements to speak of to the security community. Do you live under a rock? There were a lot of public announcements about this. To begin with, anyone noticed the memory leak they (Sendmail) silently patched? I wonder how many other unreported silently-patched vulnerabilities are out there? Yes. There was a presentation at Blackhat Europe about this. It happens all the time. Vendors do not practice responsible disclosure but they expect you to. Sendmail is, as we know, the most used daemon for SMTP in the world. This is an International Infrastructure vulnerability and should have been treated that way. It wasn't. It was handled not only poorly, but irresponsibly. So in one sentence you say that the ISS bug is only a DoS and now you are crying that a bug is being handled irresponsibly? Don't you have already talked to death DNS attacks to sound the alarm about? They say it's a remote code execution. They say it's a race condition. No real data available to speak of. I can't see how it's remotely exploitable, but well, no details, remember? From what we can see it seems like a DoS. So if in the best of your abilities this is only a DoS --- why cry over so called irresponsible disclosure of a bug? Oh wait, the minor memory leak that you think you found is the issue. What they did behind the smoke-screen is replace a lot of setjmp() and longjmp() functions (not very secure ones at that) with goto's (interesting choice). So what would you have done? What smoke-screen are you talking about? The int overflow is possibly exploitable, not very sure about the jumps. No idea why ISS says the Race Condition is, would love insight. You got that right. We would all love you to get some insight. One could say ISS and Sendmail did good, obscuring the information so that the vulnerability-to-exploit time will be longer. That proved wrong, useless and pointless. They failed. Obviously. I mean if *you* couldn't figure out how to exploit the ISS issue then they must have failed. Or wait, you couldn't figure it out so perhaps they failed but are still smarter than you. After looking at the available data for 30 minutes (more or less), we know exactly what the vulnerabilities are. Exploiting them may So after 30 minutes you were wrong about an issue. Tell me again how smart you are. Not to mention the silently patched memory leak. Alert the press. DNS is can be attacked AND there is a memory leak in Sendmail. both ISS and Sendmail should look good and hard at the coming massive exploitation of Sendmail servers. Nah the 1337 h4x0rs will be too busy going after DNS right? With issues relating to the Internet Infrastructure I'd be willing to go even with the evil of non-disclosure, as long as something gets done and then reported publically when it finally scaled down in a roll-back after a couple of years. Yeah, that will work. Because, no offense Mark Dowd, no one else could have found the problem. Well at least we know that the world is safe from you. If not, and you are going to make it public, make the effort and fix it as soon as you can, and give information to help the process of healing. Don't do it a mounth late and obscure data. So if you find a bug, it should be fixed and released on the same day you find it. Yeah right. It took Sendmail a mounth to fix this. A mounth. A whole month? The horror! Babies will die and our women will raped if vendors continue to take an entire month to address as many issues addressed in the Sendmail patch. A mounth! Mounth? So first you say no details should have been released for at least 2 years and now you are crying because it took a month to come up with a patch. Do you even read the shit that seems to flow from your brain to your keyboard? With such Vendor Responsibility, perhaps it is indeed a Good Thing to go Full Disclosure. It seems like history is repeating itself and Full Disclosure is once again not only a choice, but necessary to make vendors become responsible. WTF are you talking about? The bug has been disclosed. The patch released. Why are you complaining? How was Sendmail irresponsible by fixing an issue and releasing a patch? I think you have lost your meds. I wish we could somehow avoid all the guys who will inevitably shout in the press end of the world. The Internet is, was and will stay Except for you right? Answer your phone. Its the kettle calling. Speaking of pot perhaps you should smoke less before sending emails to lists. Have you not shouted about DNS have you not shouted in this tripe filled email about how irresponsible Sendmail and ISS are because the issue is so dangerous and that Sendmail and ISS should watch the mass exploitation that their evil ways will cause? One could hope that someone will take
Re: [Full-disclosure] Phun! Search
On could hope that the two of you will get cancer and die and soon. On Thu, 23 Mar 2006 21:56:13 -0800 Stan Bubrouski [EMAIL PROTECTED] wrote: How come when people make comments off-list you re-add FD to the replies? You are cancer. On 3/23/06, n3td3v [EMAIL PROTECTED] wrote: I have exploit code for this issue, which the list won't be getting hold of. The disclosure was to show that I can ask the slurp robot to cache an account on the public index, so I can retrieve account information. I ask the code to cache a copy of 'x user', when 'x' is at critical information page to obtain access to the yahoo users account. Of course with such a good 0-day, I use it seldom and only on specific targets like yahoo users with 'paid' services and or Yahoo employees. On 3/22/06, Stan Bubrouski [EMAIL PROTECTED] wrote: How old are you? Seriously. I don't know whether you realize just how completely stupid you come off as to even people new in the security field. You are a joke. Quit filling this list with crap. BTW did you even check to see if you Yahoo! will let you view OTHER people's account stuff? Otherwise it seems pretty useless. -sb ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/