Re: [Full-disclosure] DHS need to get on top of this right now

2007-10-24 Thread Mike Owen
On 10/24/07, worried security [EMAIL PROTECTED] wrote:
 I'm sorry everyone I was just trying to highlight a valid point, i didn't
 expect a flame war to errupt.

 The DHS need to ban ISP's from talking about infrastructure security in
 public places. it should be classified information don't you all think?


No, it shouldn't be classified. Besides, having DHS (lol) try to ban
isps from talking is absurd in the extreme. Even ignoring the point
that DHS is incompetent, there is a rather large issue with DHS being
a US-centric agency, and this whole intarweb thing being world wide.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Month of Random Hashes: DAY FIFTEEN

2007-06-28 Thread Mike Owen
On 6/27/07, Month of Random Hashes [EMAIL PROTECTED] wrote:
snip

My additions. These are of use to me, and possibly others.

(md5)
hash i 814521e15bd92880fc27811707c8156f
hash u 5c9483e84b320d017dea913c237b5ff2

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Linux big bang theory....

2007-05-15 Thread Mike Owen
On 5/13/07, Andrew Farmer [EMAIL PROTECTED] wrote:
 Well, yeah. The script depends on lynx and wget being available, and
 neither is installed on OS X. It also depends on the line-by-line
 layout of several include files, one of which (linux/wireless.h)
 doesn't even exist on non-Linux systems.

 It won't even work on all Linux systems. If the target doesn't have
 compilers available, for example, it won't have any headers to grab
 the target strings from.


Don't forget things like x86_32/x86_64, especially when combined with
a source distro like Gentoo. And of course, things like different
versions of linux/wireless.h, etc.

snip
happy=`awk 'NR==59 {gsub(//,);print $3}' /usr/include/paths.h`
/snip

$ cat /usr/include/paths.h
/* Autogenerated by create_ml_includes() in multilib.eclass */

#ifdef __i386__
# include gentoo-multilib/x86/paths.h
#endif /* __i386__ */

#ifdef __x86_64__
# include gentoo-multilib/amd64/paths.h
#endif /* __x86_64__ */

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Hushmail from [EMAIL PROTECTED]

2007-02-02 Thread Mike Owen
On 2/2/07, James Matthews [EMAIL PROTECTED] wrote:
 Again WTF!


It's just someone trying to get hushmail filtered from full-disclosure.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] IBM to buy ISS

2006-08-23 Thread Mike Owen

Sounds like IBM is going to buy out ISS. Having too much experience in
dealing with IBM contractors and support, I don't think this is a good
thing for ISS or their customers.

http://www.iss.net/about/press_center/releases/us_ibm_08233006.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: blocking tor is not the right way forward. It may just be the right way backward.

2006-06-09 Thread Mike Owen

On 6/9/06, Cardoso [EMAIL PROTECTED] wrote:


Most websites rely on cookies, sessions and javascript. If a user can't
live with that, I'm very sorry but there's nothing I can do.



Actually, no, most websites don't. I use a deny by default cookie
policy, and NoScript, and nearly every single website I visit works. I
need to enable session cookies when I'm buying something online, but
JavaScript is rare that I ever need to enable it for a site.


Same about corporate networks where people way high on the food chain
demand full access, no firewall control or even transparent filtering.



If you have that kind of problem where you work, you need to work on
more education and security awareness. Where I am, we force all
outbound traffic through a proxy, and everyone including the oh so
precious C level goes through it.

Mike

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Secunia illegal spam and advisory republication

2006-04-20 Thread Mike Owen
On 4/20/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

 as for this list being sponsored by Secunia. did n3td3v not actually READ the 
 list
 at all before subscribing or posting to it?  who wouldn't take such 
 preliminary cautions?


 alan


The list was purchased by Secunia a year or so ago. Many of the
subscribers have been on it since it's inception by Len on netsys.com
4 years ago, long before Secunia got their hands on it.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Recall: Oracle read-only user can insert/update/delete data

2006-04-12 Thread Mike Owen
On 4/11/06, Bill Weiss [EMAIL PROTECTED] wrote:
 Van Winssen, Andre A SITI-ITIBHW5([EMAIL PROTECTED])@Wed, Apr 12, 2006 at 
 07:56:08AM +0200:
  The sender would like to recall the message, Oracle read-only user can 
  insert/update/delete data.

 Hey, everybody!  It's that guy who uses Exchange and doesn't know that it
 doesn't work with the outside world!  Why don't we all laugh at him?

 (With apologies to The Simpsons fans everywhere)

 --
 Bill Weiss


In my experience, it doesn't even work in an Exchange environment. The
user gets a message that the message should be recalled, but the
original is still there, even if it hasn't been read yet. I've heard
people say that at one time it would auto-delete the message if it
hadn't been read, but I've never seen that.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-23 Thread Mike Owen
On 3/23/06, Gadi Evron [EMAIL PROTECTED] wrote:
 Tech details:
 Sendmail vulnerabilities were released yesterday. No real public
 announcements to speak of to the security community.

snip
 Public announcement
 ---
 FreeBSD were the only ones who released a public announcement of a patch
 and emailed it to bugtraq so far.

snip

Not sure what you mean by no advisories from the major distros.

The CERT advisory went out at about 1700GMT. At the same time, RedHat
sent out their notices, Mandrake, SUSE and Gentoo were within a few
hours. Debian and Sun had updates within 24 hours.

I'd say that covers the major players, and all of them were sent out
by the time you sent your email. If you mean specifically Bugtraq (tm)
postings, then you're right, they haven't been released by the
moderators of that list yet. Bugtraq is what a moderated FD would look
like, which is why it's not anywhere near as popular or useful as it
was back in the Aleph1 netspace.org days.

While I agree with you that this vulnerability should have more
publicity then it does, I don't think everything is quite as gloomy as
you're making it sound.

 Mike

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] HTTP AUTH BASIC monowall.

2006-03-16 Thread Mike Owen
On 3/16/06, Simon Smith [EMAIL PROTECTED] wrote:
 Flames like yours are useless. If you do not know how to answer the
 question that I am asking, then just be quiet. Mark Coleman is one of
 the few people that seems to have understood my question and provided me
 with a viable solution. Again, thanks Mark!


Adriel or Simon or whatever the hell you're calling yourself these days,

You're asking a bullshit question. You're basically saying that ssl is
broken, so you want to tunnel something through ssl that'll be secure
if the ssl wasn't there. Don't fucking use ssl in the first place then
if you don't like it.

I'm honestly quite surprised you haven't just replied to the list yet
with the standard YHBT. YHL. HAND. That's all you are doing here, is
just trolling, posting crap to get an argument going so you can sit
back and laugh.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] For Sale: Security Vulnerability Database Company

2006-03-10 Thread Mike Owen
On 3/10/06, System Outage [EMAIL PROTECTED] wrote:

snip

I'm curious, is there a reason you always use a hax0red proxy to do
your posting from? You weren't by chance the one who rooted them are
you?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about Mac OS X 10.4 Security

2006-02-28 Thread Mike Owen
On 2/28/06, Stef [EMAIL PROTECTED] wrote:
 On 2/28/06, Paul Schmehl [EMAIL PROTECTED] wrote:
  Still, the ignorance of Mac users, who believe their platform is somehow
  magically secure will contribute to the problem.
 
snip
 I am sorry, Paul, but I have to take you up on this, especially with
 your tendency of generalizing everything. I have used *nix in the
snip
 ... so the Mac users are not [only] the bunch of idiots/ignorants whom
 you tend to describe - I would just invite you to attend a blackhat or
 shmoocon, or even SANS or Cisco networkers, and let me know how many
 Mac users you can count there ... and then ask yourself why ... but
 then, again, I may be wrong ;

 Stef


Stef,

You're describing your own experiences, and those of other security
professionals. What Paul is describing is the normal user. I agree
with him that the normal user thinks that because they have a Mac,
they are suddenly immune to everything. As an example, a good friend
of mine has been using an iBook and an iMac for several years, and
likes to talk about how she doesn't have to deal with all the viruses
and problems that her Windows using friends have. When I asked, she
had never done a single update on her computers, because she didn't
think she needed to. I've since convinced her to check for updates on
a weekly basis, which while not perfect, has at least kept her
patched.

Mike
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] blocking Google Desktop

2006-02-10 Thread Mike Owen
On 2/10/06, Michael Holstein [EMAIL PROTECTED] wrote:
 I'm sure many of you corporate types are scared to death of the new
 Google Desktop (allowing Google to store anything on my drive for a month).

 Question : what's the most effective way to block this on a network level?

 Does blackholeing desktop.google.com do the trick and prevent it from
 reporting (even if already installed) ?

 Regards,

 Michael Holstein
 Cleveland State University

You could always try an authenticated proxy that all traffic must pass
through. Last I checked, Google Desktop couldn't deal with an
authenticated proxy.

Mike
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Gutmann's research paper today

2006-02-07 Thread Mike Owen
On 2/7/06, Frank Knobbe [EMAIL PROTECTED] wrote:
 I'm performing backups where the stream is tee'ed to the drive and into
 md5 for hash creation. Works great with tapes, should work for drives
 too.

 Cheers,
 Frank


Funny, that's how my backups always end up working as well. 'cat
/dev/urandom  /dev/tape'

Mike
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] BlackWorm technical information

2006-01-24 Thread Mike Owen
On 1/24/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 The *interesting* question is whether it's possible to use this to count
 the *actual* number of affected machines by excluding all the rubberneckers
 that are visiting the page and hitting refresh to see the numbers go up.
 Maybe by looking at the Referer or User-Agent values?



That's what the Snort rule looks for, a connection to that page
without a Referer: tag. Not perfect, but it works well enough.

Mike
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/