Re: [Full-disclosure] how to steal openssh private key
Has anyone really been far even as decided to use even go want to do look more like? On Mon, Oct 22, 2012 at 12:10 AM, nothacking nothack...@163.com wrote: Hello everybody: environment is A is hacker client, B is target and C is Manager center and C have all A and B private key. C are open 80,22. And this is http's 403 state on the C. I have A's root,how to steal private key On the C. Are there have some vuln with openssh. Is there some impossible which C login in to the A and B when A and B let C run some bash. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] How to access your favorite sites in the event of a DNS takedown ?
And don't forget lists.grok.org.uk 127.0.0.1 On Jun 25, 2012 11:15 AM, Jardel jweyr...@gmail.com wrote: Do you know? Even in DNS take down you can youcan access your favourite sites. People may think that in DNS shoutdown they can lost access to their addicted websites. But after reading this article you will know how easily you can access your websites. You can access them by typing their IP address in your web-browser. Copy the IP addresses given below: tumblr.com 174.121.194.34 wikipedia.org 208.80.152.201 Original Article: http://cybermughal.blogspot.com/2012/06/how-to-access-your-favorite-sites-in.html ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Downloads Folder: A Binary Planting Minefield
Hmm, interesting AV evasion technique: Seemingly legitimate app, but the download page gives both a malicious DLL and the main executable, the main executable uses LoadLibrary insecurely. On Feb 22, 2012 9:33 AM, ACROS Security Lists li...@acros.si wrote: Hi Jeff, I don't believe a PE/PE+ executable needs a DLL extension to be loaded by LoadLibrary and friends. True, any file can be loaded this way, but our pretty extensive experimenting showed extremely few cases where legitimate applications (in this case mostly installers) loaded anything other than something.dll. The operating assumption here is that the initial executable (installer) is friendly but whatever it loads with LoadLibrary* can be potentially malicious. The attacker can therefore not choose which file the initial executable will load with LoadLibrary* but must plant a file that the executable is already set to load. Perhaps a scanning/cleansing tool would be helpful. Certainly. In the mean time, del Downloads\* is a free and efficient superset of that ;-) Cheers, Mitja ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Patator - new multi-purpose brute-forcing tool
You might look into PyPy for a speed boost: http://pypy.org On Feb 22, 2012 6:43 AM, lanjelot lanje...@gmail.com wrote: Hello FD, Released two months ago, and downloaded a few thousand times since, I wanted to share with you a new multi-purpose brute-forcing tool named Patator (http://code.google.com/p/patator/). I am posting here because I would like to get more feedback from people using it, so feel free to fire me an email if you have any queries, or rather use the issues tracker on patator project page. To put it bluntly, I just got tired of using Medusa, Hydra, ncrack, metasploit auxiliary modules, nmap NSE scripts and the like because: - they either do not work or are not reliable (got me false negatives several times in the past) - they are slow (not multi-threaded or not testing multiple passwords within the same TCP connection) - they lack very useful features that are easy to code in python (eg. interactive runtime) Basically you should give Patator a try once you get disappointed by Medusa, Hydra or other brute-forcing tools and are about to code your own small script because Patator will allow you to: - Not write the same code over and over, due to its a modular design and flexible usage - Run multi-threaded - Benefit from useful features such as the interactive runtime commands, automatic response logging, etc. Currently Patator supports the following modules : - ftp_login : Brute-force FTP - ssh_login : Brute-force SSH - telnet_login : Brute-force Telnet - smtp_login: Brute-force SMTP - smtp_vrfy : Enumerate valid users using the SMTP 'VRFY' command - smtp_rcpt : Enumerate valid users using the SMTP 'RCPT TO' command - http_fuzz : Brute-force HTTP/HTTPS - pop_passd : Brute-force poppassd (not POP3) - ldap_login: Brute-force LDAP - smb_login : Brute-force SMB - mssql_login : Brute-force MSSQL - oracle_login : Brute-force Oracle - mysql_login : Brute-force MySQL - pgsql_login : Brute-force PostgreSQL - vnc_login : Brute-force VNC - dns_forward : Forward lookup subdomains - dns_reverse : Reverse lookup subnets - snmp_login: Brute-force SNMPv1/2 and SNMPv3 - unzip_pass: Brute-force the password of encrypted ZIP files - keystore_pass : Brute-force the password of Java keystore files The name Patator comes from the famous weapon : http://www.youtube.com/watch?v=xoBkBvnTTjo Cheers! ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Exploit Pack - New video - Ultimate 2.1
He's a security searcher: he searches exploit-db to find PoCs to steal. On Jan 30, 2012 2:25 AM, Mario Vilas mvi...@gmail.com wrote: I fear the day when he finally succeeds in making enough people believe he's a real security researcher. I wish attrition.org did a piece on him in the charlatans section. 2012/1/30 Peter Osterberg j...@vel.nu: This is Juan Sacco's new spam puppet. He just posted the same thing using his real name elsewhere. nore...@exploitpack.com skrev: Exploit Pack - New video! Release - Ultimate 2.1 Check it out! http://www.youtube.com/watch?v=4TrsFry13TU Exploit Pack Team http://exploitpack.com Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- “There's a reason we separate military and the police: one fights the enemy of the state, the other serves and protects the people. When the military becomes both, then the enemies of the state tend to become the people.” ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] captcha
Very carefully. On Jan 1, 2012 1:52 PM, ebhakt ebh...@gmail.com wrote: Hii guys, g Hii guys, I want to know the logic behind creating a captcha image I know how the servers are designed and what the captcha security does!! but how the captcha imagae is generated that's my main question !! Any ideas , guesses !! Just mail around !! Thanks ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] VLAN Hacking Tutorial at InfoSec Institute
May be I am just ignorant but, just explain how an ARP packet from one VLAN enters another? Very carefully. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Large password list
Creative Commons BY-SA might be more appropriate than the GPL. On Dec 2, 2011 10:41 AM, Travis Biehn tbi...@gmail.com wrote: My password leaks will all be released under the GPL. -Travis On Fri, Dec 2, 2011 at 7:28 AM, Mario Vilas mvi...@gmail.com wrote: On Fri, Dec 2, 2011 at 3:05 AM, adam a...@papsy.net wrote: C:\Users\adam\Desktopls -la combined.zip | gawk {print $5} *31337*317 That's a funny coincidence. :) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- Twitter https://twitter.com/tbiehn | LinkedInhttp://www.linkedin.com/in/travisbiehn| GitHub http://github.com/tbiehn | TravisBiehn.comhttp://www.travisbiehn.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] XSS attack on Edlio.com school websites
http://{SITE_GOES_HERE}/apps/email/index.jsp?e=239323752379240323772273237523772383237723832309238123792273238724032417n=scriptalert(XSS);/scriptfull-disclosure@lists.grok.org.uk for SITE_GOES_HERE, try: www.artshigh.org, or any site at http://www.edlio.com/portfolio/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/