Re: [Full-disclosure] how to steal openssh private key

2012-10-22 Thread Nate Theis
Has anyone really been far even as decided to use even go want to do look
more like?

On Mon, Oct 22, 2012 at 12:10 AM, nothacking nothack...@163.com wrote:

 Hello everybody:
  environment is A is hacker client, B is target and C is Manager
 center and C have all A and B private key.
  C are open 80,22. And this is http's 403 state on the C.
  I have A's root,how to steal private key On the C. Are there have
 some vuln with openssh.
  Is there some impossible which C login in to the A and B when A and B
 let C run some bash.



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] How to access your favorite sites in the event of a DNS takedown ?

2012-06-25 Thread Nate Theis
And don't forget

lists.grok.org.uk 127.0.0.1
On Jun 25, 2012 11:15 AM, Jardel jweyr...@gmail.com wrote:

 Do you know? Even in DNS take down you can youcan access your favourite
 sites.

 People may think that in DNS shoutdown they can lost access to their
 addicted websites.


 But after reading this article you will know how easily you can access
 your websites. You can access them by typing their IP address in your
 web-browser.

 Copy the IP addresses given below:

 tumblr.com 174.121.194.34
 wikipedia.org 208.80.152.201

 Original Article:
 http://cybermughal.blogspot.com/2012/06/how-to-access-your-favorite-sites-in.html

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Downloads Folder: A Binary Planting Minefield

2012-02-22 Thread Nate Theis
Hmm, interesting AV evasion technique: Seemingly legitimate app, but the
download page gives both a malicious DLL and the main executable, the main
executable uses LoadLibrary insecurely.
On Feb 22, 2012 9:33 AM, ACROS Security Lists li...@acros.si wrote:

 Hi Jeff,

  I don't believe a PE/PE+ executable needs a DLL extension to
  be loaded by LoadLibrary and friends.

 True, any file can be loaded this way, but our pretty extensive
 experimenting showed
 extremely few cases where legitimate applications (in this case mostly
 installers)
 loaded anything other than something.dll. The operating assumption here
 is that the
 initial executable (installer) is friendly but whatever it loads with
 LoadLibrary*
 can be potentially malicious. The attacker can therefore not choose which
 file the
 initial executable will load with LoadLibrary* but must plant a file that
 the
 executable is already set to load.

  Perhaps a scanning/cleansing tool would be helpful.

 Certainly. In the mean time, del Downloads\* is a free and efficient
 superset of
 that ;-)

 Cheers,
 Mitja

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Patator - new multi-purpose brute-forcing tool

2012-02-22 Thread Nate Theis
You might look into PyPy for a speed boost: http://pypy.org
On Feb 22, 2012 6:43 AM, lanjelot lanje...@gmail.com wrote:

 Hello FD,

 Released two months ago, and downloaded a few thousand times since, I
 wanted to share with you a new multi-purpose brute-forcing tool named
 Patator (http://code.google.com/p/patator/).

 I am posting here because I would like to get more feedback from
 people using it, so feel free to fire me an email if you have any
 queries, or rather use the issues tracker on patator project page.

 To put it bluntly, I just got tired of using Medusa, Hydra, ncrack,
 metasploit auxiliary modules, nmap NSE scripts and the like because:
  - they either do not work or are not reliable (got me false
 negatives several times in the past)
  - they are slow (not multi-threaded or not testing multiple
 passwords within the same TCP connection)
  - they lack very useful features that are easy to code in python
 (eg. interactive runtime)

 Basically you should give Patator a try once you get disappointed by
 Medusa, Hydra or other brute-forcing tools and are about to code your
 own small script because Patator will allow you to:
  - Not write the same code over and over, due to its a modular design
 and flexible usage
  - Run multi-threaded
  - Benefit from useful features such as the interactive runtime
 commands, automatic response logging, etc.

 Currently Patator supports the following modules :
  - ftp_login : Brute-force FTP
  - ssh_login : Brute-force SSH
  - telnet_login  : Brute-force Telnet
  - smtp_login: Brute-force SMTP
  - smtp_vrfy : Enumerate valid users using the SMTP 'VRFY' command
  - smtp_rcpt : Enumerate valid users using the SMTP 'RCPT TO' command
  - http_fuzz : Brute-force HTTP/HTTPS
  - pop_passd : Brute-force poppassd (not POP3)
  - ldap_login: Brute-force LDAP
  - smb_login : Brute-force SMB
  - mssql_login   : Brute-force MSSQL
  - oracle_login  : Brute-force Oracle
  - mysql_login   : Brute-force MySQL
  - pgsql_login   : Brute-force PostgreSQL
  - vnc_login : Brute-force VNC

  - dns_forward   : Forward lookup subdomains
  - dns_reverse   : Reverse lookup subnets
  - snmp_login: Brute-force SNMPv1/2 and SNMPv3

  - unzip_pass: Brute-force the password of encrypted ZIP files
  - keystore_pass : Brute-force the password of Java keystore files

 The name Patator comes from the famous weapon :
 http://www.youtube.com/watch?v=xoBkBvnTTjo

 Cheers!

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Exploit Pack - New video - Ultimate 2.1

2012-01-31 Thread Nate Theis
He's a security searcher: he searches exploit-db to find PoCs to steal.
On Jan 30, 2012 2:25 AM, Mario Vilas mvi...@gmail.com wrote:

 I fear the day when he finally succeeds in making enough people
 believe he's a real security researcher. I wish attrition.org did a
 piece on him in the charlatans section.

 2012/1/30 Peter Osterberg j...@vel.nu:
  This is Juan Sacco's new spam puppet. He just posted the same thing using
  his real name elsewhere.
 
  nore...@exploitpack.com skrev:
 
  Exploit Pack - New video! Release - Ultimate 2.1
 
  Check it out! http://www.youtube.com/watch?v=4TrsFry13TU
 
  Exploit Pack Team
  http://exploitpack.com
 
  
 
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/



 --
 “There's a reason we separate military and the police: one fights the
 enemy of the state, the other serves and protects the people. When the
 military becomes both, then the enemies of the state tend to become
 the people.”

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] captcha

2012-01-02 Thread Nate Theis
Very carefully.
On Jan 1, 2012 1:52 PM, ebhakt ebh...@gmail.com wrote:

 Hii guys,
g

 Hii guys,
 I want to know the logic behind creating a captcha image
 I know how the servers are designed and what the captcha security does!!
 but how the captcha imagae is generated  that's my main question !!

 Any ideas , guesses !!
 Just mail around !!

 Thanks


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] VLAN Hacking Tutorial at InfoSec Institute

2011-12-09 Thread Nate Theis
 May be I am just ignorant but, just explain how an ARP packet from one
 VLAN enters another?


Very carefully.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Large password list

2011-12-05 Thread Nate Theis
Creative Commons BY-SA might be more appropriate than the GPL.
On Dec 2, 2011 10:41 AM, Travis Biehn tbi...@gmail.com wrote:

 My password leaks will all be released under the GPL.

 -Travis

 On Fri, Dec 2, 2011 at 7:28 AM, Mario Vilas mvi...@gmail.com wrote:

 On Fri, Dec 2, 2011 at 3:05 AM, adam a...@papsy.net wrote:

 C:\Users\adam\Desktopls -la combined.zip | gawk {print $5}
 *31337*317


 That's a funny coincidence. :)

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 --
 Twitter https://twitter.com/tbiehn | 
 LinkedInhttp://www.linkedin.com/in/travisbiehn|
 GitHub http://github.com/tbiehn | 
 TravisBiehn.comhttp://www.travisbiehn.com


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] XSS attack on Edlio.com school websites

2011-11-24 Thread Nate Theis
http://{SITE_GOES_HERE}/apps/email/index.jsp?e=239323752379240323772273237523772383237723832309238123792273238724032417n=scriptalert(XSS);/scriptfull-disclosure@lists.grok.org.uk


for SITE_GOES_HERE, try: www.artshigh.org, or any site at
http://www.edlio.com/portfolio/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/