Re: [Full-disclosure] New Source Code Vulnerability Scanner (Free 30 Day Trial)

2010-12-04 Thread netinfinity
I was thinking about another way to possible bypass this code.

POC:

grep -fruit

will trick the system into thinking it is a fruit thus crashing because of
stackoverflow and juice overflow.



On Sat, Dec 4, 2010 at 12:32 PM, Georgi Guninski gunin...@guninski.comwrote:


 On Fri, Dec 03, 2010 at 01:46:56AM -0800, Michal Zalewski wrote:
   grep -r ACIDBITCHES *
 
  This code has two very obvious detection bypass vulnerabilities:
 
  1) It fails to scan dotfiles in the starting directory,
 
  2) It can be tricked into not producing any output by creating a file
  named -q in the starting dir.
 
  Let me fire up my vulnerability research whitepaper generator.
 
  /mz
 

 implementation issues aside, are the theoretic foundations of the scanner
 correct?

 some points.

 1. analyzing the grep(1) codebase. what if grep has anti-scanning backdoor
 - like a compiler backdoor?

 2. the scanner reproducibly reports backdoors in /dev/urandom - it is
 even not an .EXE!

 --
 joro

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
www.google.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New Source Code Vulnerability Scanner (Free 30 Day Trial)

2010-12-02 Thread netinfinity
How much is the commercial version?

I'd like to buy it for my hosting company.

On Thu, Dec 2, 2010 at 7:18 PM, vulns...@hushmail.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Esteemed members of the Full Disclosure mailing list,

 In the wake of the recent compromise of the ProFTPd distribution
 server and the subsequent root-level backdoor that was placed into
 the source[0], we are proud to announce a cutting edge source code
 scanner that will help you detect backdoors in your code. This code
 is free to use for 30 days, after which time you must pay for it.


 - - el8 Vuln Scan v.0.1 -

 #!/bin/bash

 ###
 #
 # Place this script inside the top level directory of your
 # source code repo.
 #
 # Please delete this after 30 days, or purchase a copy from our
 # online store.
 #
 # 50% of all proceeds will go to the victims that have been
 # owned by ACIDBITCHES within the past 6 years.
 #
 ###

 # main

 export PATH=/bin

 grep -r ACIDBITCHES *

 - - el8 Vuln Scan v.0.1 -


 Thank you for helping us to help you make the Internet a safer
 place.


 [0]
 http://permalink.gmane.org/gmane.comp.security.ids.snort.emerging-
 sigs/7965http://permalink.gmane.org/gmane.comp.security.ids.snort.emerging-%0Asigs/7965
 -BEGIN PGP SIGNATURE-
 Charset: UTF8
 Version: Hush 3.0
 Note: This signature can be verified at https://www.hushtools.com/verify

 wpwEAQMCAAYFAkz34wkACgkQnCf21LwRaXbdlwP/bRK2S7SA77h05jF1cdBty4hefooL
 Zx0GOeABoqTZKnaNuKxGqwdPtg7fyNctrb7iMzehzJWBXnAD1Zik2UCujZINxeE8BFhw
 yTN9gshJZB1cdWSHwxQdiB+NqS9eRqg3s0J8i/9EjzNVkgX4EJTJZMXv9oEUDCgwW92h
 7KFZMWU=
 =mJJI
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
www.google.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New Source Code Vulnerability Scanner (Free 30 Day Trial)

2010-12-02 Thread netinfinity
So due to weak implemetation of license it has a bug. I'm creating a torrent
for this scanner as we speak, and I will put it on thepritebay, so more
honest people like me can download it for free.

On Thu, Dec 2, 2010 at 9:50 PM, Jens Christian Hillerup
j...@hillerup.netwrote:

 Dropping a 0day for y'all.

 So I found a vulnerability in the license management code in this software.
 It's off the top of my head, and is presented in an untested state. It
 seems, however, that if you continue using the software *after* the free
 30-day trial it will actually continue working! This is due to a very week
 license management implementation, relying on the user agreeing to remove
 the software after having used it for a total of thirty days.

 This flaw affects all known builds of the source code posted, and stands
 currently with no workaround or hotfix. The vendor has yet to be contacted,
 but is expected to push a patch for this vuln any day now.

 -jc


 On Thu, Dec 2, 2010 at 9:30 PM, netinfinity 
 netinfinity.security...@gmail.com wrote:

 How much is the commercial version?

 I'd like to buy it for my hosting company.


 On Thu, Dec 2, 2010 at 7:18 PM, vulns...@hushmail.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Esteemed members of the Full Disclosure mailing list,

 In the wake of the recent compromise of the ProFTPd distribution
 server and the subsequent root-level backdoor that was placed into
 the source[0], we are proud to announce a cutting edge source code
 scanner that will help you detect backdoors in your code. This code
 is free to use for 30 days, after which time you must pay for it.


 - - el8 Vuln Scan v.0.1 -

 #!/bin/bash

 ###
 #
 # Place this script inside the top level directory of your
 # source code repo.
 #
 # Please delete this after 30 days, or purchase a copy from our
 # online store.
 #
 # 50% of all proceeds will go to the victims that have been
 # owned by ACIDBITCHES within the past 6 years.
 #
 ###

 # main

 export PATH=/bin

 grep -r ACIDBITCHES *

 - - el8 Vuln Scan v.0.1 -


 Thank you for helping us to help you make the Internet a safer
 place.


 [0]
 http://permalink.gmane.org/gmane.comp.security.ids.snort.emerging-
 sigs/7965http://permalink.gmane.org/gmane.comp.security.ids.snort.emerging-%0Asigs/7965
 -BEGIN PGP SIGNATURE-
 Charset: UTF8
 Version: Hush 3.0
 Note: This signature can be verified at https://www.hushtools.com/verify

 wpwEAQMCAAYFAkz34wkACgkQnCf21LwRaXbdlwP/bRK2S7SA77h05jF1cdBty4hefooL
 Zx0GOeABoqTZKnaNuKxGqwdPtg7fyNctrb7iMzehzJWBXnAD1Zik2UCujZINxeE8BFhw
 yTN9gshJZB1cdWSHwxQdiB+NqS9eRqg3s0J8i/9EjzNVkgX4EJTJZMXv9oEUDCgwW92h
 7KFZMWU=
 =mJJI
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 --
 www.google.com

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/





-- 
www.google.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] LFImap

2010-12-01 Thread netinfinity
gzip: stdin: not in gzip format
tar: Child returned status 1
tar: Error is not recoverable: exiting now


-- 
www.google.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] LFIMAP

2010-12-01 Thread netinfinity
And your archives sucks also. Please use standard ones.

On Wed, Dec 1, 2010 at 12:44 PM, Augusto Pereyra aepere...@gmail.comwrote:

 Hi i'd like to share with the community this tool developed by me.
 This tool is very usefull when you find some site with the
 vulnerability called local file include.
 This is a list of functionalities of the tool:

 Can find automatically the root of the file system.
 Detect default files outside of the web folder
 It will try detect passwords inside the files
 Support basic authentication
 Can use null byte to bypass some controls
 Write a report of the scan to a file

 The tool can be downloaded from:
 http://code.google.com/p/lfimap/downloads/list

 Please download the last version

 My English sucks, sorry
 Thanks to www.artsweb.com.ar
 Best regard
 Augusto Pereyra

 
 This list is sponsored by: Information Assurance Certification Review Board

 Prove to peers and potential employers without a doubt that you can
 actually do a proper penetration test. IACRB CPT and CEPT certs require a
 full practical examination in order to become certified.

 http://www.iacertification.org
 




-- 
www.google.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] LFIMAP

2010-12-01 Thread netinfinity
I had to use hex editor to extract test.dat and lfimap-1.4.py.




On Wed, Dec 1, 2010 at 9:07 PM, netinfinity 
netinfinity.security...@gmail.com wrote:

 And your archives sucks also. Please use standard ones.


 On Wed, Dec 1, 2010 at 12:44 PM, Augusto Pereyra aepere...@gmail.comwrote:

 Hi i'd like to share with the community this tool developed by me.
 This tool is very usefull when you find some site with the
 vulnerability called local file include.
 This is a list of functionalities of the tool:

 Can find automatically the root of the file system.
 Detect default files outside of the web folder
 It will try detect passwords inside the files
 Support basic authentication
 Can use null byte to bypass some controls
 Write a report of the scan to a file

 The tool can be downloaded from:
 http://code.google.com/p/lfimap/downloads/list

 Please download the last version

 My English sucks, sorry
 Thanks to www.artsweb.com.ar
 Best regard
 Augusto Pereyra

 
 This list is sponsored by: Information Assurance Certification Review
 Board

 Prove to peers and potential employers without a doubt that you can
 actually do a proper penetration test. IACRB CPT and CEPT certs require a
 full practical examination in order to become certified.

 http://www.iacertification.org
 




 --
 www.google.com




-- 
www.google.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Hacxx Anti Malware for Windows XP

2010-06-07 Thread netinfinity
*Hacxx Anti Malware for Windows XP blocks virus and worms using known
filenames.

To install it simply visit http:///antimalware.x10.bz and click in Run
Hacxx Anti Malware.
You must accept the ActiveX and the source is available in the site.*

I'll stick to my antivirus program :D

You really think that someone will fall to that HERE?

-- 
www.google.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [Announcement] Introducing SecurityTube Tools section!

2010-04-22 Thread netinfinity
Dear All,

We are excited to launch a brand new section - SecurityTube Tools!

http://tools.securitytube.net

SecurityTube Tools is a collaboratively edited community wiki which aims to
list all the security and hacking tools out there. We have already listed
over 280+ popular tools and need your help in building this index further
and making it useful to everyone.

Why did we start ST Tools?

Though there are a couple of sites which maintain lists of tools, we feel
the amount of information available there is limited. In most cases, it is
just a 1-2 line description.

ST Tools changes all this and aims to provide more useful information to the
reader. For every tool listed on our site, the following information is
given:

   1. Description of the Tool: Short summary of the tool's functionality
   2. Details:

*  Website :

*  Discussion Forum :

*  Mailing List :

*  Platforms :

*  License :

*  Author :

*  Contact Email :

   3. Sample Usage : Screenshot or Text dump of the tool's usage or help
pages
   4. Tutorials and Video Demos : Links to Text and Video tutorials
   5. Supporting Links : Links to documentation
   6. Books : Links to books if applicable

We have already populated most of this information for over 280+ tools. A
sample tool's page would look like this: Nmap Tool Page

How can you help us?

You can help us by adding your tool if you are an author, or by adding
other's tools if you use and like them. If you would like to add a tool,
please read the Submission Process page first. Also, a lot of details for
existing tools might be missing. We would request you to help us correct
them.

-- 
http://netinfinity-sec.blogspot.com

http://www.netinfinity.org
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [Announcement] Introducing SecurityTube Toolssection!

2010-04-22 Thread netinfinity
You have the OS listing. Unix, Linux, Win etc in details section.

-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Free Security Video Tutorials for beginners

2010-04-10 Thread netinfinity
There is a Security Videos site already:

http://securitytube.net

*
SecurityTube is the YouTube of hacking and security. We receive a crowd of
around 200,000 security professionals , hackers and students per month on
our site. SecurityTube provides them a platform to share
information and to learn from each other, using videos.*


-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Introducing SecurityTube Questions!

2010-03-31 Thread netinfinity
On Thu, Mar 18, 2010 at 10:18 AM, netinfinity 
netinfinity.security...@gmail.com wrote:

 SecurityTube http://www.securitytube.net/ is excited to launch a new
 section - SecurityTube Questions! http://questions.securitytube.net/

 SecurityTube Questions http://questions.securitytube.net/ is modeled
 after StackOverflow and is aimed at helping hackers, infosec professionals,
 enthusiasts and students solve security related problems.

 Note that SecurityTube Questions http://questions.securitytube.net/ is
 not a forum where members discuss security news, post links etc. It is
 instead a questions and answers site, where members with specific technical
 queries in the information security field are seeking answers. Members are
 expected to ask and answer to the point!

 To make it more interesting, expert members who ask good questions and
 provide valuable answers get ranked and receive badges and points. Another
 interesting feature, is that all questions are tagged to make searching and
 posting follow up questions very easy! There are tons of other features
 which you will love once you start using the site!

 So, without further ado, please visit http://questions.securitytube.net !
 and start asking questions and giving answers!!

 Regards,

 SecurityTube Team


 --
 http://netinfinity-sec.blogspot.com

 http://www.ubuntu-pe.tk




-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Introducing SecurityTube Questions!

2010-03-31 Thread netinfinity
SecurityTube Questions http://questions.securitytube.net/ is modeled after
StackOverflow and is aimed at helping hackers, infosec professionals,
enthusiasts and students solve security related problems.

Note that SecurityTube Questions http://questions.securitytube.net/ is not
a forum where members discuss security news, post links etc. It is instead
a questions and answers site, where members with specific technical queries
in the information security field are seeking answers. Members are expected
to ask and answer to the point!

To make it more interesting, expert members who ask good questions and
provide valuable answers get ranked and receive badges and points. Another
interesting feature, is that all questions are tagged to make searching and
posting follow up questions very easy! There are tons of other features
which you will love once you start using the site!

So, without further ado, please visit http://questions.securitytube.net !
and start asking questions and giving answers!!

Regards,

SecurityTube Team

On Wed, Mar 31, 2010 at 5:50 PM, netinfinity 
netinfinity.security...@gmail.com wrote:



 On Thu, Mar 18, 2010 at 10:18 AM, netinfinity 
 netinfinity.security...@gmail.com wrote:

 SecurityTube http://www.securitytube.net/ is excited to launch a new
 section - SecurityTube Questions! http://questions.securitytube.net/

 SecurityTube Questions http://questions.securitytube.net/ is modeled
 after StackOverflow and is aimed at helping hackers, infosec professionals,
 enthusiasts and students solve security related problems.

 Note that SecurityTube Questions http://questions.securitytube.net/ is
 not a forum where members discuss security news, post links etc. It is
 instead a questions and answers site, where members with specific technical
 queries in the information security field are seeking answers. Members are
 expected to ask and answer to the point!

 To make it more interesting, expert members who ask good questions and
 provide valuable answers get ranked and receive badges and points. Another
 interesting feature, is that all questions are tagged to make searching and
 posting follow up questions very easy! There are tons of other features
 which you will love once you start using the site!

 So, without further ado, please visit http://questions.securitytube.net !
 and start asking questions and giving answers!!

 Regards,

 SecurityTube Team


 --
 http://netinfinity-sec.blogspot.com

 http://www.ubuntu-pe.tk




 --
 http://netinfinity-sec.blogspot.com

 http://www.ubuntu-pe.tk




-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Security system

2010-03-30 Thread netinfinity
How about having a box that runs 24/7, then you can conect the intrusion
system to it. Write a program that will detect intrusion and send you a sms
or call you via internet?

-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Introducing SecurityTube Questions!

2010-03-18 Thread netinfinity
SecurityTube http://www.securitytube.net/ is excited to launch a new
section - SecurityTube Questions! http://questions.securitytube.net/

SecurityTube Questions http://questions.securitytube.net/ is modeled after
StackOverflow and is aimed at helping hackers, infosec professionals,
enthusiasts and students solve security related problems.

Note that SecurityTube Questions http://questions.securitytube.net/ is not
a forum where members discuss security news, post links etc. It is instead
a questions and answers site, where members with specific technical queries
in the information security field are seeking answers. Members are expected
to ask and answer to the point!

To make it more interesting, expert members who ask good questions and
provide valuable answers get ranked and receive badges and points. Another
interesting feature, is that all questions are tagged to make searching and
posting follow up questions very easy! There are tons of other features
which you will love once you start using the site!

So, without further ado, please visit http://questions.securitytube.net !
and start asking questions and giving answers!!

Regards,

SecurityTube Team


-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SecurityFocus to partially shut down

2010-03-17 Thread netinfinity
Let's face the fact that twitter or facebook or whatever facesomething will
never replace mailing lists, and good
security oriented webpages. There you have over a 90% of traffic being
useless. And the wall posting system can not
replace a mail because an information get's lost very fast.

On the other side twitter can be usefull for posting a short information
(exploit, papers, events etc) or a link (webpage, downloads etc).

-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] SecurityFocus to partially shut down

2010-03-12 Thread netinfinity
*Since its inception in 1999, SecurityFocus has been a mainstay in the
security community. From original news content to detailed technical papers
and guest columnists, we’ve strived to be the community’s source for all
things security related. SecurityFocus was formed with the idea that the
community needed a place to come together and share its collected wisdom and
knowledge. *
* At the time, the security community was fairly fragmented with mainstream
security information in its infancy. If you worked in security, it was
difficult and frustrating to find the information you were looking for
because it was scattered across a small number of mailing lists, sites and
publications. There was no single place where a community of security
professionals could go to get the information they needed and there was a
unique opportunity to build a community portal that would provide its users
with a destination and voice*

http://www.securityfocus.com/news/11582


-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Multiple vulnerabilities in SUPERAntiSpyware and Super Ad Blocker

2010-03-11 Thread netinfinity
*I am really sorry and appologize for using lame file uploading sites,
but I don't own a domain:( I tried to attach ZIP archive, but it seems
it's being filtered*


Use tar.gz not zip. Or .rar could also work.

-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] I am furious.

2010-03-01 Thread netinfinity
 *I have 26 0days and can hack anything if
the price is right. And I sell them to the bad guys, for the lulz.
I think being disloyal and a hypocrite is hilarious.

I am a consummate civil servant, if I do say so myself.
*

You are a funny troll. I like your posts :)

-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] anybody know good service for cracking md5?

2010-02-04 Thread netinfinity
Pyrit uses CUDA.

On Thu, Feb 4, 2010 at 1:11 PM, Sergio Pelissari 
sergio.peliss...@proteus-security.com wrote:

 You can try gpu brute-force, where the c/s is bigger than a normal
 quad-core processor.

 But you can't use wordlist because isnt make sense compared with c/s you
 try to break a hashe using something like incremental way on JTR.

 Actually BT4 comes with a md5_gpu_crack you need a VGA support with CUDA
 or the ATI technology ( i don't remember the name right now )

 On Thu, 2010-02-04 at 12:59 +0100, Christian Sciberras wrote:
  Uh, in the sense that they are finally becoming actually useful...
 
 
 
 
 
  On Thu, Feb 4, 2010 at 12:58 PM, Anders Klixbull a...@experian.dk
  wrote:
  seems to be cropping in?
  as far as know rainbow tables has been around for years...
 
 
 
 
 
  __
  From: full-disclosure-boun...@lists.grok.org.uk
  [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf
  Of Christian Sciberras
  Sent: 3. februar 2010 23:02
  To: valdis.kletni...@vt.edu
  Cc: full-disclosure@lists.grok.org.uk
  Subject: Re: [Full-disclosure] anybody know good service for
  cracking md5?
 
 
 
 
  Actually dictionary attacks seem to work quite well,
  especially for common users which typically use dictionary
  and/or well known passwords (such as the infamous password).
  Another idea which seems to be cropping in, is the use of hash
  tables with a list of known passwords rather then dictionary
  approach.
  Personally, the hash table one is quite successful, consider
  that it targets password groups rather than a load of wild
  guesses.
 
  Cheers.
 
 
 
 
  On Wed, Feb 3, 2010 at 10:26 PM, valdis.kletni...@vt.edu
  wrote:
  On Wed, 03 Feb 2010 23:42:07 +0300, Alex said:
 
   i find some sites which says that they can brute md5
  hashes and WPA dumps
   for 1 or 2 days.
 
 
  Given enough hardware and a specified md5 hash, one
  could at least
  hypothetically find an input text that generated that
  hash.  However, that
  may or may not be as useful as one thinks, as you
  wouldn't have control over
  what the text actually *was*.  It would suck if you
  were trying to crack
  a password, and got the one that was only 14 binary
  bytes long rather than
  the one that was 45 printable characters long. ;)
 
  Having said that, it would take one heck of a botnet
  to brute-force an MD5 has
  in 1 or 2 days. Given 1 billion keys/second, a true
  brute force of MD5 would
  take on the order of 10**22 years.  If all 140 million
  zombied computers on the
  internet were trying 1 billion keys per second, that
  drops it down to 10**16
  years or so - or about 10,000 times the universe has
  been around already.
 
  I suspect they're actually doing a dictionary attack,
  which has a good chance
  of succeeding in a day or two.
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter:
  http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] anybody know good service for cracking md5? 6A9-4CD

2010-02-04 Thread netinfinity
And why are my reply's spam???



On Thu, Feb 4, 2010 at 1:47 PM, netinfinity 
netinfinity.security...@gmail.com wrote:

 Pyrit uses CUDA.


 On Thu, Feb 4, 2010 at 1:11 PM, Sergio Pelissari 
 sergio.peliss...@proteus-security.com wrote:

 You can try gpu brute-force, where the c/s is bigger than a normal
 quad-core processor.

 But you can't use wordlist because isnt make sense compared with c/s you
 try to break a hashe using something like incremental way on JTR.

 Actually BT4 comes with a md5_gpu_crack you need a VGA support with CUDA
 or the ATI technology ( i don't remember the name right now )

 On Thu, 2010-02-04 at 12:59 +0100, Christian Sciberras wrote:
  Uh, in the sense that they are finally becoming actually useful...
 
 
 
 
 
  On Thu, Feb 4, 2010 at 12:58 PM, Anders Klixbull a...@experian.dk
  wrote:
  seems to be cropping in?
  as far as know rainbow tables has been around for years...
 
 
 
 
 
  __
  From: full-disclosure-boun...@lists.grok.org.uk
  [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf
  Of Christian Sciberras
  Sent: 3. februar 2010 23:02
  To: valdis.kletni...@vt.edu
  Cc: full-disclosure@lists.grok.org.uk
  Subject: Re: [Full-disclosure] anybody know good service for
  cracking md5?
 
 
 
 
  Actually dictionary attacks seem to work quite well,
  especially for common users which typically use dictionary
  and/or well known passwords (such as the infamous password).
  Another idea which seems to be cropping in, is the use of hash
  tables with a list of known passwords rather then dictionary
  approach.
  Personally, the hash table one is quite successful, consider
  that it targets password groups rather than a load of wild
  guesses.
 
  Cheers.
 
 
 
 
  On Wed, Feb 3, 2010 at 10:26 PM, valdis.kletni...@vt.edu
  wrote:
  On Wed, 03 Feb 2010 23:42:07 +0300, Alex said:
 
   i find some sites which says that they can brute md5
  hashes and WPA dumps
   for 1 or 2 days.
 
 
  Given enough hardware and a specified md5 hash, one
  could at least
  hypothetically find an input text that generated that
  hash.  However, that
  may or may not be as useful as one thinks, as you
  wouldn't have control over
  what the text actually *was*.  It would suck if you
  were trying to crack
  a password, and got the one that was only 14 binary
  bytes long rather than
  the one that was 45 printable characters long. ;)
 
  Having said that, it would take one heck of a botnet
  to brute-force an MD5 has
  in 1 or 2 days. Given 1 billion keys/second, a true
  brute force of MD5 would
  take on the order of 10**22 years.  If all 140 million
  zombied computers on the
  internet were trying 1 billion keys per second, that
  drops it down to 10**16
  years or so - or about 10,000 times the universe has
  been around already.
 
  I suspect they're actually doing a dictionary attack,
  which has a good chance
  of succeeding in a day or two.
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter:
  http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 --
 http://netinfinity-sec.blogspot.com

 http://www.ubuntu-pe.tk




-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] PHC is _NOT_ DEAD !!!!

2010-01-21 Thread netinfinity
peep who cares :D

On Thu, Jan 21, 2010 at 5:20 PM, Christian Sciberras uuf6...@gmail.com wrote:
 Vote +1 for message of the month award.





 On Thu, Jan 21, 2010 at 2:22 PM, p...@hushmail.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 peep game nigga, peep game, feel us !



 - --Phrack High Council
 -BEGIN PGP SIGNATURE-
 Charset: UTF8
 Note: This signature can be verified at https://www.hushtools.com/verify
 Version: Hush 3.0

 wpwEAQMCAAYFAktYVRAACgkQPBffzoCVnANW3QP9EMxg0GLjH2DfaH7sAsH/0UsrBQz+
 yo+ob4Qy8hF373vHTy0GjTxLYPPYuT58xUEwdzO/vnHNJlGkWjbCucnJiQj3hAdXZ/R/
 fYQP1Kg978//PDBMyTUBRCwIafjELdhHgUl3a7nR7dlRsu8hRx6ebHncw0+HmfW95uhY
 VpjBPQ4=
 =AsaL
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] FREE STEPHEN WATT !!!

2010-01-21 Thread netinfinity
FREE WILLY!

On Thu, Jan 21, 2010 at 10:39 PM, Christian Sciberras uuf6...@gmail.com wrote:
 I think throwing and fuck you in a mailing list pretty much affects
 all

 Just sayin'

 Cheers.





 On Thu, Jan 21, 2010 at 8:33 PM, Thor (Hammer of God) t...@hammerofgod.com
 wrote:

 Well, if you are going to say “Fuck Kaminsky,” then throw me in with him.
  I’ll be at Defcon for anyone who would like to say it to my face.



 t



 From: full-disclosure-boun...@lists.grok.org.uk
 [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Jeff
 Williams
 Sent: Thursday, January 21, 2010 10:12 AM
 To: p...@hushmail.com; full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] FREE STEPHEN WATT !!!



 You just forgot kaminsky,

 2010/1/21 p...@hushmail.com

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Fuck Gadi Evron, Fuck #phr...@efnet, Fuck anti-sec.com kiddiotz,
 Fuck romeo, Fuck Fedz, Fuck Ratz and Fuck U 


 FREE STEPHEN WATT !!!
 -BEGIN PGP SIGNATURE-
 Charset: UTF8
 Version: Hush 3.0
 Note: This signature can be verified at https://www.hushtools.com/verify

 wpwEAQMCAAYFAktYi4gACgkQPBffzoCVnAMzwAP+JyFb0s/aVmr2bGbzLxll2+h956B0
 4IVuQiuFnEHgC6U8KnRVa36RdhIDsNZLQe9SoDvzYEfMZEvBF/Y71f8VyGC+133Uh9Be
 OVkAjRnkHKYBsmk1PGCbZ+5VdAtDl2K8Ke0EEmkyeIU//+VijDwx6JkyIn6H2KTQ9CzC
 ZgWJoJo=
 =ftdb
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] FREE STEPHEN WATT !!!

2010-01-21 Thread netinfinity
Free nepal?

On Thu, Jan 21, 2010 at 10:46 PM, Christian Sciberras uuf6...@gmail.com wrote:
 JAIL OSAMA?

 ...




 On Thu, Jan 21, 2010 at 10:45 PM, netinfinity
 netinfinity.security...@gmail.com wrote:

 FREE WILLY!

 On Thu, Jan 21, 2010 at 10:39 PM, Christian Sciberras uuf6...@gmail.com
 wrote:
  I think throwing and fuck you in a mailing list pretty much affects
  all
 
  Just sayin'
 
  Cheers.
 
 
 
 
 
  On Thu, Jan 21, 2010 at 8:33 PM, Thor (Hammer of God)
  t...@hammerofgod.com
  wrote:
 
  Well, if you are going to say “Fuck Kaminsky,” then throw me in with
  him.
   I’ll be at Defcon for anyone who would like to say it to my face.
 
 
 
  t
 
 
 
  From: full-disclosure-boun...@lists.grok.org.uk
  [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Jeff
  Williams
  Sent: Thursday, January 21, 2010 10:12 AM
  To: p...@hushmail.com; full-disclosure@lists.grok.org.uk
  Subject: Re: [Full-disclosure] FREE STEPHEN WATT !!!
 
 
 
  You just forgot kaminsky,
 
  2010/1/21 p...@hushmail.com
 
  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA1
 
  Fuck Gadi Evron, Fuck #phr...@efnet, Fuck anti-sec.com kiddiotz,
  Fuck romeo, Fuck Fedz, Fuck Ratz and Fuck U 
 
 
  FREE STEPHEN WATT !!!
  -BEGIN PGP SIGNATURE-
  Charset: UTF8
  Version: Hush 3.0
  Note: This signature can be verified at
  https://www.hushtools.com/verify
 
  wpwEAQMCAAYFAktYi4gACgkQPBffzoCVnAMzwAP+JyFb0s/aVmr2bGbzLxll2+h956B0
  4IVuQiuFnEHgC6U8KnRVa36RdhIDsNZLQe9SoDvzYEfMZEvBF/Y71f8VyGC+133Uh9Be
  OVkAjRnkHKYBsmk1PGCbZ+5VdAtDl2K8Ke0EEmkyeIU//+VijDwx6JkyIn6H2KTQ9CzC
  ZgWJoJo=
  =ftdb
  -END PGP SIGNATURE-
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 



 --
 http://netinfinity-sec.blogspot.com

 http://www.ubuntu-pe.tk

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/





-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] FREE STEPHEN WATT !!!

2010-01-21 Thread netinfinity
A country. And I meant Tibet. :D

Obvious I need to get some sleep...

On Thu, Jan 21, 2010 at 10:51 PM, Christian Sciberras uuf6...@gmail.com wrote:
 Nepal? Who's Nepal?





 On Thu, Jan 21, 2010 at 10:48 PM, netinfinity
 netinfinity.security...@gmail.com wrote:

 Free nepal?

 On Thu, Jan 21, 2010 at 10:46 PM, Christian Sciberras uuf6...@gmail.com
 wrote:
  JAIL OSAMA?
 
  ...
 
 
 
 
  On Thu, Jan 21, 2010 at 10:45 PM, netinfinity
  netinfinity.security...@gmail.com wrote:
 
  FREE WILLY!
 
  On Thu, Jan 21, 2010 at 10:39 PM, Christian Sciberras
  uuf6...@gmail.com
  wrote:
   I think throwing and fuck you in a mailing list pretty much affects
   all
  
   Just sayin'
  
   Cheers.
  
  
  
  
  
   On Thu, Jan 21, 2010 at 8:33 PM, Thor (Hammer of God)
   t...@hammerofgod.com
   wrote:
  
   Well, if you are going to say “Fuck Kaminsky,” then throw me in with
   him.
    I’ll be at Defcon for anyone who would like to say it to my face.
  
  
  
   t
  
  
  
   From: full-disclosure-boun...@lists.grok.org.uk
   [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Jeff
   Williams
   Sent: Thursday, January 21, 2010 10:12 AM
   To: p...@hushmail.com; full-disclosure@lists.grok.org.uk
   Subject: Re: [Full-disclosure] FREE STEPHEN WATT !!!
  
  
  
   You just forgot kaminsky,
  
   2010/1/21 p...@hushmail.com
  
   -BEGIN PGP SIGNED MESSAGE-
   Hash: SHA1
  
   Fuck Gadi Evron, Fuck #phr...@efnet, Fuck anti-sec.com kiddiotz,
   Fuck romeo, Fuck Fedz, Fuck Ratz and Fuck U 
  
  
   FREE STEPHEN WATT !!!
   -BEGIN PGP SIGNATURE-
   Charset: UTF8
   Version: Hush 3.0
   Note: This signature can be verified at
   https://www.hushtools.com/verify
  
   wpwEAQMCAAYFAktYi4gACgkQPBffzoCVnAMzwAP+JyFb0s/aVmr2bGbzLxll2+h956B0
   4IVuQiuFnEHgC6U8KnRVa36RdhIDsNZLQe9SoDvzYEfMZEvBF/Y71f8VyGC+133Uh9Be
   OVkAjRnkHKYBsmk1PGCbZ+5VdAtDl2K8Ke0EEmkyeIU//+VijDwx6JkyIn6H2KTQ9CzC
   ZgWJoJo=
   =ftdb
   -END PGP SIGNATURE-
  
   ___
   Full-Disclosure - We believe in it.
   Charter: http://lists.grok.org.uk/full-disclosure-charter.html
   Hosted and sponsored by Secunia - http://secunia.com/
  
  
  
   ___
   Full-Disclosure - We believe in it.
   Charter: http://lists.grok.org.uk/full-disclosure-charter.html
   Hosted and sponsored by Secunia - http://secunia.com/
  
  
   ___
   Full-Disclosure - We believe in it.
   Charter: http://lists.grok.org.uk/full-disclosure-charter.html
   Hosted and sponsored by Secunia - http://secunia.com/
  
 
 
 
  --
  http://netinfinity-sec.blogspot.com
 
  http://www.ubuntu-pe.tk
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 



 --
 http://netinfinity-sec.blogspot.com

 http://www.ubuntu-pe.tk

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/





-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] FREE STEPHEN WATT !!!

2010-01-21 Thread netinfinity
That is not a bad idea :D

On Thu, Jan 21, 2010 at 10:55 PM, Christian Sciberras uuf6...@gmail.com wrote:
 Who cares about Tibet.

 Free beer and coffee! That's what we need!!





 On Thu, Jan 21, 2010 at 10:53 PM, netinfinity
 netinfinity.security...@gmail.com wrote:

 A country. And I meant Tibet. :D

 Obvious I need to get some sleep...

 On Thu, Jan 21, 2010 at 10:51 PM, Christian Sciberras uuf6...@gmail.com
 wrote:
  Nepal? Who's Nepal?
 
 
 
 
 
  On Thu, Jan 21, 2010 at 10:48 PM, netinfinity
  netinfinity.security...@gmail.com wrote:
 
  Free nepal?
 
  On Thu, Jan 21, 2010 at 10:46 PM, Christian Sciberras
  uuf6...@gmail.com
  wrote:
   JAIL OSAMA?
  
   ...
  
  
  
  
   On Thu, Jan 21, 2010 at 10:45 PM, netinfinity
   netinfinity.security...@gmail.com wrote:
  
   FREE WILLY!
  
   On Thu, Jan 21, 2010 at 10:39 PM, Christian Sciberras
   uuf6...@gmail.com
   wrote:
I think throwing and fuck you in a mailing list pretty much
affects
all
   
Just sayin'
   
Cheers.
   
   
   
   
   
On Thu, Jan 21, 2010 at 8:33 PM, Thor (Hammer of God)
t...@hammerofgod.com
wrote:
   
Well, if you are going to say “Fuck Kaminsky,” then throw me in
with
him.
 I’ll be at Defcon for anyone who would like to say it to my
face.
   
   
   
t
   
   
   
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of
Jeff
Williams
Sent: Thursday, January 21, 2010 10:12 AM
To: p...@hushmail.com; full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] FREE STEPHEN WATT !!!
   
   
   
You just forgot kaminsky,
   
2010/1/21 p...@hushmail.com
   
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
   
Fuck Gadi Evron, Fuck #phr...@efnet, Fuck anti-sec.com kiddiotz,
Fuck romeo, Fuck Fedz, Fuck Ratz and Fuck U 
   
   
FREE STEPHEN WATT !!!
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at
https://www.hushtools.com/verify
   
   
wpwEAQMCAAYFAktYi4gACgkQPBffzoCVnAMzwAP+JyFb0s/aVmr2bGbzLxll2+h956B0
   
4IVuQiuFnEHgC6U8KnRVa36RdhIDsNZLQe9SoDvzYEfMZEvBF/Y71f8VyGC+133Uh9Be
   
OVkAjRnkHKYBsmk1PGCbZ+5VdAtDl2K8Ke0EEmkyeIU//+VijDwx6JkyIn6H2KTQ9CzC
ZgWJoJo=
=ftdb
-END PGP SIGNATURE-
   
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
   
   
   
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
   
   
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
   
  
  
  
   --
   http://netinfinity-sec.blogspot.com
  
   http://www.ubuntu-pe.tk
  
   ___
   Full-Disclosure - We believe in it.
   Charter: http://lists.grok.org.uk/full-disclosure-charter.html
   Hosted and sponsored by Secunia - http://secunia.com/
  
  
 
 
 
  --
  http://netinfinity-sec.blogspot.com
 
  http://www.ubuntu-pe.tk
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 



 --
 http://netinfinity-sec.blogspot.com

 http://www.ubuntu-pe.tk

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/





-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google today

2010-01-16 Thread netinfinity
I know they are changing the look, but this is wierd. Maybe they are
changing something or maybe the server is gone crazy :D

On Fri, Jan 15, 2010 at 8:20 PM, Thor (Hammer of God)
t...@hammerofgod.com wrote:
 I know google likes to do clever Today themes, but what's this one supposed 
 to mean? :D


 
 Timothy (Thor) Mullen
 t...@hammerofgod.com
 www.hammerofgod.com




 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
http://netinfinity-sec.blogspot.com

http://www.ubuntu-pe.tk

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] iiScan - Full-function web application securityscanning platform for free

2010-01-06 Thread netinfinity
This invitation code thing sucks. Why don't you open the registration?

I don't understand this way of promoting yourself. It's not that
you're google :D

On Wed, Jan 6, 2010 at 11:34 AM, list l...@iiscan.com wrote:
 Hello everybody,

 We are pleased  that many people are interesting in iiScan. Here are some
 invitation codes for testing .
 BTW,after activte your account ,you will get FIVE invitation codes from
 system, please share them with your friends or other guys.

 invitation codes :

 a992c2531466432a
 43e31d117b9d0b8f
 1ffdd9dd81102c97
 b2280f3ca4fe446b
 c5ea0eb6af453b2f
 d01c2300a5d92249
 64862bff458f0e2f
 64c5982ba2acd838
 bf1ffd671e970d0b
 365cd20b5b8e9f15
 cc481ed046dbc93a
 62d619eb6a37b4e6

 l...@iiscan.com



 2010-01-06
 
 list
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
netinfinity

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Antisec for lulz - exposed (anti-sec.com)

2010-01-04 Thread netinfinity
I couldn't agree more with Adriel.

-- 
netinfinity

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] google dork you may enjoy

2009-12-10 Thread netinfinity
Very interesting. Found a lot of stuff, from mastercard passwords
(encrypted of course) to family pictures :)

-- 
netinfinity

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft: ‘Piracy no long er poses a threat to us’

2009-12-03 Thread netinfinity
Yeah right. What a cheap psychology.. If you have cracked win 7, then
your bank accounts can be stolen - So buy the original



-- 
netinfinity

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Facebook Police

2009-11-27 Thread netinfinity
 Facebook policy requires the use of one’s real name to sign up, but
they let the police use fake names..

Sure the policy says that but a lot of people are changing their names
on a daily basis (ok maybe not daily). And majority of those changes
are
just for fun, but never the less they are against the policy. What
about those people? Only way to verify or check someone's name is
through IP (ISP). And that can't be done
by will.. It must have some legal grounds...

Let me get to the point, I'm sure that police is violating some some
kind of human rights or even law's (?)

-- 
netinfinity

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.

2009-11-19 Thread netinfinity
Mr.  Kurt Greenbaum made a mistake. Privacy violated, because there
are other mechanism's like baninig the IP, email or whatever is
necessary to submit the post. If this fails then you should conntact
the ISP of the spammer based on the IP.

-- 
netinfinity

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/