Re: [Full-disclosure] Nokia N95 cellphone remote DoS using the SIP Stack

2007-12-05 Thread reepex
On Dec 5, 2007 11:05 AM, Radu State [EMAIL PROTECTED] wrote:

 # Humberto J. Abdelnur (Ph.D Student) #

 # Radu State (Ph.D) #

 # Olivier Festor (Ph.D) #

lol..

wow is all i can say to this..

let me enlighten you on the basics of Perl


 $text = '';


http://perldoc.perl.org/functions/my.html

if you understood  perl you would see that this line shows your complete
lack of ability as $text could be declared as its used in the loop

to demonstrate such amazing techniques such as declaring variables properly
i will demonstrate this code

die ($!) unless open  my $file,'',/etc/passwd;
my @b = $file;

while(my $a = shift @b){
print $a;
}

notice the my $a ... please take a few minutes to reflect on  this code as
your fragile phd minds can only handle so much but soon it will come to you


 while (not $text =~ /^SIP\/2.0 100(.\r\n)*/ ){

from perlretut ( http://perldoc.perl.org/perlretut.html )

The sense of the match can be reversed by using !~ operator:

print http://perldoc.perl.org/functions/print.html It doesn't
match\n if Hello World !~ /World/;

Understanding that you do not know how to code i will make it easier for
you:

 while ($text !~ /^SIP\/2.0 100(.\r\n)*/ ){
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Nokia N95 cellphone remote DoS using the SIP Stack

2007-12-05 Thread reepex
http://hal.inria.fr/index.php?view_this_doc=inria-00172056extended_view=1version=halsid=5561bd637e62791f1744a158d907343a

Could you please send me this document so i can learn from you how to nmap?
I would very much appreciate reading this paper so I can learn the basics of
a high level pen test.

http://hal.inria.fr/inria-00168415/fr/

I would also love this paper. Based on the times you mention the word
model and proven it seems your product must be better  then selinux
itself.

The rest of your papers were modeled around mobile ad-hoc networks and key
managment in blah blah which are areas generally reserved for academics who
cannot publish anything useful so it seems appropriate that the bulk of your
publications are in this field.




On Dec 5, 2007 1:57 PM, [EMAIL PROTECTED] wrote:

 hi Reepex,

 I do not understand why are frustrated about a computer science degree.
 Maybe,
 someone got dropped out of a degree programm and some psychological trauma
 gets
  activated when seeing a Ph.D?

 If you like it or not, in order to get a computer science degree, you will
 have
 to take classes, and  most classes are taught by Ph.Ds.

 I will not argue with you on why I use the Ph.D in my signature, but if
 you
 really want to know, look at our research papers published in academic
 journals/conferences. (If you do not find them, I can send them to you).
 If you will ever understand the contents, then you will understand what
 are our
 credentials..:) This will probably never happen.

 At least, I use a signature and a real name and do not hide behind a gmail
 account.

 Meanwhile try yourself to find at least one vulnerability and enjoy Perl
 programming, it seemes your computer science skills are somehow in this
 area :)


 Greetings




 RS


 Selon reepex [EMAIL PROTECTED]:

  So almighty Phd what is your thesis exactly?
 
  To me it seems to be  'how to run a fuzzer then write crappy perl
  scripts
  to exploit DoS conditions'
 
  does this properly summarize your phd credentials?
 
  I guess  you could tack on 'after writing the crappy scripts, flood
 mailing
  lists with our crap, and get made fun of'
 
  I am sure you will serve the academic community great one day when teach
  hacking classes revolving around the latest editions of hacking
 exposed
 
 
 
  On Dec 5, 2007 11:05 AM, Radu State [EMAIL PROTECTED] wrote:
 
Nokia N95 cellphone remote DoS using the SIP Stack
  
  
  
   Severity:
  
   High – Denial of Service
  
  
  
   Hardware:
  
   Nokia N95
  
  
  
   Firmware:
  
   Tested version: Nokia RM-159 V 12.0.013
  
  
  
   Notification:
  
   Vulnerability found: 11 September 2007
  
   Contact Nokia Support: 12 September 2007 / None reply Contact Nokia
   Security Support: 19 September 2007 / None reply
  
  
  
   Vulnerability Synopsis:
  
   If the device has the SIP Phone client activated, a sequence of SIP
   messages turn the device in an inconsistent state where the user is
 not
  able
   to operate it anymore until it reboots.
  
  
  
   The sequence of messages consists in 2 different SIP Dialogs where the
   first initiates an INVITE transaction but immediately closes it (in an
   anticipated manner). While, the second transaction initiates a normal
  INVITE
   transaction that trigger the vulnerability of the target.
  
  
  
   The sequence of messages is illustrated below.
  
  
  
   X - INVITE --- Nokiav12
  
   X -- 100 Trying -- Nokiav12
  
   X - CANCEL --- Nokiav12
  
   X - OK (to the Cancel) --- Nokiav12
  
X  487 Request Terminated  Nokiav12
  
  
  
   New Dialog
  
  
  
   X - INVITE --- Nokiav12
  
   X -- 100 Trying -- Nokiav12
  
   X -- 180 Trying -- Nokiav12
  
  
  
    The device does not work properly anymore 
  
  
  
   Impact:
  
   A remote entity can take down all the services of the cell phone
  
  
  
   Resolution:
  
   As we did not get any proper reply from Nokia about the subject, the
 best
   way will be to disable the SIP Client
  
  
  
   Credits:
  
   Humberto J. Abdelnur (Ph.D Student)
  
   Radu State (Ph.D)
  
   Olivier Festor (Ph.D)
  
  
  
   This vulnerability was identified by the Madynes research team at
 INRIA
   Lorraine, using KiF the Madynes VoIP fuzzer.
  
   http://madynes.loria.fr/
  
  
  
  
  
   Proof of Concept:
  
  
  
   A perl script (nokiav12.pl) is attached to this mail. Before launching
  
   it, the SIP phone has to be initialed in the target device
  
  
  
   Command:
  
   perl nokiav12.pl dst_IP username SourceIp SourceUsername
  
  
  
   Eg. perl nokiav12.pl 192.168.1.119 lupilu 192.168.1.2 tucu
  
  
  
  
  
   #!/usr/bin/perl

Re: [Full-disclosure] High Value Target Selection

2007-12-03 Thread reepex
you should destroy myspace.com

after the downfall of and removal of myspace, many emo kids and future
teenage moms will commit sucide saving the world from future jerry springer
episodes and adding to the list of an heroes

On 11/30/07, gmaggro [EMAIL PROTECTED] wrote:

 I think it'd be interesting if we started a discussion on the selection
 of high value targets to be used in the staging of attacks that damage
 significant infrastructure. The end goals, ranked equal in importance,
 would be as follows:

 1. To bring like minded people together while operating under the
 strategy of 'leaderless resistance'
 (http://en.wikipedia.org/wiki/Leaderless_resistance)

 2. To be the 'aboveground' partner to the 'underground' scene, or at
 least serve to distract authorities from the activities of underground
 groups

 3. To see exactly what can be accomplished, and accomplish it

 4. To capture the imagination of the public

 The 'leaderless resistance' aspect of organization is going to be key.
 Plenty of technology exists for encryption and anonymity but that
 doesn't apply to people. We have to be like the Internet itself here, as
 originally intended: able to take the largest of blows and route around
 the damage automatically. We also have to be like good encryption: able
 to expose everything about our mechanism without leading to compromise.

 Capturing the imagination of the public sounds like bizspeek bullshit,
 but it's a very powerful tool - it only takes one cow to start a
 stampede. Furthermore it serves as a useful discriminator in selecting
 targets. Bringing down Facebook or Amazon might annoy people... but it
 really gets driven home when they can't pay their bills, buy food from
 supermarkets, or take the train to work.

 So, types of infrastructure to attack:

 1. Transportation
 2. Financial
 3. Telecommunications
 4. Petrochemical
 5. Manufacturing
 6. Health care
 7. Education
 8. Civilian Law Enforcement
 9. Government (Judicial, Executive, Legislative)
 10. Military

 This is just what I've thought of to date. One thing we'll need to do is
 prioritize that list and flesh it out. For instance, for 'Financial' I'd
 be inclined to break up something like this: banks, credit card
 companies, credit processing companies, ATM companies, credit bureaus,
 collection agencies, investment firms, etc.

 I guess we should pick some kind of a nation-state to narrow the scope.
 I'm going to propose the USA for several reasons:

 1. Alot of folks got it in for them. This makes it easier to blend into
 the background. There's also the potential for assistance via
 enemy-of-my-enemy-is-my-friend co-operation among like minded
 individuals and groups. Also, in security, the advantage always goes to
 the attacker; he only needs to be successful once but the defender has
 to suceed every time. And since they're no doubt getting assaulted left
 right and centre they've probably been tenderized pretty good. These
 factors, I believe, combine to nullify any advantage they might have
 from being well practiced at having to withstand assaults.

 2.They're weak right now. In many ways. Given the issues in the
 sub-prime market and it's cascade effects, profits are down everywhere.
 When businesses lose money, what's the first thing that suffers?
 Customer service. What's the second thing? Security. Not trying to slant
 politically one way or the other here, but the American implementation
 of capitalism is not renowned for having led to people making quality
 goods or loving their jobs. Sloppiness abounds whether it's ACLs on the
 router or easy-to-social-engineer employees. The effects of more people
 losing their jobs and increased sociocultural turmoil will only
 exacerbate this. Alot of talented people will be out a job for reason of
 economics or colour, and if engaged properly, can add to the ranks.

 3. They're easy to penetrate. If you can't walk right into the states
 over the Mexican or Canadian border, then there's a million lines of
 fibre and copper running straight in. It is an incredibly well connected
 place with a widely geographically dispersed populace. And alot of
 coffee shops near open wifi. Entire cities blanketed in connectivity
 accessible from back alleys, washrooms in malls, or remote corners of
 public parks with a 12db Yagi. Miles upon miles of SCADA wiring.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Microsoft FTP Client Multiple Bufferoverflow Vulnerability

2007-11-28 Thread reepex
so... what fuzzer that you didnt code did you use to find these amazing
vulns?

Also nice 'payload'  in your exploits meaning 'nice long lists of as'. You
should not claim code execution when your code does not perform it.

Well I guess it has been good talking until your fuzzer crashes another
application and you copy and paste the results


On 11/28/07, Rajesh Sethumadhavan [EMAIL PROTECTED] wrote:

 Microsoft FTP Client Multiple Bufferoverflow
 Vulnerability

 #

 XDisclose Advisory  : XD100096
 Vulnerability Discovered: November 20th 2007
 Advisory Reported   : November 28th 2007
 Credit  : Rajesh Sethumadhavan

 Class   : Buffer Overflow
  Denial Of Service
 Solution Status : Unpatched
 Vendor  : Microsoft Corporation
 Affected applications   : Microsoft FTP Client
 Affected Platform   : Windows 2000 server
  Windows 2000 Professional
  Windows XP
  (Other Versions may be also effected)

 #


 Overview:
 Bufferoverflow vulnerability is discovered in
 microsoft ftp client. Attackers can crash the ftp
 client of the victim user by tricking the user.


 Description:
 A remote attacker can craft packet with payload in the
 mget, ls, dir, username and password
 commands as demonstrated below. When victim execute
 POC or specially crafted packets, ftp client will
 crash possible arbitrary code execution in contest of
 logged in user. This vulnerability is hard to exploit
 since it requires social engineering and shellcode has
 to be injected as argument in vulnerable commands.

 The vulnerability is caused due to an error in the
 Windows FTP client in validating commands like mget,
 dir, user, password and ls

 Exploitation method:

 Method 1:
 -Send POC with payload to user.
 -Social engineer victim to open it.

 Method 2:
 -Attacker creates a directory with long folder or
 filename in his FTP server (should be other than IIS
 server)
 -Persuade victim to run the command mget, ls or
 dir  on specially crafted folder using microsoft ftp
 client
 -FTP client will crash and payload will get executed


 Proof Of Concept:
 http://www.xdisclose.com/poc/mget.bat.txt
 http://www.xdisclose.com/poc/username.bat.txt
 http://www.xdisclose.com/poc/directory.bat.txt
 http://www.xdisclose.com/poc/list.bat.txt

 Note: Modify POC to connect to lab FTP Server
  (As of now it will connect to
 ftp://xdisclose.com)

 Demonstration:
 Note: Demonstration leads to crashing of Microsoft FTP
 Client

 Download POC rename to .bat file and execute anyone of
 the batch file
 http://www.xdisclose.com/poc/mget.bat.txt
 http://www.xdisclose.com/poc/username.bat.txt
 http://www.xdisclose.com/poc/directory.bat.txt
 http://www.xdisclose.com/poc/list.bat.txt


 Solution:
 No Solution

 Screenshot:
 http://www.xdisclose.com/images/msftpbof.jpg


 Impact:
 Successful exploitation may allows execution of
 arbitrary code with privilege of currently logged in
 user.

 Impact of the vulnerability is system level.


 Original Advisory:
 http://www.xdisclose.com/advisory/XD100096.html

 Credits:
 Rajesh Sethumadhavan has been credited with the
 discovery of this vulnerability


 Disclaimer:
 This entire document is strictly for educational,
 testing and demonstrating purpose only. Modification
 use and/or publishing this information is entirely on
 your own risk. The exploit code/Proof Of Concept is to
 be used on test environment only. I am not liable for
 any direct or indirect damages caused as a result of
 using the information or demonstrations provided in
 any part of this advisory.




 
 Never miss a thing.  Make Yahoo your home page.
 http://www.yahoo.com/r/hs

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Microsoft FTP Client Multiple Bufferoverflow Vulnerability

2007-11-28 Thread reepex
woah woah watch your words

many people on fd make their career based on 1) and 2) so dont diss them
unless you want to start an e-war

On 11/28/07, Peter Dawson [EMAIL PROTECTED] wrote:

 Yeah ..

 a) Social engineer victim to open it.
 b) Persuade victim to run the command 

 is kind funky..

 On Nov 28, 2007 5:21 PM, Stan Bubrouski  [EMAIL PROTECTED] wrote:

  Not to mention the obvious fact that if you have to trick someone into
  running a batch file then you could probably just tell the genius to
  execute a special EXE you crafted for them.
 
  -sb
 
  On Nov 28, 2007 4:43 PM, dev code  [EMAIL PROTECTED] wrote:
  
lolerowned, kinda like the 20 other non exploitable stack overflow
   exceptions that someone else has been reporting on full disclosure
   
   Date: Wed, 28 Nov 2007 09:11:30 -0600
   From: [EMAIL PROTECTED]
   To: [EMAIL PROTECTED] ; full-disclosure@lists.grok.org.uk
   Subject: Re: [Full-disclosure] Microsoft FTP Client Multiple
  Bufferoverflow
   Vulnerability
  
  
  
   so... what fuzzer that you didnt code did you use to find these
  amazing
   vulns?
  
   Also nice 'payload'  in your exploits meaning 'nice long lists of
  as'. You
   should not claim code execution when your code does not perform it.
  
   Well I guess it has been good talking until your fuzzer crashes
  another
   application and you copy and paste the results
  
  
   On 11/28/07, Rajesh Sethumadhavan  [EMAIL PROTECTED]
  wrote:
   Microsoft FTP Client Multiple Bufferoverflow
   Vulnerability
  
   #
  
   XDisclose Advisory  : XD100096
   Vulnerability Discovered: November 20th 2007
   Advisory Reported   : November 28th 2007
   Credit  : Rajesh Sethumadhavan
  
   Class   : Buffer Overflow
Denial Of Service
   Solution Status : Unpatched
   Vendor  : Microsoft Corporation
   Affected applications   : Microsoft FTP Client
   Affected Platform   : Windows 2000 server
Windows 2000 Professional
Windows XP
(Other Versions may be also effected)
  
   #
  
  
   Overview:
   Bufferoverflow vulnerability is discovered in
   microsoft ftp client. Attackers can crash the ftp
   client of the victim user by tricking the user.
  
  
   Description:
   A remote attacker can craft packet with payload in the
   mget, ls, dir, username and password
   commands as demonstrated below. When victim execute
   POC or specially crafted packets, ftp client will
   crash possible arbitrary code execution in contest of
   logged in user. This vulnerability is hard to exploit
   since it requires social engineering and shellcode has
   to be injected as argument in vulnerable commands.
  
   The vulnerability is caused due to an error in the
   Windows FTP client in validating commands like mget,
   dir, user, password and ls
  
   Exploitation method:
  
   Method 1:
   -Send POC with payload to user.
   -Social engineer victim to open it.
  
   Method 2:
   -Attacker creates a directory with long folder or
   filename in his FTP server (should be other than IIS
   server)
   -Persuade victim to run the command mget, ls or
   dir  on specially crafted folder using microsoft ftp
   client
   -FTP client will crash and payload will get executed
  
  
   Proof Of Concept:
   http://www.xdisclose.com/poc/mget.bat.txt
http://www.xdisclose.com/poc/username.bat.txt
   http://www.xdisclose.com/poc/directory.bat.txt
   http://www.xdisclose.com/poc/list.bat.txt
  
   Note: Modify POC to connect to lab FTP Server
(As of now it will connect to
   ftp://xdisclose.com)
  
   Demonstration:
   Note: Demonstration leads to crashing of Microsoft FTP
   Client
  
   Download POC rename to .bat file and execute anyone of
   the batch file
   http://www.xdisclose.com/poc/mget.bat.txt
 http://www.xdisclose.com/poc/username.bat.txt
   http://www.xdisclose.com/poc/directory.bat.txt
   http://www.xdisclose.com/poc/list.bat.txt
  
  
   Solution:
   No Solution
  
   Screenshot:
   http://www.xdisclose.com/images/msftpbof.jpg
  
  
   Impact:
   Successful exploitation may allows execution of
   arbitrary code with privilege of currently logged in
   user.
  
   Impact of the vulnerability is system level.
  
  
   Original Advisory:
   http://www.xdisclose.com/advisory/XD100096.html
  
   Credits:
   Rajesh Sethumadhavan has been credited with the
   discovery of this vulnerability
  
  
   Disclaimer:
   This entire document is strictly for educational,
   testing and demonstrating purpose only. Modification
   use and/or publishing this information is entirely on
   your own risk. The exploit code/Proof Of Concept is to
   be used on test environment only. I am not liable for
   any direct or 

Re: [Full-disclosure] [Argeniss] Data0: Next generation malware for stealing databases (Paper)

2007-11-24 Thread reepex
so you can .. read login details to databases, login to them, steal their
records, and then send them out? .. thanks for this ... groundbreaking
research

we hope that your next pdf will contain how to sniff telnet sessions and
then automatically hack something something something

anyway um .. great job

On Nov 22, 2007 5:57 AM, Cesar [EMAIL PROTECTED] wrote:

 Hey, I'm releasing this new paper, not big deal but
 interesting.
 http://www.argeniss.com/research/Data0.pdf

 Abstract:
 This paper it's about Data0, a fictitious (or not)
 simple PoC of new malware that after it's
 deployed on a computer in an internal network it will
 automatically hack database servers and
 steal their data. Several techniques used by Data0
 will be detailed. Data0 will be targeting
 Microsoft SQL Server and Oracle Database Server two of
 the most used database servers.
 While Data0 could be used by the bad guys for evil
 purposes, it could also be used by security
 professionals and organizations to determine how
 strong networks, workstations, database
 servers, etc. are against this kind of attack.
 This paper is not intended to be a cook book for cyber
 criminals, it's intended to show people
 that by implementing simple techniques malware can
 become smarter and cause a lot more
 damage in a very near future.


 Cesar.



  
 
 Get easy, one-click access to your favorites.
 Make Yahoo! your homepage.
 http://www.yahoo.com/r/hs

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] RIPA powers being used

2007-11-21 Thread reepex
lol its always the lamest people that make responses like these

are you scared they will steal your latest post auth dos in a ftpd that no
one uses?

On Nov 21, 2007 11:51 AM, Morning Wood [EMAIL PROTECTED] wrote:

 - Original Message -
 From: James Rankin [EMAIL PROTECTED]
 To: full-disclosure@lists.grok.org.uk
 Sent: Tuesday, November 20, 2007 3:46 AM
 Subject: [Full-disclosure] RIPA powers being used


  RIPA is finally being used to force people to hand over encryption
 keys...
 
  http://news.bbc.co.uk/1/hi/technology/7102180.stm
 
 omg wtf...

 In the event that there was doubt that a suspect did not possess a key,
 he
 said, it was up to the prosecution to demonstrate beyond a reasonable
 doubt
 that they could know the passphrase



 ever fat finger a password? ever forgot a password? ( I got a zip archive
 I
 protected and cant unlock due to the fact I forgot the passphrase )

 looks like prosecuters and judges will now be ASSUMING guilt or innocence
 based on whaty they THINK MIGHT be true. ( if you created the passphrase
 you
 must know it )

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] save gary mckinnon or lock away dan egerstad

2007-11-15 Thread reepex
gary mckinnon should be burned alive on charges of script kiddie douche bag


On 11/14/07, worried security [EMAIL PROTECTED] wrote:

 if this guy [1] gets away with this then i want gary mckinnon [2]
 taken off charges as well.

 [1] http://www.theage.com.au/articles/2007/11/12/1194766589522.html

 [2] http://en.wikipedia.org/wiki/Gary_McKinnon

 n3td3v

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] 300$ is more than 0$

2007-11-10 Thread reepex
does badly recorded videos on random OSes like plan9 count?

On Nov 10, 2007 3:49 PM, don bailey [EMAIL PROTECTED] wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Ok, so the first person to disclose a Linux kernel
 zero day exploit in the next week will get 300$ from
 me direct into their favorite (legitimate) charity's
 bank account.

 Ok, fuck it, let's make it 500$. I'm serious.
 Ok, fuck it again. ANY kernel exploit for:
Windows
OpenBSD
or
Linux

 released publicly in the next week gets 500$
 of my personal money into their favorite
 charity's bank account. That's right, YOU
 get to pick the charity. As long as it's
 legit and the exploit is released before
 midnight of November 16th, 2007.

 Make your favorite (or least favorite) kernel
 look bad while making your charity feel good!

 500$ isn't a lot of money, sure. It's better than
 making SNOsoft and iDefense look slightly more
 elite, isn't it? I think so!

 Don B.

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.6 (GNU/Linux)

 iD8DBQFHNidMyWX0NBMJYAcRArIIAJ9nJ17T09fcSNU0xffeIG3PmVvdwwCdG4ex
 Y1Nje/C4XsVabyF52QBSl/g=
 =uKW3
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] stop cross posting

2007-11-04 Thread reepex
actually no one cares about your posts so it would be better if you stopped
posting completely

when you learn to install gcc you can come back

On Nov 3, 2007 6:39 PM, Dude VanWinkle [EMAIL PROTECTED] wrote:

 On 11/3/07, worried security [EMAIL PROTECTED] wrote:
  hi,
 
  can everyone stop cross posting?
 
  its the same people on all the mailing lists, there is absolutely no
  reason for cross posting.

 Sorry about that n3td3v, won't happen again.

 I would hate to annoy you like that.

 -JP

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] breaking SIP for fun and toll fraud

2007-11-04 Thread reepex
On Nov 4, 2007 8:45 AM, Radu State [EMAIL PROTECTED] wrote:

  P is the proxy located at URL:proxy.org

http://proxy.org X is the attacker located at URL: attacker.lan.org

  V is the victim located at URL:   victim.lan.org

  V is also registered with P under the username [EMAIL PROTECTED]

  .

 Step 3) The accomplice Y steps in and invites victim V, and then
 the victim decides

  to put X on hold


to make this exploit work you need more conditions present than in The
Malloc Maleficarum.

If Alice sits in bob's lap and bob looks over alices shoulder and sees her
type her password and alice does not notice bob then bob has broken the
security of the windows login.

 POC code:



  Available ONLY to legitimate VoIP device manufacturers.



 Will you step down to them and send them more of your expert perl? or
will you send them iterative loops in lisp



  Humberto Abdelnur, Ph.D student, the Madynes team at INRIA

  Radu State, Ph.D, the Madynes team at INRIA

  Olivier Festor, Ph.D the Madynes team at INRIA



phd is the new cissp!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] on xss and its technical merit

2007-11-04 Thread reepex
Pdp architect and I have been emailing back and forth about whether xss has
a place in fd, bugtraq, or the security research area at all.  He decided
that we should start a discussion about in on here and gets peoples
unmoderated opinion.  This discussion should not concern whether its
important due to stealing bank info, paypal, whatever it should only stick
to xss as a pure research area.  Or as pdp described it:

we are talking about whether XSS is as technical as other security
disciplines. We are also talking about whether it should have a deserved an
recognized place among FD readers and contributers. however, the topic wont
cover only whether you can detect or inject  XSS, this is lame. it will
cover the whole 9 yards... pretty much all the topics covered inside the XSS
book.

My ideas on the topic are

1) XSS isnt techincal no matter how its used
2) people who use xss on pentests/real hacking/anything but phishing are
lame and only use it because they cannot write real exploits (non-web) or
couldnt find any other web bugs (sql injection, cmd exec,file include,
whatever)
3) XSS does not have a place on this list or any other security list and i
remember when the idea of making a seperate bugtraq for xss was proposed and
i still think it should be done.
4) if you go into a pentest/audit and all you get out is xss then its a
failed pentest and the customer should get a refund.
5) publishing xss shows your weakness and that you dont have the ability to
find actual bugs ( b/c xss isnt a vuln its crap )

i think pdp is going to respond first. should be fun ;)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] on xss and its technical merit

2007-11-04 Thread reepex
 investigated enough to see whether and how your findings can
 be exploited.


we agree!!



 reepex, I am sorry but all your statements are groundless. I was
 expecting something more from you, especially after we exchanged a few
 private emails. sometimes, I get the feeling that you actually know
 what you are talking about. you definitely know a few things but
 c'mon, really... give me something juicy...


Yea after reading my original thing i admit it was pretty weak. i hope i
fixed it up here.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] on xss and its technical merit

2007-11-04 Thread reepex
i seemed to reply to nexxus as you were writing your original reply which
ive since replied to. about this email though...

On Nov 4, 2007 3:13 PM, pdp (architect) [EMAIL PROTECTED]
wrote:

 XSS today is where buffer overflows were 10-15 year ago. Moreover, did
 you missed when I said that 99% of all sites are vulnerable to XSS.
 Given the percentage of available XSS vulnerabilities, what chance you
 think you have finding one? simple math! of course it is easy. It is
 easy for most of XSS issues. However, those that really matter are not
 easy at all. DOM based XSS is a debug hell, mainly because every time
 you want to do something you have to deal with the remote server. This
 is not very ofline.


yes buffer overflows were everywhere then and yes xss is everywhere now. but
to say that xss is the buffer overflow of 15 years ago is not a good
comparison. Even if xss evolves for 15 years, which it may, would the result
be as damaging as even simple stack based overflows have been? Could you
have such mass damage worms as overflows have caused? I know there has been
myspace worms (which you mention), but xss cannot have the same effect as
overflows to a server.

lets say 1 servers are running a vuln ftpd and another 1 are running
the same open source web app. Which would you rather have the explot for?
also which would be more practical to attack? assuming you have the same
system and a good exploit you could get all the 1 ftpds, while the xss
on 1 msg boards would require 1 users to view the page you attacked.

xss just does not have the same potentional as overflows do unless browsers
develop some new technology or extend an old one to let client side
scripting to have much more control on the system.



 if you want to do it right, then it is harder to get a successful XSS
 attack. do you know why? cuz XSS involves a bit of strategy as well.
 because it is an indirect type of attack. A single XSS attack
 sometimes may involve several sub XSS each one of which call the next
 one in an exponential manner. By the time you reach level 5 you head
 is so screwed up that you need to start all over again because you
 code breaks on 50 places. JavaScript in particular is not an easy
 language. You may think that you know it but you don't know 90% of it.
 When it comes to scoping you get into a mess of things. Have you ever
 done XSS on GMail. Try it! See how far you will go. Unless you have
 some solid understanding on AJAX debuging and some nifty tools that
 can put back Google's mess into order, you have no chance. Today
 software hackers relay on tools such as IDA Pro or Soft Ice, which is
 discontinue but still. Check this out there are not tools like that
 for XSS and in particular AJAX, therefore I have to start from zero.
 Where is my JavaScript deobfiscator? I don't have one... I have to
 write it myself. Where is my debugger. I am stuck with Firebug for
 Firefox... Great! How about dynamic tracing, tracking, stepping and
 all other things on a complete BlackBox application that you can only
 see the incoming and outgoing requests. At least when you have a
 binary you know what it is. You can do it offline and you have all of
 the parts.

 XSS can be very complicated. Don't be fulled by what people post on FD.



the problem is that if you are going to xss 5 times deep why cant you just
find a client side browser bug?  you are researching how to basically steal
credentials/force requests/steal accounts when one browser or client side
bug would make all of that unnecesary. People like the ones i mention in the
other email will put this much time into xss because they are incapable
doing the client side bugs because they require much more skill that he ppl
simply do not have.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] on xss and its technical merit

2007-11-04 Thread reepex
wow you are an idiot. could you please stay off this discussion. we wanted
valid (professional) opinions not your retarded comments.

On Nov 4, 2007 5:07 PM, Dude VanWinkle [EMAIL PROTECTED] wrote:

 On 11/4/07, reepex [EMAIL PROTECTED] wrote:
 
  On Nov 4, 2007 3:13 PM, pdp (architect)  [EMAIL PROTECTED]
  wrote:
   This
   is not very offline.


 So you are taking peoples offline conversations and posting them
 against their wishes?

 Are you trying to make a name for yourself by saying look this guy
 actually talks to me?

 What a joke.

 -JP

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] on xss and its technical merit

2007-11-04 Thread reepex
On Nov 4, 2007 4:43 PM, pdp (architect) [EMAIL PROTECTED]
wrote:

 
  lets say 1 servers are running a vuln ftpd and another 1 are
 running
  the same open source web app. Which would you rather have the explot
 for?
  also which would be more practical to attack? assuming you have the same
  system and a good exploit you could get all the 1 ftpds, while the
 xss
  on 1 msg boards would require 1 users to view the page you
 attacked.
 

 well I will go for the 1 ftpds in general. However, it really
 depends on what I am doing. As I said, these FTPDs may give you access
 to the system but probably not access to the data which to me is a lot
 more interesting. In this case 1 XSS sounds a lot more valuable.


  Which 'data' are you talking about? the servers info (in this case the
server running the ftpd daemon) or the data/personal machines of the users
of the ftpd?

  I would rather have control of the ftpd then simply backdoor the daemon to
work on indivivual users, just as I would rather control on the web server
itself rather than any pre-exsiting xss bugs.

again the whole point is that you do not need xss ever if you have client
side exploits or access to the server itself.



 There are XSS script kiddies as well Buffer Overflow script kiddies.
 Just because you can find XSS does not mean that you've done something
 amazing and extraordinary. It takes skills and a lot of effort to make
 something out of it. But as I said before, open your mind. There are
 endless potentials when it comes to XSS.


yes and i guess bad for you is that the only xss you really see posted (fd,
milw0rm, security focus) is people posting scriptalert('hi')/script




 BTW, it does look like an achievement when you find a XSS inside an
 application that 1000 more people play with (look for similar bugs) on
 a daily basis. XSS in some small apps are stupid. XSS on the default
 Google Search Interface is as valuable as remotely exploitable buffer
 overflow for Linux 2.6.x kernels (distribution independent).


Again i think if you are attacking the users of a site instead of the site
itself this is acceptable but your attacks could become much more hazardous
if you owned the google server itself (maybe a stretch in the case of
google) and added whatever code you wanted to the front page/ or embedded
your nice browser exploit in the page. either of these ways seems much more
valuable then xssing people who are signed in and visited your page.

also (unless im missing) something in another email you mentioned like 15
different kinds of xss which I am sure are all interesting in their own way
but the most you can get out of them is simple browser games.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] on xss and its technical merit

2007-11-04 Thread reepex
you see i do not agree with this because you are relying on other bugs to
make xss useful and again you are relying on interaction from the user.

any bug that requires another (form of) bug to be useful or that requires
user interaction is inherently weaker then then other any time bugs like
bof/sql injection/whatever

On Nov 4, 2007 5:16 PM, pdp (architect) [EMAIL PROTECTED]
wrote:

 well valid point. XSS can alway be used as a career to whatever kind
 of attack you have in there. Just imagine the MySpace XSS warm
 combined with the IE VML or one of these ActiveX bugs that allow you
 to write into arbitery files on the file system (so that it is not a
 software bug). Hmmm?

 On Nov 4, 2007 11:51 PM,  [EMAIL PROTECTED] wrote:
  What about when xss leads to stack overflows and command injections?
  See http://xs-sniper.com.  It would seem that if you subscribe to the
 thought that only attacks that take over a victims computer are valid, then
 you would have to now admit xss as valid as well.
 
  Nate
  Sent via BlackBerry from T-Mobile
 
 
  -Original Message-
  From: reepex [EMAIL PROTECTED]
 
  Date: Sun, 4 Nov 2007 13:26:17
  To:full-disclosure@lists.grok.org.uk, pdp (architect) 
 [EMAIL PROTECTED]
  Subject: [Full-disclosure] on xss and its technical merit
 
 
  Pdp architect and I have been emailing back and forth about whether xss
 has a place in fd, bugtraq, or the security research area at all. He decided
 that we should start a discussion about in on here and gets peoples
 unmoderated opinion. This discussion should not concern whether its
 important due to stealing bank info, paypal, whatever it should only stick
 to xss as a pure research area. Or as pdp described it:
 
  we are talking about whether XSS is as technical as other security
 disciplines. We are also talking about whether it should have a deserved an
 recognized place among FD readers and contributers. however, the topic wont
 cover only whether you can detect or inject XSS, this is lame. it will cover
 the whole 9 yards... pretty much all the topics covered inside the XSS
 book.
 
  My ideas on the topic are
 
  1) XSS isnt techincal no matter how its used
  2) people who use xss on pentests/real hacking/anything but phishing are
 lame and only use it because they cannot write real exploits (non-web) or
 couldnt find any other web bugs (sql injection, cmd exec,file include,
 whatever)
  3) XSS does not have a place on this list or any other security list and
 i remember when the idea of making a seperate bugtraq for xss was proposed
 and i still think it should be done.
  4) if you go into a pentest/audit and all you get out is xss then its a
 failed pentest and the customer should get a refund.
  5) publishing xss shows your weakness and that you dont have the ability
 to find actual bugs ( b/c xss isnt a vuln its crap )
 
  i think pdp is going to respond first. should be fun ;)
 
   ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 



 --
 pdp (architect) | petko d. petkov
 http://www.gnucitizen.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Matasano on the mac trojan

2007-11-02 Thread reepex
Matasano's latest post has addressed the FUD post by gadi evron now [1]. I
would ask gadi to comment on why he made such an outlandish post with no
technical analysis but we all
1) Gadi has no technical skills
2) He is too busy putting on makeup for his next random tech magazine
interview and story

[1] http://www.matasano.com/log/985/the-silly-new-mac-os-x-trojan-or-hohuma/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] mac trojan in-the-wild

2007-11-02 Thread reepex
I guess you never heard of full disk encryption, finger print readers, or
caged machines.


On Nov 2, 2007 3:51 PM, Dude VanWinkle [EMAIL PROTECTED] wrote:

 On 11/2/07, J. Oquendo [EMAIL PROTECTED] wrote:
  Dude VanWinkle wrote:
 
   A program installed under false pretenses that will give the
   author/distributer remote access to the victim machines.
 
  Right... Guess those local are not a threat.

 ?? Local to the machine??

 all prevention methods fail if physical security is compromised.

 There is nothing short of hooking a claymore to the inside of your
 case that will stop someone knowledgeable who has physical access to
 your machine from doing whatever they want



  Vranisaprick is that you


 ?


   -JP

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Full-Disclosure Digest, Vol 33, Issue 1

2007-11-01 Thread reepex
On Nov 1, 2007 9:36 AM, Joxean Koret [EMAIL PROTECTED] wrote:

 First of all, yes, is a preauth sql injection in an admin
 console but, if you have privileges to connect to the Oracle Financials
 instance,


 So as I said its 'post auth' sql injection but thanks for clarifying.


 And second, there are many ways to bypass authentication in Oracle
 E-Business Suite, at least in version 11i, I'm not sure if the same
 problems applies to R12. I can't release more details right now.


hasn't this list been over people who 'have bugs' but  'cant release them
for fear/fame/drama purposes'

Do you *really* *want* *to* *be* in the same category as pdp and drraid. (
Notice how I sound smart by using alot of  like the great valdis )
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] mac trojan in-the-wild

2007-11-01 Thread reepex
It is funny that gadi does not post to this list anymore.. maybe its because
he knows people here can actually express their opinion against his retarded
posts without being moderated?

anyway of course gadi is going to jump over stuff like this because it takes
no technical knowledge to write about. If you want another example of this
try sun's /8 in google and you will find gadi's low level technical
research about the solaris telnet vulnerability or look up his crap about
the no auth vnc bugs.  These are the only bugs known to date that gadi evron
could comprehend so he has to make many posts about them to keep his name
high on google rankings for when he searches for his name daily [1].

[1] http://seclists.org/fulldisclosure/2007/Sep/0058.html

On Nov 1, 2007 3:10 PM, nnp [EMAIL PROTECTED] wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Oh don't be so bloody sensationalist. You're worse than the
 journalists because you should know better.

 - -nnp
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.7 (Darwin)
 Comment: http://firegpg.tuxfamily.org

 iD8DBQFHKpQRbP10WPHfgnQRAtZ9AKDIydXWUjKGq4OboanGyxHXFMYdWACfUGvX
 hky9nDk4BKs4MdK+htgIGv0=
 =k7Xe
 -END PGP SIGNATURE-

 On 10/31/07, Gadi Evron [EMAIL PROTECTED] wrote:
  For whoever didn't hear, there is a Macintosh trojan in-the-wild being
  dropped, infecting mac users.
  Yes, it is being done by a regular online gang--itw--it is not yet
 another
  proof of concept. The same gang infects Windows machines as well, just
  that now they also target macs.
 
 
 http://sunbeltblog.blogspot.com/2007/10/screenshot-of-new-mac-trojan.html
 
 http://sunbeltblog.blogspot.com/2007/10/mackanapes-can-now-can-feel-pain-of.html
 
  This means one thing: Apple's day has finally come and Apple users are
  going to get hit hard. All those unpatched vulnerabilities from years
 past
  are going to bite them in the behind.
 
  I can sum it up in one sentence: OS X is the new Windows 98. Investing
 in
  security ONLY as a last resort losses money, but everyone has to learn
 it
  for themselves.
 
  Gadi Evron.
 


 --
 http://www.smashthestack.org
 http://www.unprotectedhex.com

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] mac trojan in-the-wild

2007-11-01 Thread reepex
On Nov 1, 2007 4:34 PM, Nick FitzGerald [EMAIL PROTECTED] wrote:

 Yes, today, the average level of clue among Mac users is probably a
 shade higher than amongst Windows users,


  Is this a joke? The reason people switch to macs is because they cannot
handle simple tasks. Isnt the main thing said by new mac users is 'it just
works' meaning 'I couldnt figure out windows' . The main users of macs are
liberal arts students and hippies .. and we all know the technical level of
these people.



 think we may agree about the advisability (or otherwise) of making such
 predictions as loudly and publicly as Gadi did,


this page [1] has been dedicated to gadi evron because of events like these

[1] http://www.encyclopediadramatica.com/index.php/Attention_whore
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] mac trojan in-the-wild

2007-11-01 Thread reepex
I will take that pepsi challenge... what is at stake ;)


On Nov 1, 2007 4:50 PM, Paul Schmehl [EMAIL PROTECTED] wrote:

 --On Thursday, November 01, 2007 16:42:51 -0500 reepex [EMAIL PROTECTED]
 wrote:

  On Nov 1, 2007 4:34 PM, Nick FitzGerald [EMAIL PROTECTED]
 wrote:
 
 
  Yes, today, the average level of clue among Mac users is probably a
  shade higher than amongst Windows users,
 
 
 
Is this a joke? The reason people switch to macs is because they
 cannot
  handle simple tasks. Isnt the main thing said by new mac users is 'it
  just works' meaning 'I couldnt figure out windows' . The main users of
  macs are liberal arts students and hippies .. and we all know the
  technical level of these people.
 
 You apparently haven't been around Macs recently.  *Many* technical
 people,
 *especially* Unix and security admins, have started using Macs because
 they
 provide all the functionality of Unix with a beautiful GUI on top.

 Besides, I'll put the technical prowess of a liberal arts major up against
 the technical prowess of a computer science major *any* day, and spot them
 two full months to study.  CS majors can code like monkeys, but they don't
 have a clue how a computer works.  :-)

 --
 Paul Schmehl ([EMAIL PROTECTED])
 Senior Information Security Analyst
 The University of Texas at Dallas
 http://www.utdallas.edu/ir/security/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] XSS - www.howtoforge.com

2007-11-01 Thread reepex
lol pdp

On Nov 1, 2007 4:58 PM, Emmanouil Gavriil [EMAIL PROTECTED]
wrote:

  Cross Site Scripting at howtoforge..


 http://www.howtoforge.com/trip_search?keys=scriptalert('XSS-Test')/scripthttp://www.howtoforge.com/trip_search?keys=%3Cscript%3Ealert%28%27XSS-Test%27%29%3C/script
 

 Emmanouil Gavriil

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [botnets] re MAC trojan (fwd)

2007-11-01 Thread reepex
seriously dude wtf ... have you even put any research or thought into this
topic? All you have done is paste other peoples sayings, links, and research
and spam them to mailing lists to get your name on this topic just like the
sendmail, solaris ftp, vnc, and every other bug that comes out.

Get a fucking life and learn how to do your own research. Why do you even
partake in the lists - we could easily replace you with a bot that forwards
mails between lists and then we would have to read your (stolen) crap all
the time.

On Nov 1, 2007 7:55 PM, Gadi Evron [EMAIL PROTECTED] wrote:

 There have been many threads on this subject, but I believe this post
 below covers what some of us are trying to say on why this issue is
 significant.

 Obviously some people are far more articulate than me.


 -- Forwarded message --
 Date: Thu, 1 Nov 2007 16:47:17 -0400
 From: PinkFreud [EMAIL PROTECTED]
 To: Gary Flynn [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 Subject: Re: [botnets] re MAC trojan

 To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
 --
 [My apologies if this has already been covered - I started this email a
 few hours ago, and haven't had a chance to finish it until now.]


 I think the point Gadi (and Alex of Sunbelt Software, in his original
 blog entry) is trying to make is that professional malware authors have
 begun to take notice of Apple.  As a piece of malware goes, this trojan
 is nothing remarkable in itself, other than the fact that it's aimed at
 Mac users.

 As Gadi mentioned, there are a number of known issues that Apple has
 yet to address.  If the professional malware authors are now taking aim
 at Mac users, Apple appears to be making it easy for them.

 There are a few comments that I've seen in this thread that are rather
 worrisome:

 ::: Interspace System Department
  Relax. MAC users are not that stupid as MS users...

 Are you a Mac user?  If so, you just proved yourself wrong with that
 statement.  :)/flame

 Users are users, and their knowledge of computers varies greatly from
 one to the next.  I've supported a number of Mac users who tend to be
 clueless when it comes to computers, and I've supported Mac users who
 know quite a bit about the machines they use.  Like any Windows or *nix
 user, Mac users can - and will - fall prey to this kind of scheme.

 Again, the trojan is not what's important here.  The fact that it was
 written for Macs is particularly noteworthy, however.


 ::: Jeremy Chatfield
  InfoSec is there to make sure that I can run my business, not as an end
 in
  itself. It *prevents* profit making activity by having effort expended
 on
  internal needs. So if the Mac hasn't *needed* higher level of security
  hoops, previously, that's good. So long as weaknesses are fixed *when
  needed*, I'm a happy bunny. If there's a Day Zero attack that hits a
 Mac,
  I'll be disappointed, but it's not a uniquely Mac situation to be in...
 If
  the failure was an obvious weakness, I'm actually still pretty sanguine,
  because it hasn't yet been exploited, despite being well known.

 Security issues should be fixed as soon as feasable, not 'when needed'.
 If all security vulnerabilities were fixed 'when needed', the malware
 authors would be having a field day (which, of course, implies they're
 not already... h.).

 Apple has a history of badly-written software.  As far as recent
 examples go, take a look at tar and rsync on Tiger (10.4) - they've
 been modified to support extended attributes like ACLs and resource
 forks, and they're quite broken - extended attribute support introduces
 a serious memory leak.

 If that doesn't quite hit home, you can get a further idea of how their
 software is written by taking a look at the man page for sharing(1), on
 OS X Server (for those of you without access to OS X Server, take a
 look at

 http://developer.apple.com/DOCUMENTATION/Darwin/Reference/ManPages/man1/sharing.1.html
 ).  Pay particular attention to the description for the -s, -g, and -i
 options - do their developers (or tech writers) know the difference
 between AND and OR?  :)



 On Thu, Nov 01, 2007 at 08:56:22AM -0400, Gary Flynn babbled thus:
  This is nothing more than simple downloadable malware exacerbated
  somewhat by permissive configuration settings. It exploits no
  security defects.
 
  As I understand it, the operator is given multiple opportunities
  to refuse the program:
 
  http://www.jmu.edu/computing/security/#macmalware
 
  (I'm only subscribed to the archive so I apologize if this
has been already pointed out or already proven incorrect
today)
 
  --
  Gary Flynn
  Security Engineer
  James Madison University
  www.jmu.edu/computing/security

 --
 PinkFreud
 Chief of Security, Nightstar IRC network
 irc.nightstar.net | www.nightstar.net
 Server Administrator - Blargh.CA.US.Nightstar.Net
 Unsolicited advertisements sent to this address are NOT welcome.
 ___
 To 

Re: [Full-disclosure] N3TD3V INTERNET SECURITY THREAT CENTER

2007-11-01 Thread reepex
thanks for your document design.. i would have chose a more blue font over
grey though

On Nov 1, 2007 5:34 PM, worried security [EMAIL PROTECTED]
wrote:

 *CYBER TERRORISM*

 *Talk about the current threat level.*

 *Discuss the internet terror threat*

 **

 *SOFTWARE FLAWS*

 *Post your own research or talk about other peoples. *

 *Discuss technical vulnerabilities*

 **

 *SECURITY NEWS *

 *Talk about news hitting the tv,radio and internet. *

 *Discuss whats making the news*



 *SECURITY HELP*

 *Are you looking to tighten your security? Ask here. *
 *Discuss security related questions*



 http://groups.google.com/group/n3td3v

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Flash that simulates virus scan

2007-10-31 Thread reepex
resulting to se in a pen test cuz you cant break any of the actual machines?

lulz

On 10/31/07, Joshua Tagnore [EMAIL PROTECTED] wrote:
 List,

 Some time ago I remember that someone posted a PoC of a small site that
 had a really nice looking flash animation that performed a virus scan and
 after the virus scan was finished, the user was prompted for a Download
 virus fix? question. After that, of course, a file is sent to the user and
 he got infected with some malware. Right now I'm performing a penetration
 test, and I would like to target some of the users of the corporate LAN, so
 I think this approach is the best in order to penetrate to the LAN.

 I searched google but failed to find the URL, could someone send it to
 me ? Thanks!

 Cheers,
 --
 Joshua Tagnore
 ___
 Full-Disclosure - We believe in it.
 Charter:
 http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Flash that simulates virus scan

2007-10-31 Thread reepex
dont you listen to pdp ever? the government uses xss and bruteforces
remote desktop logins

http://seclists.org/fulldisclosure/2007/Oct/0417.html

pdp: military grade exploits? :) dude, I am sorry man.. but you are living
in some kind of a dream world. get real, most of the military hacks
are as simple as bruteforcing the login prompt.. or trying something
as simple as XSS.

--

pdp is an hero and a computer security expert and based on his fans
from the list he is the greatest researched since lcamtuf. his word =
gold



On 11/1/07, jf [EMAIL PROTECTED] wrote:
 must be on one of the .gov red teams ;]


 On Wed, 31 Oct 2007, reepex wrote:

  Date: Wed, 31 Oct 2007 16:56:20 -0500
  From: reepex [EMAIL PROTECTED]
  To: Joshua Tagnore [EMAIL PROTECTED],
  full-disclosure@lists.grok.org.uk
  Subject: Re: [Full-disclosure] Flash that simulates virus scan
 
  resulting to se in a pen test cuz you cant break any of the actual machines?
 
  lulz
 
  On 10/31/07, Joshua Tagnore [EMAIL PROTECTED] wrote:
   List,
  
   Some time ago I remember that someone posted a PoC of a small site 
   that
   had a really nice looking flash animation that performed a virus scan 
   and
   after the virus scan was finished, the user was prompted for a Download
   virus fix? question. After that, of course, a file is sent to the user 
   and
   he got infected with some malware. Right now I'm performing a penetration
   test, and I would like to target some of the users of the corporate LAN, 
   so
   I think this approach is the best in order to penetrate to the LAN.
  
   I searched google but failed to find the URL, could someone send it to
   me ? Thanks!
  
   Cheers,
   --
   Joshua Tagnore
   ___
   Full-Disclosure - We believe in it.
   Charter:
   http://lists.grok.org.uk/full-disclosure-charter.html
   Hosted and sponsored by Secunia - http://secunia.com/
  
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ZDI-07-063: RealPlayer RA Field Size File Processing Heap Oveflow Vulnerability

2007-10-31 Thread reepex
user interaction on a random file format? haven't we been over this
types of bugs?

This pool of zdi bugs is almost more laughable then idefense's aix spam flood

On 10/31/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 This vulnerability allows remote attackers to execute code on vulnerable
 installations of RealPlayer.  User interaction is required in that a
 user must open a malicious .ra/.ram file or visit a malicious web
 site.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ZDI-07-058: Oracle E-Business Suite SQL Injection Vulnerability

2007-10-31 Thread reepex
post auth sql injection in random admin console - lulz

On 10/31/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 The specific flaw exists in the okxLOV.jsp page in the Administration
 console.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] SAXON version 5.4 Multiple Path Disclosure Vulnerabilities

2007-10-29 Thread reepex
dot dot dot

first an sql injection post that requires magic quotes off, then a
post about xss, and now a post about path disclosure?

Why waste cve entries and people's time with crap like this? Couldnt
you at least find post-auth ftp dos bugs like morning wood?

On 10/29/07, SecurityResearch [EMAIL PROTECTED] wrote:
 netVigilance Security Advisory #53
 SAXON version 5.4 Multiple Path Disclosure Vulnerabilities
 Description:
 SAXON is a simple accessible online news publishing system for personal and 
 small corporate site owners. Publish news, using configurable templates, on 
 any .php page on your site. Publish news on a 'per author' basis. Edit and/or 
 delete existing news items. Create multiple RSS news feeds automatically (RSS 
 0.9, RSS 2.0 and Atom). Post date news items for later public release. 
 Multiple authors allowed. Ability to configure users as Standard or 
 Administrators. Ability to add/delete users (Administrators only). Option to 
 change any user password (Administrators only). Template 
 creation/deletion/amendment interface. Online setup and configuration.
 External References:
 Mitre CVE: CVE-2007-4861
 NVD NIST: CVE-2007-4861
 OSVDB: Unassigned
 Summary:
 SAXON is a simple accessible online news publishing system for personal and 
 small corporate site owners.
 Security problems in the product allow attackers to gather the true path of 
 the server-side script.
 Advisory URL:
 http://www.netvigilance.com/advisory0053
 Release Date:
 10/29/2007

 CVSS Version 2 Metrics:
 Base Metrics:


 Exploitability Metrics:



 Access Vector:
 Network


 Access Complexity:
 Low


 Authentication:
 None

 Impact Metrics:



 Confidentiality Impact:
 Partial


 Integrity Impact:
 None


 Availability Impact:
 None
 Temporal Metrics:


 Exploitability:
 Functional

 Remediation Level:
 Official Fix

 Report Confidence:
 Confirmed

 CVSS Version 2 Vectors:
 Base Vector:
 AV:N/AC:L/Au:N/C:P/I:N/A:N
 Temporal Vector:
 E:F/RL:OF/RC:C

 CVSS Version 2 Scores:
 Base Score:
 5

 Impact Subscore:
 2.9

 Exploitability Subscore:
 10
 Temporal Score:
 4.1
 SecureScout Testcase ID:
 TC 17990
 Vulnerable Systems:
 SAXON version 5.4
 Vulnerability Type:
 Program flaws - The product scripts have flaws which lead to Warnings or even 
 Fatal Errors.
 Vendor:
 Quirm
 Vendor Status:
 The Vendor has confirmed the problem and has release new version 5.41 that 
 addresses the problem. New version of product was tested and we can confirm 
 that all vulnerabilities were solved.  For more information see vendor 
 announcement. To download the latest version go to vendors product download 
 area.
 Workaround:
 From netVigilance:
 Disable warning messages: modify in the php.ini file following line: 
 display_errors = Off.
 From vendor:
 Modify .htaccess file to include 'php_flag register_globals off' (this will 
 work only for the Apache servers). Amend admin/config.php to include 
 'error_reporting(0);'
 Update critical files in the /admin, /rss and root directory of the 
 installation (all MySQL error reporting removed)
 Example:
 Path Disclosure Vulnerability 1:
 REQUEST:
 http://[TARGET]/[PRODUCT DIRECTORY]/news.php
 REPLY:
 bFatal error/b:  Call to undefined function:  quotesmart() in 
 b[DISCLOSED PATH][PRODUCT DIRECTORY]\news.php/b on line b15/bbr /
 Path Disclosure Vulnerability 2:
 REQUEST:
 http://[TARGET]/[SAXON-DIRECTORY]/admin/edit-item.php?newsid[]=1
 REPLY:
 bWarning/b:  mysql_real_escape_string() expects parameter 1 to be string, 
 array given in b[DISCLOSED PATH][PRODUCT DIRECTORY]\admin\functions.php/b 
 on line b48/bbr /
 Credits:
 Jesper Jurcenoks
 Co-founder netVigilance, Inc
 www.netvigilance.com

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] pdp is leaving us

2007-10-28 Thread reepex
Since everyone who really understood the post did not reply, this
thread will serve as monument to all the people whose technical skills
hit a roadblock at xss and javascript

On 10/28/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 reepex wrote:
  It seems our good friend and fellow poster pdp|architect is leaving
  our scene for something else.
  http://www.gnucitizen.org/about/pdp#comment-61753
 
  pdp took alot of heat after his home router bug that affected millions
  of people and maybe it was too much for him to handle. We hope he
  comes back soon with more 0day advisories and technical reports.
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/


 Well, good luck, and thanks for all your efforts.

 ~Florian
 ---
 And thanks for all the phish
 http://www.blackopscode.com
 http://www.gokickrocks.us
 ---

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] MySpace URL redirection

2007-10-28 Thread reepex
CRIPEEE FIGHTT!!

On 10/28/07, Morning Wood [EMAIL PROTECTED] wrote:
 your an ignorant little twat
 if you had a clue you would see the OP stated the link will crash IE

 now go away kthnx


 - Original Message -
 From: worried security [EMAIL PROTECTED]
 To: full-disclosure@lists.grok.org.uk
 Sent: Saturday, October 27, 2007 11:46 AM
 Subject: Re: [Full-disclosure] MySpace URL redirection


  On 10/27/07, Morning Wood [EMAIL PROTECTED] wrote:
 
  
  redirection yes, crash no ( IE7 ) crash yes ( IE6 )
 
 
  morning wood, why would you want to crash IE6? is this because you're part
  of the whole zone-h agenda? yeah crashing IE6 is something you script
  kiddies do.
 
  if this was someone else mentioning IE6 crashes I wouldn't be worried, but
  its the fact you're connected to the biggest malicious hacker website in
  the
  world that it really concerns me.
 
  check out his website everyone, http://www.zone-h.org they tell script
  kids
  to submit defacements to their website and morning wood is part of the
  team,
  his picture is even in the staff section.
 
  everyone keep an eye on morning wood and I urge you to not associate
  yourself with him on the mailing lists, he is constantly being
  investigated
  because of his links with the zone-h agenda.
 
  n3td3v
 


 


  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] MySpace URL redirection

2007-10-27 Thread reepex
lol n3td3v and morning_wood fighting

http://youtube.com/watch?v=V_Y_fUhj6Bs
http://en.wikipedia.org/wiki/Cripple_Fight

thank you both for the entertainment that is your careers/lives/fd posts


On 10/27/07, worried security [EMAIL PROTECTED] wrote:
 On 10/27/07, Morning Wood [EMAIL PROTECTED] wrote:
  
  redirection yes, crash no ( IE7 ) crash yes ( IE6 )


 morning wood, why would you want to crash IE6? is this because you're part
 of the whole zone-h agenda? yeah crashing IE6 is something you script
 kiddies do.

 if this was someone else mentioning IE6 crashes I wouldn't be worried, but
 its the fact you're connected to the biggest malicious hacker website in the
 world that it really concerns me.

 check out his website everyone, http://www.zone-h.org they tell script kids
 to submit defacements to their website and morning wood is part of the team,
 his picture is even in the staff section.

 everyone keep an eye on morning wood and I urge you to not associate
 yourself with him on the mailing lists, he is constantly being investigated
 because of his links with the zone-h agenda.

 n3td3v
 ___
 Full-Disclosure - We believe in it.
 Charter:
 http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google Sacure

2007-10-27 Thread reepex
please stop trying to ruin a noname company - all you are doing is
giving n3td3v more things to talk about so that people click his link
and his terrorist cell can be funded by adsense.

If you want a company to laugh at you should instead try irm and
their cisco xss.

On 10/27/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 God, this is just more proof that they have no idea what they are
 doing. How long does it take to fix errors on a website? I mean, I
 know that they are using Godaddy.com and don't host their own
 stuff...

 wait... that can't be right!

 How can a leader in Managed Security Services not have the
 ability to host their own web server?  Somethings fishy...



 On Fri, 26 Oct 2007 11:54:22 -0400 webby devil [EMAIL PROTECTED]
 wrote:
 ole:
 your site itself has problems! how are you going to solve others
 problems?
   Welcome ole! Your request has been directed to the Customer
 Servicedepartment. Please wait for our operator to answer your
 call.
   Call accepted by operator JC. Currently in room: JC. ole:
 any answers?
 JC:
 Hello Ole
 JC:
 Do you have a question?
 ole:
 your site itself has problems! how are you going to solve others
 problems?
 JC:
 What problems are you speaking of
 JC:
 We're currently working to fix some of our pages if that is what
 you're
 referring to
 ole:
 Access denied for user:
 '[EMAIL PROTECTED]'[EMAIL PROTECTED](Using
 password: YES)
 ole:
 /home/content/s/a/c/sacure/html/news/snews.php
 JC:
 Yes, I understand the concern with our News and Events page
 JC:
 We're working to fix that, my apologies
 ole:
 Your being discussed on FullDisclosure
 ole:
 do you know what that is?
 JC:
 No
 JC:
 Can you explain to me what that is
 ole:
 are you by anyway related to information security testing?
 JC:
 Yes we are
 JC:
 Can you please explain to me what Full Disclosure is and what the
 discussion
 is
 ole:
 well you should be asking one of your penetration testers there
 what FD is

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] pdp is leaving us

2007-10-27 Thread reepex
It seems our good friend and fellow poster pdp|architect is leaving
our scene for something else.
http://www.gnucitizen.org/about/pdp#comment-61753

pdp took alot of heat after his home router bug that affected millions
of people and maybe it was too much for him to handle. We hope he
comes back soon with more 0day advisories and technical reports.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] lol @ you

2007-10-27 Thread reepex
stop you from what.. spamming us? I believe we have that handled.

Also don't annoy us because you can not get a job in the security
field like we have.

On 10/27/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 hahahahaha you can't stop us, silly whitehats

 there are more of us, and we are smarter

 -EAT A DIK

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] TCP Hijacking (aka Man-in-the-Middle)

2007-10-26 Thread reepex
seriously. enough with the irc ass kissing.

On 10/26/07, don bailey [EMAIL PROTECTED] wrote:
  Thank you, Captain Obvious - I specifically *said* that only one of them
  needs to be blind spoofing.
 
  only possible if sequence number is 100% (or close to 100%) predictable.
 
  And Michael Zalewski's work showed that even on many boxes that *claim*
  to have RFC1948 randomization, you can do pretty well on the predicting.
 

 Seriously. Enough with the asterisks.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] TCP Hijacking (aka Man-in-the-Middle)

2007-10-25 Thread reepex
Hi I am sorry to hear you just woke from your coma. It is now 2007 not 1995.

On 10/25/07, Oliver [EMAIL PROTECTED] wrote:


 Hello,

 I have been searching all over the place to find an answer to this question,
 but Google has made me feel unlucky these last few days. I hope I could find
 more expertise here. The burning question I have been pondering over is -
 could TCP connections be hijacked both ways? I know there are tools ( e.g.
 Hunt) that sniffs traffic and could arbitrarily reset a connection by
 spoofing the IP and MAC address. But could there be more than just that? Is
 it theoretically possible to not reset the connection with the server or the
 client, but play the man-in-the-middle attack?

 An example network scenario of this that I could come up with is that the
 hacker is within the same network as the victim (client), who is connected
 to a server through a persistent TCP connection. Now the hacker could
 pretend to be the server and send a TCP message (not reset/fin) to the
 client and change the seq/ack numbers on the client side, and the hacker
 could pretend to be the client and send a TCP message (not reset/fin) to the
 server and change the seq/ack there. Thus, the seq/ack numbers are
 completely out of sync for the client and server and thus would not
 recognize each others messages. At this point, the hacker could relay ( i.e.
 be man-in-the-middle) the messages from the client to the server and vice
 versa, using the seq/ack numbers that they would accept. While this seems
 pretty pointless so far, the hacker could inject messages at will to either
 side of the connection, and still make the server and client believe that
 they are in sync with each other ( i.e. this would not work if the hacker
 does not relay the messages with the seq/ack numbers the server and client
 would accept). That means the hacker goes undetected and could do whatever
 he chooses, as he has hijacked the connection.

 Is this possible? Assuming there is no hardware limitation (e.g.
 router/switch blocking MAC/IP addresses from certain port). Would the TCP
 protocol definition and implementation in Windows and *nixes these days
 would interpret this behaviour correctly (correctly for the hacker,
 incorrectly for themselves)? I imagine it would be quite a bit of work
 proving this theory and perhaps some of you could enlighten me or dismiss
 this concept.

 Regards,
 Oliver

 ___
 Full-Disclosure - We believe in it.
 Charter:
 http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Airscanner Mobile Security Advisory #07101401: Mobile-spy Victim/User Phone/SMS/URL Log Spoofing and Persistent XSS Injection

2007-10-23 Thread reepex
On 10/23/07, Seth Fogie [EMAIL PROTECTED] wrote:

 * Risk Level:*
 High - Spoofed log records / Injected JavaScript can lead to malware
 attacks


Risk level high and javascript do not belong together
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] IRM Discover More Vulnerabilities in Cisco IOS

2007-10-23 Thread reepex

Bug 1:
The Line Printer Daemon, which provides print server functionality in
Cisco IOS is vulnerable to a software flaw whereby the length of the
hostname of the router is not checked before being copied into a fixed
size memory buffer. . However, the attacker must be able to
control the hostname of the router, which could be achieved via SNMP.

Ok... so for this remote attack the victim would need a badly
configured snmp listening public... ok pdp architect

---
Bug 2:
Cisco say its cross-site scripting

Ok you are still stealing pdp architect's research
---

Bug 3-7,10-15
Local attacks on a cisco - lulz

Not even pdp would go this low
---

Bug 8,9: no info - im sure its elite though

Having a bug but releasing no info - sounds like drraid and pdp architec to me

-

so basically you found a bunch of local bugs in ciscos and a bug if
you can control snmp - way to go - your grep -r strcpy * skills are
quiet strong. Eeye and idefense would glady hire you.

Do you wonder why you found 12 bugs and get no press but michael lynn
finds a couple and cisco is throwing lawyers and lawsuits at him? ---
its probably because his mattered and yours are a joke - just like you
and your company.


On 10/23/07, Andy Davis [EMAIL PROTECTED] wrote:
 In the last three months IRM has discovered a total of 13 new security
 vulnerabilities in Cisco IOS. These vulnerabilities were reported to
 Cisco and have all been allocated PSIRT reference numbers while the root
 cause and potential impact of each is investigated. Cisco has taken all
 the vulnerability reports extremely seriously and has already started
 releasing patches and workarounds to mitigate them (e.g.
 http://www.cisco.com/warp/public/707/cisco-sr-20071010-lpd.shtml). As
 the remaining patches or workarounds are developed, IRM will release
 security advisories, which will include full technical details of each
 vulnerability and links to patch download information.

 More information about the new vulnerabilities discovered is available
 here:

 http://www.irmplc.com/index.php/111-Vendor-Alerts


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ifnet.it WEBIF XSS Vulnerability

2007-10-22 Thread reepex
SHUT UP PDP

SEND XSS TO SECURITY BASICS

On 10/22/07, SkyOut [EMAIL PROTECTED] wrote:

 -
 || WWW.SMASH-THE-STACK.NET ||
 -

 || ADVISORY: IFNET.IT WEBIF XSS VULNERABILITY

 _
 || 0x00: ABOUT ME
 || 0x01: DATELINE
 || 0x02: INFORMATION
 || 0x03: EXPLOITATION
 || 0x04: GOOGLE DORK
 || 0x05: RISK LEVEL
 
 

 _
 || 0x00: ABOUT ME

 Author: SkyOut
 Date: October 2007
 Contact: skyout[-at-]smash-the-stack[-dot-]net
 Website: www.smash-the-stack.net

 _
 || 0x01: DATELINE

 2007-10-15: Bug found
 2007-10-15: Email with notification sent to ifnet.it
 2007-10-21: Still no reaction from ifnet.it
 2007-10-22: Advisory released

 
 || 0x02: INFORMATION

 In the WEBIF product by the italian company ifnet, an error
 occurs due to the fact of an unfiltered variable (cmd) in the
 webif.exe program. It is possible to execute any JavaScript code
 by manipulating the parameter.

 _
 || 0x03: EXPLOITATION

 To exploit this bug no exploit is needed, all can be done through
 manipulation of the given URL:

 STEP 1:
 Go to the standard page of the WEBIF product, normally existing
 at /cgi-bin/webif.exe. You will recognize some further parameters,
 being cmd, config and outconfig.

 STEP 2:
 Don't change any parameter instead of the cmd one. Change its value
 to any JavaScript code you like. For our demo we will use the default
 one, being scriptalert('XSS');/script.

 STEP 3:
 Click ENTER and execute the code. A successfull demonstration will
 popup a window.

 EXAMPLE:
 http://example.com/webif/cgi-bin/webif.exe?cmd=scriptalert('XSS');/scriptconfig=[
 * ]outconfig=[ * ]

 [ * ] = Depends on the server. Don't change this!

 
 || 0x04: GOOGLE DORK

 inurl:/cgi-bin/webif/ intitle:WEBIF

 ___
 || 0x05: RISK LEVEL

 - LOW - (1/3) -

 ! Happy Hacking !

 
 

 THE END

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Redirecting 404 error pages?

2007-10-21 Thread reepex
whats the point of the blocking the url when its in google cache?

http://64.233.169.104/search?q=cache:Y4hf4gOOAc8J:www.newskicks.com/avatars/user_uploaded//ts-audiotomidi-full-crack.html+muonline+huck+1+hit+panasonic+gd+68+acid+5+mp3hl=enct=clnkcd=2gl=usclient=firefox-a

also you are lucky some spammers hacked your site instead of people who had
more interesting ideas

On 10/21/07, crazy frog crazy frog [EMAIL PROTECTED] wrote:

 Hi All,

 Recently on one of my domain i found some strange php script with
 random numeric names like 3578.php etc etc. and there was one
 .htaccess file which contained the apache directive to redirect the
 404 pages to this script. and then on searching on google i found that
 my sites were displaying porn,cracks etc.i think its a automated
 bot/worm.
 any ideas on this?
 i have about it here:-

 http://www.secgeeks.com/ever_checked_that_your_apache_404_page_is_displaying_porn_or_cracks.html

 --
 ---
 http://www.secgeeks.com
 http://www.newskicks.com

 ---

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

<    1   2