Re: [Full-disclosure] WTF

2011-05-08 Thread Sagar Belure
Hi,

On Sat, May 7, 2011 at 12:19 AM, Gustavo  wrote:
>
> WTF ?
>
> notebook:~$ ping www.compusa.com
> PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
> 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019 
> ms
>
> notebook:~$ ping www.tigerdirect.com
> PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
> 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.022 
> ms
>

Hehe...This is funny.
Well, to me, *bh.georedirector.akadns.net* seems to be the culprit.

Here is what I got on my box...

$ host compusa.com
compusa.com has address 206.191.131.89
compusa.com mail is handled by 10 mail.highspeedbackbone.net.
$ host www.compusa.com
www.compusa.com is an alias for compusa.syx.com.akadns.net.
compusa.syx.com.akadns.net is an alias for bh.georedirector.akadns.net.
bh.georedirector.akadns.net has address 127.0.0.1
$ host tigerdirect.com
tigerdirect.com has address 206.191.131.89
tigerdirect.com mail is handled by 10 mail.highspeedbackbone.net.
$ host www.tigerdirect.com
www.tigerdirect.com is an alias for wwwtigerdirect.syx.com.akadns.net.
wwwtigerdirect.syx.com.akadns.net is an alias for bh.georedirector.akadns.net.
bh.georedirector.akadns.net has address 127.0.0.1

Even if you ask same questions to OpenDNS(208.67.222.222) or Google
DNS servers(8.8.8.8)
They say...

$ host bh.georedirector.akadns.net 208.67.222.222
Using domain server:
Name: 208.67.222.222
Address: 208.67.222.222#53
Aliases:

bh.georedirector.akadns.net has address 127.0.0.1
$ host bh.georedirector.akadns.net 8.8.8.8
Using domain server:
Name: 8.8.8.8
Address: 8.8.8.8#53
Aliases:

bh.georedirector.akadns.net has address 127.0.0.1


OR asking same thing to some of Nameservers of akadns.net, I got...

$ host -t ns akadns.net
akadns.net name server eur1.akadns.net.
akadns.net name server zc.akadns.org.
akadns.net name server zd.akadns.org.
akadns.net name server use3.akadns.net.
akadns.net name server asia9.akadns.net.
akadns.net name server zb.akadns.org.
akadns.net name server usw2.akadns.net.
akadns.net name server za.akadns.org.
akadns.net name server use4.akadns.net.
$ host bh.georedirector.akadns.net eur1.akadns.net
Using domain server:
Name: eur1.akadns.net
Address: 195.59.44.134#53
Aliases:

bh.georedirector.akadns.net has address 127.0.0.1
$ host bh.georedirector.akadns.net asia9.akadns.net
Using domain server:
Name: asia9.akadns.net
Address: 222.122.64.133#53
Aliases:

bh.georedirector.akadns.net has address 127.0.0.1
$ host bh.georedirector.akadns.net za.akadns.org
Using domain server:
Name: za.akadns.org
Address: 96.6.112.198#53
Aliases:

bh.georedirector.akadns.net has address 127.0.0.1


Just my two cents.

BTW, if anyone has any idea, is this intentional or something?

Thanks,
Sagar Belure
Security Analyst
Secfence Technologies
www.secfence.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF

2011-05-07 Thread Kevin Fealey
Works fine for me on Windows.

C:\>ping www.compusa.com

Pinging e3531.b.akamaiedge.net [96.17.206.102] with 32 bytes of data:
Reply from 96.17.206.102: bytes=32 time=15ms TTL=58
Reply from 96.17.206.102: bytes=32 time=16ms TTL=58
Reply from 96.17.206.102: bytes=32 time=16ms TTL=58
Reply from 96.17.206.102: bytes=32 time=16ms TTL=58

Ping statistics for 96.17.206.102:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 15ms, Maximum = 16ms, Average = 15ms

On Sat, May 7, 2011 at 12:27 AM, ksha  wrote:

>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
>
> On 05/06/2011 11:15 PM, Nick Boyce wrote:
> > On Fri, May 6, 2011 at 6:49 PM, Gustavo 
> > 
> > wrote:
> >
> >> WTF ?
> >>
> >> notebook:~$ ping www.compusa.com PING bh.georedirector.akadns.net
> >> (127.0.0.1) 56(84) bytes of data. 64 bytes from
> >> localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019
> >> ms
> >
> > Same here ... this time on Windows :
> >
> > F:\>ping www.compusa.com
> >
> > Pinging bh.georedirector.akadns.net [127.0.0.1] with 32 bytes of
> > data:
> >
> > Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 Reply from
> > 127.0.0.1: bytes=32 time<1ms TTL=128 Reply from 127.0.0.1: bytes=32
> > time<1ms TTL=128 Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
> >
> > Ping statistics for 127.0.0.1: Packets: Sent = 4, Received = 4,
> > Lost = 0 (0% loss), Approximate round trip times in milli-seconds:
> > Minimum = 0ms, Maximum = 0ms, Average = 0ms
> >
> > F:\>nslookup www.compusa.com Server:  Address: 9
> >
> > Non-authoritative answer: Name: bh.georedirector.akadns.net
> > Address: 127.0.0.1 Aliases: www.compusa.com,
> > compusa.syx.com.akadns.net
> >
> >
> > Normally I'd say that's a DNS config screwup, which would make
> > them unreachable (since their website is not on my system).
> > However, Google seems to be able to reach them if you use the "site
> > preview" option in the search results :
> > http://www.google.com/search?q=www.compusa.com
> >
> > Curious.
> >
> > Relevant: http://forums.opendns.com/comments.php?DiscussionID=9721
> >
> > Nick -- Leave the Olympics in Greece, where they belong.
> >
> > ___ Full-Disclosure -
> > We believe in it. Charter:
> > http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
> > sponsored by Secunia - http://secunia.com/
>
> About dns
>
> ;; ADDITIONAL SECTION:
> ns01.highspeedbackbone.net. 240003 INA199.181.77.21
> ns02.highspeedbackbone.net. 240003 INA199.181.78.22
> ns03.highspeedbackbone.net. 240003 INA199.181.77.23
> ns04.highspeedbackbone.net. 240003 INA199.181.78.24
>
> testing one by one ...
>
> [ksha@warbof ~]$ dig compusa.com @199.181.77.21 AXFR
>
> ; <<>> DiG 9.8.0 <<>> compusa.com @199.181.77.21 AXFR
> ;; global options: +cmd
> ; Transfer failed.
> [ksha@warbof ~]$ dig compusa.com @199.181.78.22 AXFR
>
> ; <<>> DiG 9.8.0 <<>> compusa.com @199.181.78.22 AXFR
> ;; global options: +cmd
> ; Transfer failed.
> [ksha@warbof ~]$ dig compusa.com @199.181.77.23 AXFR
>
> ; <<>> DiG 9.8.0 <<>> compusa.com @199.181.77.23 AXFR
> ;; global options: +cmd
> ; Transfer failed.
>
>
> and the last allow zone transfer.
>
> compusa.com.86400INSOAns03.highspeedbackbone.net.
> hostmaster.highspeedbackbone.net. 2008134189 10800 3600 604800 3600
> compusa.com.86400INTXT"v=spf1 ip4:206.191.131.0/24
> mx -all"
> compusa.com.86400INMX10 mail.highspeedbackbone.net.
> compusa.com.86400INNSns01.highspeedbackbone.net.
> compusa.com.86400INNSns02.highspeedbackbone.net.
> compusa.com.86400INNSns03.highspeedbackbone.net.
> compusa.com.86400INNSns04.highspeedbackbone.net.
> compusa.com.900INA206.181.131.221
> compusa.com.900INA206.181.131.220
> nap.miadk._domainkey.compusa.com. 5 INTXT"t=y\;
>
> p=MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAJ5YnwXcWzCFY6fvQ1Gd6tzI97rvvOw9PVjoekWbja1reGBMfjJ+rfwsJCQavPadAUAKbs46KUDubUgcmwe1oU9abJ3APStwgcxMXlWfvlhuSXmyDHG+HQAIrk0PsR7BBwIDAQAB\;"
> nap.miadkim._domainkey.compusa.com. 5 IN TXT"v=DKIM1\; t=y:s\;
>
> p=MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAJ5YnwXcWzCFY6fvQ1Gd6tzI97rvvOw9PVjoekWbja1reGBMfjJ+rfwsJCQavPadAUAKbs46KUDubUgcmwe1oU9abJ3APStwgcxMXlWfvlhuSXmyDHG+HQAIrk0PsR7BBwIDAQAB\;"
> _sip._tls.compusa.com.300INSRV0 0 443 sip.compusa.com.
> answers.compusa.com.86400INCNAME
> web220.highspeedbackbone.net.
> autodiscover.compusa.com. 300INA10.100.100.108
> community.compusa.com.86400INCNAME
> web220.highspeedbackbone.net.
> comp.compusa.com.900INA206.181.131.89
> comp.compusa.com.900INA206.181.131.49
> dubdubdub.compusa.com.60INCNAME
> www.compusa.com.edgekey.net.
> forums.compusa.com.86400INCNAME
> web220.highspeedbackbone.net.
> 

Re: [Full-disclosure] WTF

2011-05-07 Thread Gino
Guess you got nulled

On 05/06/2011 11:49 AM, Gustavo wrote:
> WTF ?
> 
> notebook:~$ ping www.compusa.com
> PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
> 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019 
> ms
> 
> notebook:~$ ping www.tigerdirect.com
> PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
> 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.022 
> ms
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/




0x34C1CCB7.asc
Description: application/pgp-keys
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WTF

2011-05-07 Thread Valdis . Kletnieks
On Fri, 06 May 2011 15:49:31 -0300, Gustavo said:
> WTF ?
> 
> notebook:~$ ping www.compusa.com
> PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.

www.compusa.com and www.tigerdirect.com are Akamai'zed.  They play DNS games to
point you at the "nearest" Akamai cache server (technically speaking, they use
the one nearest your DNS resolver).   So for www.compusa.com, it goes something
like this:

www.compusa.com.60  IN  CNAME   compusa.syx.com.akadns.net.
compusa.syx.com.akadns.net. 300 IN  CNAME   www.compusa.com.edgekey.net.
www.compusa.com.edgekey.net. 300 IN CNAME   e3531.b.akamaiedge.net.
e3531.b.akamaiedge.net. 20  IN  A   173.223.190.102

(The final akamaiedge.net address will depend on where in the Internet you are)

The fact that bh.georedirector.akadns.net got referenced in the ping most
likely means "Akamai got confused where you are and has no *clue* which cache
is closest to you".





pgpZF8R6baZzf.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WTF

2011-05-06 Thread ksha

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 05/06/2011 11:15 PM, Nick Boyce wrote:
> On Fri, May 6, 2011 at 6:49 PM, Gustavo 
> wrote:
>
>> WTF ?
>>
>> notebook:~$ ping www.compusa.com PING bh.georedirector.akadns.net
>> (127.0.0.1) 56(84) bytes of data. 64 bytes from
>> localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019
>> ms
>
> Same here ... this time on Windows :
>
> F:\>ping www.compusa.com
>
> Pinging bh.georedirector.akadns.net [127.0.0.1] with 32 bytes of
> data:
>
> Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 Reply from
> 127.0.0.1: bytes=32 time<1ms TTL=128 Reply from 127.0.0.1: bytes=32
> time<1ms TTL=128 Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
>
> Ping statistics for 127.0.0.1: Packets: Sent = 4, Received = 4,
> Lost = 0 (0% loss), Approximate round trip times in milli-seconds:
> Minimum = 0ms, Maximum = 0ms, Average = 0ms
>
> F:\>nslookup www.compusa.com Server:  Address: 9
>
> Non-authoritative answer: Name: bh.georedirector.akadns.net
> Address: 127.0.0.1 Aliases: www.compusa.com,
> compusa.syx.com.akadns.net
>
>
> Normally I'd say that's a DNS config screwup, which would make
> them unreachable (since their website is not on my system).
> However, Google seems to be able to reach them if you use the "site
> preview" option in the search results :
> http://www.google.com/search?q=www.compusa.com
>
> Curious.
>
> Relevant: http://forums.opendns.com/comments.php?DiscussionID=9721
>
> Nick -- Leave the Olympics in Greece, where they belong.
>
> ___ Full-Disclosure -
> We believe in it. Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
> sponsored by Secunia - http://secunia.com/

About dns

;; ADDITIONAL SECTION:
ns01.highspeedbackbone.net. 240003 INA199.181.77.21
ns02.highspeedbackbone.net. 240003 INA199.181.78.22
ns03.highspeedbackbone.net. 240003 INA199.181.77.23
ns04.highspeedbackbone.net. 240003 INA199.181.78.24

testing one by one ...

[ksha@warbof ~]$ dig compusa.com @199.181.77.21 AXFR

; <<>> DiG 9.8.0 <<>> compusa.com @199.181.77.21 AXFR
;; global options: +cmd
; Transfer failed.
[ksha@warbof ~]$ dig compusa.com @199.181.78.22 AXFR

; <<>> DiG 9.8.0 <<>> compusa.com @199.181.78.22 AXFR
;; global options: +cmd
; Transfer failed.
[ksha@warbof ~]$ dig compusa.com @199.181.77.23 AXFR

; <<>> DiG 9.8.0 <<>> compusa.com @199.181.77.23 AXFR
;; global options: +cmd
; Transfer failed.


and the last allow zone transfer.

compusa.com.86400INSOAns03.highspeedbackbone.net.
hostmaster.highspeedbackbone.net. 2008134189 10800 3600 604800 3600
compusa.com.86400INTXT"v=spf1 ip4:206.191.131.0/24
mx -all"
compusa.com.86400INMX10 mail.highspeedbackbone.net.
compusa.com.86400INNSns01.highspeedbackbone.net.
compusa.com.86400INNSns02.highspeedbackbone.net.
compusa.com.86400INNSns03.highspeedbackbone.net.
compusa.com.86400INNSns04.highspeedbackbone.net.
compusa.com.900INA206.181.131.221
compusa.com.900INA206.181.131.220
nap.miadk._domainkey.compusa.com. 5 INTXT"t=y\;
p=MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAJ5YnwXcWzCFY6fvQ1Gd6tzI97rvvOw9PVjoekWbja1reGBMfjJ+rfwsJCQavPadAUAKbs46KUDubUgcmwe1oU9abJ3APStwgcxMXlWfvlhuSXmyDHG+HQAIrk0PsR7BBwIDAQAB\;"
nap.miadkim._domainkey.compusa.com. 5 IN TXT"v=DKIM1\; t=y:s\;
p=MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAJ5YnwXcWzCFY6fvQ1Gd6tzI97rvvOw9PVjoekWbja1reGBMfjJ+rfwsJCQavPadAUAKbs46KUDubUgcmwe1oU9abJ3APStwgcxMXlWfvlhuSXmyDHG+HQAIrk0PsR7BBwIDAQAB\;"
_sip._tls.compusa.com.300INSRV0 0 443 sip.compusa.com.
answers.compusa.com.86400INCNAME
web220.highspeedbackbone.net.
autodiscover.compusa.com. 300INA10.100.100.108
community.compusa.com.86400INCNAME
web220.highspeedbackbone.net.
comp.compusa.com.900INA206.181.131.89
comp.compusa.com.900INA206.181.131.49
dubdubdub.compusa.com.60INCNAME
www.compusa.com.edgekey.net.
forums.compusa.com.86400INCNAME
web220.highspeedbackbone.net.
help.compusa.com.86400INNSns02.highspeedbackbone.net.
help.compusa.com.86400INNSns01.highspeedbackbone.net.
images.compusa.com.86400INCNAME
images.compusa.com.edgesuite.net.
m.compusa.com.300INCNAMEcompusa.com.velocitude.mobi.
media.compusa.com.900INA206.181.131.89
media.compusa.com.900INA206.181.131.49
news.compusa.com.86400INA74.81.68.187
origin-images.compusa.com. 900INA206.181.131.89
origin-images.compusa.com. 900INA206.181.131.49
origin-www.compusa.com.60INA206.191.131.54
origin-www.compusa.com.60INA206.191.131.14
retail.compusa.com.600INA10.101.132.194
reviews.compusa.com.86400INCNAME
w

Re: [Full-disclosure] WTF

2011-05-06 Thread Nick Boyce
On Fri, May 6, 2011 at 6:49 PM, Gustavo  wrote:

> WTF ?
>
> notebook:~$ ping www.compusa.com
> PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
> 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1
> ttl=64 time=0.019 ms

Same here ... this time on Windows :

F:\>ping www.compusa.com

Pinging bh.georedirector.akadns.net [127.0.0.1] with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

F:\>nslookup www.compusa.com
Server:  
Address:  9

Non-authoritative answer:
Name:bh.georedirector.akadns.net
Address:  127.0.0.1
Aliases:  www.compusa.com, compusa.syx.com.akadns.net


Normally I'd say that's a DNS config screwup, which would make them
unreachable (since their website is not on my system).  However,
Google seems to be able to reach them if you use the "site preview"
option in the search results :
http://www.google.com/search?q=www.compusa.com

Curious.

Relevant: http://forums.opendns.com/comments.php?DiscussionID=9721

Nick
--
Leave the Olympics in Greece, where they belong.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] WTF

2011-05-06 Thread Gustavo
WTF ?

notebook:~$ ping www.compusa.com
PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019 ms

notebook:~$ ping www.tigerdirect.com
PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.022 ms

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF eEye Really?

2010-05-05 Thread J Roger
>
> And if the author is sincere and it was really his original intent, he
> should refrain from blogging from now on...
>

I have a feeling his employer will see to that for the foreseeable future.
At least in a professional context representing them as a company.

If he really meant it as everyone that read the original post seemed to take
it, then he should have the balls to stand by what he said or admit he meant
it at the time but was wrong and has since learned different. Either one of
those options would be a mature way of handling the situation. Trying to
spin it as "what I said isn't what I really meant. What I really meant is
something so benign that no one could have a strong opinion about it and it
was really pointless to even blog about." comes across as insincere.

What do I know though, Mr. Haber is the one with the lifetime in the
vulnerability assessment field.

JRoger


2010/5/5 Sébastien Duquette 

> Looks to me more like the "unqualified person doing testing" argument
> is used as an escape from their faux-pas.  When you read the initial
> article, the author is clearly interested in the issue of crime being
> perpetrated by using these tools :
>
> "Penetration tools clearly allow the breaking and entering of systems
> to prove that vulnerabilities are real, but clearly could be used
> maliciously to break the law."
>
> "There was tons of security around these systems and even possession
> of tools to penetrate a system was a crime too."
>
> In the new text, the author tells us that "what I hoped to convey was
> the importance of well-managed testing under the watch of a user who
> knows what they’re doing".
>
> This looks like a lame PR attempt at stopping the shitstorm they
> started by using the good old excuse this-is-not-what-I-meant.
>
> And if the author is sincere and it was really his original intent, he
> should refrain from blogging from now on...
>
> S.
>
>
> On Tue, May 4, 2010 at 11:48 AM, Mike Hale 
> wrote:
> > Looks like he rewrote it and clarified what he meant to say.
> >
> > I think this is a lesson on why you really should proofread stuff and
> > ask someone else to go over your writings before you publish
> > something.
> >
> > On Mon, May 3, 2010 at 5:44 PM, Sec News  wrote:
> >> Did anyone else see this?
> >>
> >>
> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
> >> """
> >> Penetration Tools Can Be Weapons in the Wrong Hands
> >> Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security,
> >> Vulnerability Management
> >>
> >> After a lifetime in the vulnerability assessment field, I’ve come to
> look at
> >> penetration testing almost as a kind of crime, or at least a
> misdemeanor.
> >>
> >> We enjoy freedom of speech, even if it breaks the law or license
> agreements.
> >> Websites cover techniques for jailbreaking iPhones even though it
> clearly
> >> violates the EULA for Apples devices. Penetration tools clearly allow
> the
> >> breaking and entering of systems to prove that vulnerabilities are real,
> but
> >> clearly could be used maliciously to break the law.
> >>
> >> Making these tools readily available is like encouraging people to play
> with
> >> fireworks. Too bold of a statement? I think not. Fireworks can make a
> >> spectacular show, but they can also be abused and cause serious damage.
> In
> >> most states, only people licensed and trained are permitted to set off
> >> fireworks.
> >>
> >> Now consider a pen test tool. In its open form, on the Internet,
> everyone
> >> and anyone can use it to test their systems, but in the wrong hands, for
> >> free, it can be used to break into systems and cause disruption, steal
> >> information, or cause even more permanent types of harm.
> >>
> >> How many people remember the 80’s TV show Max Headroom? Next to murder,
> the
> >> most severe crime was if users illegally used information technology
> systems
> >> to steal information or make money. There was tons of security around
> these
> >> systems and even possession of tools to penetrate a system was a crime
> too.
> >> So what’s the difference?
> >>
> >> Yes, it is just a TV show but in reality today we are in effect putting
> >> weapons in people’s hands, not tracking them, and allowing them to use
> them
> >> near anonymously to perform crimes or learn how to perform more
> >> sophisticated attacks. It all comes back to the first amendment and
> Freedom
> >> of Speech. I can write a blog of this nature, state my opinion about how
> I
> >> feel about free penetration testing tools, and assure everyone that they
> >> need defenses to protect their systems, since free weapons are available
> >> that can break into your systems – easily.
> >> """
> >> WOW - am i the only one to go WTF to this?  Talk about alienating your
> >> customers and shitting where you eat.
> >> And to think i used to be a fan...
> >> - Some anonymous ex-eEye fan
> >> ___
>

Re: [Full-disclosure] WTF eEye Really?

2010-05-05 Thread Sébastien Duquette
Looks to me more like the "unqualified person doing testing" argument
is used as an escape from their faux-pas.  When you read the initial
article, the author is clearly interested in the issue of crime being
perpetrated by using these tools :

"Penetration tools clearly allow the breaking and entering of systems
to prove that vulnerabilities are real, but clearly could be used
maliciously to break the law."

"There was tons of security around these systems and even possession
of tools to penetrate a system was a crime too."

In the new text, the author tells us that "what I hoped to convey was
the importance of well-managed testing under the watch of a user who
knows what they’re doing".

This looks like a lame PR attempt at stopping the shitstorm they
started by using the good old excuse this-is-not-what-I-meant.

And if the author is sincere and it was really his original intent, he
should refrain from blogging from now on...

S.


On Tue, May 4, 2010 at 11:48 AM, Mike Hale  wrote:
> Looks like he rewrote it and clarified what he meant to say.
>
> I think this is a lesson on why you really should proofread stuff and
> ask someone else to go over your writings before you publish
> something.
>
> On Mon, May 3, 2010 at 5:44 PM, Sec News  wrote:
>> Did anyone else see this?
>>
>> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
>> """
>> Penetration Tools Can Be Weapons in the Wrong Hands
>> Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security,
>> Vulnerability Management
>>
>> After a lifetime in the vulnerability assessment field, I’ve come to look at
>> penetration testing almost as a kind of crime, or at least a misdemeanor.
>>
>> We enjoy freedom of speech, even if it breaks the law or license agreements.
>> Websites cover techniques for jailbreaking iPhones even though it clearly
>> violates the EULA for Apples devices. Penetration tools clearly allow the
>> breaking and entering of systems to prove that vulnerabilities are real, but
>> clearly could be used maliciously to break the law.
>>
>> Making these tools readily available is like encouraging people to play with
>> fireworks. Too bold of a statement? I think not. Fireworks can make a
>> spectacular show, but they can also be abused and cause serious damage. In
>> most states, only people licensed and trained are permitted to set off
>> fireworks.
>>
>> Now consider a pen test tool. In its open form, on the Internet, everyone
>> and anyone can use it to test their systems, but in the wrong hands, for
>> free, it can be used to break into systems and cause disruption, steal
>> information, or cause even more permanent types of harm.
>>
>> How many people remember the 80’s TV show Max Headroom? Next to murder, the
>> most severe crime was if users illegally used information technology systems
>> to steal information or make money. There was tons of security around these
>> systems and even possession of tools to penetrate a system was a crime too.
>> So what’s the difference?
>>
>> Yes, it is just a TV show but in reality today we are in effect putting
>> weapons in people’s hands, not tracking them, and allowing them to use them
>> near anonymously to perform crimes or learn how to perform more
>> sophisticated attacks. It all comes back to the first amendment and Freedom
>> of Speech. I can write a blog of this nature, state my opinion about how I
>> feel about free penetration testing tools, and assure everyone that they
>> need defenses to protect their systems, since free weapons are available
>> that can break into your systems – easily.
>> """
>> WOW - am i the only one to go WTF to this?  Talk about alienating your
>> customers and shitting where you eat.
>> And to think i used to be a fan...
>> - Some anonymous ex-eEye fan
>> ___
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
>
> --
> 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Mike Hale
Looks like he rewrote it and clarified what he meant to say.

I think this is a lesson on why you really should proofread stuff and
ask someone else to go over your writings before you publish
something.

On Mon, May 3, 2010 at 5:44 PM, Sec News  wrote:
> Did anyone else see this?
>
> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
> """
> Penetration Tools Can Be Weapons in the Wrong Hands
> Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security,
> Vulnerability Management
>
> After a lifetime in the vulnerability assessment field, I’ve come to look at
> penetration testing almost as a kind of crime, or at least a misdemeanor.
>
> We enjoy freedom of speech, even if it breaks the law or license agreements.
> Websites cover techniques for jailbreaking iPhones even though it clearly
> violates the EULA for Apples devices. Penetration tools clearly allow the
> breaking and entering of systems to prove that vulnerabilities are real, but
> clearly could be used maliciously to break the law.
>
> Making these tools readily available is like encouraging people to play with
> fireworks. Too bold of a statement? I think not. Fireworks can make a
> spectacular show, but they can also be abused and cause serious damage. In
> most states, only people licensed and trained are permitted to set off
> fireworks.
>
> Now consider a pen test tool. In its open form, on the Internet, everyone
> and anyone can use it to test their systems, but in the wrong hands, for
> free, it can be used to break into systems and cause disruption, steal
> information, or cause even more permanent types of harm.
>
> How many people remember the 80’s TV show Max Headroom? Next to murder, the
> most severe crime was if users illegally used information technology systems
> to steal information or make money. There was tons of security around these
> systems and even possession of tools to penetrate a system was a crime too.
> So what’s the difference?
>
> Yes, it is just a TV show but in reality today we are in effect putting
> weapons in people’s hands, not tracking them, and allowing them to use them
> near anonymously to perform crimes or learn how to perform more
> sophisticated attacks. It all comes back to the first amendment and Freedom
> of Speech. I can write a blog of this nature, state my opinion about how I
> feel about free penetration testing tools, and assure everyone that they
> need defenses to protect their systems, since free weapons are available
> that can break into your systems – easily.
> """
> WOW - am i the only one to go WTF to this?  Talk about alienating your
> customers and shitting where you eat.
> And to think i used to be a fan...
> - Some anonymous ex-eEye fan
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Michal Zalewski
> are there any reliable caches for this url?

Attrition has an annotated, but otherwise verbatim copy:

http://attrition.org/errata/sec-co/eeye-01.html

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Georgi Guninski
On Mon, May 03, 2010 at 05:44:55PM -0700, Sec News wrote:
> Did anyone else see this?
> 
> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
>

are there any reliable caches for this url?

search for the shit you quoted returns basically this thread and ATM
the url says "we fucked up".

-- 
joro

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Marsh Ray
On 5/4/2010 12:37 PM, Justin C. Klein Keane wrote:
> For an interesting take on this see page xxxix in Ross Anderson's
> "Security Engineering" (the Legal Notice).  Apparently the debate over
> whether or not to publish tools/techniques that could be used for evil
> (specifically with respects to crypto) dates back to 1641.

Yep, perhaps another example of why you should never assume that your
issue is new?

- Marsh

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

For an interesting take on this see page xxxix in Ross Anderson's
"Security Engineering" (the Legal Notice).  Apparently the debate over
whether or not to publish tools/techniques that could be used for evil
(specifically with respects to crypto) dates back to 1641.

Justin C. Klein Keane
http://www.MadIrish.net

The digital signature on this message can be confirmed
using the public key at http://www.madirish.net/gpgkey

On 05/04/2010 01:32 PM, Marsh Ray wrote:
> 
> On 5/3/2010 7:44 PM, Sec News wrote:
>> Did anyone else see this?
>>
>> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
>>
>> """
>> Penetration Tools Can Be Weapons in the Wrong Hands
>> Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security,
>> Vulnerability Management
>>
>> After a lifetime in the vulnerability assessment field, I’ve come to look at
>> penetration testing almost as a kind of crime, or at least a misdemeanor.
> 
> Is this for real?
> 
>> We enjoy freedom of speech, even if it breaks the law or license agreements.
> 
> No, there are laws and contracts that can restrict speech.
> 
>> Websites cover techniques for jailbreaking iPhones even though it clearly
>> violates the EULA for Apples devices.
> 
> Since when did devices have an EULA? I haven't bought an Apple in modern
> times, do they make you sign something before buying it?
> 
>> Penetration tools clearly allow the
>> breaking and entering of systems to prove that vulnerabilities are real, but
>> clearly could be used maliciously to break the law.
> 
> It took you a lifetime in the vulnerability assessment field to figure
> this out?
> 
>> Making these tools readily available is like encouraging people to play with
>> fireworks. Too bold of a statement? I think not. Fireworks can make a
>> spectacular show, but they can also be abused and cause serious damage. In
>> most states, only people licensed and trained are permitted to set off
>> fireworks.
> 
> Fireworks are macroscopic physical objects the transportation which can
> reasonably be regulated.
> 
>> Now consider a pen test tool. In its open form, on the Internet, everyone
>> and anyone can use it to test their systems, but in the wrong hands, for
>> free, it can be used to break into systems and cause disruption, steal
>> information, or cause even more permanent types of harm.
> 
> Yep.
> 
> Your mistake is assuming that there is some jurisdiction of law that
> encompasses the Internet. Indeed, it appears that often the adversary is
> a state entity itself.
> 
> Those who accept this argument that testing tools should be somehow
> restricted are only tying their own hands. You can bet that your
> adversary will not feel so restricted (if you have anything actually
> worth protecting that is.)
> 
> It is even more foolish to assume that your adversary doesn't already
> have it.
> 
>> How many people remember the 80’s TV show Max Headroom?
> 
> I stop reading now.
> 
> - Marsh
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iPwEAQECAAYFAkvgW0EACgkQkSlsbLsN1gBw8QcAra1aONNBorzhlwi4kNoRlw9G
rm5FlvMw3Sv7m9tzqrqGIn9lIho/somrbl4jQ8T/woJK+gS4gccS4UqV1XkvW9aR
W7ROz2eTezsUgTwyHU3tW9VuwsinFvO5n6XowCFG1pAO/O/7y+eN1usYYdz3W9Wm
ORtmxcRNyb/cYmSMuTq+3dktOG7s+XWA47FaGkfdjzTefA7dGYyUx/zysCnFKLbX
eLVA7GL79KSr6SB37uOi4vgyN0hze/p1vMw9POTo0Bhq4nT1Y1/5oyYhd29+aH9M
h3fQ/V96SFCAy1Cqq9U=
=oDqa
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Marsh Ray

On 5/3/2010 7:44 PM, Sec News wrote:
> Did anyone else see this?
> 
> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
> 
> """
> Penetration Tools Can Be Weapons in the Wrong Hands
> Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security,
> Vulnerability Management
> 
> After a lifetime in the vulnerability assessment field, I’ve come to look at
> penetration testing almost as a kind of crime, or at least a misdemeanor.

Is this for real?

> We enjoy freedom of speech, even if it breaks the law or license agreements.

No, there are laws and contracts that can restrict speech.

> Websites cover techniques for jailbreaking iPhones even though it clearly
> violates the EULA for Apples devices.

Since when did devices have an EULA? I haven't bought an Apple in modern
times, do they make you sign something before buying it?

> Penetration tools clearly allow the
> breaking and entering of systems to prove that vulnerabilities are real, but
> clearly could be used maliciously to break the law.

It took you a lifetime in the vulnerability assessment field to figure
this out?

> Making these tools readily available is like encouraging people to play with
> fireworks. Too bold of a statement? I think not. Fireworks can make a
> spectacular show, but they can also be abused and cause serious damage. In
> most states, only people licensed and trained are permitted to set off
> fireworks.

Fireworks are macroscopic physical objects the transportation which can
reasonably be regulated.

> Now consider a pen test tool. In its open form, on the Internet, everyone
> and anyone can use it to test their systems, but in the wrong hands, for
> free, it can be used to break into systems and cause disruption, steal
> information, or cause even more permanent types of harm.

Yep.

Your mistake is assuming that there is some jurisdiction of law that
encompasses the Internet. Indeed, it appears that often the adversary is
a state entity itself.

Those who accept this argument that testing tools should be somehow
restricted are only tying their own hands. You can bet that your
adversary will not feel so restricted (if you have anything actually
worth protecting that is.)

It is even more foolish to assume that your adversary doesn't already
have it.

> How many people remember the 80’s TV show Max Headroom?

I stop reading now.

- Marsh

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Christian Sciberras
Load o' bull.

On Tue, May 4, 2010 at 2:44 AM, Sec News  wrote:

> Did anyone else see this?
>
>
> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
>
> """
> Penetration Tools Can Be Weapons in the Wrong Hands
> Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security,
> Vulnerability Management
>
> After a lifetime in the vulnerability assessment field, I’ve come to look
> at penetration testing almost as a kind of crime, or at least a misdemeanor.
>
> We enjoy freedom of speech, even if it breaks the law or license
> agreements. Websites cover techniques for jailbreaking iPhones even though
> it clearly violates the EULA for Apples devices. Penetration tools clearly
> allow the breaking and entering of systems to prove that vulnerabilities are
> real, but clearly could be used maliciously to break the law.
>
> Making these tools readily available is like encouraging people to play
> with fireworks. Too bold of a statement? I think not. Fireworks can make a
> spectacular show, but they can also be abused and cause serious damage. In
> most states, only people licensed and trained are permitted to set off
> fireworks.
>
> Now consider a pen test tool. In its open form, on the Internet, everyone
> and anyone can use it to test their systems, but in the wrong hands, for
> free, it can be used to break into systems and cause disruption, steal
> information, or cause even more permanent types of harm.
>
> How many people remember the 80’s TV show Max Headroom? Next to murder, the
> most severe crime was if users illegally used information technology systems
> to steal information or make money. There was tons of security around these
> systems and even possession of tools to penetrate a system was a crime too.
> So what’s the difference?
>
> Yes, it is just a TV show but in reality today we are in effect putting
> weapons in people’s hands, not tracking them, and allowing them to use them
> near anonymously to perform crimes or learn how to perform more
> sophisticated attacks. It all comes back to the first amendment and Freedom
> of Speech. I can write a blog of this nature, state my opinion about how I
> feel about free penetration testing tools, and assure everyone that they
> need defenses to protect their systems, since free weapons are available
> that can break into your systems – easily.
> """
>
> WOW - am i the only one to go WTF to this?  Talk about alienating your
> customers and shitting where you eat.
>
> And to think i used to be a fan...
>
> - Some anonymous ex-eEye fan
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] WTF eEye Really?

2010-05-04 Thread Sec News
Did anyone else see this?

http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands

"""
Penetration Tools Can Be Weapons in the Wrong Hands
Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security,
Vulnerability Management

After a lifetime in the vulnerability assessment field, I’ve come to look at
penetration testing almost as a kind of crime, or at least a misdemeanor.

We enjoy freedom of speech, even if it breaks the law or license agreements.
Websites cover techniques for jailbreaking iPhones even though it clearly
violates the EULA for Apples devices. Penetration tools clearly allow the
breaking and entering of systems to prove that vulnerabilities are real, but
clearly could be used maliciously to break the law.

Making these tools readily available is like encouraging people to play with
fireworks. Too bold of a statement? I think not. Fireworks can make a
spectacular show, but they can also be abused and cause serious damage. In
most states, only people licensed and trained are permitted to set off
fireworks.

Now consider a pen test tool. In its open form, on the Internet, everyone
and anyone can use it to test their systems, but in the wrong hands, for
free, it can be used to break into systems and cause disruption, steal
information, or cause even more permanent types of harm.

How many people remember the 80’s TV show Max Headroom? Next to murder, the
most severe crime was if users illegally used information technology systems
to steal information or make money. There was tons of security around these
systems and even possession of tools to penetrate a system was a crime too.
So what’s the difference?

Yes, it is just a TV show but in reality today we are in effect putting
weapons in people’s hands, not tracking them, and allowing them to use them
near anonymously to perform crimes or learn how to perform more
sophisticated attacks. It all comes back to the first amendment and Freedom
of Speech. I can write a blog of this nature, state my opinion about how I
feel about free penetration testing tools, and assure everyone that they
need defenses to protect their systems, since free weapons are available
that can break into your systems – easily.
"""

WOW - am i the only one to go WTF to this?  Talk about alienating your
customers and shitting where you eat.

And to think i used to be a fan...

- Some anonymous ex-eEye fan
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WTF people?

2009-01-11 Thread waveroad waveroad
Why dont you post under your real nick aka n3tcr4p ?

you think it make n3tcr4p kid more credible in some ways ?

0r m4yb3 5h4|| 1 5p34k |1k3 7h15 7o m4k3 you und3r574nd my p01n7 ?

1 don7 know wh3n 1 |ook 47 your w3b5173 1 wond3r .

2009/1/11 

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> You tell me.
>
> On Sun, 11 Jan 2009 19:30:17 -0500 Pete Licoln
>  wrote:
> >What's the point with MI5 n3td3v ?
> >
> >Regards Pete
> -BEGIN PGP SIGNATURE-
> Charset: UTF8
> Note: This signature can be verified at https://www.hushtools.com/verify
> Version: Hush 3.0
>
> wpwEAQMCAAYFAklqm4cACgkQynWwk3/AtyOg/gP+KWIstvs71K7K+cvK/9bo/tRsYBC9
> iCu8diF/TpkXYvnEPXoV+IRH06bJxqhGkkuvE4zBhj0HtTlKMO5MmYPuY2j9GiBWIM3M
> vfYvbxBaZS8pZGJuoU8nbCYag8pXzf1FaEeNZhTT2J8Lhpy4JD12Duxnq2nnEtJL+Oz/
> UCQxaPk=
> =fsii
> -END PGP SIGNATURE-
>
> --
> Click for free info on online masters degrees and make up to $150K/ year
>
> http://tagline.hushmail.com/fc/PnY6qxtpjZXJLh7RrSDxAfzH8U8VbYeKiNKjN2pvOBEY7XUQCex7a/
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WTF people?

2009-01-11 Thread sexyazngrl69
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

You tell me.

On Sun, 11 Jan 2009 19:30:17 -0500 Pete Licoln
 wrote:
>What's the point with MI5 n3td3v ?
>
>Regards Pete
-BEGIN PGP SIGNATURE-
Charset: UTF8
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 3.0

wpwEAQMCAAYFAklqm4cACgkQynWwk3/AtyOg/gP+KWIstvs71K7K+cvK/9bo/tRsYBC9
iCu8diF/TpkXYvnEPXoV+IRH06bJxqhGkkuvE4zBhj0HtTlKMO5MmYPuY2j9GiBWIM3M
vfYvbxBaZS8pZGJuoU8nbCYag8pXzf1FaEeNZhTT2J8Lhpy4JD12Duxnq2nnEtJL+Oz/
UCQxaPk=
=fsii
-END PGP SIGNATURE-

--
Click for free info on online masters degrees and make up to $150K/ year
 
http://tagline.hushmail.com/fc/PnY6qxtpjZXJLh7RrSDxAfzH8U8VbYeKiNKjN2pvOBEY7XUQCex7a/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF people?

2009-01-11 Thread Pete Licoln
What's the point with MI5 n3td3v ?

Regards Pete
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WTF people?

2009-01-11 Thread sexyazngrl69
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

naive to think mi5 is gender biased:)))

On Sun, 11 Jan 2009 18:36:56 -0500 Pete Licoln
 wrote:
>sexyazngrl69 is a n3td3v alias, no doubt about it.
>
>Regards Pete
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpwEAQMCAAYFAklqjccACgkQynWwk3/AtyMqRwQAiOCfp9PC1o0g7CP8X8gr1psnpijR
NVIHQqkbjl1L4uAa55qBUElskX7n5DTzLflFIoT1u9zfCV9KTz8kPpdPZjMnXBpXzFmA
N7+lDieYQvJn+0PZVhH7zkzJX3aXcgmcNoIRoVSjazJlHKK76lNXrhQ2vqAPeSCA01NR
wtKWVj4=
=WSQG
-END PGP SIGNATURE-

--
Stuck in a dead end job?? Click to start living your dreams by earning an 
online degree.
 
http://tagline.hushmail.com/fc/PnY6qxtpfWguKXIbuKy0wc53HbV7MyFTUOqm2btdhhgyTGOJRdfcM/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF people?

2009-01-11 Thread sr.
amazing how every message becomes tainted with bullshit.

On Sun, Jan 11, 2009 at 6:01 PM,   wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> pics?
>
> On Sun, 11 Jan 2009 17:48:53 -0500 waveroad waveroad
>  wrote:
>>N3td3v other alias spotted.
>>
>>
>>
>>2009/1/11 
>>
>>> -BEGIN PGP SIGNED MESSAGE-
>>> Hash: SHA1
>>>
>>> i find the surname mcafee to be a turn-on here on the security
>>> mailing list, mister good hacker:)))
>>>
>>> a/s/l?
>>>
>>>
>>> On Sun, 11 Jan 2009 16:49:20 -0500 Will McAfee >> commun...@thegoodhacker.com> wrote:
>>> >I have lurked for some time, and really, this list has become
>>> >pathetic
>>> >due to it's hiijacking by two or three trolls with nothing
>>better
>>> >to
>>> >do than destroy the relevant signal to noise ratio.  This list
>>is
>>> >not
>>> >about MI5, the NSA, or Mossad unless there is something
>>practical
>>> >to
>>> >be learned from them.  I do not care about the information war
>>> >between
>>> >Russia and Georgia unless it is about the systems used.  Think
>>of
>>> >this
>>> >list as like a trade correspondence journal, not a public
>>> >tackboard.
>>> >
>>> >Sent from my iPhone
>>> >
>>> >___
>>> >Full-Disclosure - We believe in it.
>>> >Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> >Hosted and sponsored by Secunia - http://secunia.com/
>>> -BEGIN PGP SIGNATURE-
>>> Charset: UTF8
>>> Version: Hush 3.0
>>> Note: This signature can be verified at
>>https://www.hushtools.com/verify
>>>
>>>
>>wpwEAQMCAAYFAklqcbUACgkQynWwk3/AtyOa+wP/YQJlJsabFMRjU8FEs6V+t4eEwkW
>>0
>>>
>>QHX6NsZkryCvIgNWKjPjCTq25n/sS8JKr9oKFJybeyhgY9ADMJ94rLspQU6pQetJnfk
>>o
>>>
>>rkmOnzyUOPzXdmBDJH/34qe3K55k8v7f7OeWLu3xosxWP8iWJwQWR2gXF11hELGJKbJ
>>/
>>> 9Zzisvg=
>>> =cJJ3
>>> -END PGP SIGNATURE-
>>>
>>> --
>>> Click for free info on online doctorate degrees and make up to
>>$250k/ year.
>>>
>>>
>>http://tagline.hushmail.com/fc/PnY6qxudoSZgDEE0yj7ARzIKdHrLoCs88Zzh
>>zE4rU3tdHkjzM8yso/
>>>
>>> ___
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>
> -BEGIN PGP SIGNATURE-
> Charset: UTF8
> Version: Hush 3.0
> Note: This signature can be verified at https://www.hushtools.com/verify
>
> wpwEAQMCAAYFAklqek0ACgkQynWwk3/AtyPcEgP8ClWXNKSO2PiPEUGhalNNnQD3LORX
> LxkxnMgYlCPb06v4unM1RSC4ohJZdX7T+bRrvNQdO9b0RsP34pkdCbCZavLMsxaZChbJ
> /ApjICH6vsajaRdu0ZEH5HjnfAwnYcVpAFKamfnP7h8Zyzgp9ZfHZv4ZEOYL9oHxh2NN
> CdQCXww=
> =Hgbn
> -END PGP SIGNATURE-
>
> --
> Click for free info on business schools, $150K/ year potential.
>  
> http://tagline.hushmail.com/fc/PnY6qxsZgJoEzGwoSheR0lZiwV2oU7O92zSQHsC8LzPC3isaZnbmg/
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF people?

2009-01-11 Thread Pete Licoln
sexyazngrl69 is a n3td3v alias, no doubt about it.

Regards Pete
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WTF people?

2009-01-11 Thread sexyazngrl69
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

pics?

On Sun, 11 Jan 2009 17:48:53 -0500 waveroad waveroad
 wrote:
>N3td3v other alias spotted.
>
>
>
>2009/1/11 
>
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> i find the surname mcafee to be a turn-on here on the security
>> mailing list, mister good hacker:)))
>>
>> a/s/l?
>>
>>
>> On Sun, 11 Jan 2009 16:49:20 -0500 Will McAfee > commun...@thegoodhacker.com> wrote:
>> >I have lurked for some time, and really, this list has become
>> >pathetic
>> >due to it's hiijacking by two or three trolls with nothing
>better
>> >to
>> >do than destroy the relevant signal to noise ratio.  This list
>is
>> >not
>> >about MI5, the NSA, or Mossad unless there is something
>practical
>> >to
>> >be learned from them.  I do not care about the information war
>> >between
>> >Russia and Georgia unless it is about the systems used.  Think
>of
>> >this
>> >list as like a trade correspondence journal, not a public
>> >tackboard.
>> >
>> >Sent from my iPhone
>> >
>> >___
>> >Full-Disclosure - We believe in it.
>> >Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> >Hosted and sponsored by Secunia - http://secunia.com/
>> -BEGIN PGP SIGNATURE-
>> Charset: UTF8
>> Version: Hush 3.0
>> Note: This signature can be verified at
>https://www.hushtools.com/verify
>>
>>
>wpwEAQMCAAYFAklqcbUACgkQynWwk3/AtyOa+wP/YQJlJsabFMRjU8FEs6V+t4eEwkW
>0
>>
>QHX6NsZkryCvIgNWKjPjCTq25n/sS8JKr9oKFJybeyhgY9ADMJ94rLspQU6pQetJnfk
>o
>>
>rkmOnzyUOPzXdmBDJH/34qe3K55k8v7f7OeWLu3xosxWP8iWJwQWR2gXF11hELGJKbJ
>/
>> 9Zzisvg=
>> =cJJ3
>> -END PGP SIGNATURE-
>>
>> --
>> Click for free info on online doctorate degrees and make up to
>$250k/ year.
>>
>>
>http://tagline.hushmail.com/fc/PnY6qxudoSZgDEE0yj7ARzIKdHrLoCs88Zzh
>zE4rU3tdHkjzM8yso/
>>
>> ___
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpwEAQMCAAYFAklqek0ACgkQynWwk3/AtyPcEgP8ClWXNKSO2PiPEUGhalNNnQD3LORX
LxkxnMgYlCPb06v4unM1RSC4ohJZdX7T+bRrvNQdO9b0RsP34pkdCbCZavLMsxaZChbJ
/ApjICH6vsajaRdu0ZEH5HjnfAwnYcVpAFKamfnP7h8Zyzgp9ZfHZv4ZEOYL9oHxh2NN
CdQCXww=
=Hgbn
-END PGP SIGNATURE-

--
Click for free info on business schools, $150K/ year potential.
 
http://tagline.hushmail.com/fc/PnY6qxsZgJoEzGwoSheR0lZiwV2oU7O92zSQHsC8LzPC3isaZnbmg/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF people?

2009-01-11 Thread waveroad waveroad
N3td3v other alias spotted.



2009/1/11 

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> i find the surname mcafee to be a turn-on here on the security
> mailing list, mister good hacker:)))
>
> a/s/l?
>
>
> On Sun, 11 Jan 2009 16:49:20 -0500 Will McAfee  commun...@thegoodhacker.com> wrote:
> >I have lurked for some time, and really, this list has become
> >pathetic
> >due to it's hiijacking by two or three trolls with nothing better
> >to
> >do than destroy the relevant signal to noise ratio.  This list is
> >not
> >about MI5, the NSA, or Mossad unless there is something practical
> >to
> >be learned from them.  I do not care about the information war
> >between
> >Russia and Georgia unless it is about the systems used.  Think of
> >this
> >list as like a trade correspondence journal, not a public
> >tackboard.
> >
> >Sent from my iPhone
> >
> >___
> >Full-Disclosure - We believe in it.
> >Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >Hosted and sponsored by Secunia - http://secunia.com/
> -BEGIN PGP SIGNATURE-
> Charset: UTF8
> Version: Hush 3.0
> Note: This signature can be verified at https://www.hushtools.com/verify
>
> wpwEAQMCAAYFAklqcbUACgkQynWwk3/AtyOa+wP/YQJlJsabFMRjU8FEs6V+t4eEwkW0
> QHX6NsZkryCvIgNWKjPjCTq25n/sS8JKr9oKFJybeyhgY9ADMJ94rLspQU6pQetJnfko
> rkmOnzyUOPzXdmBDJH/34qe3K55k8v7f7OeWLu3xosxWP8iWJwQWR2gXF11hELGJKbJ/
> 9Zzisvg=
> =cJJ3
> -END PGP SIGNATURE-
>
> --
> Click for free info on online doctorate degrees and make up to $250k/ year.
>
> http://tagline.hushmail.com/fc/PnY6qxudoSZgDEE0yj7ARzIKdHrLoCs88ZzhzE4rU3tdHkjzM8yso/
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WTF people?

2009-01-11 Thread Rants nRaves
If you want to solve the problem, then you and people like you need to:

Step 1: Filter out n3td3v, urleet, etc so you never see their posts or
replies to them. ie: filter the noise Step 2: Post something that you think
is relevant to the list. ie: add to the signal
Step 3: Profit!

Notice there is no step which reads: "Whine and complain about the noise on
the list like a little girl."-  because clearly that's proven not to be
effective.

-Rants

On Sun, Jan 11, 2009 at 1:49 PM, Will McAfee <
sec-commun...@thegoodhacker.com> wrote:

> I have lurked for some time, and really, this list has become pathetic
> due to it's hiijacking by two or three trolls with nothing better to
> do than destroy the relevant signal to noise ratio.  This list is not
> about MI5, the NSA, or Mossad unless there is something practical to
> be learned from them.  I do not care about the information war between
> Russia and Georgia unless it is about the systems used.  Think of this
> list as like a trade correspondence journal, not a public tackboard.
>
> Sent from my iPhone
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
- Rants
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WTF people?

2009-01-11 Thread sexyazngrl69
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

i find the surname mcafee to be a turn-on here on the security
mailing list, mister good hacker:)))

a/s/l?


On Sun, 11 Jan 2009 16:49:20 -0500 Will McAfee  wrote:
>I have lurked for some time, and really, this list has become
>pathetic
>due to it's hiijacking by two or three trolls with nothing better
>to
>do than destroy the relevant signal to noise ratio.  This list is
>not
>about MI5, the NSA, or Mossad unless there is something practical
>to
>be learned from them.  I do not care about the information war
>between
>Russia and Georgia unless it is about the systems used.  Think of
>this
>list as like a trade correspondence journal, not a public
>tackboard.
>
>Sent from my iPhone
>
>___
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpwEAQMCAAYFAklqcbUACgkQynWwk3/AtyOa+wP/YQJlJsabFMRjU8FEs6V+t4eEwkW0
QHX6NsZkryCvIgNWKjPjCTq25n/sS8JKr9oKFJybeyhgY9ADMJ94rLspQU6pQetJnfko
rkmOnzyUOPzXdmBDJH/34qe3K55k8v7f7OeWLu3xosxWP8iWJwQWR2gXF11hELGJKbJ/
9Zzisvg=
=cJJ3
-END PGP SIGNATURE-

--
Click for free info on online doctorate degrees and make up to $250k/ year.
 
http://tagline.hushmail.com/fc/PnY6qxudoSZgDEE0yj7ARzIKdHrLoCs88ZzhzE4rU3tdHkjzM8yso/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] WTF people?

2009-01-11 Thread Will McAfee
I have lurked for some time, and really, this list has become pathetic  
due to it's hiijacking by two or three trolls with nothing better to  
do than destroy the relevant signal to noise ratio.  This list is not  
about MI5, the NSA, or Mossad unless there is something practical to  
be learned from them.  I do not care about the information war between  
Russia and Georgia unless it is about the systems used.  Think of this  
list as like a trade correspondence journal, not a public tackboard.

Sent from my iPhone

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/