Re: [Full-disclosure] what is this?

2008-01-18 Thread worried security
On Jan 18, 2008 5:44 PM, Fredrick Diggle <[EMAIL PROTECTED]> wrote:
> Hear that H.D.? While analyzing security for UT Dallas Paul came to
> the conclusion that you suck...

Do you really think HDMoore gives a crap what you say or Paul from
Dallas says? Get a f***ing grip and stop trying to raise tensions onto
the list to provoke high profile hackers to get involved in your jail
bait.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-18 Thread Fredrick Diggle
Hear that H.D.? While analyzing security for UT Dallas Paul came to
the conclusion that you suck...

On Jan 17, 2008 5:32 PM, Paul Schmehl <[EMAIL PROTECTED]> wrote:
> --On Thursday, January 17, 2008 15:16:30 -0600 Fredrick Diggle
> <[EMAIL PROTECTED]> wrote:
>
> > Seems to Fredrick Diggle that if you are any good at your job you
> > should be thanking the sheltered research corner for keeping you in
> > mustache wax.
>
> That's about the funniest thing I've ever read.  If every researcher on the
> planet died tomorrow, it wouldn't change the attack matrix one bit.  We'd 
> still
> get hammered with the same crap we get hammered with now.  We just wouldn't
> have to put up with all the snarky "up smarter than you" crap from
> "researchers".
>
> Besides, the intelligent ones are on this list anyway.  They're busy actually
> *doing* research.
>
> --
> Paul Schmehl ([EMAIL PROTECTED])
> Senior Information Security Analyst
> The University of Texas at Dallas
> http://www.utdallas.edu/ir/security/
>
> ___
>
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-17 Thread Paul Schmehl
--On Thursday, January 17, 2008 15:16:30 -0600 Fredrick Diggle 
<[EMAIL PROTECTED]> wrote:

> Seems to Fredrick Diggle that if you are any good at your job you
> should be thanking the sheltered research corner for keeping you in
> mustache wax.

That's about the funniest thing I've ever read.  If every researcher on the 
planet died tomorrow, it wouldn't change the attack matrix one bit.  We'd still 
get hammered with the same crap we get hammered with now.  We just wouldn't 
have to put up with all the snarky "up smarter than you" crap from 
"researchers".

Besides, the intelligent ones are on this list anyway.  They're busy actually 
*doing* research.

-- 
Paul Schmehl ([EMAIL PROTECTED])
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-17 Thread Valdis . Kletnieks
On Wed, 16 Jan 2008 23:44:19 -0300, damncon said:
> your comments are so fucking shitty, the articles you write are so
> fucking useless (Web Server Botnets and Server Farms as Attack
> Platforms), DONT YOU GET FUCKING TIRED OF ALWAYS TALKING ABOUT THE
> SAME BLABLABLA BOTNETDDOSRFI SHIT?

One of my co-workers has a rubber stamp that says "I told you about this in 
19__",
which is still seeing use.

Quite frankly, many of us in the security industry get *tired* of always
talking about the "same blah blah shit".  It's why I stopped contributing
to the SANS/FBI Top 20 list every year - industry-wide, the *same exact
problems* were still the biggest issues.  But it's very much the lose-lose
proposition - if we keep talking about the *same* issues, we're flamed about
it, and when we try to raise awareness of an actual *new* issue, we're accused
of grandstanding.

Also, you have to remember that in many cases, we need to get the attention
of Corporate Suits - and unless it gets said forty-leven times, they don't
notice.




pgpocrptkQ3ci.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-17 Thread Valdis . Kletnieks
On Thu, 17 Jan 2008 15:16:30 CST, Fredrick Diggle said:
> mustache wax. If you inform your clients of the realistic risks
> involved then you also must realize that very few researchers are
> actually finding the types of bugs which keep your clients scared
> enough to hire you 

I'm not worried about being unemployed - there's literally a quarter acre of
raised-floor server room across the hallway, and plenty to keep our crew of
sysadmins busy for years to come.  If I end up spending less time doing
security, that just means I'll have more time to work on other things like
performance monitoring and tuning, backups (when you have enough disk that your
*incremental* backups run to several terabytes a night, it's decidedly
non-trivial), network storage, and other fun stuff...



pgpvUUJNwGiXI.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-17 Thread Fredrick Diggle
Seems to Fredrick Diggle that if you are any good at your job you
should be thanking the sheltered research corner for keeping you in
mustache wax. If you inform your clients of the realistic risks
involved then you also must realize that very few researchers are
actually finding the types of bugs which keep your clients scared
enough to hire you o.0. Fredrick Diggle thinks you owe someone an
apology.

Also, we should all put a description of our jobs on here like Valdis
has so graciously started. That way we will all know who we are
dealing with. Fredrick Diggle will start.

Fredrick's job is to primarily clean the primate cages but also he is
allowed to feed the chimps, train the babies to do backflips for
grapes (monkeys love grapes), and teach the older ones to search for
web vulns (The zoo doesn't know but he is building an army of monkey
hackers). Sometimes he is also asked to brush the hippopotamus' teeth
but Fredrick tends to get angry and throw things when he is forced to
do that because no matter how much you brush you just can't get rid of
the smell (interesting fact: hippos have bad breathe).

YAY!

On Jan 17, 2008 2:36 PM,  <[EMAIL PROTECTED]> wrote:
> On Wed, 16 Jan 2008 20:41:21 CST, reepex said:
>
> > woah paul are you talking about stuff you do not know about again? [1] You
> > like to butt in on conversations. and how do you that this virus has been
> > put in virustotal, maybe it is new? Most people with decent RE skill (
> > unlike you and gadi ),
>
> It might come as quite the shock to you in your sheltered corner of the
> security community, but many of us have jobs and roles in the community that
> don't directly involve either creating exploits or doing RE.  For instance,
> I will cheerfully admit that I suck at writing exploits, and I'm not the
> world expert on RE.  On the other hand, that's OK, because that's not my
> job.  My job is to answer questions like "What is our exposure if somebody
> has an exploit for bug #19345" and "What can we do to minimize the damage if
> somebody in the VP's office gets hit with the FooBar trojan?" and other
> similar "How do we keep our 30,000 users out of trouble?" questions.
> And to answer those sorts of questions doesn't take a lot of writing/RE
> knowledge, but it *does* require understanding things like "escalating
> privilege" (if attacker has X, can they get to Y?), auditing (how do we
> know if an attacker did or didn't get Y), deployment issues (how
> do you get 30,000 users to patch against something, when you don't have
> administrative control over their boxes), and social engineering (what you
> resort to when you can't find other ways to get the users to patch :)
> and social engineering.
>
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-17 Thread Valdis . Kletnieks
On Wed, 16 Jan 2008 20:41:21 CST, reepex said:

> woah paul are you talking about stuff you do not know about again? [1] You
> like to butt in on conversations. and how do you that this virus has been
> put in virustotal, maybe it is new? Most people with decent RE skill (
> unlike you and gadi ),

It might come as quite the shock to you in your sheltered corner of the
security community, but many of us have jobs and roles in the community that
don't directly involve either creating exploits or doing RE.  For instance,
I will cheerfully admit that I suck at writing exploits, and I'm not the
world expert on RE.  On the other hand, that's OK, because that's not my
job.  My job is to answer questions like "What is our exposure if somebody
has an exploit for bug #19345" and "What can we do to minimize the damage if
somebody in the VP's office gets hit with the FooBar trojan?" and other
similar "How do we keep our 30,000 users out of trouble?" questions.
And to answer those sorts of questions doesn't take a lot of writing/RE
knowledge, but it *does* require understanding things like "escalating
privilege" (if attacker has X, can they get to Y?), auditing (how do we
know if an attacker did or didn't get Y), deployment issues (how
do you get 30,000 users to patch against something, when you don't have
administrative control over their boxes), and social engineering (what you
resort to when you can't find other ways to get the users to patch :) 
and social engineering.




pgpmx7Ze9knFB.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-17 Thread reepex
and what exactly does gadi evron know and what .. original research ... has
he ever done?

and your second paragraph makes no sense, and is not related to the topic -
you sound like paul at utdallas

On 1/16/08, scott <[EMAIL PROTECTED]> wrote:
>
> Not to mention that Gadi Evron knows more than all of these wanna-be's
> put together!
>
> I guess the new world order of cyberpunks is just really intolerant of
> ideas that are outside the realm of neat tools and other people writing
> their exploits for them,so that the sheer act of learning something new
> turns them off. :-(
>
> Lord Help InfoSec,
>Scott
>
>
>
> Tremaine Lea wrote:
> > Probably because Gadi is at least close to on topic whether the majority
> > of readers appreciate the posts or not.
> >
> >
> > 
> >
> > ___
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
>
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-17 Thread SilentRunner
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

STFU you utterly pointless little creature.

If you have nothing constructive, edifying or humorous to impart,
stop wasting oxygen. The world is better off if there are no more
of your diseased tribe, so for the love of God, please don't breed.

>your comments are so fucking shitty, the articles you write are so
>fucking useless (Web Server Botnets and Server Farms as Attack
>Platforms), DONT YOU GET FUCKING TIRED OF ALWAYS TALKING ABOUT THE
>SAME BLABLABLA BOTNETDDOSRFI SHIT?
>
>disregards, fattyfagget
>
>___
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/







-BEGIN PGP SIGNATURE-
Note: This signature can be verified at https://www.hushtools.com/verify
Charset: UTF8
Version: Hush 2.5

wpwEAQECAAYFAkePCgAACgkQBGNKW24YMAdRIAP/bWz48Ir67nGQxZ4RLt4YW9NAE80W
DPXMuIkdcWpoa/xJ5C/NMRdtBmxI/hleDmgEEDxQCpMM2/Wxoszsn9nangf2Mr/rfF4z
6uzcLE97Bt/cuklUFoeYAhlLb2YuD6Dr2390m4zEBoFNBKZHuteXLYi6CI+As7kjzgbZ
g6+V4Ig=
=kLT1
-END PGP SIGNATURE-

--
Love Music?  Get a degree in Musical Education. Click Here.
http://tagline.hushmail.com/fc/Ioyw6h4fQxIkoianAjhBS1tATWvuYsEwTycFTE72igWd00oQhvF37K/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-16 Thread scott
Not to mention that Gadi Evron knows more than all of these wanna-be's 
put together!


I guess the new world order of cyberpunks is just really intolerant of 
ideas that are outside the realm of neat tools and other people writing 
their exploits for them,so that the sheer act of learning something new 
turns them off. :-(


Lord Help InfoSec,
  Scott



Tremaine Lea wrote:

Probably because Gadi is at least close to on topic whether the majority
of readers appreciate the posts or not.

  



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/





signature.asc
Description: OpenPGP digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-16 Thread Tremaine Lea
Probably because Gadi is at least close to on topic whether the majority
of readers appreciate the posts or not.

-- 
Tremaine Lea
Network Security Consultant
Intrepid ACL
"Paranoia for hire"


On Wed, 2008-01-16 at 20:19 -0600, reepex wrote:
> On Jan 14, 2008 3:46 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:
> I did not look at the malware, but it is pretty obvious you
> have been
> compromised.
> 
> Because you do not have the skill necesary to do so.
>  
> Linking also to my original article here:
> http://blogs.securiteam.com/index.php/archives/815
> 
> blah blah i have nothing useful to say but I am going to spam my blog
> that no one reads.
> 
> Why do we let gadi spam but bitch about the guy spamming to defend his
> business?
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/



signature.asc
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-16 Thread damncon
your comments are so fucking shitty, the articles you write are so
fucking useless (Web Server Botnets and Server Farms as Attack
Platforms), DONT YOU GET FUCKING TIRED OF ALWAYS TALKING ABOUT THE
SAME BLABLABLA BOTNETDDOSRFI SHIT?

disregards, fattyfagget

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-16 Thread reepex
woah paul are you talking about stuff you do not know about again? [1] You
like to butt in on conversations. and how do you that this virus has been
put in virustotal, maybe it is new? Most people with decent RE skill (
unlike you and gadi ),  would take the virus apart themsevles to see what it
is doing

[1] http://archives.neohapsis.com/archives/fulldisclosure/2007-11/0018.html

Here paul calls out comp sci majors and when I took his bet he backed down
saying it was a joke. Seems paul likes to run his mouth about nothing.

On Jan 16, 2008 8:26 PM, Paul Schmehl <[EMAIL PROTECTED]> wrote:

> --On January 16, 2008 8:19:52 PM -0600 reepex <[EMAIL PROTECTED]> wrote:
>
> > On Jan 14, 2008 3:46 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:
> >
> >> I did not look at the malware, but it is pretty obvious you have been
> >> compromised.
> >
> > Because you do not have the skill necesary to do so.
> >
>
> Yeah, right.  It takes real l33t ski11z to submit a file to Virustotal and
> find out what it is.  And uber l33t ski11z to figure out that the
> javascript on his website is downloading the infection to site visitors.
>
> Paul Schmehl ([EMAIL PROTECTED])
> Senior Information Security Analyst
> The University of Texas at Dallas
> http://www.utdallas.edu/ir/security/
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-16 Thread worried security
On Jan 17, 2008 2:26 AM, Paul Schmehl <[EMAIL PROTECTED]> wrote:
> --On January 16, 2008 8:19:52 PM -0600 reepex <[EMAIL PROTECTED]> wrote:
>
> > On Jan 14, 2008 3:46 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:
> >
> >> I did not look at the malware, but it is pretty obvious you have been
> >> compromised.
> >
> > Because you do not have the skill necesary to do so.
> >
>
> Yeah, right.  It takes real l33t ski11z to submit a file to Virustotal and
> find out what it is.  And uber l33t ski11z to figure out that the
> javascript on his website is downloading the infection to site visitors.

what you mean gadi evron has sk1llz? we're doomed.

regardz,

n3td3v

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-16 Thread Paul Schmehl
--On January 16, 2008 8:19:52 PM -0600 reepex <[EMAIL PROTECTED]> wrote:

> On Jan 14, 2008 3:46 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:
>
>> I did not look at the malware, but it is pretty obvious you have been
>> compromised.
>
> Because you do not have the skill necesary to do so.
>

Yeah, right.  It takes real l33t ski11z to submit a file to Virustotal and 
find out what it is.  And uber l33t ski11z to figure out that the 
javascript on his website is downloading the infection to site visitors.

Paul Schmehl ([EMAIL PROTECTED])
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-16 Thread reepex
On Jan 14, 2008 3:46 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:

> I did not look at the malware, but it is pretty obvious you have been
> compromised.


Because you do not have the skill necesary to do so.


> Linking also to my original article here:
> http://blogs.securiteam.com/index.php/archives/815
>

blah blah i have nothing useful to say but I am going to spam my blog that
no one reads.

Why do we let gadi spam but bitch about the guy spamming to defend his
business?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-16 Thread auto71278
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

>No, he's Nick Fitzgerald, one of the foremost experts in the world

>on malware,

Dear Paul,
sorry for the delay in answering to your e-mail but Hermione and I
were attending an important class here at Hogwarts. Anyway, now I’m
completely at your disposal.

I wanna believe in your words and I had an idea, I shall trust you.
You and your friend Gadi have one day to prove what you are
asserting (yes, you can help him, if you want).
Write a 60-words technical analysis about this malware and send it
to the list.  In case you can also use the technical comments
already spreaded to the list or in teh internet (well, excepted the
one from our great ph.d. at monkey.org or 3APA3A will own him
again, kthx).

Show that you aren’t just drones, who spend the days downloading e-
mails and posting shit everywhere, to everyone’s boredom.

This is your chance, the last one.

Regards,
Harry Potter
-BEGIN PGP SIGNATURE-
Note: This signature can be verified at https://www.hushtools.com/verify
Charset: UTF8
Version: Hush 2.5

wpwEAQECAAYFAkeOFywACgkQPpltNbWHYodH2gP/XscRv9QHLVIwd/+1btXwwWkm/M+I
3kiy2FAGAPbMoZM26xPnGiH3Yr89JsI3CVXNIRYOQ6tCztIWt2bUun1WO90CnglFIREz
Fbo6nALiOxvQ2jIxsqcus9XvG0e6GufZeompSiWc4JL4Z3pNOU4EiYb1turGOresoDq3
LR4MxIM=
=JqO2
-END PGP SIGNATURE-

--
Online Stock Trading - Straightforward pricing. Powerful tools. Click here!
http://tagline.hushmail.com/fc/Ioyw6h4dPYx37wOXnajy6LSNt8ZkZFM0twckkbPHmuyUpVk6AcLLsc/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-15 Thread Thomas Pollet
Mr. worthless security,

> stop replying to gadi evron he is a fruit cake.
>
> if we ignore him he will go away.
>
> :)

it didn't work for you, it won't work for G.E.

Regards,
T

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-15 Thread worried security
On Jan 15, 2008 5:24 PM, crazy frog crazy frog <[EMAIL PROTECTED]> wrote:
> nope i dont thnk it has to do with user agent.i have tried with
> IE,Firefox but nothing.though when u change ip it shows the stuff.so i
> think its ip based?

stop replying to gadi evron he is a fruit cake.

if we ignore him he will go away.

:)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-15 Thread Gadi Evron
On Tue, 15 Jan 2008, crazy frog crazy frog wrote:
> nick,
> ur not getting my point,the url is techicorner.com/{random string
> here},i have already mentioned it in previous posts.
> i have read the link sent by denis,and i would have to conclude that:
> 1)The problem does not occurs always,instead it occurs randomly based
> on IP or something like tht.

In recent kits, it is more likely it is user-agent based.

> 2)if u look at the pages on techicorner.com u will not find any
> malicious code,so its possible that the server is compromised and its
> an LKM
> please refer to these links:
> http://www.webhostingtalk.com/showthread.php?t=651748 [thanks denis]
>
> Thanks again everyone for your valuable suggestion,i posted here to
> share this stuff with everyone and may be u can learn from it.
>
> regards,
> _CF
>
> On Jan 15, 2008 12:15 PM, Nick FitzGerald <[EMAIL PROTECTED]> wrote:
>> crazy frog crazy frog wrote:
>>
>>> well,
>>> i received many response but no one is perfact.i checked the files and
>>> didn't find anything embeded in my scripts or pages.still i have to
>>> figure out why my antivirus randomly popsup?i mean most of the times
>>> it doesnt detect any infection but then suddenly this thing happnes
>>> and then everything seems ok.
>>> i dont think its a problem with my script otherwise i could have find
>>> the code or it should be repeating consistly.has any one still facing
>>> this issue in the techicorner.com or on tubeley.com or on
>>> secgeeks.com?
>>>
>>> let me know i m trying hard to digg this issue.
>>
>> If you would tell us the _actual_ URL where this behaviour is being
>> seen we would have a reasonable chance of actually diagnosing it.  As
>> it is, we're having to guess based on matching your half-arsed
>> descriptions of what you think is happening with our knowledge of what
>> has been seen going on out there.
>>
>> This may surprise you, but many thousands and thousands of sites are
>> compromised each day to display "similar" activity to what you've asked
>> to us to diagnose (aka "guess").
>>
>> If we could look at the actual site and see what is really happening
>> should have a better (if not perfect) chance of success.
>>
>>
>> Regards,
>>
>> Nick FitzGerald
>>
>>
>> ___
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
>
> -- 
> advertise on secgeeks?
> http://secgeeks.com/Advertising_on_Secgeeks.com
> http://newskicks.com
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-15 Thread worried security
On Jan 15, 2008 3:08 PM, Paul Schmehl <[EMAIL PROTECTED]> wrote:
>
> It's better to remain silent and be thought a fool than to open your mouth and
> remove all doubt.

tell that to gadi evron, wait a minute i think you were. (?)

--
cyber security mailing list
http://n3td3v.googlepages.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-15 Thread crazy frog crazy frog
nope i dont thnk it has to do with user agent.i have tried with
IE,Firefox but nothing.though when u change ip it shows the stuff.so i
think its ip based?

On Jan 15, 2008 10:52 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:
> On Tue, 15 Jan 2008, crazy frog crazy frog wrote:
> > nick,
> > ur not getting my point,the url is techicorner.com/{random string
> > here},i have already mentioned it in previous posts.
> > i have read the link sent by denis,and i would have to conclude that:
> > 1)The problem does not occurs always,instead it occurs randomly based
> > on IP or something like tht.
>
> In recent kits, it is more likely it is user-agent based.
>
>
> > 2)if u look at the pages on techicorner.com u will not find any
> > malicious code,so its possible that the server is compromised and its
> > an LKM
> > please refer to these links:
> > http://www.webhostingtalk.com/showthread.php?t=651748 [thanks denis]
> >
> > Thanks again everyone for your valuable suggestion,i posted here to
> > share this stuff with everyone and may be u can learn from it.
> >
> > regards,
> > _CF
> >
> > On Jan 15, 2008 12:15 PM, Nick FitzGerald <[EMAIL PROTECTED]> wrote:
> >> crazy frog crazy frog wrote:
> >>
> >>> well,
> >>> i received many response but no one is perfact.i checked the files and
> >>> didn't find anything embeded in my scripts or pages.still i have to
> >>> figure out why my antivirus randomly popsup?i mean most of the times
> >>> it doesnt detect any infection but then suddenly this thing happnes
> >>> and then everything seems ok.
> >>> i dont think its a problem with my script otherwise i could have find
> >>> the code or it should be repeating consistly.has any one still facing
> >>> this issue in the techicorner.com or on tubeley.com or on
> >>> secgeeks.com?
> >>>
> >>> let me know i m trying hard to digg this issue.
> >>
> >> If you would tell us the _actual_ URL where this behaviour is being
> >> seen we would have a reasonable chance of actually diagnosing it.  As
> >> it is, we're having to guess based on matching your half-arsed
> >> descriptions of what you think is happening with our knowledge of what
> >> has been seen going on out there.
> >>
> >> This may surprise you, but many thousands and thousands of sites are
> >> compromised each day to display "similar" activity to what you've asked
> >> to us to diagnose (aka "guess").
> >>
> >> If we could look at the actual site and see what is really happening
> >> should have a better (if not perfect) chance of success.
> >>
> >>
> >> Regards,
> >>
> >> Nick FitzGerald
> >>
> >>
> >> ___
> >> Full-Disclosure - We believe in it.
> >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >> Hosted and sponsored by Secunia - http://secunia.com/
> >>
> >
> >
> >
> > --
> > advertise on secgeeks?
> > http://secgeeks.com/Advertising_on_Secgeeks.com
> > http://newskicks.com
> >
>



-- 
advertise on secgeeks?
http://secgeeks.com/Advertising_on_Secgeeks.com
http://newskicks.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-15 Thread Valdis . Kletnieks
On Tue, 15 Jan 2008 09:08:32 CST, Paul Schmehl said:

> >> I did not look at the malware, but it is pretty obvious you have
> > been
> >> compromised.

> No, he's Nick Fitzgerald, one of the foremost experts in the world on 
> malware, 
> you bozo.

Umm... Paul?  Hate to tell you this, but Nick replied with a fairly long and
cogent description.  The quoted person "I did not look at the malware"
was actually Gadi.

Doesn't change the fact that Gadi was right - at some point in the description,
the facts add up to 'pwned', and actually looking at the malware only serves
to show *how* you got pwned. ;)


pgptvxh5AiMRd.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-15 Thread Paul Schmehl
--On Tuesday, January 15, 2008 10:29:32 +0100 [EMAIL PROTECTED] wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
>> I did not look at the malware, but it is pretty obvious you have
> been
>> compromised.
>
> Dear Asshole,
> You did not look at the malware but you're sure (err, excuse.. "its
> pretty obvious") he's owned. Thats really funny. Are you the great
> Gandalf the magician or John Titor?
>

No, he's Nick Fitzgerald, one of the foremost experts in the world on malware, 
you bozo.

The malware was VBS/Psyme, but Nick didn't need to know that to understand that 
the guy had been compromised.  Why you did is an exercise for the reader.

It's better to remain silent and be thought a fool than to open your mouth and 
remove all doubt.

-- 
Paul Schmehl ([EMAIL PROTECTED])
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-15 Thread auto71278
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

>I did not look at the malware, but it is pretty obvious you have
been
>compromised.

Dear Asshole,
You did not look at the malware but you're sure (err, excuse.. "its
pretty obvious") he's owned. Thats really funny. Are you the great
Gandalf the magician or John Titor?

>Defacements today (unless for specific reason of being "seen") are
>about
>leaving the site the same way you find it, and infecteing its user

>base/visitors.

Stop to act as a guru, you're just funny.

And please, stop to subscribe to all the mailing list around TEH
INTERNET. You're really boring us (not since today by the way, but
i think someone have to tell you that).

Have a nice day,
Harry Potter
-BEGIN PGP SIGNATURE-
Note: This signature can be verified at https://www.hushtools.com/verify
Charset: UTF8
Version: Hush 2.5

wpwEAQECAAYFAkeMfPQACgkQPpltNbWHYoftNQP/ctEOQgN4fQC9GG37CN2LVKHq+H6m
+eXxxz0Sg9TPrub4wgcANami0+14YzjeJwW9gxIYRtDRKoVNXsYfBE565sRAydceJx/k
SRqZEZjVxXcY32T0+FXYDGdG59djpXkO+2MKlGrec9Zz5cQe+8PutmfPd4ZiJe7NWteA
h27cX+k=
=0aO7
-END PGP SIGNATURE-

--
Shop & save on all of the office supplies you need. Click now!
http://tagline.hushmail.com/fc/Ioyw6h4e9j0chEYgPsh2ViLinqAGnD5yFxEIhNlaMZmuqfn7KgZES0/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-15 Thread crazy frog crazy frog
nick,
ur not getting my point,the url is techicorner.com/{random string
here},i have already mentioned it in previous posts.
i have read the link sent by denis,and i would have to conclude that:
1)The problem does not occurs always,instead it occurs randomly based
on IP or something like tht.
2)if u look at the pages on techicorner.com u will not find any
malicious code,so its possible that the server is compromised and its
an LKM
please refer to these links:
http://www.webhostingtalk.com/showthread.php?t=651748 [thanks denis]

Thanks again everyone for your valuable suggestion,i posted here to
share this stuff with everyone and may be u can learn from it.

regards,
_CF

On Jan 15, 2008 12:15 PM, Nick FitzGerald <[EMAIL PROTECTED]> wrote:
> crazy frog crazy frog wrote:
>
> > well,
> > i received many response but no one is perfact.i checked the files and
> > didn't find anything embeded in my scripts or pages.still i have to
> > figure out why my antivirus randomly popsup?i mean most of the times
> > it doesnt detect any infection but then suddenly this thing happnes
> > and then everything seems ok.
> > i dont think its a problem with my script otherwise i could have find
> > the code or it should be repeating consistly.has any one still facing
> > this issue in the techicorner.com or on tubeley.com or on
> > secgeeks.com?
> >
> > let me know i m trying hard to digg this issue.
>
> If you would tell us the _actual_ URL where this behaviour is being
> seen we would have a reasonable chance of actually diagnosing it.  As
> it is, we're having to guess based on matching your half-arsed
> descriptions of what you think is happening with our knowledge of what
> has been seen going on out there.
>
> This may surprise you, but many thousands and thousands of sites are
> compromised each day to display "similar" activity to what you've asked
> to us to diagnose (aka "guess").
>
> If we could look at the actual site and see what is really happening
> should have a better (if not perfect) chance of success.
>
>
> Regards,
>
> Nick FitzGerald
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
advertise on secgeeks?
http://secgeeks.com/Advertising_on_Secgeeks.com
http://newskicks.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread Nick FitzGerald
crazy frog crazy frog wrote:

> well,
> i received many response but no one is perfact.i checked the files and
> didn't find anything embeded in my scripts or pages.still i have to
> figure out why my antivirus randomly popsup?i mean most of the times
> it doesnt detect any infection but then suddenly this thing happnes
> and then everything seems ok.
> i dont think its a problem with my script otherwise i could have find
> the code or it should be repeating consistly.has any one still facing
> this issue in the techicorner.com or on tubeley.com or on
> secgeeks.com?
> 
> let me know i m trying hard to digg this issue.

If you would tell us the _actual_ URL where this behaviour is being 
seen we would have a reasonable chance of actually diagnosing it.  As 
it is, we're having to guess based on matching your half-arsed 
descriptions of what you think is happening with our knowledge of what 
has been seen going on out there.

This may surprise you, but many thousands and thousands of sites are 
compromised each day to display "similar" activity to what you've asked 
to us to diagnose (aka "guess").

If we could look at the actual site and see what is really happening 
should have a better (if not perfect) chance of success.


Regards,

Nick FitzGerald

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread crazy frog crazy frog
well,
i received many response but no one is perfact.i checked the files and
didn't find anything embeded in my scripts or pages.still i have to
figure out why my antivirus randomly popsup?i mean most of the times
it doesnt detect any infection but then suddenly this thing happnes
and then everything seems ok.
i dont think its a problem with my script otherwise i could have find
the code or it should be repeating consistly.has any one still facing
this issue in the techicorner.com or on tubeley.com or on
secgeeks.com?

let me know i m trying hard to digg this issue.

On Jan 15, 2008 10:46 AM, Denis <[EMAIL PROTECTED]> wrote:
> This is a very serious new threat affecting Linux servers and thousands
> of boxes have been compromised since December 2007.
>
> Each box serving the nasty javascript has been rooted. One person has
> found a way to CLEAN the infection (ie. stop your server from serving
> the bad javascript), however not the root hole ie. the servers in
> question are still rooted as nobody so far has found what hole is being
> exploited to gain root access in the first place.
>
> See the following urls for a lot more info on this exploit:
>
> http://www.webhostingtalk.com/showthread.php?t=651748 (useful discussion
> starts on page 3 or so)
>
> http://www.theregister.co.uk/2008/01/11/mysterious_web_infection/
>
> Time for some honey pot action to find out how they're gaining root
> access to begin with. From all reports so far it does not appear to be a
> kernel vulnerability (as some of the affected servers were using latest
> kernels)
>
> Cheers,
> Denis
>
>
> On Sun, 13 Jan 2008 21:31:34 +0530
> "crazy frog crazy frog" <[EMAIL PROTECTED]> wrote:
>
> ---> Hi,
>
> --->
> ---> Recently on opening one of my site,my antivirus pops up saying that it
> ---> has found on malicious script.the url is random and i have managed to
> ---> get tht script.it is using some flaw in apple quick time.
> ---> u can get the zip file for java script here:
> ---> http://secgeeks.com/what.zip
> ---> password is 12345
> ---> can somebody guide/help me what is this and how can i remove it?
> --->
> ---> --
> ---> advertise on secgeeks?
> ---> http://secgeeks.com/Advertising_on_Secgeeks.com
> ---> http://newskicks.com
>
> Denis
>



-- 
advertise on secgeeks?
http://secgeeks.com/Advertising_on_Secgeeks.com
http://newskicks.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread Gadi Evron
> Hi,
>
> Recently on opening one of my site,my antivirus pops up saying that it
> has found on malicious script.the url is random and i have managed to
> get tht script.it is using some flaw in apple quick time.
> u can get the zip file for java script here:
> http://secgeeks.com/what.zip
> password is 12345
> can somebody guide/help me what is this and how can i remove it?

I did not look at the malware, but it is pretty obvious you have been 
compromised.

Defacements today (unless for specific reason of being "seen") are about 
leaving the site the same way you find it, and infecteing its user 
base/visitors.

A second option is that you are secure but a "partner" such as ad sites 
has been compromised and infects your users.

Naturally, a compromise can come from anywhere, but in most cases it is 
something like RFI... Taosecurity linked to three great papers on the 
subject of web botnets / cross-platform web malware:
http://taosecurity.blogspot.com/2007/11/great-papers-from-honeynet-project.html

Linking also to my original article here:
http://blogs.securiteam.com/index.php/archives/815

Gadi.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread Mario Contestabile
Looks like the local name is actually more random:

var name = "c:\\win"+GetRandString(4)+".exe";

Kinda dumb though, as any non-admin class user won't have access to the
local folder on the root [c:\].

[EMAIL PROTECTED]
http://securitymario.spaces.live.com/

 

-Original Message-
From: Jose Nazario [mailto:[EMAIL PROTECTED] 
Sent: Monday, January 14, 2008 10:44 AM
To: crazy frog crazy frog
Cc: Untitled; PenTest; [EMAIL PROTECTED]
Subject: Re: what is this?

On Sun, 13 Jan 2008, crazy frog crazy frog wrote:

> http://secgeeks.com/what.zip
> password is 12345
> can somebody guide/help me what is this and how can i remove it?

te file you sent here contains a bunch of embeded nulls (every other
character is 00). stripping those out reveals ...

that it's a collection of browser exploits. by the looks of it it's MPack
and uses the heapspray slide stuff.

the goal is to download hxxp://techicorner.com/bcuoixqf (which looks dead)
as a local file c:\\mosvs8.exe and then run it.


very common exploit scenario these days (but they usually have some form 
of js obfuscation going on).

i hope this helps.


jose nazario, ph.d. http://monkey.org/~jose/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread 3APA3A
Dear Jose Nazario,


JN> te file you sent here contains a bunch of embeded nulls (every other
JN> character  is  00).  stripping  those  out reveals ...  jose

JN> nazario, ph.d.   http://monkey.org/~jose/

This  is  Little  Endian  UCS-2  Unicode, not a bunch of embedded nulls.
Never stop to educate yourself.

-- 
~/ZARAZA http://securityvulns.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread Jose Nazario
On Sun, 13 Jan 2008, crazy frog crazy frog wrote:

> http://secgeeks.com/what.zip
> password is 12345
> can somebody guide/help me what is this and how can i remove it?

te file you sent here contains a bunch of embeded nulls (every other 
character is 00). stripping those out reveals ...

that it's a collection of browser exploits. by the looks of it it's MPack 
and uses the heapspray slide stuff.

the goal is to download hxxp://techicorner.com/bcuoixqf (which looks dead) 
as a local file c:\\mosvs8.exe and then run it.


very common exploit scenario these days (but they usually have some form 
of js obfuscation going on).

i hope this helps.


jose nazario, ph.d. http://monkey.org/~jose/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread Robert McArdle
Apologies I should clarify.

In this attack legitimate pages on a site are first populated with
html tags embedding Javascript like so



these all point to the page you sent on. All the Mp3, quicktime, etc
stuff are expoits that are launched against the browser of the victim
who browses to the site.

The full descriptions of the various exploits are linked off
http://blog.trendmicro.com/e-commerce-sites-invaded/

Robert McArdle
-- 
www.RobertMcArdle.com/blog/ - Techie/Security/Inane Ramblings

On Jan 13, 2008 5:33 PM, crazy frog crazy frog <[EMAIL PROTECTED]> wrote:
> more,its not a java script,looks like a html page[notice the 
> and  tag n the file] there is also a random function,which
> generate the random string which is used to store teh files on c drive
> and may be for the random url.its trying to play mp3 and other
> files.all looks like messed up.may be there is another script which is
> getting embeded in pages which infect calling this script?
>
>
> On Jan 13, 2008 9:31 PM, crazy frog crazy frog <[EMAIL PROTECTED]> wrote:
> > Hi,
> >
> > Recently on opening one of my site,my antivirus pops up saying that it
> > has found on malicious script.the url is random and i have managed to
> > get tht script.it is using some flaw in apple quick time.
> > u can get the zip file for java script here:
> > http://secgeeks.com/what.zip
> > password is 12345
> > can somebody guide/help me what is this and how can i remove it?
> >
> > --
> > advertise on secgeeks?
> > http://secgeeks.com/Advertising_on_Secgeeks.com
> > http://newskicks.com
> >
>
>
>
> --
> advertise on secgeeks?
> http://secgeeks.com/Advertising_on_Secgeeks.com
> http://newskicks.com
>



-- 
www.RobertMcArdle.com/blog/ - Techie/Security/Inane Ramblings

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread crazy frog crazy frog
yep ther eis one yahoo messenger exploit too.

On Jan 14, 2008 9:14 PM, Jose Nazario <[EMAIL PROTECTED]> wrote:
> On Sun, 13 Jan 2008, crazy frog crazy frog wrote:
>
> > http://secgeeks.com/what.zip
> > password is 12345
> > can somebody guide/help me what is this and how can i remove it?
>
> te file you sent here contains a bunch of embeded nulls (every other
> character is 00). stripping those out reveals ...
>
> that it's a collection of browser exploits. by the looks of it it's MPack
> and uses the heapspray slide stuff.
>
> the goal is to download hxxp://techicorner.com/bcuoixqf (which looks dead)
> as a local file c:\\mosvs8.exe and then run it.
>
>
> very common exploit scenario these days (but they usually have some form
> of js obfuscation going on).
>
> i hope this helps.
>
> 
> jose nazario, ph.d. http://monkey.org/~jose/
>



-- 
advertise on secgeeks?
http://secgeeks.com/Advertising_on_Secgeeks.com
http://newskicks.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread Robert McArdle
Looks like your site was compromised along with several hundred others
in the last day or so.

A full account is up on
http://blog.trendmicro.com/e-commerce-sites-invaded/ but the JS you
posted is the exact same as the one used in those attacks. I'm
guessing you have Javascripts embedded in your pages that pointed to a
randomly named js in the same directory, right?

Robert McArdle
-- 
www.RobertMcArdle.com/blog/ - Techie/Security/Inane Ramblings



On Jan 13, 2008 4:01 PM, crazy frog crazy frog <
[EMAIL PROTECTED]> wrote:
> Hi,
>
> Recently on opening one of my site,my antivirus pops up saying that it
> has found on malicious script.the url is random and i have managed to
> get tht script.it is using some flaw in apple quick time.
> u can get the zip file for java script here:
> http://secgeeks.com/what.zip
> password is 12345
> can somebody guide/help me what is this and how can i remove it?
>
> --
> advertise on secgeeks?
> http://secgeeks.com/Advertising_on_Secgeeks.com
> http://newskicks.com
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread Robert McArdle
Looks like your site was compromised along with several hundred others in
the last day or so.

A full account is up on
http://blog.trendmicro.com/e-commerce-sites-invaded/but the JS you
posted is the exact same as the one used in those attacks.
I'm guessing you have Javascripts embedded in your pages that pointed to a
randomly named js in the same directory, right?

Robert McArdle
-- 
www.RobertMcArdle.com/blog/ - Techie/Security/Inane Ramblings

On Jan 13, 2008 4:01 PM, crazy frog crazy frog <[EMAIL PROTECTED]>
wrote:

> Hi,
>
> Recently on opening one of my site,my antivirus pops up saying that it
> has found on malicious script.the url is random and i have managed to
> get tht script.it is using some flaw in apple quick time.
> u can get the zip file for java script here:
> http://secgeeks.com/what.zip
> password is 12345
> can somebody guide/help me what is this and how can i remove it?
>
> --
> advertise on secgeeks?
> http://secgeeks.com/Advertising_on_Secgeeks.com
> http://newskicks.com
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-14 Thread 3APA3A
Dear Nick FitzGerald,

--Monday, January 14, 2008, 2:52:23 PM, you wrote to 
full-disclosure@lists.grok.org.uk:


NF> U -- the only part of that likely to be relevant here is the last.

NF> These kinds of web page "compromises" are typically achieved through
NF> bad/ill-configured/non-updated   server-side  web  applications  (or
NF> their  underlying script engines) and are typically achieved without
NF> requiring  any more special or privileged access to the victim sites
NF> than  the  ability  to  run  a  clever  Google  search  or  your own
NF> brute-force spidering via a bot-net, etc.

During  last  few  months,  we  monitor  mass infection attempts through
stollen  FTP passwords.

Yes,  web  exploitation  scenario  is also possible. These are automated
exploitation requests received during a single day:

http://securityvulns.com/files/exprequests.txt

In  this  case  there  is  a  quick workaround (and also a good security
practice)  of  disabling  write access for web server account. Of cause,
investigation is required anyway.


-- 
~/ZARAZA http://securityvulns.com/
Всегда будем рады послушать ваше чириканье (Твен)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-14 Thread crazy frog crazy frog
hmm.thanks everyone for the suggestions.

On Jan 14, 2008 5:22 PM, Nick FitzGerald <[EMAIL PROTECTED]> wrote:
> 3APA3A wrote:
>
> > Dear crazy frog crazy frog,
> >
> >   Clear  your  computer  from  trojan,  change FTP password for you site
> >   hosting  access,  because it's stolen, access your hosting account via
> >   FTP  and remove additional text (usually at the end of the file, after
> >   ) from all HTML/PHP pages.
>
> U -- the only part of that likely to be relevant here is the last.
>
> These kinds of web page "compromises" are typically achieved through
> bad/ill-configured/non-updated server-side web applications (or their
> underlying script engines) and are typically achieved without requiring
> any more special or privileged access to the victim sites than the
> ability to run a clever Google search or your own brute-force spidering
> via a bot-net, etc.
>
> Of course, simply removing the undesired iframe/script/etc tags from
> your compromised pages is not enough.  Although doing so does not mean
> that this attacker will come back, it equally does nothing to close the
> hole they used in the first place, and the next attacker searching for
> that hole will hit you just as easily and indiscriminately...
>
>
> Regards,
>
> Nick FitzGerald
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
advertise on secgeeks?
http://secgeeks.com/Advertising_on_Secgeeks.com
http://newskicks.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread Nick FitzGerald
3APA3A wrote:

> Dear crazy frog crazy frog,
> 
>   Clear  your  computer  from  trojan,  change FTP password for you site
>   hosting  access,  because it's stolen, access your hosting account via
>   FTP  and remove additional text (usually at the end of the file, after
>   ) from all HTML/PHP pages.

U -- the only part of that likely to be relevant here is the last.

These kinds of web page "compromises" are typically achieved through 
bad/ill-configured/non-updated server-side web applications (or their 
underlying script engines) and are typically achieved without requiring 
any more special or privileged access to the victim sites than the 
ability to run a clever Google search or your own brute-force spidering 
via a bot-net, etc.

Of course, simply removing the undesired iframe/script/etc tags from 
your compromised pages is not enough.  Although doing so does not mean 
that this attacker will come back, it equally does nothing to close the 
hole they used in the first place, and the next attacker searching for 
that hole will hit you just as easily and indiscriminately...


Regards,

Nick FitzGerald

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] what is this?

2008-01-14 Thread 3APA3A
Dear crazy frog crazy frog,

  Clear  your  computer  from  trojan,  change FTP password for you site
  hosting  access,  because it's stolen, access your hosting account via
  FTP  and remove additional text (usually at the end of the file, after
  ) from all HTML/PHP pages.

--Sunday, January 13, 2008, 7:01:34 PM, you wrote to 
full-disclosure@lists.grok.org.uk:

cfcf> Hi,

cfcf> Recently on opening one of my site,my antivirus pops up saying that it
cfcf> has found on malicious script.the url is random and i have managed to
cfcf> get tht script.it is using some flaw in apple quick time.
cfcf> u can get the zip file for java script here:
cfcf> http://secgeeks.com/what.zip
cfcf> password is 12345
cfcf> can somebody guide/help me what is this and how can i remove it?



-- 
~/ZARAZA http://securityvulns.com/
Стреляя во второй раз, он искалечил постороннего. Посторонним был я. (Твен)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] what is this?

2008-01-13 Thread crazy frog crazy frog
more,its not a java script,looks like a html page[notice the 
and  tag n the file] there is also a random function,which
generate the random string which is used to store teh files on c drive
and may be for the random url.its trying to play mp3 and other
files.all looks like messed up.may be there is another script which is
getting embeded in pages which infect calling this script?

On Jan 13, 2008 9:31 PM, crazy frog crazy frog <[EMAIL PROTECTED]> wrote:
> Hi,
>
> Recently on opening one of my site,my antivirus pops up saying that it
> has found on malicious script.the url is random and i have managed to
> get tht script.it is using some flaw in apple quick time.
> u can get the zip file for java script here:
> http://secgeeks.com/what.zip
> password is 12345
> can somebody guide/help me what is this and how can i remove it?
>
> --
> advertise on secgeeks?
> http://secgeeks.com/Advertising_on_Secgeeks.com
> http://newskicks.com
>



-- 
advertise on secgeeks?
http://secgeeks.com/Advertising_on_Secgeeks.com
http://newskicks.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] What is this

2005-08-08 Thread Armando Rogerio Brandão Guimaraes Junior
This link came through MSN chat.
The IM worm inserted this link in chat.

Armando Guimarães Jr 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ron
Sent: segunda-feira, 08 de agosto de 2005 16:06
To: [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] What is this

I've seen something very similar spreading as an IM worm.  There's  a
pretty good chance he got it from AIM or MSN.  Of course, it could also
be a classic email worm, who knows?

Michael Hale wrote:
> Anti virus doesn't detect it because its packed with ASProtect 1.2.x
> (using StudPE). You can see the difference when it's dumped out of RAM
> into it's uncompressed/decrypted form (see VirusTotal results below).
> My interest is where you came across this URL. Can you provide that
> information?
> 
> Scan results
>  File: DUMPED.php
>  Date: 08/08/2005 20:39:56 (CET)
> 
> AntiVir 6.31.1.0/20050808   found [BDS/SdBot.Gen.Plus]
> Avast   4.6.695.0/20050808  found nothing
> AVG 718/20050807found nothing
> Avira   6.31.1.0/20050808   found [BDS/SdBot.Gen.Plus]
> BitDefender 7.0/20050808found nothing
> CAT-QuickHeal   7.03/20050808   found [(Suspicious) - DNAScan]
> ClamAV  devel-20050725/20050808 found [Trojan.Mybot-312]
> DrWeb   4.32b/20050808  found [BackDoor.IRC.Sdbot.118]
> eTrust-Iris 7.1.194.0/20050806  found nothing
> eTrust-Vet  11.9.1.0/20050808   found [Win32.Slinbot]
> Fortinet2.36.0.0/20050808   found [suspicious]
> F-Prot  3.16c/20050808  found nothing
> Ikarus  0.2.59.0/20050808   found nothing
> Kaspersky   4.0.2.24/20050808   found nothing
> McAfee  4552/20050808   found [New Malware.b]
> NOD32v2 1.1187/20050805 found [BAT/NoShare.L]
> Norman  5.70.10/20050805found nothing
> Panda   8.02.00/20050808found nothing
> Sophos  3.96.0/20050808 found nothing
> Sybari  7.5.1314/20050808   found [Win32.Slinbot]
> Symantec8.0/20050808found [W32.Randex]
> TheHacker   5.8.2.082/20050808  found nothing
> VBA32   3.10.4/20050808 found [suspected of Backdoor.RxBot.2]
> 
> On 8/8/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> 
>>Quoting Armando Rogerio Brandão Guimaraes Junior <[EMAIL PROTECTED]>:
>>
>>
>>>Somebody know what fuck is this? http://www.pokersverige.se/IMAGE0004.php
>>>AntiVirus and SpyBot doesn´t detect!!!
>>>
>>>Armando Guimarães Jr
>>
>>It is an MS-EXE executable program.  Anti virus doesn't find it because
>>it is not an virus.  Spybot for the same reason.  To block these you
>>need an smtp policy that does not allow executable attachments to
>>incoming emails.
>>
>>"What it does" could be anything from typing "hello world" in a dialog
>>box (unlikely) to creating a new Administrator account on your
>>corporate AD server and posting the entire contents thereof to an IRC
>>channel (somewhat more likely).  But at first glance it looks like it
>>is going to open a backdoor shell on the recipient's PC.
>>
>>tc
>>
>>
>>
>>
>>This message was sent using IMP, the Internet Messaging Program.
>>
>>___
>>Full-Disclosure - We believe in it.
>>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>Hosted and sponsored by Secunia - http://secunia.com/
>>
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 
> 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] What is this

2005-08-08 Thread Aditya Deshmukh
> http://www.pokersverige.se/IMAGE0004.php

.exe file of some kind using only the headers will 
have to download it and test in some vmware machine to 
debug it - anyone volunteer for that task ?


begin 666 smime.p7s
M,( &"2J&2(;W#0$'`J" ,( "`0$Q"S )[EMAIL PROTECTED]@,"&@4`,( &"2J&2(;W#0$'
M`0``H(()?3""`P4P@@)NH ,"`0("`P]$"# [EMAIL PROTECTED]&]PT!`00%`#!B,0LP
M"08#500&$P):03$E,",&`U4$"A,<5&AA=W1E($-O;G-U;'1I;F<@*%!T>2D@
M3'1D+C$L,"H&`U4$`Q,C5&AA=W1E(%!E,1\P'08#
M500#$Q94:&%W=&[EMAIL PROTECTED])E96UA:[EMAIL PROTECTED],3LP.08)*H9(AO<-`0D!%BQA
M9&ET>6$N9&5S:&UU:VA ;VYL:6YE+F=A=&5W87DNW$3
M#Y[VQE1?27[6O))6O0TQLW<>.T@"MP_U8N/"P@'?3-Q4J_GR0P_=0B-%7T%]
M/_*118FW>[EMAIL PROTECTED],1J*ZPO1$$IU5'0C]8<::RUXQP#U>TTOXC,;U"
M0.[%) ]V#K2#6AY.E&P[2_W9XX=QE<<@]*K%%\;R6?<"W&ZX2A]ZU%K",%
MBXMM!V2R'^.5P!5 A+R&K^$(G9?,MQBX5#NX"_6)%PTY-C Q
M,#$P,# P,#!:%PTR,#$R,S$R,S4Y-3E:,('1,0LP"08#500&$P):03$5,!,&
M`U4$"!,,5V5S=&5R;B!#87!E,1(P$ 8#500'$PE#87!E(%1O=VXQ&C [EMAIL PROTECTED]
M! H3$51H87=T92!#;VYS=6QT:6YG,[EMAIL PROTECTED])@8#500+$Q]#97)T:69I8V%T:6]N
M(%-EE'V Q1MNIRD;"$7GTM#8][$M^%)74H=#I"+&,GGY5[2^]^&8<=ANJC
MW;G.EF0:PA1N1*Q\YH_H30]Q'T XI@"CAWCV^92&7JWJP%YVZ]D4HUUN>GP,
MI4M5?P89*7^>FB;5:KLX) AJF,>QVJ.8D?UYV^5:Q!RY`@,!``&C$S 1, \&
M`U4=$P$!_P0%, ,!`?\P#08)*H9(AO<[EMAIL PROTECTED]:E9V(J
MI/!-$6#0;[EMAIL PROTECTED]&&L)KM2-5P(SS#[J$J6BA]B0B.,%P_TNF2<%ZQ'*=^=F%[2
M;&!Q7**LW'GCYVX`1Q^U#2CH`IWDFOT3]*;9?+'XW%\C)@F1@'/0%!O>0ZF#
M)?+FG"\5ROZFJXH'=8L,W5&$:^3XT[EMAIL PROTECTED]'1D+C$L,"H&
M`U4$`Q,C5&AA=W1E(%!E_0( "9->GIKN?9='%*E2%
[EMAIL PROTECTED]>VT3QA!$ >9!ER8+?[`@,!``&[EMAIL PROTECTED]@[EMAIL 
PROTECTED]'_! @[EMAIL PROTECTED]
M_P([EMAIL PROTECTED]'1\$/# Z,[EMAIL PROTECTED] 
TAC)H='1P.B\O8W)L+G1H87=T92YC;VTO
M5&AA=W1E4&5R,!PQ&C [EMAIL PROTECTED] ,3$5!R:79A=&5,86)E;#(M,3,X, T&"2J&
M2(;W#0$!!04``X&!`$B,T5"[EMAIL PROTECTED] VC9JQG#W^OK+["%Z%#EI2=?TPAN/@V
M'ZHMGS8OP/0<4""3<#S]K>%A8L/9.AE^A+&9&P#%&@N"=)XE4)1BQ]LG<5[EMAIL PROTECTED]'1D+C$L,"H&`U4$`Q,C5&AA=W1E
M(%!E[EMAIL PROTECTED]&]PT!"1 "`3%6,%0$'0`0"[EMAIL PROTECTED]>I
MIR2XE:?\7P$`@ $`,# P+H$L861I='EA+F1E 8)*P8!! &"
M-Q $,6LP:3!B,0LP"08#500&$P):03$E,",&`U4$"A,<5&AA=W1E($-O;G-U
M;'1I;F<@*%!T>[EMAIL PROTECTED]'1D+C$L,"H&`U4$`Q,C5&AA=W1E(%!E$@;T70NAD;0[_6
MHN85I2YI*[BOQ#JB8RT4HE,3\!Z)3*3^3J5K8/[DKZ>G\1!=\U6T+46M>Y8> AU\]"Y]DVY\R3C
6=',D=,]TETU3`0http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] What is this

2005-08-08 Thread Peter Kruse
Hi,

> It is an MS-EXE executable program.  Anti virus doesn't find 
> it because it is not an virus.  Spybot for the same reason.  
> To block these you need an smtp policy that does not allow 
> executable attachments to incoming emails.

As a matter of fact this is a new sdbot variant. 

It does pretty much the same as any other sdbot variant outthere: It allows
the author of the code and others to control the infected host.

Kind regards
Peter Kruse



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What is this

2005-08-08 Thread Jeremy
On 8/8/05, Armando Rogerio Brandão Guimaraes Junior
<[EMAIL PROTECTED]> wrote:
> Somebody know what fuck is this? http://www.pokersverige.se/IMAGE0004.php
> AntiVirus and SpyBot doesn´t detect!!!
> 
> Armando Guimarães Jr

Installs a bot. Looks up lists2.dc21business.com, connects to an IRC
server on port 12000. Joins a few rooms. Gets a message/command to
download http://home.comcast.net/~soliveria/n3.exe . Does so, then
gets a message to download  http://home.comcast.net/~ebaker1973/up.exe
. Reports to http://dos2.deadlist.net/ . Joins another IRC server at
204.8.34.78 port 12000. Gets told to download
http://hec-ulg-entrepreneurs.com/3.exe , then
http://hec-ulg-entrepreneurs.com/1.exe . Starts a netbios scan of
local network. Joins several different irc chats. It just keeps going
and going and going Lots of spyware, lots of malware, chaos.

Still watching,
~J
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What is this

2005-08-08 Thread Ron
I've seen something very similar spreading as an IM worm.  There's  a
pretty good chance he got it from AIM or MSN.  Of course, it could also
be a classic email worm, who knows?

Michael Hale wrote:
> Anti virus doesn't detect it because its packed with ASProtect 1.2.x
> (using StudPE). You can see the difference when it's dumped out of RAM
> into it's uncompressed/decrypted form (see VirusTotal results below).
> My interest is where you came across this URL. Can you provide that
> information?
> 
> Scan results
>  File: DUMPED.php
>  Date: 08/08/2005 20:39:56 (CET)
> 
> AntiVir 6.31.1.0/20050808   found [BDS/SdBot.Gen.Plus]
> Avast   4.6.695.0/20050808  found nothing
> AVG 718/20050807found nothing
> Avira   6.31.1.0/20050808   found [BDS/SdBot.Gen.Plus]
> BitDefender 7.0/20050808found nothing
> CAT-QuickHeal   7.03/20050808   found [(Suspicious) - DNAScan]
> ClamAV  devel-20050725/20050808 found [Trojan.Mybot-312]
> DrWeb   4.32b/20050808  found [BackDoor.IRC.Sdbot.118]
> eTrust-Iris 7.1.194.0/20050806  found nothing
> eTrust-Vet  11.9.1.0/20050808   found [Win32.Slinbot]
> Fortinet2.36.0.0/20050808   found [suspicious]
> F-Prot  3.16c/20050808  found nothing
> Ikarus  0.2.59.0/20050808   found nothing
> Kaspersky   4.0.2.24/20050808   found nothing
> McAfee  4552/20050808   found [New Malware.b]
> NOD32v2 1.1187/20050805 found [BAT/NoShare.L]
> Norman  5.70.10/20050805found nothing
> Panda   8.02.00/20050808found nothing
> Sophos  3.96.0/20050808 found nothing
> Sybari  7.5.1314/20050808   found [Win32.Slinbot]
> Symantec8.0/20050808found [W32.Randex]
> TheHacker   5.8.2.082/20050808  found nothing
> VBA32   3.10.4/20050808 found [suspected of Backdoor.RxBot.2]
> 
> On 8/8/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> 
>>Quoting Armando Rogerio Brandão Guimaraes Junior <[EMAIL PROTECTED]>:
>>
>>
>>>Somebody know what fuck is this? http://www.pokersverige.se/IMAGE0004.php
>>>AntiVirus and SpyBot doesn´t detect!!!
>>>
>>>Armando Guimarães Jr
>>
>>It is an MS-EXE executable program.  Anti virus doesn't find it because
>>it is not an virus.  Spybot for the same reason.  To block these you
>>need an smtp policy that does not allow executable attachments to
>>incoming emails.
>>
>>"What it does" could be anything from typing "hello world" in a dialog
>>box (unlikely) to creating a new Administrator account on your
>>corporate AD server and posting the entire contents thereof to an IRC
>>channel (somewhat more likely).  But at first glance it looks like it
>>is going to open a backdoor shell on the recipient's PC.
>>
>>tc
>>
>>
>>
>>
>>This message was sent using IMP, the Internet Messaging Program.
>>
>>___
>>Full-Disclosure - We believe in it.
>>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>Hosted and sponsored by Secunia - http://secunia.com/
>>
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 
> 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What is this

2005-08-08 Thread Michael Hale
Anti virus doesn't detect it because its packed with ASProtect 1.2.x
(using StudPE). You can see the difference when it's dumped out of RAM
into it's uncompressed/decrypted form (see VirusTotal results below).
My interest is where you came across this URL. Can you provide that
information?

Scan results
 File: DUMPED.php
 Date: 08/08/2005 20:39:56 (CET)

AntiVir 6.31.1.0/20050808   found [BDS/SdBot.Gen.Plus]
Avast   4.6.695.0/20050808  found nothing
AVG 718/20050807found nothing
Avira   6.31.1.0/20050808   found [BDS/SdBot.Gen.Plus]
BitDefender 7.0/20050808found nothing
CAT-QuickHeal   7.03/20050808   found [(Suspicious) - DNAScan]
ClamAV  devel-20050725/20050808 found [Trojan.Mybot-312]
DrWeb   4.32b/20050808  found [BackDoor.IRC.Sdbot.118]
eTrust-Iris 7.1.194.0/20050806  found nothing
eTrust-Vet  11.9.1.0/20050808   found [Win32.Slinbot]
Fortinet2.36.0.0/20050808   found [suspicious]
F-Prot  3.16c/20050808  found nothing
Ikarus  0.2.59.0/20050808   found nothing
Kaspersky   4.0.2.24/20050808   found nothing
McAfee  4552/20050808   found [New Malware.b]
NOD32v2 1.1187/20050805 found [BAT/NoShare.L]
Norman  5.70.10/20050805found nothing
Panda   8.02.00/20050808found nothing
Sophos  3.96.0/20050808 found nothing
Sybari  7.5.1314/20050808   found [Win32.Slinbot]
Symantec8.0/20050808found [W32.Randex]
TheHacker   5.8.2.082/20050808  found nothing
VBA32   3.10.4/20050808 found [suspected of Backdoor.RxBot.2]

On 8/8/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> Quoting Armando Rogerio Brandão Guimaraes Junior <[EMAIL PROTECTED]>:
> 
> > Somebody know what fuck is this? http://www.pokersverige.se/IMAGE0004.php
> > AntiVirus and SpyBot doesn´t detect!!!
> >
> > Armando Guimarães Jr
> 
> It is an MS-EXE executable program.  Anti virus doesn't find it because
> it is not an virus.  Spybot for the same reason.  To block these you
> need an smtp policy that does not allow executable attachments to
> incoming emails.
> 
> "What it does" could be anything from typing "hello world" in a dialog
> box (unlikely) to creating a new Administrator account on your
> corporate AD server and posting the entire contents thereof to an IRC
> channel (somewhat more likely).  But at first glance it looks like it
> is going to open a backdoor shell on the recipient's PC.
> 
> tc
> 
> 
> 
> 
> This message was sent using IMP, the Internet Messaging Program.
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] What is this

2005-08-08 Thread trains

Quoting Armando Rogerio Brandão Guimaraes Junior <[EMAIL PROTECTED]>:


Somebody know what fuck is this? http://www.pokersverige.se/IMAGE0004.php
AntiVirus and SpyBot doesn´t detect!!!

Armando Guimarães Jr


It is an MS-EXE executable program.  Anti virus doesn't find it because
it is not an virus.  Spybot for the same reason.  To block these you
need an smtp policy that does not allow executable attachments to
incoming emails.

"What it does" could be anything from typing "hello world" in a dialog
box (unlikely) to creating a new Administrator account on your
corporate AD server and posting the entire contents thereof to an IRC
channel (somewhat more likely).  But at first glance it looks like it
is going to open a backdoor shell on the recipient's PC.

tc




This message was sent using IMP, the Internet Messaging Program.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/