Re: [Full-Disclosure] Erasing a hard disk easily

2004-07-12 Thread Michael Williamson
http://dban.sourceforge.net (boot floppy, works nicely)



signature.asc
Description: This is a digitally signed message part


Re: [Full-Disclosure] Temporary Files and Web Sites (swp, ~, etc)

2004-08-12 Thread michael williamson
Here's another thing:  Don't put your db usernames/passwords in any file
that is accessable from the web.  (the don't have to be)If some
other bonehead admin happens to replace your http.conf with a generic
one, you don't want all your blocked files showing up automagically.

Secondly, be aware that if you've got embedded usernames/passwords for
db access on your system, they are generally not safe from other users
of the system.

-Michael

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Electronic Voting Machines - WinVote by Adv anced Voting Solutions

2004-08-19 Thread Michael Williamson
Using 802.11 for anything remotely critical is outright STUPID.  

FCC regulations are such that these part 15 devices (802.11, cordless
phones, baby monitors) have no legal protection from interference from
licensed services (amateur radio, TV stations, etc).  If I'm running a
high powered (10-100 watt) maybe signal at 2.4 ghz for amateur radio TV
and happen to be living across the street from an election center,
they're basically screwed.  As a matter a fact, if their 802.11 is
interfering with my licensed operation, it is they who must shut down.

-Michael


> Without even commenting on the "security" of WEP, it seems to me that a
> massive DDOS attack against the voting machines could prevent vote tallies
> from being counted in a timely manner.


signature.asc
Description: This is a digitally signed message part


Re: [Full-Disclosure] Electronic Voting Machines - WinVote by Adv anced Voting Solutions

2004-08-19 Thread Michael Williamson

> > > Perhaps they need to invest in some of this...
> > >
> > > http://www.theregister.co.uk/2004/08/12/wifi_wallpaper/
> > 
> > Perhaps they need to invest in some of this...
> > 
> > http://www.amazon.com/exec/obidos/tg/detail/-/B0J1V3
> 
> Definitely a better solution ;)
> 

Or even better, one of these
http://sprott.physics.wisc.edu/neural/BRAIN.GIF


signature.asc
Description: This is a digitally signed message part


Re: RE: [Full-Disclosure] Electronic Voting Machines - WinVote by Adv anced Voting Solutions

2004-08-20 Thread Michael Williamson
These power ranges are perfectly legal in (some of) the amateur radio
bands.  The 2.4 ghz ISM band partially overlaps the 2.4 ghz amateur
band.  Dangerous?  Very.  One use: Moonbounce communications.   I've
heard of people running 1.5kw into very high gain antenna arrays
producing ERP's in the 1/4 megawatt range for moonbounce.  This is still
perfectly legal.  (but using it as a weapon isn't) Now pointing the
thing around and intentionally blowing the front end off of everything
somewhat resonant (and popping eyeballs) with it would be illegal, but
I'm only discussing incidental interference. 

-Michael

On Fri, 2004-08-20 at 07:50, James Tucker wrote:
> Of course the power ranges you quote are also illegal, not to mention
> extremely dangerous.
> 



signature.asc
Description: This is a digitally signed message part


Re: [Full-Disclosure] The 'good worm' from HP

2004-08-21 Thread michael williamson
There are much better alternatives to using exploit code to install
patches.The security folk at TAMU have come up with an in-line
network sniffer automagically blocks infected machines and notifies them
via an internal webserver of their infection.  After a set time it
allows them back on.  (clever...motivates _user_ to clean/patch)

http://netsquid.tamu.edu/

This is a _lot_ more responsible than running exploit code of any sort,
even for a good purpose.  I admin one particular windows server that I
must actually wait for vender approval before applying any hotfixes.  
I'd be extremely pissed if some do-gooder net admin tried to patch my
box via sploit code and ended up breaking it.  (it is that fickle)

-Michael

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] The 'good worm' from HP

2004-08-21 Thread michael williamson

> Except that the scenario you describe isn't near complete.  What will happen 
> is either it will get attacked by a benign worm (possibly breaking something) 
> or a malicious worm (definitely breaking something) only a short while later.
> Which would you prefer then ?

I'd prefer to not have to deal with systems built on house cards, but
sometimes that's just not avoidable nor realistic.   I can't deal with
too much downtime either. 

> I think it is _your_ responsibility to shield your box from the internet

the box _is_ fairly well shielded. 

> if it is that fickle and that important to you.  

I'm really wanting phase this P.O.S. out, but I will mention this sort
of crap is not that uncommon of "turnkey solutions" in the windows
world. 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Sending remote procedure calls through e-mail (RPC-Mail)

2004-10-20 Thread michael williamson
Someone could use an email scheme like this to to trigger an outbound
secure shell connection with ports forwarded from the machine its
connecting to back to the machine making the connection.  In this way
any firewall that allows SSH can be perforated. 

(now replace the afformentioned email sceme with dumb users)...I how
much spyware already does stuff like this?  This sure does demonstrate
how _useless_ NAT really is for security. 

-Michael

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Sending remote procedure calls through e-mail (RPC-Mail)

2004-10-20 Thread Michael Williamson
I agree, but you'd be surprised how often it is used as such...
I think this really applies to any network firewall that allows for
outbound ssh.

> Possibly because NAT isn't a security mechanism.


signature.asc
Description: This is a digitally signed message part


Re: [Full-Disclosure] Show me the Virrii!

2004-01-07 Thread michael williamson
>   Saying Windows is to blame for the mess that we're in is like saying the
> gun is what causes a murder and not the person that pulled the trigger.

Well, it doesn't help things when the gun has the safety removed...

Michael


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] sco.com Press Release

2004-02-02 Thread michael williamson
> ...if they spent an average of 30 minutes cleaning the crap out
> of their mailboxes...

I'd say they need to consider a better mail client.  I mean, really
now...

Michael

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] InfoSec sleuths beware ...

2004-02-19 Thread michael williamson
And you think this could be reliably implemented on a mickeysoft
platform?  

On Thu, 2004-02-19 at 08:07, Exibar wrote:
--snip--
>I would think that a more controllable environment would be a laptop that
> must phone home every 5 minutes of activity or gets securely wiped.  Better
> yet, an encrypted laptop where access to the sourcecode is limited to 5
> minutes and then you must FOB authenticate back into it.  After 30 minutes
> of activity and no FOB re-entry you must call back to Microsoft for a new
> software FOB.  After one hour of activity and no FOB authentication the
> whole laptop becomes irreversibly encrypted and must be sent back to
> Microsoft to be re-built.
> 
>Ok maybe that's TOO secure :-)
--snip--

Michael

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Coming soon: CPU fix for buffer overflows

2004-02-24 Thread Michael Williamson
On Mon, 2004-02-23 at 20:38, Mike Barushok wrote:
> (Note to the non-mathematically inclined: Yes, it might seem
> difficult to believe, but a 4004 processor combined with
> unlimited (countable) storage, can emulate the fastest super
> computer, just not in 'real time').

What about a quantum computer?


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] mozilla firefox 0.8 - linux (probably mozilla too) cut/paste (semi) vulnerability

2004-04-28 Thread Michael Williamson
This isn't as much a typical vulnerability as it is poorly-designed
behavior. I've noticed when cutting/pasting data (unix style, w/middle
mouse button) into a Web form, any attempt to paste into an area without
first clicking on the input will result in firefox doing a google search
on the contents of the paste.  If I happen to be cutting/pasting
confidential data, this is bad.

Michael

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] mozilla firefox 0.8 - linux (probably mozilla too) cut/paste (semi) vulnerability

2004-04-28 Thread Michael Williamson
> ..please. Do you paste confidential data into webforms often? :D
Sure, Sometimes. I have a few in-house (intranet) Web-based utilities I
use. 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Cisco IOS Source Code For Sale

2004-05-27 Thread Michael Williamson
Wow, this will be very useful in our world domination, err, I mean
global marketing plans. Yeah.

Here's all my Info...I'll pay you later in software licenses.  We will
embrace and extend IOS and provide features never before thought of.  I
can't tell you what these features will be because most will be a
surprise (for us both).

William H. Gates
One Microsoft Way
Redmond, WA 98052
US
425 882 8080 fax: 206 703 2641

(sorry guys, couldn't resist 
-- Michael)


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] lists, autoresponders, and netiquette

2004-05-27 Thread Michael Williamson
Every time I post to a list I get these "out of office" auto-responses. 
Can these responders be configured to not respond to stuff from a list?
  
-Michael


signature.asc
Description: This is a digitally signed message part