Local/remote mpg123 exploit

2003-01-21 Thread gobbles
/ \___|\___/|___/___/|___|___/ |___/___\___|\___/|_|_\___| |_| |_| Putting the honey in honeynet since '98. Introduction: Several months ago, GOBBLES Security was recruited by the RIAA (riaa.org) to invent, create, and finally deploy the future of antipiracy tools. We focused on creating virii/worm hybrids to infect and spread over p2p nets. Until we became

iDefense Security Advisory

2002-12-12 Thread gobbles
CERT ([EMAIL PROTECTED]) about the matter. 12/10/2002 Attempted to contact CERT again for assistance with contacting the authors of 0verkill. 12/11/2002 iDEFENSE clients notified 12/12/2002 Coordinated public disclosure VIII. CREDIT GOBBLES ([EMAIL PROTECTED

The SUPER Bug

2002-07-31 Thread gobbles
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 /* * SAVE DEFCON..HELP GOBBLES..SAVE DEFCON..HELP GOBBLES * * When GOBBLES say he and he security team * are non-profit. He really mean NON-profit. * This means GOBBLES and he GOBBLES Security * Labs (GSL) friends do not have much funds

Proof of Concept Code for OpenSSH

2002-07-01 Thread gobbles
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Remote OpenSSH exploit for 2.9.9-3.3. Check out our official mirror while we work on the bugtraq.org hosting situation, http://www.immunitysec.com/GOBBLES/ (thanks bob!), we have a new comic posted and some other miscellaneous stuff. If you

GOBBLES Reflection on the msn666 Hole

2002-06-15 Thread gobbles
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday, June 13th, a mail appeared on the Bugtraq (do not confuse with Bugtraq.org) mailing list titled, Sensitive IM Security - MSN Message Sniffing. Someone brought it to our attention on IRC (greets to all our friends in #!GOBBLES

[GOBBLES] reflections on talkd hole

2002-05-24 Thread gobbles
correspondence pretty much deal with issues we mentioned in advisory... 1. Yes, K2/antisec discover and disclose this before GOBBLES, but after this disclosure, many other vendor talkd still vulnerable to hack attacks by blackhat hackers. Since we're ethical whitehats like K2 and his antisec, we thought

Fwd: GOBBLES RESPONSE TO THE BLUE BOAR (fixed version)

2002-05-11 Thread gobbles
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [Blue Boar's personal attacks have been ignored in this version.] - -Quoted Message- From: [EMAIL PROTECTED] Sent: Fri, 10 May 2002 22:06:16 -0700 To: [EMAIL PROTECTED] Subject: GOBBLES RESPONSE TO THE BLUE BOAR I was initially a bit

Adivosry + Exploit for Remote Root Hole in Default Installation of Popular Commercial Operating System

2002-04-30 Thread gobbles
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 GOBBLES SECURITY ADVISORY #32 ALERT! REMOTE ROOT HOLE IN DEFAULT INSTALL OF POPULAR OPERATING SYSTEM! ALERT! Forward: @route so was fydor trying to make his code unreadable when he write nmap? @route or was that just the fallout of poor planning

ALERT! ALERT! ALERT! ALERT! ALERT! hehehehe ;Pppppp

2002-04-22 Thread gobbles
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Attached is advisory + local root exploit for screen 3.9.11. Save yourself! Love, GOBBLES Hush provide the worlds most secure, easy to use online applications - which solution is right for you? HushMail Secure Email http://www.hushmail.com

ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT

2002-04-11 Thread gobbles
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear World, Below is copy paste of GOBBLES advisory for NTOP. NTOP available from www.ntop.org. This serious remote root bug in logging mechanism. Time for alert and disclosure is now. Website with other advisories at http://www.bugtraq.org