/
\___|\___/|___/___/|___|___/ |___/___\___|\___/|_|_\___| |_| |_|
Putting the honey in honeynet since '98.
Introduction:
Several months ago, GOBBLES Security was recruited by the RIAA (riaa.org)
to invent, create, and finally deploy the future of antipiracy tools. We
focused on creating virii/worm hybrids to infect and spread over p2p nets.
Until we became
CERT ([EMAIL PROTECTED]) about the matter.
12/10/2002 Attempted to contact CERT again for assistance with contacting
the authors of 0verkill.
12/11/2002 iDEFENSE clients notified
12/12/2002 Coordinated public disclosure
VIII. CREDIT
GOBBLES ([EMAIL PROTECTED
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
/*
* SAVE DEFCON..HELP GOBBLES..SAVE DEFCON..HELP GOBBLES
*
* When GOBBLES say he and he security team
* are non-profit. He really mean NON-profit.
* This means GOBBLES and he GOBBLES Security
* Labs (GSL) friends do not have much funds
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Remote OpenSSH exploit for 2.9.9-3.3.
Check out our official mirror while we work on the bugtraq.org hosting situation,
http://www.immunitysec.com/GOBBLES/ (thanks bob!), we have a new comic posted and some
other miscellaneous stuff.
If you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Thursday, June 13th, a mail appeared on the Bugtraq (do not confuse with
Bugtraq.org) mailing list titled, Sensitive IM Security - MSN Message Sniffing.
Someone brought it to our attention on IRC (greets to all our friends in #!GOBBLES
correspondence pretty much deal with issues we mentioned in advisory...
1. Yes, K2/antisec discover and disclose this before GOBBLES, but after this
disclosure, many other vendor talkd still vulnerable to hack attacks by blackhat
hackers. Since we're ethical whitehats like K2 and his antisec, we thought
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[Blue Boar's personal attacks have been ignored in this version.]
- -Quoted Message-
From: [EMAIL PROTECTED]
Sent: Fri, 10 May 2002 22:06:16 -0700
To: [EMAIL PROTECTED]
Subject: GOBBLES RESPONSE TO THE BLUE BOAR
I was initially a bit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
GOBBLES SECURITY ADVISORY #32
ALERT! REMOTE ROOT HOLE IN DEFAULT INSTALL OF POPULAR OPERATING SYSTEM! ALERT!
Forward:
@route so was fydor trying to make his code unreadable when he write nmap?
@route or was that just the fallout of poor planning
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Attached is advisory + local root exploit for screen 3.9.11.
Save yourself!
Love,
GOBBLES
Hush provide the worlds most secure, easy to use online applications - which solution
is right for you?
HushMail Secure Email http://www.hushmail.com
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dear World,
Below is copy paste of GOBBLES advisory for NTOP. NTOP available from www.ntop.org.
This serious remote root bug in logging mechanism. Time for alert and disclosure is
now.
Website with other advisories at http://www.bugtraq.org
10 matches
Mail list logo