[Full-disclosure] Microsoft WINS Vulnerability + OS/SP Scanner (source)

2005-05-02 Thread class
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 While replicating, it's possible to guess the OS and SP, in addition you have the heap base address. Conclusion: all needed for a skilled hacker to intrude a vulnerable computer, however a script kiddie wont be able to do something because each wrong

[Full-disclosure] RE: hPRoTeCT Labs Releases vulnfind ([EMAIL PROTECTED])

2005-05-02 Thread Alexander . Haeussler
Ascom Comment > Date: Wed, 27 Apr 2005 11:57:15 -0700 > From: <[EMAIL PROTECTED]> > Subject: [Full-disclosure] hPRoTeCT Labs Releases vulnfind > To: > Message-ID: <[EMAIL PROTECTED]> > > hPRoTeCT Labs is pleased to announce the release of vulnfind, an > automated universal vulnerabilit

Re: [Full-disclosure] RE: hPRoTeCT Labs Releases vulnfind ([EMAIL PROTECTED])

2005-05-02 Thread Joachim Schipper
On Mon, May 02, 2005 at 10:58:55AM +0200, [EMAIL PROTECTED] wrote: > Ascom IDEAsecure SIGNED MESSAGE > BASE64 > AAEBAAACAQAAAwAAAgIAAAjRgAEAAAbGgAIAAAa0AAQCAAIAAgAABpg+IERhdGU6IF > dlZCwgMjcgQXByIDIwMDUgMTE6NTc6MTUgLTA3MDANCj4gRnJvbTogPGhwcm90ZWN0QGh1 > c2htYWlsLmNvbT4NCj4gU3ViamVjdD

[Full-disclosure] Multiple Vulnerabilities in Video Cam Server 1.0.0

2005-05-02 Thread Donato Ferrante
Donato Ferrante Application: Video Cam Server http://vcs.raybase.com/ Version: 1.0.0 Bugs: Multiple Vulnerabilities Date: 02-May-2005 Author: Donato Ferrante e-mail: [EMAIL PROTECTED] web:www

[Full-disclosure] asm to c

2005-05-02 Thread Matteo Giannone
Hi list, is it possible to convert asm code into c code ? Is there any tool around ? __ http://teokolo.altervista.org 6X velocizzare la tua navigazione a 56k? 6X Web Accelerator di Libero! Scaricalo su INTERN

Re: [Full-disclosure] asm to c

2005-05-02 Thread Andrew Griffiths
On Mon, May 02, 2005 at 02:52:05PM +0200, Matteo Giannone wrote: > Hi list, > is it possible to convert asm code into c code ? Is there any tool around ? > Hi, Have a read over http://boomerang.sourceforge.net/, http://www.program-transformation.org/Transform/DecompilationPossible, and http://b

RE: [Full-disclosure] The best hacker ever !

2005-05-02 Thread Schmehl, Paul L
> -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > Sent: Friday, April 29, 2005 9:18 PM > To: Schmehl, Paul L > Cc: full-disclosure@lists.grok.org.uk > Subject: Re: [Full-disclosure] The best hacker ever ! > > On Fri, 29 Apr 2005 16:34:42 CDT, Paul Schmehl said: >

Re: [Full-disclosure] Reminder to you Out-of-Office folks.

2005-05-02 Thread vulcanius
Thomas, does it look like i'm whining? Or does it look like your trying to start something. I'm leaning toward the latter. Don't be one of the children of FD. I have already set up a filter to weed them out. The point was people can take a minute or two and be polite and save the rest of us the tro

Re: [Full-disclosure] The best hacker ever !

2005-05-02 Thread vulcanius
In some senses it seems like it may be worthy of a Darwin award. On 5/2/05, Schmehl, Paul L <[EMAIL PROTECTED]> wrote: > > -Original Message- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > > Sent: Friday, April 29, 2005 9:18 PM > > To: Schmehl, Paul L > > Cc: full-disclosure@lists

Re: [Full-disclosure] The best hacker ever !

2005-05-02 Thread Zuxy Haiduc
While most people know better than attacking 127.0.0.1, it's important to note that in some operating systems (Windows, and a few others, but normally not *nix), anything in 127.* is loopback. Its a lot easier to trick someone into attacking, say, 127.36.120.67, than 127.0.0.1. Just a thought.

Re: [Full-disclosure] The best hacker ever !

2005-05-02 Thread Gregory Boyce
On Mon, 2 May 2005, Zuxy Haiduc wrote: While most people know better than attacking 127.0.0.1, it's important to note that in some operating systems (Windows, and a few others, but normally not *nix), anything in 127.* is loopback. Its a lot easier to trick someone into attacking, say, 127.36.120.6

Re: [Full-disclosure] DMA[2005-0425a] - 'ESRI ArcGIS 9.x multiple localvulnerabilities'

2005-05-02 Thread solemn
if you think that's funny, check out ArcIMS for windows and some of the permissions that are given to the files during the install. at least it was pretty entertaining with earlier versions of ArcIMS wonder if they fixed it in 9. don't forget the humor with certain tags when making custom xml queri

[Full-disclosure] CCA source code released

2005-05-02 Thread Jonathan Heusser
Hello, Some months ago I announced the C Code Analyzer, a static analysis tool for detecting potential security problems in C source code. I released the source code of CCA today. Current features are: - fully automatic user input tracer - potential bufferoverflow detection - memory leak detectio

[Full-disclosure] The Tel Aviv University Security Forum - meeting #11 - 8/5/05

2005-05-02 Thread Gadi Evron
Hello! The next, non-commercial, technological Security Forum will take place on Sunday, the 8th of May, 2005, at Tel Aviv University's Lev Auditorium. Schedule 17:45 - Gathering - hot and cold drinks will be served. 18:00 - Yaniv Shaked. Lecture: Cracking the Bluetooth PIN. Level:

Re: [Full-disclosure] The best hacker ever !

2005-05-02 Thread Andre Derek Protas
I thought that was your IP so I used the same program he had and just killed my box! Whoops! ;) PS - Works in M$ Gregory Boyce wrote: On Mon, 2 May 2005, Zuxy Haiduc wrote: While most people know better than attacking 127.0.0.1, it's important to note that in some operating systems (Windows, and

[Full-disclosure] tHorK FrameWork beta v0.1::: another exploit framework

2005-05-02 Thread khaalel
tHork FrameWork is an exploit framework that allows you to put all the exploits you want/have in a repertory in order to access them (with a search engine) whenever and wherever you want. tHork is under GPL license and was programed in python. tHork FrameWork is a whole of "small" CGI script needi

[Full-disclosure] Possible Google Phishing Scam

2005-05-02 Thread DAN MORRILL
Enclosures as raw text. Interesting that a, my google e-mail is not public, b, I didn't ask for assistance, c, there is no place in google to report this other than a user error unable to get to e-mail. Header E-Version: 1.0 Received: from sproxy.google.com ([64.233.170.130]) by mc11-f36.hotmail

[Full-disclosure] Another PayPal phishing scam

2005-05-02 Thread Julio Cesar Fort
Today I received a fake message pretending to be from PayPal Security Center. The most intersting thing is that I don't even have a PayPal account. The fake PayPal link points to a possibly compromised server in Spain (http://217.11.100.3/~cs/paypal/) Regards, Julio Cesar Fort (julio at rfdslabs

Re: [Full-disclosure] Another PayPal phishing scam

2005-05-02 Thread Morning Wood
> Today I received a fake message pretending to be from PayPal Security > Center. The most intersting thing is that I don't even have a PayPal > account. > quite common. i am supprised its your first one. ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Reminder to you Out-of-Office folks.

2005-05-02 Thread Thomas Sutpen
On 5/2/05, vulcanius <[EMAIL PROTECTED]> wrote: > Thomas, does it look like i'm whining? Is this a rhetorical question? You just sent an email to a bunch of people that are out of the office. And what are these people going to do when they get back in the office? "Oh crap! I got a bunch of gar

Re: [Full-disclosure] The best hacker ever !

2005-05-02 Thread Volker Tanger
On Mon, 2 May 2005 12:06:39 -0400 (EDT) Gregory Boyce <[EMAIL PROTECTED]> wrote: > On Mon, 2 May 2005, Zuxy Haiduc wrote: > > > While most people know better than attacking 127.0.0.1, it's > > important to note that in some operating systems (Windows, and a few > > others, but normally not *nix),