Hello FD,
Recently one of our offices started to experience a significant packet
lost ratio and was having trouble browsing the web. The network
infrastructure is very simple[1] - its a remote office connected to
the Internet. The suspicion reduced to a number of possible causes,
one of them is
On Sat, 26 Nov 2005, Maxim Vexler wrote:
infrastructure is very simple[1] - its a remote office connected to
the Internet. The suspicion reduced to a number of possible causes,
sniffing I will be forced to temporally replace this switch with my
trusty hub the next time I get a chance to go
On Sat, 26 Nov 2005 11:24:42 +0200, Maxim Vexler said:
In the mean time I would like to ask you if any testing can be made to
locate a noisy machine on a subnet that is connected with a switch?
If it's a managed switch, you can just dump the per-port statistics
and look for one that looks way
On Fri, Nov 25, 2005 at 04:04:31PM -0800, coderman wrote:
On 11/25/05, Joachim Schipper [EMAIL PROTECTED] wrote:
...
While I'm not too sure what you mean, doesn't manual keying solve this
problem?
setkey doesn't make the greatest key daemon. something that supports
decent
On 11/25/05, R S [EMAIL PROTECTED] wrote:
Why does posts from n3td3v, phc and InfosecBOFH appear very similar? Google
Mail not putting something similar to X-Originating-IP has given some
kiddies an even easier way to create differerent personas and go around
promoting their fantasy
Priceless.
On 11/26/05, [EMAIL PROTECTED] [EMAIL PROTECTED]
wrote:
It appears that a great deal of this list doesn't rememberPHC/Project Mayhem and is dismissing them as trolls like n3td3v, or
other script kiddies that seem to populate this list nowaday. Letme refresh the memories of those who
lol.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On 11/26/05, Joachim Schipper [EMAIL PROTECTED] wrote:
I fully agree. But if you only want to accept traffic from trusted,
authenticated sources, it's about as close to that as you can get.
what i'd like a key daemon to do:
- create or import a symmetric key database (hardware entropy++)
- for
Keep pr0j3kt m4yh3m alive!
Dear FD Reader,
First of all, I would like to state for the rest of you
that never heard about the honourary Phrack High Council, we have no
links or ties to the fake 'phrack' team that is publishing that
whitehat e-zine. We've been contacted to join forces with them
Calling someone else a kid
just because he has a different mindset or vision is simply childish.
Am I the only one who sees a little bit of irony there?
___
Full-Disclosure - We believe in it.
Charter:
I suppose you have pictures of Kevin Mitnick on your bedroom wall and stuff.
Send my regards,
n3td3v
On 11/26/05, Phrack High Council [EMAIL PROTECTED] wrote:
Keep pr0j3kt m4yh3m alive!
___
Full-Disclosure - We believe in it.
Charter:
below this line is priceless ---
Yo,
Hey John, I want to introduce you to a student of mine, Ryan Coleman. Ryan
was hoping to correspond with you.
%% Is this the Ryan with the hot mommy?
Ryan is extremely bright, in his early twenties and looking for a
I have never hacked a
computer, I am not a hacker. I have never used anyone elses exploit to
hack a computer, I am not a script kid. I read news sites, mailing
lists and am friends of hackers, employees of vendors and script kids.
I am a researcher of security in that context. I know a lot of
On Sat, Nov 26, 2005 at 05:08:37PM +, n3td3v wrote:
snip
I run my own intelligence service and report shit to vendors. Time to
get educated and stop throwing titles around based on your misinformed
opinion based on someone you know nothing about.
Enlighten us to your intelligence service
On 26/11/05, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
A mirror of the original PHC site:
http://www.eurocompton.net/~bhb/phrack/
A mirror of an anti-sec journal (blackhatbloc):
http://www.eurocompton.net/~bhb/
el8 magazine:
http://web.textfiles.com/ezines/EL8/
Thats just as funny as
n3td3v wrote:
I have never hacked a
computer, I am not a hacker. I have never used anyone elses exploit to
hack a computer, I am not a script kid. I read news sites, mailing
lists and am friends of hackers, employees of vendors and script kids.
I am a researcher of security in that context. I
Maxim Vexler wrote:
[...]
In the mean time I would like to ask you if any testing can be made to
locate a noisy machine on a subnet that is connected with a switch?
If you have access to a machine connected to the switch you could try
arp-spoofing (
And yet you quoted netdev's entire email for no good reason
whatsoever...another breach of supposed netiquette.
Top vs. bottom posting is a bunch of crap. With 20 years experience in
computing I have yet to see consensus on this issueregardless of
wikipedia definition.
I subscribe to
yeah, that was a slight accident, the first one I composed only went to
him since I didn't hit reply-all, and didn't fully edit the second one. :/
ok, so I'm a bit of a hypocrite sometimes too. Also, I didn't mean to
say wikipedia's definition was a way to go, I was just using that to
show my
I would only add that if EVERYBODY bottom-posted on a particular forum
and ALWAYS snipped unnecessary prior posts...then I would do the
same...just out of courtesy for established protocol.
Just as I have my own coding conventions which I use for my own code,
yet if I'm editing another
Not in the least. I just know a scam and a waste of time/money when I see one.
On 11/25/05, Exibar [EMAIL PROTECTED] wrote:
wow, SANS must have really hurt you emotionally to be this pissed at
them
Ex
-Original Message-
From: InfoSecBOFH [mailto:[EMAIL PROTECTED]
Sent:
Or perhaps you should learn a thing or two about how Gmail works and
what the IP addresses you are seeing in the header are. Jesus...
perhaps the PHC coming back is going to be a bit like killing a fly
with a shotgun. Are you really that stupid?
On 11/25/05, R S [EMAIL PROTECTED] wrote:
I am
I thought the whole Abad thing was a scam and he was a part of Project
Mayhem along with is co-worker (at the time) Jim Jones over at Qualys.
Hey there is a concept. Lets trust a vendor that hires known hackers
who are known to participate in illegal activity and stores your vuln
assessment
But yet you threatened to knock us off the internet in your previous
troll thread.
So which is it shit breath?
On 11/26/05, n3td3v [EMAIL PROTECTED] wrote:
I have never hacked a
computer, I am not a hacker. I have never used anyone elses exploit to
hack a computer, I am not a script kid. I
If you have access to a machine connected to the switch you could try
arp-spoofing ( http://en.wikipedia.org/wiki/ARP_spoofing )and redirect
traffic to this machine and sniff it there.
More Info:
http://wiki.ethereal.com/CaptureSetup/Ethernet?action=show
http://su2.info/doc/arpspoof.php
I don't feel the urgency to explain the complexed reasoning behind my
postings...Go back to your unimportant job in the industry and keep
away from my operations.
Feel free to pass your judgements, they will be noted, but are
unlikely to be listened to. You havent contributed to the scene,
damn guys, can't we just all get along? maybe sit down and have a cup of
whatever highly cafinated drink you like?
I thought this email would keep me abreast on the latest security holes
that I should update my system for.
Kyle
___
Full-Disclosure -
Kyle Lutze wrote:
damn guys, can't we just all get along? maybe sit down and have a cup of
whatever highly cafinated drink you like?
I thought this email would keep me abreast on the latest security holes
that I should update my system for.
Kyle
err, email list, I should probably get some
On Sat, Nov 26, 2005 at 07:35:34AM -0800, coderman wrote:
On 11/26/05, Joachim Schipper [EMAIL PROTECTED] wrote:
I fully agree. But if you only want to accept traffic from trusted,
authenticated sources, it's about as close to that as you can get.
what i'd like a key daemon to do:
-
Holy shit. is everyone here 13? I feel like I'm sitting in grade school again.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
here's an idea: ignore everyone and stfu for once, and maybe this
list can get back to normal.
On 11/26/05, n3td3v [EMAIL PROTECTED] wrote:
Further attempts to noise me up will be ignored... have a good weekend
___
Full-Disclosure - We believe in it.
On Samstag 26 November 2005 10:24, Maxim Vexler wrote:
[...]
[1] : What they have is : ((clients)) --- [hp switch] -_- [router]
-_- [asdl modem] - {{{ Internet }}}
--
Cheers,
Maxim Vexler (hq4ever).
Depends on the hp switch model you can set up a port for Network Monitoring
Port (same as
ZRCSA-200503 - ktools Buffer Overflow Vulnerability
Zone-H Research Center Security Advisory 200503
http://www.zone-h.fr
Date of release: 27/11/2005
Software: ktools (http://konst.org.ua/ktools)
Affected versions: = 0.3
Risk: Medium
Discovered by: Mehdi Oudad deepfear and Kevin Fernandez
Heres a list of some stuff from months and years ago that I have
republished for your benefit http://n3td3v.blogspot.com
Theres more to come in the future.
Keep a bookmark of my GeoCities site to keep abreast on the latest
Yahoo developments to be released to the world that I have had
personal
34 matches
Mail list logo