Seeing as our friend doesnt seem to realise everyone is getting bored of seeing his trolls.
Place your votes:-
http://snappoll.com/poll/50150.php
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Stop the PRESS
GROUNDBREAKING
d4yj4y and Dorian have released a scientific ingenious
miracle or informational GOLD/Spirit to HELP THE HUMAN
RACE
ANti-Pscyh-Ops Etc. and PRO Will and Life!!
==CHUNG'S DONUT SHOP RELEASE=
The Dorian Worm Theory: Future brightness
refs: AI,
Stop the PRESS
GROUNDBREAKING
d4yj4y and Dorian have released a scientific ingenious
miracle or informational GOLD/Spirit to HELP THE HUMAN
RACE
ANti-Pscyh-Ops Etc. and PRO Will and Life!!
==CHUNG'S DONUT SHOP RELEASE=
The Dorian Worm Theory: Future brightness
refs: AI,
oops?
Database error: pconnect(209.173.128.195, snappoll, $Password) failed.
MySQL Error: ()
Session halted.
http://snappoll.com/poll/50150.php
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
hmm, second time vote worked... but um
http://www.snappoll.com/view_results.php?poll_id='50150
Database error: Invalid SQL: SELECT * FROM polls WHERE poll_id='50150
MySQL Error: 1064 (You have an error in your SQL syntax near ''50150' at
line 1)
Session halted.
eek
its called fedora and suexec umm, aka not patched apache 2.0.49 server ?
.02
On 11/28/05, Morning Wood [EMAIL PROTECTED] wrote:
oops?Database error: pconnect(209.173.128.195, snappoll, $Password) failed.
MySQL Error: ()Session
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200511-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200511-23
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
Dear All,
(First I am looking for a job in OC right now so if
you are looking for someone with knowledge like me,
send me an email. Eating is nice and I am poor
currently)
I highlighted an added sections as well as italicied
and underlined things to make it easier to absorb and
learn without
Here ye Here ye,
Someone hire me, I'm bored and like one enter key
could take the whole net down. 26, I could really use
a job-some corporate sponsership to help
consult/develop Etc.
Nothing wrong with keeping the internet for the people
by the people. Hey, whoever has to do it has to do it
and
You cared enough to post your usual shit. Your usual shit intales
bashing others, where you have nothing constructive to add to the
conversation. Go back to your IRC hideout mr Venom. Thanx
On 11/28/05, VeNoMouS [EMAIL PROTECTED] wrote:
OMG HAI!!!, Wow your job is almost complete, all you have
Title: Google Talk Beta Messenger cleartext credentials in process memory
Affected versions: 1.0.0.64 (this version is believed to be the first
one released to the public)
Vendor contacted: 25/08/05
Patched version released: 29/08/05
Advisory released: 28/11/05
Author: pagvac (Adrian Pastor)
http://www.snappoll.com/view_results.php?poll_id='50150
Database error: Invalid SQL: SELECT * FROM polls WHERE poll_id='50150
MySQL Error: 1064 (You have an error in your SQL syntax near ''50150' at
line 1)
Session halted.
Sounds like a SQL injection test-site to me
Maybe he took the site down with his l33t h4x0r skillz, or one of his 'contacts' did lol
On 11/28/05, Michael Holstein [EMAIL PROTECTED] wrote:
http://www.snappoll.com/view_results.php?poll_id='50150 Database error: Invalid SQL: SELECT * FROM polls WHERE poll_id='50150 MySQL Error: 1064 (You
On Mon, 2005-11-28 at 14:43 +, dead troll wrote:
Maybe he took the site down with his l33t h4x0r skillz, or one of his
'contacts' did lol
Or it could be that there's a a single quote in the URL that Morning
Wood posted, which the webserver doesn't appear to be sanitising (this
would be why
Hello all,
This isn't really a security advisory, but I hope it lives up to the
'leetness of the last several threads here (I'll mispell some words if
it'll help).
After trying to help several customers set up fully secure SSH access to
their servers *without allowing passwords*, I got tired of
shut up kid, noone ever cares about your posts n3td0rk and your website is
all crap.
no code at all and no interesting info. your just a pathetic wannabie who's
ego
seems a little too high compared to his skill level. since you got no skill
at all.
funny thing is you complain that others just bash
On 11/28/05, dead troll [EMAIL PROTECTED] wrote:
nothing important
This is the first email I have recieved in a long time with netdev
being the topic of the email.
Please respect those that are smarter than you and put netdev in the
subject or body so that my filters can put these kinds of
Anyone know about this?
-- Forwarded message --
From: 4Daily.com Hotline [EMAIL PROTECTED]
Date: Nov 28, 0005 9:28 AM
Subject: [YXZ-45186]: Re: [Full-Disclosure] Return of the Phrack High Council
To: [EMAIL PROTECTED]
== Please reply above this line ==
Dude VanWinkle,
FreeWebStat Multiple XSS Vulnerabilities
Name Multiple XSS Vulnerabilities in FreeWebStat
Systems Affected FreeWebStat (verified on 1.0 rev37)
Severity Medium Risk
Vendorwww.freewebstat.com
Advisory http://www.ush.it/2005/11/25/free-web-stat/
PHP Web Statistik Multiple Vulnerabilities
Name Multiple Vulnerabilities in PHP Web Statistik
Systems Affected PHP Web Statistik (verified on 1.4)
Severity Medium Risk
Vendorwww.php-web-statistik.de
Advisory
-multiple-vulnerabilities/
Advisory
http://www.ush.it/team/ascii/hack-WebCalendar/advisory.txt
AuthorFrancesco aScii Ongaro (ascii at katamail . com)
Date 20051128
WebCalendar is vulnerable to four SQL Injection (files activity_log.php,
admin_handler.php
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200511-23
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
Off your meds?
Yes, this email is sure to get you a job. Cause we all need to hire
./ kiddies... maybe n3td3v can use you.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by
http://www.f-secure.com/weblog/#0723
Here's an interesting one. Peripherals manufacturer I-O Data has shipped a
series of nice-looking portable hard drives in the 40GB to 120GB range -
carrying the Backdoor.Win32.Tompai trojan on them.
They should be roasted just as Sony was for their
Here's an interesting one. Peripherals manufacturer I-O Data has shipped
a series of nice-looking portable hard drives in the 40GB to 120GB range
- carrying the Backdoor.Win32.Tompai trojan on them.
More interesting is *why* there would be a master image on a new
expansion hard drive in the
On Mon, Nov 28, 2005 at 04:56:55PM -0500, Michael Holstein wrote:
Here's an interesting one. Peripherals manufacturer I-O Data has shipped
a series of nice-looking portable hard drives in the 40GB to 120GB range
- carrying the Backdoor.Win32.Tompai trojan on them.
More interesting is *why*
Paul Schmehl wrote:
http://www.f-secure.com/weblog/#0723
Here's an interesting one. Peripherals manufacturer I-O Data has shipped a
series of nice-looking portable hard drives in the 40GB to 120GB range -
carrying the Backdoor.Win32.Tompai trojan on them.
They should be roasted
Steve Friedl to Michael Holstein:
More interesting is *why* there would be a master image on a new
expansion hard drive in the first place.
I just bought a couple of external USB-based hard drives, and the
preformatted filesystems had an autorun with the logo of the vendor:
I think it
Well, I agree that something should be done, but it isn't equal to the
Sony issue IMHO. This was clearly an accident, just like viruses and
trojans that were found in MP3 players to Dell computers (for a very
short time). This is business, sometimes, products are defective.
Sony knew what they
Todd Towles wrote:
Well, I agree that something should be done, but it isn't equal to the
Sony issue IMHO. This was clearly an accident, just like viruses and
trojans that were found in MP3 players to Dell computers (for a very
short time). This is business, sometimes, products are defective.
Flaw in Syn Attack Protection on non-updated Microsoft OSes, can lead to DoS
Summary
It is possible to mount a DoS attack against Windows 2000/2003 hosts where
the SYN attack protection has been enabled. The attacker can consume all CPU
resources of the victim host making it unresponsive.
While
--On Monday, November 28, 2005 18:33:13 -0500 Eliah Kagan
[EMAIL PROTECTED] wrote:
Todd is right.
It is important to differentiate between maliciousness and a really
embarrassing error. Sony *wrote* a rootkit for the purpose of cracking
into their customers' systems to force their customers to
Duncan Lindley wrote (off-list):
On the subject of embarrassing errors;
Sony purchased a root kit ala DRM software from first 4 internet.
---
Duncan Lindley
Systems Administrator
Virgin Blue Airlines Pty Ltd
07 3295 5010
0423 025 150
Yes, this is an embarrassing error on my part. It has
From: Eliah Kagan [EMAIL PROTECTED]
Date: Mon, 28 Nov 2005 18:55:00 -0500
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] This crap needs to stop
Yes, this is an embarrassing error on my part. It has next to nothing
to do with what I am trying to say, but it is
Paul Schmehl wrote:
Well, that's not what I said, but doesn't a company have a responsibility
to virus-check any software they ship *before* they ship it? It's not like
this is something so new that a normal check wouldn't have found it.
And isn't the *effect* on the end user the same?
Some deserve to wither and die. Perhaps you are one of those.
On 11/28/05, Day Jay [EMAIL PROTECTED] wrote:
niggas gotta eat and shit bitch!!
--- InfoSecBOFH [EMAIL PROTECTED] wrote:
Off your meds?
Yes, this email is sure to get you a job. Cause we
all need to hire
./ kiddies...
-
Fedora Legacy Update Advisory
Synopsis: Updated php packages fix security issues
Advisory ID: FLSA:166943
Issue date:2005-11-28
Product: Red Hat Linux, Fedora Core
Keywords:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello,
someone guided me to http://www.honeynet.org/index.html and i found it a
nice project. At least i still learned something myself :) Does anyone
know similar sites with analysis from rootkit infected systems?
Preferably more recent ones.
- --
heheh, I surely do :-)
oh yah, and for those wondering it's NOT a test question that I know of
;-)
Exibar
-Original Message-
From: Disco Jonny [mailto:[EMAIL PROTECTED]
Sent: Saturday, November 26, 2005 1:59 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [inbox] Re:
Hello full-disclosurers,
This month's top10 list for Full Disclosure (http;//www.securiytrap.org/fd/) is
,
1 [Full-disclosure] Return of the Phrack High Council59
http://www.securitytrap.org/fd/10055
2 [inbox] Re: [Full-disclosure] Hacking Boot camps! 40
41 matches
Mail list logo