Hochin Chen wrote:
List,
I am looking for a database of default accounts for various software
like MS SQL, Oracle Server, IIS, etc
Any links / pointers?
http://www.phenoelit.de/dpl/dpl.html
http://defaultpassword.com/
BB
http://www.mvimortgage.net/ apparently you should watch what and where you put pictures or your friends. as this company is now finding out pron pictures of your girls should not be podted on your comnay public website even if you think they are in a hidden driectory. especially if your company
aww did i miss the fun?[EMAIL PROTECTED] wrote: and a very merry christmas to you. Love those New England Lassie's. b -- Original message -- From: rich erich [EMAIL PROTECTED] http://www.mvimortgage.net/ apparently you should watch what and where you put pictures or
Rodrigo Barbosa wrote:
On Mon, Dec 26, 2005 at 10:11:45PM -0600, Leif Ericksen wrote:
Really if we have nothing to hide we should not fear them listening to
us. Now if they come in and start forcing a special mark or code word
or something special in order to live or buy or sell anything then
in another life, I played witht eh computrace software. If I remember
correctly it transmits it's data before the OS fully boots, and it is
supposed to survive a Ghost re-image or an OS re-install. I believe it
hooks the Floppy controller if I remember correctly. If the floppy wasn't
set to
shit! I missed the picture! :-(
can any thoughtful person send it to me please?
Ex
-Original Message-From: Will Image
[mailto:[EMAIL PROTECTED]Sent: Tuesday, December 27, 2005 1:18
PMTo: [EMAIL PROTECTED]; rich erich;
full-disclosure@lists.grok.org.ukSubject: [inbox] Re:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2005:238
http://www.mandriva.com/security/
in another life, I played witht eh computrace software. If I remember
correctly it transmits it's data before the OS fully boots, and it is
supposed to survive a Ghost re-image or an OS re-install.
I could envision doing this with BIOS participation and taking advantage
of the HPA area on
On Tue, Dec 27, 2005 at 04:21:02PM -0500, Michael Holstein wrote:
But to send out a phone home packet, you'd have to put a lot of logic
in the bios (enough to do tcp/ip, dhcp, dns, plus hardware drivers for
ethernet, etc).
Don't a lot of systems include just this? Any system which supports
Advisory #2 Title: file Modification in osCommerce# # # Author: 0o_zeus_o0# Contact: [EMAIL PROTECTED]
# Website: olimpusklan.org# Date: 27/12/2005# Risk: High # Vendor Url: http://www.oscommerce.com/# Affected Software:
Don't a lot of systems include just this? Any system which supports
PXE boot can pretty much do all of the above from the BIOS.
True, but Intel's PXE spec expects it to fetch the instructions from the
TFTP server, and get all the details about what to fetch via DHCP. To do
the LoJack trickery
Does the fourth amendment really guarantee us the right to pass any
information through any medium, and assume that it is still considered
private?
The problem is that privacy and freedom (I believe) are mutually
exclusive. If we are granted total privacy in our communications
systems, then that
Juniper NSM remote Denial Of Service
NetScreen-Security Manager is a software that enables you to integrate and
centralize management of your Juniper Networks NetScreen security environment.
More information can be found on
http://www.juniper.net/customers/support/products/nsm.jsp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yo Dean!
On Tue, 27 Dec 2005, Dean Pierce wrote:
The problem is that privacy and freedom (I believe) are mutually
exclusive.
Stalin would be proud of you! You would have loved Franco's Spain.
RGDS
GARY
-
On Tue, 27 Dec 2005 15:41:06 -0500, Exibar [EMAIL PROTECTED] said:
shit! I missed the picture! :-(
can any thoughtful person send it to me please?
Or better yet a link to the list. ;-)
--ckg
--
Clark Gaylord
Blacksburg, VA USA
[EMAIL PROTECTED]
--On December 27, 2005 2:49:18 PM -0800 Benjamin Franz
[EMAIL PROTECTED] wrote:
On Tue, 27 Dec 2005, Paul Schmehl wrote:
Well, no, they are not clearly illegal. That is a matter of opinion
and not law. In fact, all legal precedents indicate that the program
is legal, within the purview
On 12/27/05, Paul Schmehl [EMAIL PROTECTED] wrote:
...
Well, no, they are not clearly illegal. That is a matter of opinion and
not law.
you are both correct to some degree. as an unsatisfying but
appropriate conclusion consider that the interpretation of the law by
a judge / jury must
http://news.com.com/2061-10789_3-6009969.html
Richard M. Smith, a computer privacy expert, has suggested a method
to find out if the government is monitoring a person's e-mail...
To find out [[if the NSA is watching]], Smith suggested the following
recipe: Set up e-mail accounts with Hotmail and
We leet his professionism :
http://www.google.com/search?q=robert+lemos+moreover
Moreover yeah
Bend over l33t
We're with you Roberto
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and
This is typical of the shit that C|Net publishes nowadays.
They haven't published an accurate or useful article in months... C|
Net is only good if you need reviews of digital cameras. They should
have stuck with their old TV shows - Daphne Gina were awesome.
Jamie
On Dec 27, 2005, at
So let me get this straight. SecurityFocus doesn't think you're worth
their time and so they must not be hackers... I'd say I was confused
but sadly I think I get it.
-sb
On 12/27/05, Joe Average [EMAIL PROTECTED] wrote:
This mail was sent on behalf of the n3td3v group.
It goes without
What does Robert Lemos saying Moreover have anything to do with security?
And what is your obsession with slandering and discrediting people who
actually have jobs and accomplished more than copied and pasted
e-mails like you anyways.
Moreover, you are n3td3v.
-sb
On 12/27/05, Joe Average
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Dec 27, 2005 at 06:32:34PM -0600, Paul Schmehl wrote:
But if the rest of us are very unlucky, this huge step towards
totalitarianism by the Bush administration will be let stand as a very
bad precedent.
You don't have a clue what
In reference to:
http://www.securityfocus.com/archive/1/420288/30/0/threaded
I ported the exploit to the Metasploit Framework in case anyone wants to
test it without installing a thousand spyware apps...
Available from 'msfupdate' for MSF users, or in the 2.5 snapshot:
We are seeing a lot of website picking this exploit up.
Examples: DON'T CLICK
Crackz.ws
unionseek.com/d/t1/wmf_exp.htm
beehappyy.biz/parthner3/xpl.wmf
http://www.tfcco.com/xpl.wmf
Iframeurl.biz
Cheers,
Eric Sites
VP of Research Development
Sunbelt Software
email: [EMAIL PROTECTED]
Voice:
In his defence. Lemos is kind of a fuckbag
On 12/27/05, Stan Bubrouski [EMAIL PROTECTED] wrote:
What does Robert Lemos saying Moreover have anything to do with security?
And what is your obsession with slandering and discrediting people who
actually have jobs and accomplished more than copied
Apparently you guys don't get it.
If they are actually reading/monitoring the emails and you put a url
in the message that hits a box that you have access to the logs on.
Make the URL unique and when the spook clicks on it, you see the hit
in your logs. It is a stretch but it may work. But
So what? I don't care if the guy eats babies for breakfast, personal
attacks have nothing to with security or any topic covered on this
list.
-sb
On 12/28/05, InfoSecBOFH [EMAIL PROTECTED] wrote:
In his defence. Lemos is kind of a fuckbag
On 12/27/05, Stan Bubrouski [EMAIL PROTECTED] wrote:
I agree. Yet the moderator still allows n3td3v to post
On 12/27/05, Stan Bubrouski [EMAIL PROTECTED] wrote:
So what? I don't care if the guy eats babies for breakfast, personal
attacks have nothing to with security or any topic covered on this
list.
-sb
On 12/28/05, InfoSecBOFH
You have to remember who he's being called a f*ckbag by
- Original Message -
From: Paul [EMAIL PROTECTED]
To: 'InfoSecBOFH' [EMAIL PROTECTED]; 'Stan Bubrouski'
[EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Sent: Wednesday, December 28, 2005 1:36 AM
Subject: RE:
I don't attempt to pass myself off as a blackhat. Personally, I find the
blackhat philosophy very disagreeable. I will openly admit on this list,
despite the certain onslaught of flames and insults that awaits, that given
the black and white view of security, I would label myself a whitehat. Why?
31 matches
Mail list logo