Re: [Full-disclosure] Comment Spam: new trends, failing counter-measures and why it's a big deal

2006-02-12 Thread Andrew Haninger
On 2/12/06, Nick FitzGerald <[EMAIL PROTECTED]> wrote: > I guess you missed all the historic discussion of how cheap it is, in > "Western" terms, to employ what passes as skilled labour in much of the > third-world to solve "captcha-like" challenges??? FWIW, I've heard of (never seen) porn sites wh

RE: [Full-disclosure] Comment Spam: new trends, failing counter-measures and why it's a big deal

2006-02-12 Thread php0t
> And a friend of mine has already written a PHP class using GD that can > beat 80-90% of common CAPTCHA implementations. Interested. Further info? Any online implementation that I can feed images / url's to and receive results? > It's not a particularly complex algorithm. This is all re

[Full-disclosure] [SECURITY] [DSA 968-1] New noweb packages fix insecure temporary file creation

2006-02-12 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 968-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze February 13th, 2006

[Full-disclosure] HITB E-Zine #38 Released !

2006-02-12 Thread Praburaajan
We are pleased to announce that the latest edition of the HITB e-zine (Issue #38) has been released. We do hope everyone enjoyed the videos of HITBSecConf2005 - Malaysia ... If you haven't downloaded them yet, they're still available at ht

Re: [Full-disclosure] Comment Spam: new trends, failing counter-measures and why it's a big deal

2006-02-12 Thread Gareth Davies
php0t wrote Yep.. I repeat. 'Big part of the problem'. Which is nowhere near 'singularly successful solution'. Let's suppose 20% of that spam you see is posted by people doing this all day, getting paid for it. It's probably much less, but this is all a guess, nothing more. Would it not be a

RE: [Full-disclosure] Comment Spam: new trends, failing counter-measures and why it's a big deal

2006-02-12 Thread php0t
php0t wrote: > > A big part of the problem you mention can be solved by requiring a > > Turing test for the actions that you don't want a bot to be able to > > do. > I guess you missed all the historic discussion of how cheap it is, in > "Western" terms, to employ what passes as skilled labo

Re: [Full-disclosure] Comment Spam: new trends, failing counter-measures and why it's a big deal

2006-02-12 Thread Michael Silk
I just think it's hypocritical for blogs to complain about spam; they are in themselves spam. You spam the internet, the internet spams you back. It's soviet russia! -- Michael On 2/13/06, Gadi Evron <[EMAIL PROTECTED]> wrote: > Recently, new bots rendered current anti spam techniques for blogs >

RE: [Full-disclosure] Comment Spam: new trends, failing counter-measures and why it's a big deal

2006-02-12 Thread Nick FitzGerald
php0t wrote: > A big part of the problem you mention can be solved by requiring a > Turing test for the actions that you don't want a bot to be able to do. I guess you missed all the historic discussion of how cheap it is, in "Western" terms, to employ what passes as skilled labour in much of

RE: [Full-disclosure] Comment Spam: new trends, failing counter-measures and why it's a big deal

2006-02-12 Thread php0t
A big part of the problem you mention can be solved by requiring a Turing test for the actions that you don't want a bot to be able to do. php0t > Recently, new bots rendered current anti spam techniques for blogs > almost useless. Here is a short write-up on the subject of comment spam, >

Re: [Full-disclosure] Re: Microsoft AntiSpyware attacks Norton AV?

2006-02-12 Thread Bipin Gautam
On 2/13/06, Dave Korn <[EMAIL PROTECTED]> wrote: > "Joel R. Helgeson" [EMAIL PROTECTED] wrote in message > news:[EMAIL PROTECTED] > > Is anyone else seeing/experiencing this? > > > When it scanned each system it found a Trojan called PWS.Bancos.A > > (Password Stealer) - Level: Severe > > > When it

[Full-disclosure] Comment Spam: new trends, failing counter-measures and why it's a big deal

2006-02-12 Thread Gadi Evron
Recently, new bots rendered current anti spam techniques for blogs almost useless. Here is a short write-up on the subject of comment spam, referrer spam and what's currently happening in that area. I have given a lot of thought and have done a lot of checking into the subject of comment spam.

RE: [Full-disclosure] Re: Microsoft AntiSpyware attacks Norton AV?

2006-02-12 Thread Nick Hyatt
I disagree. In our troubleshooting environment, we use 4 applications to remove spyware / malware / virus infections from customer systems - AVG, MS Antispyware, Ad-Aware PE and Spybot S&D. We've found that it takes 4+ applications plus some manual digging with Hijack This and RegscrubXP to get ri

[Full-disclosure] Everyone's loginName variable Cross Site Scripting Vulnerability

2006-02-12 Thread simo
Title: Everyone's loginName variable Cross Site Scripting Author: Simo Ben youssef aka _6mO_HaCk Published: 12 february 2006 MorX Security Research Team http://www.morx.org Service: Webmail Vendor: everyone / www.everyone.net Vulnerability: Cross Site Scripting Exploit included: Yes Details: Ev

Re: [Full-disclosure] Re: Microsoft AntiSpyware attacks Norton AV?

2006-02-12 Thread Nancy Kramer
At 07:05 PM 2/12/2006, Dave Korn wrote: No, let me correct that. You need to fully uninstall it then throw it in the bin and get something better[*]. Oh, and don't let MS beta software run on any of your machines. I concur. Been there done that got the viruses. If it weren't for AVG I

[Full-disclosure] Re: What can a Remote Vulnerability Scanner do in Future?

2006-02-12 Thread Tim Nelson
On Mon, 6 Feb 2006, Alice Bryson wrote: ... Eeye scanner could not do remote local check too. So I am consider what can Remote Vulnerability Scanner do? Will this thing disappear in the future? Scan for remote vulnerabilities. Scanning for local vulnerabilities can obviously only be done

[Full-disclosure] Re: Microsoft AntiSpyware attacks Norton AV?

2006-02-12 Thread Dave Korn
"Joel R. Helgeson" [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED] > Is anyone else seeing/experiencing this? > When it scanned each system it found a Trojan called PWS.Bancos.A > (Password Stealer) - Level: Severe > When it quarantined the bug, it also rendered the Symantec Anti-Viru

Re: [Full-disclosure] Privilege Scalation for Windows Networks using weak Service restrictions v2.0 exploit

2006-02-12 Thread Andres Tarasco
Hi,Not all windows versions are affected. The services listed below have been found on several pen-tests.As far as i know, the only way to know if you system is vulnerable to this issue, is testing it with srvcheck because i have found win2k server boxes, with all patches, with more than 20 vulnera

Re: [Full-disclosure] Cisco Certifications

2006-02-12 Thread Kerry Thompson
Andrew Smith said: > Hey, > Might not be the best place to ask this, but I couldn't find anywhere more > relevant. > I'm considering trying to get some CISCO Certifications in the future, but > can't really afford the training. > I know a few people with certifications and they're willing to lend m

Re: [Full-disclosure] Google creates SPAM haven

2006-02-12 Thread Volker Tanger
Adam Laurie <[EMAIL PROTECTED]> wrote: > J.A. Terranson wrote: > > On Sat, 11 Feb 2006, Stan Bubrouski wrote: > >confirmation, >Google just blindly subscribes you when anyone > >requests it, I'm >assuming, since I didn't subscribe to any of the > >hacker or porn groups >I have to keep removing mys

Re: [Full-disclosure] Privilege Scalation for Windows Networks using weak Service restrictions v2.0 exploit

2006-02-12 Thread [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Andres Tarasco wrote: > Proof of concept of Sudhakar Govindavajhala and Andrew Appel paper > (http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf) Running > as an unprivileged user you can test if your services are > vulnerable and can be used to

[Full-disclosure] [ GLSA 200602-05 ] KPdf: Heap based overflow

2006-02-12 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200602-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200602-04 ] Xpdf, Poppler: Heap overflow

2006-02-12 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200602-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

Re: [Full-disclosure] Google creates SPAM haven

2006-02-12 Thread Adam Laurie
J.A. Terranson wrote: On Sat, 11 Feb 2006, Stan Bubrouski wrote: Yeah but typically lists and whatnot these days require confirmation, Google just blindly subscribes you when anyone requests it, I'm assuming, since I didn't subscribe to any of the hacker or porn groups I have to keep removing

Re: [Full-disclosure] Cisco Certifications

2006-02-12 Thread pingywon
If you want cert info try www.governmentsecurity.org   ~pingywon - Original Message - From: Andrew Smith To: full-disclosure@lists.grok.org.uk Sent: Saturday, February 11, 2006 11:10 AM Subject: [Full-disclosure] Cisco Certifications Hey,Might not be the be