[Full-disclosure] [SECURITY] [DSA 1085-1] New lynx-cur packages fix several vulnerabilities

2006-06-01 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1085-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze June 1st, 2006

[Full-disclosure] THC releases Nokia Phone ROM images and memory maps

2006-06-01 Thread rm
Hi, THC is the world's first group to release ROM images and memory maps from Nokia Mobile Phones. This is an invitation for Reverse Engineers and hackers to discover hidden secrets and backdoors on mobile phones. http://www.thc.org/thc-rom The following webpage contains ROM images from

Re: [Full-disclosure] RFID used at Olympics in Germany

2006-06-01 Thread Chris
In order to get a ticket you were engaged to give the following information to the FIFA: - complete name and surename - adress - date of birth - nationality - number of passport or Reisepass (travel passport) - telephone number - fan of what club (!) - email-address - number of bank-

Re: [Full-disclosure] RFID used at Olympics in Germany

2006-06-01 Thread Adam Laurie
Josh L. Perrymon wrote: Yeah.. I suppose their would be limitations on the amount of data that would be on the chip.. Maybe the will just use an ID number that refrences the user info in the DB Has anyone successfully performed SQL injections usinf RFID tags? I looked at a few papers

[Full-disclosure] Different google interface when using some Tor exit nodes

2006-06-01 Thread Naxxtor Security
Whilst using the Tor network to search google, once in a while the google search results interface changes to the new look, as described here: http://arstechnica.com/news.ars/post/20060326-6460.html But the method used there uses cookies. This means one of two things: o The decision to

Re: [Full-disclosure] Different google interface when using some Tor exit nodes

2006-06-01 Thread Tonnerre Lombard
Salut, On Thu, 2006-06-01 at 14:46 +0100, Naxxtor Security wrote: Whilst using the Tor network to search google, once in a while the google search results interface changes to the new look, as described here: http://arstechnica.com/news.ars/post/20060326-6460.html This is due to IP based

Re: [Full-disclosure] Different google interface when using some Tor exit nodes

2006-06-01 Thread Naxxtor Security
I'm aware of that, however, is there any particular reason why the exit nodes that I've been observing load that version? Are they owned by Google developers working on the new interface? Or are they just normal users? Perhaps they are corporate users who have a deal with Google? There doesn't

Re: [Full-disclosure] Different google interface when using some Tor exit nodes

2006-06-01 Thread Michael Holstein
This is due to IP based defaults. Google looks different from different countries. Walk around in the world with your laptop and you'll see what I mean. Just do : http://www.google.com/ncr the /ncr stands for no country recognition. Then you get the default (english) interface. /mike.

Re: [Full-disclosure] Different google interface when using some Tor exit nodes

2006-06-01 Thread Michael Holstein
I'm aware of that, however, is there any particular reason why the exit nodes that I've been observing load that version? Are they owned by Google developers working on the new interface? Or are they just normal users? Perhaps they are corporate users who have a deal with Google? There doesn't

Re: [Full-disclosure] RFID used at Olympics in Germany

2006-06-01 Thread gboyce
On Thu, 1 Jun 2006, Josh L. Perrymon wrote: Has anyone successfully performed SQL injections usinf RFID tags? I looked at a few papers but know it's not widespread. I'm thinking about getting an IPAQ and an RFID reader/writer to play around w/ this stuff.

[Full-disclosure] [ MDKSA-2006:094 ] - Updated evolution packages fix DoS (crash) vulnerability on certain messages.

2006-06-01 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:094 http://www.mandriva.com/security/

Re: [Full-disclosure] Different google interface when using some Tor exit nodes

2006-06-01 Thread Dean Pierce
Yes, that is strange. I don't think that it means tor is caching cookies in exit points, but it is likely that there is a way to bind that preference to your IP as opposed to the cookie like in the article. I tried this 1. started tor 2. checked the IP of my exit point 3. did a google search,

[Full-disclosure] rPSA-2006-0089-1 mysql mysql-bench mysql-server

2006-06-01 Thread Justin M. Forbes
rPath Security Advisory: 2006-0089-1 Published: 2006-06-01 Products: rPath Linux 1 Rating: Severe Exposure Level Classification: Local System User Deterministic Vulnerability Updated Versions: mysql=/[EMAIL PROTECTED]:devel//1/5.0.22-1-0.1 mysql-bench=/[EMAIL

[Full-disclosure] VMSA-2006-0001 - VMware ESX Server Cross Site Scripting issue

2006-06-01 Thread VMware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - --- VMware Security Advisory Advisory ID: VMSA-2006-0001 Synopsis: VMware ESX Server Cross Site Scripting issue VMware ESX

[Full-disclosure] Joomla/Mambo CMS Component SimpleBoard 1.1 XSS-Vulnerabilities

2006-06-01 Thread Yannick von Arx
Joomla/Mambo CMS Component SimpleBoard 1.1.0 Stable XSS-Vulnerabilities === Release Date June 01, 2006 Vendor --- Two Shoes Mambo Factory http://www.tsmf.net/ Version --- SimpleBoard 1.1.0 Stable

[Full-disclosure] scanning

2006-06-01 Thread Nightfall Nightfall
Is it illegal if I perform a vulnerability scan on a site without permission from the owner? How about a simple port scan? thanks.. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and

RE: [Full-disclosure] scanning

2006-06-01 Thread Dixon, Wayne
Depends on the Jurisdiction... However If I found out that it was my site, I'd have to debate on whether or not to sue your ass... But that's just me... However, you could approach the website to see if they would like you to do a security audit or port-scan for them... Just a thought Wayne

Re: [Full-disclosure] scanning

2006-06-01 Thread Valdis . Kletnieks
On Fri, 02 Jun 2006 08:54:23 +0800, Nightfall Nightfall said: Is it illegal if I perform a vulnerability scan on a site without permission from the owner? How about a simple port scan? thanks. Rule 0 of a pen test: *ALWAYS* have a *written* Get Out Of Jail Free card before doing anything,

RE: [Full-disclosure] scanning

2006-06-01 Thread David Alanis
Depends on the Jurisdiction... However If I found out that it was my site, I'd have to debate on whether or not to sue your ass... But that's just me... You would not sue anyone. Thats just saying that you would sue anyone under the sun trying to ping or go after some bot trying to scan your

[Full-disclosure] VMSA-2006-0002 - VMware Server sensitive information lifetime issue

2006-06-01 Thread VMware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - --- VMware Security Advisory Advisory ID: VMSA-2006-0002 Synopsis: VMware Server sensitive information lifetime issue Advisory URL:

[Full-disclosure] Files keep appearing

2006-06-01 Thread Stephen Johnson
Title: Files keep appearing I keep having a phishing website appear on my web server. They keep showing up in a Resources folder of one of the sites that I host. I have gone through the logs and I am not seeing any connections. I deleted the files this morning and this evening they

Re: [Full-disclosure] scanning

2006-06-01 Thread Simon Smith
Guys, It is not illegal to port-scan a target IP with or without authorization. It would be impossible to prosecute someone because they portscanned you. Hell, it would be near impossible to prosecute someone who ran nessus against you but never penetrated your systems. From expereince, the

Re: [Full-disclosure] scanning

2006-06-01 Thread Nightfall Nightfall
On 6/2/06, Simon Smith [EMAIL PROTECTED] wrote: Guys, It is not illegal to port-scan a target IP with or without authorization. It would be impossible to prosecute someone because they portscanned you. Hell, it would be near impossible to prosecute someone who ran nessus against you but