Re: [Full-disclosure] Fw: [WEB SECURITY] Application Security Program

2006-06-30 Thread c0redump
Google "STRIDE" and "DREAD" in terms of computer security; http://wiki.okopipi.org/wiki/Security_concerns -- c0redump - Original Message - From: huan chen To: full-disclosure@lists.grok.org.uk Sent: Friday, June 30, 2006 3:40 AM Subject: [Full-disclosure] Fw: [WEB SECURITY] Applicatio

Re: FW: [Full-disclosure] Are consumers being misled by "phishing"?

2006-06-30 Thread Chris Umphress
On 6/29/06, Josh L. Perrymon <[EMAIL PROTECTED]> wrote: Most companies believe that blocking HTML in email handicaps emails effectiveness.. ( screw the newsletters.. put it on a website ) Hehe, agree with you there. Network Protection: I believe that it's possible to develop "widgets" to

RE: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread Castigliola, Angelo
>When the malicious code writers build their viruses and Trojans why not >code the threats to detect the use of proxy servers and if used, connect >through them. Typically you can get to the internet through the default gateway directly from the computer without needing to configure proxy setting

[Full-disclosure] [FLSA-2006:189672] Updated thunderbird package fixes security issues

2006-06-30 Thread Marc Deslauriers
- Fedora Legacy Update Advisory Synopsis: Updated thunderbird package fixes security issues Advisory ID:FLSA:189672 Issue date: 2006-06-30 Product:Fedora Core Keywords: Bugfix, Security C

[Full-disclosure] NCP VPN/PKI Client: UDP Bypassing

2006-06-30 Thread [EMAIL PROTECTED]
Application:NCP VPN/PKI Client Site: http://www.ncp.de Version:8.30, Build 59 and maybe lower OS: Windows Possible problem: UDP Bypassing Product: NCP's Secure Communications provides a comprehensive portfolio of p

Re: [Full-disclosure] FBI Says Data on VA Laptop Not Accessed

2006-06-30 Thread Michael Holstein
The FBI, in a statement from its Baltimore field office, said a preliminary review of the equipment by its computer forensic teams "has determined that the data base remains intact and has not been accessed since it was stolen." More tests were planned, however. Didn't the original "wanted" noti

Re: [Full-disclosure] RFID Attack theory

2006-06-30 Thread Michael Holstein
So most of the research has been done here already.. Which brings me to the work done by www.rfidvirus.org They have some really good ideas about attacking the middleware using SQL injections, SSL includes, and buffer overflows on the reader to middle ware interface. S

Re: [Full-disclosure] FBI Says Data on VA Laptop Not Accessed

2006-06-30 Thread Cardoso
I don't think they can detect some highly advanced techniques like using Partition Magic to mirror the disk.. On Fri, 30 Jun 2006 10:07:46 -0400 Michael Holstein <[EMAIL PROTECTED]> wrote: MH> >The FBI, in a statement from its Baltimore field office, said a MH> >preliminary review of the equipm

Re: [Full-disclosure] FBI Says Data on VA Laptop Not Accessed

2006-06-30 Thread Michael Braun
Cardoso schrieb: I don't think they can detect some highly advanced techniques like using Partition Magic to mirror the disk.. As long as they didn't know the exact amount of hours the hdd was running before it got stolen, i don't see any way to determine if the data was copied away by som

[Full-disclosure] [ GLSA 200606-30 ] Kiax: Arbitrary code execution

2006-06-30 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200606-30 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] ISC: Firefox immune to outerHTML flaw in MSIE [Was: Browser bugs hit IE, Firefox]

2006-06-30 Thread Juha-Matti Laurio
SANS Internet Storm Center states at their updated Diary entry that after more research on this vulnerability it appears that Mozilla Firefox is not affected to information disclosure object.documentElement.outerHTML" property vulnerability reported in Internet Explorer. http://isc.sans.org/di

[Full-disclosure] ZDI-06-020: Apple iTunes AAC File Parsing Integer Overflow Vulnerability

2006-06-30 Thread zdi-disclosures
ZDI-06-020: Apple iTunes AAC File Parsing Integer Overflow Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-06-020.html June 29, 2006 -- CVE ID: CVE-2006-1467 -- Affected Vendor: Apple -- Affected Products: iTunes -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS custom

Re: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread n3td3v
On 6/30/06, Castigliola, Angelo <[EMAIL PROTECTED]> wrote: >When the malicious code writers build their viruses and Trojans why not >code the threats to detect the use of proxy servers and if used, connect >through them. Typically you can get to the internet through the default gateway directly

[Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread AMIT SECURITY
HELLO, MY NAME AMIT. I SECURITY RESEARCH FROM ALL OVER WORLD AND CURRENTLY THIS MY FIRST ADVISORY TO ANYONE RESARCHING. I POST TO MAILING LIST IN INTEREST OF EXPULSION OF KNOWLEDGE. RECENTLY I HEAR OF FREENODE ATTACK AND SOME OPERATORS OWNED FROM SNIFFING OR SOMETHING LIKE THAT. THIS VERY BAD BUT

RE: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread Antczak, Ed
I second the motion. An opportunity to focus and filter the broad spectrum of security issues is welcome if possible. Edwin Antczak Windows Engineer -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of n3td3v Sent: Friday, June 30, 2006 9:48 AM To: full-disc

RE: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread php0t
Thanks for the 0day advisory! It helped out a lot. (ps: 10yrs English course, 10yrs security would have been a better choice for you if you ask me) > HELLO, MY NAME AMIT. I SECURITY RESEARCH FROM ALL OVER WORLD AND CURRENTLY THIS MY FIRST > ADVISORY TO ANYONE RESARCHING. I POST TO MAILING LI

RE: [Full-disclosure] Browser bugs hit IE, Firefox today (SANS)

2006-06-30 Thread Schmehl, Paul L
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Juha-Matti Laurio Sent: Thursday, June 29, 2006 8:08 PM To: bugtraq@securityfocus.com; full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Browser bugs hit IE, Firefox today (SANS) The related S

RE: [Full-disclosure] New member asking question...

2006-06-30 Thread Reynolds, Joseph R
Question for everyone on the board? I have been reading the posts over the past few weeks, and am wondering how the heck you guy discover these vulnerabilities. Granted, I am still very new to the IS world, but I cannot begin to understand how you discover weaknesses. After reading these posts,

[Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread AMIT SECURITY
Thanks for the 0day advisory! It helped out a lot. YOU ARE VERY WELCOME SIR. (ps: 10yrs English course, 10yrs security would have been a better choice for you if you ask me) PLEASE DO NOT ATTACK MY ENGLISH. I HAVE TAKED 12 YEARS OF ENGLISH CLASSES, AND AS I CLEAR STATE IN MY ADVISORY, MY PR

Re: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread n3td3v
On 6/30/06, Antczak, Ed <[EMAIL PROTECTED]> wrote: I second the motion. An opportunity to focus and filter the broad spectrum of security issues is welcome if possible. Edwin Antczak Windows Engineer I see a major loophole here, as we don't know how much traffic on the dedicated securityfocus

[Full-disclosure] RE: Browser bugs hit IE, Firefox today (SANS)

2006-06-30 Thread Carey, Steve T GARRISON
http://isc.sans.org/ It is in today's diary. -Original Message- From: Bill Stout [mailto:[EMAIL PROTECTED] Sent: Thursday, June 29, 2006 7:18 PM To: bugtraq@securityfocus.com; full-disclosure@lists.grok.org.uk Subject: Browser bugs hit IE, Firefox today (SANS) http://news.com.com/Brows

Re: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread n3td3v
On 6/30/06, AMIT SECURITY <[EMAIL PROTECTED]> wrote: HELLO, MY NAME AMIT. I SECURITY RESEARCH FROM ALL OVER WORLD AND CURRENTLY THIS MY FIRST ADVISORY TO ANYONE RESARCHING. I POST TO MAILING LIST IN INTEREST OF EXPULSION OF KNOWLEDGE. RECENTLY I HEAR OF FREENODE ATTACK AND SOME OPERATORS OWNED F

Re: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread Cardoso
A free advice: Use your capslock key. You do not want to be seen as a newbie or script kid using 1337 speak. Real people over 12 with IQs over 45 don't write in 1337 speak OR use all caps. One of the first hints to detect a phishing mail/website is bad grammar and lack of respect to writing r

RE: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread Debasis Mohanty
IS YOUR *caps lock* DAMAGED BEYOND REPAIR?? -d -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of AMIT SECURITY Sent: Friday, June 30, 2006 10:45 PM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] Advisory from AMIT concern BANTOWNE > Tha

Re: [Full-disclosure] New member asking question...

2006-06-30 Thread n3td3v
On 6/30/06, Reynolds, Joseph R <[EMAIL PROTECTED]> wrote: Question for everyone on the board? I have been reading the posts over the past few weeks, and am wondering how the heck you guy discover these vulnerabilities. Granted, I am still very new to the IS world, but I cannot begin to underst

Re: [Full-disclosure] New member asking question...

2006-06-30 Thread n3td3v
On 6/30/06, n3td3v <[EMAIL PROTECTED]> wrote: Finally - The very fact you've asked the question you've stated leads me to believe you fall into example 2, as someone who falls into example 2 would never post this kind of message to the international WAN security community, respectively. Corre

Re: [Full-disclosure] New member asking question...

2006-06-30 Thread Valdis . Kletnieks
On Fri, 30 Jun 2006 11:47:37 CDT, "Reynolds, Joseph R" said: > Also, are there any good "Hacking" books that I could read? I have had > a Hackers Tool and Techniques class at school, but all of the programs > are very outdated, like l0phtcrack, JTR, ethereal or wireshark, and I wouldn't call any

Re: [Full-disclosure] New member asking question...

2006-06-30 Thread Andrew A
Master C, assembler on your architecture of choice, perl or python, _javascript_, and sql. Then memorize the intricacies of most major network protocols.Sometime before you are done you will start to understand the entire spectrum of application and protocol vulnerabilities. On 6/30/06, Reynolds, J

Re: [Full-disclosure] New member asking question...

2006-06-30 Thread n3td3v
On 6/30/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: On Fri, 30 Jun 2006 11:47:37 CDT, "Reynolds, Joseph R" said: > Also, are there any good "Hacking" books that I could read? I have had > a Hackers Tool and Techniques class at school, but all of the programs > are very outdated, like l0pht

Re: [Full-disclosure] New member asking question...

2006-06-30 Thread Michael Holstein
I have been reading the posts over the past few weeks, and am wondering how the heck you guy discover these vulnerabilities. Granted, I am still very new to the IS world, but I cannot begin to understand how you discover weaknesses. After reading these posts, the explanation always makes since,

Re: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread AMIT SECURITY
i am sorry, did not realize cap key is turned on. will type off now. thanks you to n3td3v for farther information of bantowne. amit On 6/30/06, Debasis Mohanty <[EMAIL PROTECTED]> wrote: IS YOUR *caps lock* DAMAGED BEYOND REPAIR?? -d -Original Message- From: [EMAIL PROTECTED] [mailto:

[Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Jay Buhrt
Does anyone know about this site, or the projects related to it? www.eon8.com ? -- Jay Buhrt Achievement Focused Technology, Inc. [EMAIL PROTECTED] 574-538-8944 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-

[Full-disclosure] phpFormGenerator

2006-06-30 Thread Morning Wood
- EXPL-A-2006-004 exploitlabs.com Advisory 049 - - phpFormGenerator - AFFECTED PRODUCTS = phpFormGenerator < v2.09 http://phpformgen.sourceforge.net/ OVERVIEW phpFormGenerator is an easy-to-use tool to create reliable and efficient we

Re: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread Vidar Løkken
On Fri, 30 Jun 2006, AMIT SECURITY wrote: i am sorry, did not realize cap key is turned on. will type off now. thanks you to n3td3v for farther information of bantowne. We did not mean that you can not use your shift key for normal capitalization... -- MVH, Vidar God doesn't play dice.

Re: [Full-disclosure] phpFormGenerator

2006-06-30 Thread pingywon
"btw.. just so that you know, i have been on openbsd's development team, written the opengl kit for the openbeos OS project (now Haiku), and am an official GNU maintainer: http://www.gnu.org/people/people.html (search for my name) ... what you should be doing is thinking about how contributing to

Re: [Full-disclosure] New member asking question...

2006-06-30 Thread Valdis . Kletnieks
On Fri, 30 Jun 2006 20:20:26 BST, n3td3v said: > Valdis falls into example 2 of my discussion: > > 2. The guy who went to high school past grades, have friends, socail > circles, go out and live a great life. Don't presume to be sure over which example I'm more like. Also, you seem to be convin

[Full-disclosure] Data Mining Myspace Bulletins

2006-06-30 Thread John Hackenger
Myspace Bulletins: The good, the bad, and the ugly Data Mining Myspace, a case study Author: stderr ([EMAIL PROTECTED]) http://stderr.linuxinit.net Original release: http://www.pandora-security.com -- 1. Abstract We all know about m

Re: [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Aaron Gray
Looks pritty omonous, I would not log onto it if I were you until tommorow.   There is a counter down counting, 4 hours 35 minutes to go. Its logging your IP address as well.   Dont know maybe nothing but it looks a bit omonous as I said.   If I do not post a message within 5 hours you will

Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Aaron Gray
The counter restarts with a different time each time you refresh the page, so not so omonous ! Aaron - Original Message - From: "Jay Buhrt" <[EMAIL PROTECTED]> To: Sent: Friday, June 30, 2006 10:13 PM Subject: **SPAM** [Full-disclosure] Weird... www.eon8.com Does anyone know about

Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Cardoso
it was digged a few hours ago. people agreed it's a viral for a game, or something. of course conspiracy buffs are LOVING the idea of some evil organization USING A FRACKING WEBSITE to talk to their members... On Sat, 1 Jul 2006 00:30:49 +0100 "Aaron Gray" <[EMAIL PROTECTED]> wrote: AG> The

Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Valdis . Kletnieks
On Fri, 30 Jun 2006 20:40:07 -0300, Cardoso said: > people agreed it's a viral for a game, or something. Quite plausible.. > of course conspiracy buffs are LOVING the idea of some evil organization > USING A FRACKING WEBSITE to talk to their members... Not all that different from a viral for a

Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Aaron Gray
Just being careful. Phew, I thought some evil organization was just about to hack the world with a new 0day :) Aaron - Original Message - From: "Cardoso" <[EMAIL PROTECTED]> To: Sent: Saturday, July 01, 2006 12:40 AM Subject: Re: **SPAM** [Full-disclosure] Weird... www.eon8.com i

Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Cardoso
Yes, you may be right. What better place to hide than in plain sight? Using the old "nobody would do that", we^H^H they can publish evil instructions the operatives, and all the fools at NSA, GRU and MI-6 will never take us^H^H them seriously until it's too late. On Fri, 30 Jun 2006 20:10:43 -

[Full-disclosure] United States Secret Service

2006-06-30 Thread n3td3v
They replace a website with the USSS logo., like what happened in the case of the shadow crew. I'm not pro Shadow crew but I find it highly offensive that the USSS are acting in such a "This is now property of the USSS" with logo, asking the remaining members of said group to hand themselves in. I

[Full-disclosure] DEF CON 14: Speakers Selected and more.

2006-06-30 Thread The Dark Tangent
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hey everyone, I want to make some announcements surrounding DEF CON 14. It's about that time to briefly lay down the inf0z, so here it goes. - - Speakers have been selected, and are now listed on-line: http://www.defcon.org/html/defcon-14/dc-14-sche

Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Valdis . Kletnieks
On Fri, 30 Jun 2006 21:15:27 -0300, Cardoso said: > Yes, you may be right. What better place to hide than in plain sight? > > Using the old "nobody would do that", we^H^H they can publish evil > instructions the operatives, and all the fools at NSA, GRU and MI-6 will > never take us^H^H them seri

Re: [Full-disclosure] United States Secret Service

2006-06-30 Thread Valdis . Kletnieks
On Fri, 30 Jun 2006 23:30:08 BST, n3td3v said: > They replace a website with the USSS logo., like what happened in the > case of the shadow crew. You got any proof the USSS actually did it, and isn't being joe-jobbed here? For starters, logs showing where/how the logo was uploaded, and other evid

Re: [Full-disclosure] New member asking question...

2006-06-30 Thread J.A. Terranson
> Finally - The very fact you've asked the question you've stated leads > me to believe you fall into example 2, as someone who falls into > example 1 would never post this kind of message to the international > WAN security community, respectively. The "international WAN security community"?

Re: **SPAM** [Full-disclosure] Weird... www.eon8.com

2006-06-30 Thread Juha-Matti Laurio
Sometimes checking the cached Google version gives some basic information without visiting an url. But when choosing 'Show Google's cache of www.eon8.com/' my Firefox says Transferring data from www.eon8.com... This is weird and not expected, because I have never visited this site. Cached versio

[Full-disclosure] More on EON8...

2006-06-30 Thread Jay Buhrt
I found some more info... If only they just put an ad on there site.. They would be making a lot of money... Anyway, check this out... Thank you all for posting and I think we are close to finding out the answer as to what the hell Eon8.com is all about. The following was posted by a blogger

[Full-disclosure] Hah, Interesting.....

2006-06-30 Thread Jay Buhrt
{eon8} Complete As of July 1st, 2006, the E8 Project has completed. The purpose of this project was to determine the reactions of the internet public to lack of information. History The domain eon8.com was chosen, as it is short, easily remembered, and eon9 was already registered. It was origin

Re: [Full-disclosure] Data Mining Myspace Bulletins

2006-06-30 Thread Robert Waters
The same goes for forums; you can even read posts from private forums. Unfortunately, you aren't able to tell which forum a post came from just from the postID, and it is enormously difficult to guess what postids might appear in which group, due to the high volume. If any is interested in this (w

Re: [Full-disclosure] DMA[2006-0628a] - 'Apple OSX launchd unformatted syslog() vulnerability'

2006-06-30 Thread K F (lists)
Just so no one feels left out... -KF #!/usr/bin/perl # # http://www.digitalmunition.com/FailureToLaunch-ppc.pl # Code by Kevin Finisterre kf_lists[at]digitalmunition[dot]com # # Much appreciation goes to John H for all kindsa random shit like exploiting Veritas and other random things in the pa