Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread chedder1
So... You're going to fight alleged terrorism, with more terrorism... the logic is impecable. And since when does iran have anything to do with terrorism? On Tue, Apr 10, 2007 at 03:45:51AM -0500, United Hackers wrote: > _ _ ___ _ __ ___ ___ _ __ > | | /| / / _ |

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread Tremaine Lea
Iran has a LOT to do with terrorism. They are the biggest state sponsor of terrorism, followed by Syria. --- Tremaine Lea Network Security Consultant Be in pursuit of equality, but not at the expense of excellence. On 15-Apr-07, at 3:26 AM, [EMAIL PROTECTED] wrote: > So... You're going to

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread Timo Schoeler
On Sun, 15 Apr 2007 05:40:24 -0600 Tremaine Lea <[EMAIL PROTECTED]> wrote: > Iran has a LOT to do with terrorism. They are the biggest state > sponsor of terrorism, followed by Syria. No, biggest state sponsor of terrorism is the USA. > --- > > Tremaine Lea > Network Security Consultant > >

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread Dude VanWinkle
Q: What kind of douchebag/douchebagette falls prey to trolls on a security mailing list meant for public disclosures of vulnerabilities? A: More than you would expect, especially considering semi-recent postings -JP "What" -Lots of ppl on FD ___ Full

[Full-disclosure] ZoneAlarm Multiple insufficient argument validation of hooked SSDT function Vulnerability

2007-04-15 Thread Matousec - Transparent security Research
Hello, We would like to inform you about a vulnerability in ZoneAlarm 6. Description: ZoneAlarm hooks many functions in SSDT and in at least two cases it fails to validate arguments that come from the user mode. User calls to NtCreateKey and NtDeleteFile with invalid argument values can caus

Re: [Full-disclosure] [exploits] RPC vuln in DNS Server (fwd)

2007-04-15 Thread Gadi Evron
-- Forwarded message -- Date: Sat, 14 Apr 2007 18:40:53 +0200 From: Jerome Athias <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: [exploits] RPC vuln in DNS Server Quote from HD Moore: "This module has been added to the development version of Metasploit 3, it will be mer

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread jonnyboi
Looks like the front line have made their first strike. http://www.mod.ir/user.asp?T1=%3Cscript%3Edocument.all%5B5%5D.innerHTML='%3Cp%20align=center%3E%3Cimg%20src=/images/arm.jpg%3E%3Cbr%3Eowned.';%3C/script%3E lol. ___ Full-Disclosure - We believe in

[Full-disclosure] URL Encoding/Decoding Flaw Mechanism In ASP.net[1.0-2.0] Based Web Applications.

2007-04-15 Thread Aditya K Sood
Hi all The penetration of web leads to origin of some new artifacts.This in turn helps in understanding the weaknesses and flaws persist in the web applications that lead to origin of exceptions. Asp.net issue have been analyzed. Links: http://zeroknock.metaeye.org/analysis http://zeroknock.blog

[Full-disclosure] Windows DNS DnssrvQuery Stack Overflow

2007-04-15 Thread dev code
/* * Copyright (c) 2007 devcode * * * ^^ D E V C O D E ^^ * * Windows DNS DnssrvQuery() Stack Overflow * [CVE-2007-1748] * * * Description: *A vulnerability has been reported in Microsoft Windows, which can *be exploited by malicious people to compromise a vulnerable s

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread Valdis . Kletnieks
On Sun, 15 Apr 2007 05:40:24 MDT, Tremaine Lea said: > Iran has a LOT to do with terrorism. They are the biggest state > sponsor of terrorism, followed by Syria. I thought that was Iraq. Or was it Afghanistan? pgpG0ugNtwY2X.pgp Description: PGP signature

[Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Michal Majchrowicz
Due to "security reasons" many Web Browsers doesn't allow cross domain XMLHttpRequests. In fact this is only troublesome for web developers and not for virus coders/crackers/etc. Some time ago there was presetened a technic which used cssText property to perform some cross domain requests. After so

Re: [Full-disclosure] Vista typographical vulnerability

2007-04-15 Thread John English
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 lsi wrote: > In any case if you folks have forgotten, you are speaking English, > and in England, centre is spelled C-E-N-T-R-E... OK??? Normally, yes. But actually the OED lists "center" as legitimate English. It's a secondary usage but not actually

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread ascii
Michal Majchrowicz wrote: > Due to "security reasons" many Web Browsers doesn't allow cross > domain XMLHttpRequests. [..] hi Michal, personally i don't get your point (to me it seems just an hybrid implementation using both server side and client side scripting) but i'm sure you can better expla

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Michal Majchrowicz
Hi. Thanks for showing this vulnerability :) In fact it was not supposed to be safe, but now it shoud be :) You are right this is not a vulnerability by itself but it gives an attacker a very usefull tool for attackers/trojans to perform Real Time Attacks on users browser. Regards Michal. On 4/15/

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Stefan Esser
Hello, > Thanks for showing this vulnerability :) In fact it was not supposed > to be safe, but now it shoud be :) You are right this is not a adding if(strstr($_GET['url'],"file:")) die; is not safe at all... Regard, Stefan _

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Michal Majchrowicz
Hi, Thanks for suggestion. Please try it now :) But as I said before this script WASN'T INTENDED to be safe at all :) I wanted to show that it is posssible to perform some kind of Cross Domain Requests. Thats all :) Regards Michal. On 4/15/07, Stefan Esser <[EMAIL PROTECTED]> wrote: > Hello, > > >

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Michal Zalewski
On Sun, 15 Apr 2007, Michal Majchrowicz wrote: > I wanted to show that it is posssible to perform some kind of Cross > Domain Requests. As much as I loathe the origin-based security model of modern web browsers, there are semi-valid reasons why XMLHttpRequest is restricted the way it is. A remot

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Michal Majchrowicz
Hi. I think it is security matter. I don't think that whole XMLHttpRequests should be cross domain. Just a small part of it... Using my script you can create an evil javascript code that will interact with user in real time. You can create (I already did it) a script that will contact some kind of

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread Tremaine Lea
Iraq and Afghanistan participated, but Iran and Syria have long been the source of financing and planning. They are the C&C of the terrorist islamist botnet ;) --- Tremaine Lea Network Security Consultant Be in pursuit of equality, but not at the expense of excellence. On 15-Apr-07, at 1

[Full-disclosure] Microsoft DNS Server Remote Code execution Exploit and analysis

2007-04-15 Thread Andres Tarasco
Hi, im sending you the headers of the new exploit code for microsoft DNS servers. You can download the full source code exploit and analysis at: - http://www.514.es/Microsoft_Dns_Server_Exploit.zip or - http://www.48bits.com/exploits/dnsxpl.rar Microsoft DNS Server Remote Code execution Exploi