[Full-disclosure] Vulnerable test application: Simple Web Server (SWS)

2007-09-10 Thread Gadi Evron
Every once in a while (last time a few months ago) someone emails one of the mailing lists about searching for an example binary, mostly for: - Reverse engineering for vulnerabilities, as a study tool. - Testing fuzzers Some of these exist, but I asked my employer, Beyond Security, to release

Re: [Full-disclosure] Came across this site

2007-09-10 Thread Mario D
meh...roll your own...you'll learn more that way --- T Biehn [EMAIL PROTECTED] wrote: screw forums, i get all my 0days from metasploit. On 9/8/07, scott [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 This site seems to have a lot of registered users.But I

Re: [Full-disclosure] n3td3v denounces the actions of www.derangedsecurity.com

2007-09-10 Thread yiri
i can't believe that you posted that to full-disclosure. dipshit. On 9/10/07, worried security [EMAIL PROTECTED] wrote: this person has been sharing login information to the world wide web, opening up world governments up to terrorist cyber intrusions. this guy has not been sent to

Re: [Full-disclosure] Came across this site

2007-09-10 Thread dcdave
In my admittedly quick (less than 5 min) review of this site, I did not see anything particularly new (i.e. not available on the usual websites), particularly useful (useable exploits/information collected in one reference spot), or particularly complete (i.e. search of security focus group

Re: [Full-disclosure] Vulnerable test application: Simple Web Server (SWS)

2007-09-10 Thread Strykar
Very interesting, been a while on here now. Downloading as I speak.. will post a follow-up. - S -Original Message- From: [EMAIL PROTECTED] [mailto:full- [EMAIL PROTECTED] On Behalf Of Gadi Evron Sent: Monday, September 10, 2007 11:36 AM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Cc:

Re: [Full-disclosure] n3td3v denounces the actions of www.derangedsecurity.com

2007-09-10 Thread b . hines
Actually this fellow is shit dipped. -- Original message -- From: yiri [EMAIL PROTECTED] i can't believe that you posted that to full-disclosure. dipshit. On 9/10/07, worried security [EMAIL PROTECTED] wrote: this person has been sharing login information to the

[Full-disclosure] Google Hacking for MPacks, Zunkers and WebAttackers

2007-09-10 Thread Dancho Danchev
The following are IPs and domain names currently or historically used to host MPack, WebAttacker and Zunker control panels as well as live exploit URLs within the packs. Some are down, others are still accessible, the rest are publicly cached. If index.php doesn't exist, admin.php or zu.php act as

Re: [Full-disclosure] Came across this site

2007-09-10 Thread Brian Toovey
At the risk of getting flamed... I am starting my own security website at http://vulntrac.com. Let me state to this mans defense it is not easy getting something going on your own. When starting out, how much original content can you have? As long as your citing sources and giving credit where

Re: [Full-disclosure] Came across this site

2007-09-10 Thread J. Oquendo
Brian Toovey wrote: At the risk of getting flamed... At the risk of cry babies whining I shall chime in. Oct 2007 Infiltrated dot net will take off where I left AntiOffline off in 2001. After reading so many shitty websites with distorted views of security in general, I decided to bring back

[Full-disclosure] How to make money with XSS

2007-09-10 Thread pdp (architect)
http://www.gnucitizen.org/blog/how-to-make-money-with-xss Finding XSS is dead easy task. Everybody is vulnerable to this type of issue and even if there are protection mechanisms on place such as application firewalls and sanitization filters, very often attackers can get a stable exploit working

Re: [Full-disclosure] IisShield 2.2 released

2007-09-10 Thread Tiago Halm
All, I've decided to open source IisShield. Feel free to browse and examine the code. Available at: http://www.codeplex.com/iisshield Cheers, Tiago Halm KodeIT Development Team -Original Message- From: Tiago Halm (Lists) [] Sent: Monday, January 08, 2007 6:46 PM To:

[Full-disclosure] XSIO - Cross Site Image Overlaying

2007-09-10 Thread Sven Vetsch / Disenchant
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi everyone, I wrote a paper about an attack type I call XSIO - Cross Site Image Overlaying. It’s about something which I think many of you have already done but I wasn’t able to find something written about it and even I don’t think, that most of the