Every once in a while (last time a few months ago) someone emails one of
the mailing lists about searching for an example binary, mostly for:
- Reverse engineering for vulnerabilities, as a study tool.
- Testing fuzzers
Some of these exist, but I asked my employer, Beyond Security, to release
meh...roll your own...you'll learn more that way
--- T Biehn [EMAIL PROTECTED] wrote:
screw forums, i get all my 0days from metasploit.
On 9/8/07, scott [EMAIL PROTECTED]
wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
This site seems to have a lot of registered
users.But I
i can't believe that you posted that to full-disclosure.
dipshit.
On 9/10/07, worried security [EMAIL PROTECTED] wrote:
this person has been sharing login information to the world wide web,
opening up world governments up to terrorist cyber intrusions. this guy has
not been sent to
In my admittedly quick (less than 5 min) review of this site, I did not see
anything particularly new (i.e. not available on the usual websites),
particularly useful (useable exploits/information collected in one reference
spot), or particularly complete (i.e. search of security focus group
Very interesting, been a while on here now.
Downloading as I speak.. will post a follow-up.
- S
-Original Message-
From: [EMAIL PROTECTED] [mailto:full-
[EMAIL PROTECTED] On Behalf Of Gadi Evron
Sent: Monday, September 10, 2007 11:36 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Cc:
Actually this fellow is shit dipped.
-- Original message --
From: yiri [EMAIL PROTECTED]
i can't believe that you posted that to full-disclosure.
dipshit.
On 9/10/07, worried security [EMAIL PROTECTED] wrote:
this person has been sharing login information to the
The following are IPs and domain names currently or historically used
to host MPack, WebAttacker and Zunker control panels as well as live
exploit URLs within the packs. Some are down, others are still
accessible, the rest are publicly cached. If index.php doesn't exist,
admin.php or zu.php act as
At the risk of getting flamed...
I am starting my own security website at http://vulntrac.com. Let me
state to this mans defense it is not easy getting something going on
your own.
When starting out, how much original content can you have? As long as
your citing sources and giving credit where
Brian Toovey wrote:
At the risk of getting flamed...
At the risk of cry babies whining I shall chime in.
Oct 2007 Infiltrated dot net will take off where I left AntiOffline off
in 2001. After reading so many shitty websites with distorted views of
security in general, I decided to bring back
http://www.gnucitizen.org/blog/how-to-make-money-with-xss
Finding XSS is dead easy task. Everybody is vulnerable to this type of
issue and even if there are protection mechanisms on place such as
application firewalls and sanitization filters, very often attackers
can get a stable exploit working
All,
I've decided to open source IisShield.
Feel free to browse and examine the code.
Available at:
http://www.codeplex.com/iisshield
Cheers,
Tiago Halm
KodeIT Development Team
-Original Message-
From: Tiago Halm (Lists) []
Sent: Monday, January 08, 2007 6:46 PM
To:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi everyone,
I wrote a paper about an attack type I call XSIO - Cross Site Image
Overlaying. It’s about something which I think many of you have already
done but I wasn’t able to find something written about it and even I
don’t think, that most of the
12 matches
Mail list logo