Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-14 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 http://gcc.gnu.org/ml/gcc-help/2006-05/msg00267.html On Sat, 13 Oct 2007 17:44:53 -0400 worried security [EMAIL PROTECTED] wrote: On 10/13/07, Dude VanWinkle [EMAIL PROTECTED] wrote: On 10/13/07, worried security [EMAIL PROTECTED] wrote: On

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-14 Thread phioust
Why is that shocking? this list of full of cissps who have never done anything but setup simple windows networks and 'hackers' who have never even wrote an exploit ( see pdp and his post about 'hacking with guis' for confirmation or his other posts about 'hacking' those routers when all he did was

Re: [Full-disclosure] How to Handle ISPs Who Turn a Blind Eye to Criminal Activity?

2007-10-14 Thread phioust
If gadi evron was killed who would read the named.conf man page at defcon every year? I was also wondering why does it happen that every year *right* before gadi talks the botnet he was going to take down live *disappears*. conspiracy? On 10/13/07, worried security [EMAIL PROTECTED] wrote: You

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-14 Thread phioust
I believe this discussion is about people who have real skills ( which is why you are confused ).. not o so I couldn't finish my CS degree or function outside of computers so now I am doing XSS for a living If XSS is the extent of your knowledge then I guess it will get food on your table but

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-14 Thread phioust
On 10/14/07, pdp (architect) [EMAIL PROTECTED] wrote: military grade exploits? :) dude, I am sorry man.. but you are living in some kind of a dream world. get real, So you pick apart three words of the message and the rest is null? you seem to follow techniques of the great valdis [1]

Re: [Full-disclosure] Remote Desktop Command Fixation Attacks

2007-10-14 Thread C Q
I guess there's some logic in spreading FUD about security in depth not working. It might be a nice way to scare potential customers who don't know much about security into whatever services Gnucitizen team sells. However, these kind of tricks simply won't work with any seasoned security

[Full-disclosure] Apache Tomcat Rem0Te FiLe DiscloSure ZeroDay (W3bd4v)

2007-10-14 Thread kcope
(see attached) Mikis Theodorakis Grigoris Bithikotsis//Tis Dikaiosynis ilie noite: http://kypros.org/Occupied_Cyprus/epiktitos/audio/patriotic/THEODORAKIS%20%20BITHIKOTSIS%20-%20Tis%20Dikaiosynis%20Ilie%20Noite.mp3 (see attached) signed, eliteb0y/2007 -- Pt! Schon vom neuen GMX

[Full-disclosure] !!! W4RN1NG N1GS und P1GZ !!!

2007-10-14 Thread Dude VanVinkle
MISS DUDE VAN WINKLE, VALDIS KINIETIKZ AND GAY EVRON OFF OF THIS LIST NOW. GTFO PLZ U R RUINING THE INTERNET. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia -

[Full-disclosure] ACHTUNG

2007-10-14 Thread Dude VanVinkle
btw did some1 audited mailman? lulz ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200710-15 ] KDM: Local privilege escalation

2007-10-14 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200710-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Re: [Full-disclosure] !!! W4RN1NG N1GS und P1GZ !!!

2007-10-14 Thread silky
next week on animal planet: the mating habits of security noobs ... On 10/15/07, Dude VanVinkle [EMAIL PROTECTED] wrote: MISS DUDE VAN WINKLE, VALDIS KINIETIKZ AND GAY EVRON OFF OF THIS LIST NOW. GTFO PLZ U R RUINING THE INTERNET. -- mike http://lets.coozi.com.au/

[Full-disclosure] [ GLSA 200710-16 ] X.Org X server: Composite local privilege escalation

2007-10-14 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200710-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[Full-disclosure] Why criticize security researchers? On the recent PDP case.

2007-10-14 Thread rpcxfsmd rpcxfsmd
Fist of all sorry for my English, I'm from Russia and can't speak very well. I'm very sad for the current state of security, that includes people who contest great contributions to the industry from people like pdp (architect) and call them bullshit. pdp does not give a damn about any of this

[Full-disclosure] Renaissance

2007-10-14 Thread rpcxfsmd rpcxfsmd
I am not sure if this will be of any interest to anyone. anyway http://www.gnucitizen.org/projects/renaissance/ Renaissance is Web2.0 client-side API which was designed to easy the development of surface agents (ajax bots). The library was intended to be used for cutting-edge Web2.0 security

Re: [Full-disclosure] Remote Desktop Command Fixation Attacks

2007-10-14 Thread C Q
This wasn't a flame... It was a simple observation. Having read your reply I also see that you are trying to reinvent the wheel... when you talk about crisis management and other planning. Risk analysis, business continuity and disaster recovery planning, well prepared incident response

Re: [Full-disclosure] Why criticize security researchers? On the recent PDP case.

2007-10-14 Thread Peter Besenbruch
rpcxfsmd rpcxfsmd wrote: Fist of all sorry for my English, I'm from Russia and can't speak very well. Your English is better than my Russian. ;) I'm very sad for the current state of security, that includes people who contest great contributions to the industry from people like pdp

Re: [Full-disclosure] Why criticize security researchers? On the recent PDP case.

2007-10-14 Thread C Q
Nichego strashnogo anglijskij normal'nij vot tol'ko soderzhanie poxozhe na propagandu :-) Couple of reasons why people in the security industry are somewhat critical of pdp... 1. Social engineering is 99% of an exploit it's pretty much a given that people will question the plausibility of a

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-14 Thread Dude VanWinkle
On 10/14/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 http://gcc.gnu.org/ml/gcc-help/2006-05/msg00267.html Oh yeah? two can play that game: http://www.forbiddenweb.org/topic/10084/index.html -JP

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-14 Thread gjgowey
I wonder if I can start billing for the waste of storage space and time that these stupid emails are causing me. I know it has been proposed to bill spammers before. If you all want to see who has the longest then please spare the rest of us. As to everyone else: show some restraint already

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-14 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Explain your joke Mister Vranesevich. On Sun, 14 Oct 2007 20:31:16 -0400 Dude VanWinkle [EMAIL PROTECTED] wrote: On 10/14/07, [EMAIL PROTECTED] full- [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-14 Thread scott
OK Dudette and VanWanker, Take it to the street!Have it out,just not here!!! Some people actually like a clean list. Regards, Scott Dude VanWinkle wrote: On 10/14/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Explain your joke Mister

[Full-disclosure] Is this an attack?

2007-10-14 Thread Kelly Robinson
In the Control Field of a TCP segment I noticed the following values: URG 0 ACK 0 PSH 0 RST 0 SYN 1 FIN 1 I assume the checksum is OK, is this an attack packet? If not, why not? If so, what is the attacker probably trying to achieve? ___

[Full-disclosure] I made third-party patch for CVE-2007-3896 (Internet Explorer 7 invalid URI handling)

2007-10-14 Thread KJK::Hyperion
Reposted for better visibility (I love attention). Have a nice week. Hope this makes you feel less vulnerable 3 http://spacebunny.xepher.net/hack/shellexecutefiasco/ ShellExecuteFiasco - third-party patch for CVE-2007-3896 Copyright (C) 2007 KJK::Hyperion [EMAIL PROTECTED]

Re: [Full-disclosure] I made third-party patch for CVE-2007-3896 (Internet Explorer 7 invalid URI handling)

2007-10-14 Thread KJK::Hyperion
And of course Thunderbird now preserves the thread references when you edit as new and now I look like an idiot. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia -

Re: [Full-disclosure] Is this an attack?

2007-10-14 Thread Daniel Marsh
On 10/15/07, Kelly Robinson [EMAIL PROTECTED] wrote: In the Control Field of a TCP segment I noticed the following values: URG 0 ACK 0 PSH 0 RST 0 SYN 1 FIN 1 I assume the checksum is OK, is this an attack packet? If not, why not? If so, what is the attacker probably trying to achieve?

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-14 Thread phioust
Please do not bring up non-technical things that even the random user can comment on. These actions have been known to make people like gadi evron and valdis post random non-sense and fill my inbox.[1][2][3][4][5][6] [1] http://www.merit.edu/mail.archives/nanog-futures/msg01386.html [2]

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-14 Thread gjgowey
Some people don't know when to quit when they're behind. Thank you for volunteering to be the first on my ban list. Your stupidity has been duly rewarded. *plonk* Next volunteer... Geoff Sent from my BlackBerry wireless handheld. -Original Message- From: phioust [EMAIL PROTECTED]