[Full-disclosure] Fwd: Chat with Dude VanWinkle

2007-12-21 Thread worried security
-- Forwarded message -- From: worried security [EMAIL PROTECTED] Date: Dec 21, 2007 9:40 AM Subject: Re: Chat with Dude VanWinkle To: Dude VanWinkle [EMAIL PROTECTED] On Dec 20, 2007 4:43 AM, Dude VanWinkle [EMAIL PROTECTED] wrote: These messages were sent while you were

Re: [Full-disclosure] [Professional IT Security Reviewers - Exposed] SecReview ( F - )

2007-12-21 Thread Paul Melson
On Dec 20, 2007 7:19 PM, SecReview [EMAIL PROTECTED] wrote: 1.) What are your qualifications for reviewing these companies? We are a team of security professionals that have been performing a wide array of penetration tests, vulnerability assessments, web application security services etc.

Re: [Full-disclosure] Fwd: Chat with Dude VanWinkle

2007-12-21 Thread worried security
On Dec 21, 2007 11:05 AM, php0t [EMAIL PROTECTED] wrote: We're made up of: online news journalists, corporate security, government security, military defense, intelligence service, law inforcement and freelance ethical hackers. You are one of the most delusional people I have ever

Re: [Full-disclosure] [Professional IT Security Providers - Exposed] Audit Serve, Inc. ( F- )

2007-12-21 Thread SilentRunner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 So, because I disagree strongly with your actions I must be the subject of your review? Clearly, your progenitors were swimming in the shallow end of the gene pool when they set about screwing your sorry excuse for a brain into existence. You

Re: [Full-disclosure] Fwd: Chat with Dude VanWinkle

2007-12-21 Thread php0t
Yes we are an easy target for php0t etc right now, but in the future we will be the biggest on the internet in the long term. I didn't know 'being targetted' means somebody replies to one of your mails (OFF LIST!) to express an opinion. What is going to change about this in the long term?

Re: [Full-disclosure] For Christmas..

2007-12-21 Thread elazar
I believe the BackTrack guys get some of it and put the rest back into Offensive Security. See http://www.remote- exploit.org/news.html, June 07. Elazar On Thu, 20 Dec 2007 20:02:03 -0500 Matthew Hall [EMAIL PROTECTED] wrote: gmaggro wrote: ..it would be a nice touch if everyone sent a few

Re: [Full-disclosure] [Professional IT Security Reviewers - Exposed] SecReview ( A + )

2007-12-21 Thread SecReview
PaulM: You'd be right only if you weren't wrong. That being said, we're not going to talk to the trolls any more. While it might be amusing it's a waste of our time, and our readers time. We will continue to write reviews and will continue to be as honest and truthful as possible during our

Re: [Full-disclosure] [Professional IT Security Reviewers - Exposed] SecReview ( A + )

2007-12-21 Thread Nate McFeters
Unless I missed something, these seemed like legitimate responses. They may not have all been delivered with tact, but I mean, you are on FD, what did you expect? I think some valid points are brought up about your credentials and your process. Nate On 12/21/07, SecReview [EMAIL PROTECTED]

[Full-disclosure] [Professional IT Security Reviewers - Exposed] SecReview ( A + )

2007-12-21 Thread damncon
I believe your answers are definitely more trollish and kiddie-like than the legitimate responses, despite the aggressive or tactless comments, as Nate mentioned. ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] [Professional IT Security Reviewers - Exposed] SecReview ( A + )

2007-12-21 Thread Kurt Dillard
I agree with Nate. It's odd how you dismiss any critics as 'trolls,' and only believe that people who compliment your efforts are 'legitimate readers.' As an author and public speaker I know that I get the most value from people who critique my work because they help me to improve. Sure, being

Re: [Full-disclosure] Fwd: Chat with Dude VanWinkle

2007-12-21 Thread worried security
On Dec 21, 2007 1:11 PM, worried security [EMAIL PROTECTED] wrote: On Dec 21, 2007 11:05 AM, php0t [EMAIL PROTECTED] wrote: We're made up of: online news journalists, corporate security, government security, military defense, intelligence service, law inforcement and freelance ethical

[Full-disclosure] Buffer-overflow in WinUAE 1.4.4

2007-12-21 Thread Luigi Auriemma
### Luigi Auriemma Application: WinUAE http://www.winuae.net Versions: = 1.4.4 Platforms:Windows Bug: buffer-overflow Exploitation: local Date: 21 Dec 2007

[Full-disclosure] [CAID 35970]: CA Products That Embed Ingres Authentication Vulnerability

2007-12-21 Thread Williams, James K
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Title: [CAID 35970]: CA Products That Embed Ingres Authentication Vulnerability CA Vuln ID (CAID): 35970 CA Advisory Date: 2007-12-19 Reported By: Ingres Corporation Impact: Attacker can gain elevated privileges. Summary: A potential

[Full-disclosure] AOL Instant Messenger AIM 6.0 or 6.5 Beta or higher local zone XSS

2007-12-21 Thread Michael Evanchik
Sorry for the brief post but Im still able to bypass filters that aol has put in place. So again with frustration I come to FD to imply pressure on a company to patch correct. From reading feedback from AOL they feel the vulnerability is put to bed and requires no more attention. I am not

[Full-disclosure] Hikaru

2007-12-21 Thread Ben
All, I read a paper last night titled The Geometry of Innocent Flesh on the Bone (http://www.cse.ucsd.edu/~hovav/). It described a technique similar to return-into-libc. The utility I'm attaching (hikaru) implements an automated binary analysis to determine possible instructions (gadgets,

Re: [Full-disclosure] Hikaru

2007-12-21 Thread Ben
It would help if I attached the file wouldn't it? - Ben All, I read a paper last night titled The Geometry of Innocent Flesh on the Bone (http://www.cse.ucsd.edu/~hovav/). It described a technique similar to return-into-libc. The utility I'm attaching (hikaru) implements an automated

Re: [Full-disclosure] Hikaru

2007-12-21 Thread coderman
On Dec 21, 2007 5:36 PM, Ben [EMAIL PROTECTED] wrote: All, I read a paper last night titled The Geometry of Innocent Flesh on the Bone (http://www.cse.ucsd.edu/~hovav/). It described a technique similar to return-into-libc. yes, this is fun stuff :) ''' Our thesis: In any sufficiently

Re: [Full-disclosure] Fwd: Chat with Dude VanWinkle

2007-12-21 Thread Valdis . Kletnieks
On Fri, 21 Dec 2007 13:11:22 GMT, worried security said: In 5 to 10 years n3td3v should be an elite force of people from corporate,government,military,intelligence,law and freelance ethical hackers that is way bigger than any other group on the internet. The only problem is that the talent