[Full-disclosure] Fwd: Chat with Dude VanWinkle

2007-12-21 Thread worried security
-- Forwarded message -- From: worried security <[EMAIL PROTECTED]> Date: Dec 21, 2007 9:40 AM Subject: Re: Chat with Dude VanWinkle To: Dude VanWinkle <[EMAIL PROTECTED]> On Dec 20, 2007 4:43 AM, Dude VanWinkle <[EMAIL PROTECTED]> wrote: > > These messages were sent while you were

Re: [Full-disclosure] [Professional IT Security Reviewers - Exposed] SecReview ( F - )

2007-12-21 Thread Paul Melson
On Dec 20, 2007 7:19 PM, SecReview <[EMAIL PROTECTED]> wrote: > > 1.) What are your qualifications for reviewing these companies? > > We are a team of security professionals that have been performing a > wide array of penetration tests, vulnerability assessments, web > application security services

Re: [Full-disclosure] Fwd: Chat with Dude VanWinkle

2007-12-21 Thread worried security
On Dec 21, 2007 11:05 AM, php0t <[EMAIL PROTECTED]> wrote: > > We're made up of: "online news > > journalists, corporate security, government security, military > > defense, intelligence service, law inforcement and freelance ethical > > hackers. > > You are one of the most delusional people I have

Re: [Full-disclosure] [Professional IT Security Providers - Exposed] Audit Serve, Inc. ( F- )

2007-12-21 Thread SilentRunner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 So, because I disagree strongly with your actions I must be the subject of your review? Clearly, your progenitors were swimming in the shallow end of the gene pool when they set about screwing your sorry excuse for a brain into existence. You obvious

Re: [Full-disclosure] Fwd: Chat with Dude VanWinkle

2007-12-21 Thread php0t
> Yes we are an easy > target for php0t etc right now, but in the future we will be the > biggest on the internet in the long term. I didn't know 'being targetted' means somebody replies to one of your mails (OFF LIST!) to express an opinion. What is going to change about this in the long term

Re: [Full-disclosure] For Christmas..

2007-12-21 Thread elazar
I believe the BackTrack guys get some of it and put the rest back into Offensive Security. See http://www.remote- exploit.org/news.html, June 07. Elazar On Thu, 20 Dec 2007 20:02:03 -0500 Matthew Hall <[EMAIL PROTECTED]> wrote: >gmaggro wrote: >> ..it would be a nice touch if everyone sent a fe

Re: [Full-disclosure] [Professional IT Security Reviewers - Exposed] SecReview ( A + )

2007-12-21 Thread SecReview
PaulM: You'd be right only if you weren't wrong. That being said, we're not going to talk to the trolls any more. While it might be amusing it's a waste of our time, and our readers time. We will continue to write reviews and will continue to be as honest and truthful as possible during our re

Re: [Full-disclosure] [Professional IT Security Reviewers - Exposed] SecReview ( A + )

2007-12-21 Thread Nate McFeters
Unless I missed something, these seemed like legitimate responses. They may not have all been delivered with tact, but I mean, you are on FD, what did you expect? I think some valid points are brought up about your credentials and your process. Nate On 12/21/07, SecReview <[EMAIL PROTECTED]> w

[Full-disclosure] [Professional IT Security Reviewers - Exposed] SecReview ( A + )

2007-12-21 Thread damncon
I believe your answers are definitely more trollish and kiddie-like than the legitimate responses, despite the aggressive or tactless comments, as Nate mentioned. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosur

Re: [Full-disclosure] [Professional IT Security Reviewers - Exposed] SecReview ( A + )

2007-12-21 Thread Kurt Dillard
I agree with Nate. It's odd how you dismiss any critics as 'trolls,' and only believe that people who compliment your efforts are 'legitimate readers.' As an author and public speaker I know that I get the most value from people who critique my work because they help me to improve. Sure, being slap

Re: [Full-disclosure] Fwd: Chat with Dude VanWinkle

2007-12-21 Thread worried security
On Dec 21, 2007 1:11 PM, worried security <[EMAIL PROTECTED]> wrote: > On Dec 21, 2007 11:05 AM, php0t <[EMAIL PROTECTED]> wrote: > > > We're made up of: "online news > > > journalists, corporate security, government security, military > > > defense, intelligence service, law inforcement and freela

Re: [Full-disclosure] Security of online casinos

2007-12-21 Thread Kevin Pawloski
Absolute Poker recently had an incident over the summer where an insider had access to a "super-user" account and was able to see the cards of every player at the table. That whole incident played out like a B Movie. Lots of details about the incident have been posted over various sites; here are a

[Full-disclosure] Buffer-overflow in WinUAE 1.4.4

2007-12-21 Thread Luigi Auriemma
### Luigi Auriemma Application: WinUAE http://www.winuae.net Versions: <= 1.4.4 Platforms:Windows Bug: buffer-overflow Exploitation: local Date: 21 Dec 2007 Au

[Full-disclosure] [CAID 35970]: CA Products That Embed Ingres Authentication Vulnerability

2007-12-21 Thread Williams, James K
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Title: [CAID 35970]: CA Products That Embed Ingres Authentication Vulnerability CA Vuln ID (CAID): 35970 CA Advisory Date: 2007-12-19 Reported By: Ingres Corporation Impact: Attacker can gain elevated privileges. Summary: A potential vulnerabilit

[Full-disclosure] AOL Instant Messenger AIM 6.0 or 6.5 Beta or higher local zone XSS

2007-12-21 Thread Michael Evanchik
Sorry for the brief post but Im still able to bypass filters that aol has put in place. So again with frustration I come to FD to imply pressure on a company to patch correct. From reading feedback from AOL they feel the vulnerability is put to bed and requires no more attention. I am not postin

[Full-disclosure] Hikaru

2007-12-21 Thread Ben
All, I read a paper last night titled "The Geometry of Innocent Flesh on the Bone" (http://www.cse.ucsd.edu/~hovav/). It described a technique similar to return-into-libc. The utility I'm attaching (hikaru) implements an automated binary analysis to determine possible instructions (gadgets, p

Re: [Full-disclosure] Hikaru

2007-12-21 Thread Ben
It would help if I attached the file wouldn't it? - Ben > All, > > I read a paper last night titled "The Geometry of Innocent Flesh on the Bone" > (http://www.cse.ucsd.edu/~hovav/). > It described a technique similar to return-into-libc. The utility I'm > attaching (hikaru) implements an au

Re: [Full-disclosure] Hikaru

2007-12-21 Thread coderman
On Dec 21, 2007 5:36 PM, Ben <[EMAIL PROTECTED]> wrote: > All, > > I read a paper last night titled "The Geometry of Innocent Flesh on the Bone" > (http://www.cse.ucsd.edu/~hovav/). It described a technique similar to > return-into-libc. yes, this is fun stuff :) ''' Our thesis: In any suļ¬ƒcien

Re: [Full-disclosure] Fwd: Chat with Dude VanWinkle

2007-12-21 Thread Valdis . Kletnieks
On Fri, 21 Dec 2007 13:11:22 GMT, worried security said: > In 5 to 10 years n3td3v should be an elite force of people from > corporate,government,military,intelligence,law and freelance ethical > hackers that is way bigger than any other group on the internet. The only problem is that the talent