Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread eliteb0y
Hello trolls from full-disclosure this is for you. NOBODY - I Say NOBODY calls kcope chicken! NOBODY. PUNKT! http://www.com-winner.com/kcope_aint_chicken.mp3 -Original Message- From: b9u4ea [mailto:[EMAIL PROTECTED] Sent: Friday, January 11, 2008 2:20 AM To: reepex Cc: eliteb0y; full-di

Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread reepex
you still have not gave a reason as to why you published this code On Jan 10, 2008 11:44 PM, eliteb0y <[EMAIL PROTECTED]> wrote: > Bla bla bla, no it was bla > > -Original Message- > From: Joey Mengele [mailto:[EMAIL PROTECTED] > Sent: Friday, January 11, 2008 5:44 AM > To: [EMAIL PROTECT

[Full-disclosure] [ MDVSA-2008:007 ] - Updated madwifi-source, wpa_supplicant packages fix vulnerabilities

2008-01-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:007 http://www.mandriva.com/security/ ___

Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread eliteb0y
Bla bla bla, no it was bla -Original Message- From: Joey Mengele [mailto:[EMAIL PROTECTED] Sent: Friday, January 11, 2008 5:44 AM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Cc: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel

[Full-disclosure] re-resting of zzuf results

2008-01-10 Thread Hanno Böck
I've also posted this to my blog: http://hboeck.de/archives/578-How-long-does-it-take-to-fix-a-crash-bug.html About one year ago, Sam Hocevar posted some results on tests with his fuzzing tool zzuf, which showed a large number of crashes in various applications, especially multimedia apps. h

Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread Joey Mengele
The Benign Euphoria, It discourages them from posting faggot shit to the list in the future. Thanks. J One in every three black males is in some phase of the correctional system. Is that a coincidence or do these people have, you know, like a racial commitment to crime? - Valdis Kletnieks On

Re: [Full-disclosure] scada/plc gear

2008-01-10 Thread b9u4ea
I believe the list of what is being tested was included in the pervious post to the list. 2 more devices arrived yesterday: - i.Board i.CanDoIt embedded webserver (http://www.csimn.com/CSI_pages/iboard.html) which is built similar to the Kohler in that it uses an embedded ethernet module, but thi

Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread b9u4ea
Regardless of their contribution, what is the benefit of belittling anyone on (or off) the list? On Jan 10, 2008 6:17 PM, reepex <[EMAIL PROTECTED]> wrote: > this was a very rude off list reply to my question > > and notice - you still have not answered why you released this code a year > later >

Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread reepex
this was a very rude off list reply to my question and notice - you still have not answered why you released this code a year later could you please answer this? On Jan 10, 2008 6:13 PM, eliteb0y <[EMAIL PROTECTED]> wrote: > Shut the fuck up. > > > -- > > *From:* r

Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread reepex
http://seclists.org/fulldisclosure/2007/Dec/0394.html arent you this idiot? I am pretty sure you are one of the bigger jokes on this list. also you did not answer my question: why did you release such simple code a year later? On Jan 10, 2008 4:01 PM, eliteb0y <[EMAIL PROTECTED]> wrote: > Than

[Full-disclosure] [USN-567-1] Dovecot vulnerability

2008-01-10 Thread Kees Cook
=== Ubuntu Security Notice USN-567-1 January 10, 2008 dovecot vulnerability CVE-2007-6598 === A security issue affects the following Ubuntu releases: Ubuntu 7.04 Ubuntu 7.10

Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread eliteb0y
Thank you for being everyones personal idiot. _ From: reepex [mailto:[EMAIL PROTECTED] Sent: Thursday, January 10, 2008 9:28 PM To: kcope; full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code did it take you the whole ye

Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread eliteb0y
HAHAHAHAHAHAAHHAHAHA A _ From: reepex [mailto:[EMAIL PROTECTED] Sent: Thursday, January 10, 2008 9:28 PM To: kcope; full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

Re: [Full-disclosure] PWDumpX v1.4 (and GUI:s)

2008-01-10 Thread Peter Besenbruch
On Wednesday 09 January 2008 09:36:07 Markus Jansson wrote: > OK, OK, I get your point. If you use GUI, you are lamer, because you > could do fine without them 20 years ago so you should be able to do > just fine without them now too. I don't think you get anyone's point. From reading this thread

Re: [Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread reepex
did it take you the whole year since the bug was published to write this code? Why release something so simple for such an old bug? Does this excuse your retarded songs you throw at us? On Jan 10, 2008 11:16 AM, kcope <[EMAIL PROTECTED]> wrote: > (see attached) > > - -kcope > > -- > GMX FreeMail:

[Full-disclosure] [ MDVSA-2008:006 ] - Updated exiv2 packages fix vulnerability

2008-01-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:006 http://www.mandriva.com/security/ ___

[Full-disclosure] Buffer-overflow in Quicktime Player 7.3.1.70

2008-01-10 Thread Luigi Auriemma
### Luigi Auriemma Application: Quicktime Player http://www.apple.com/quicktime Versions: <= 7.3.1.70 Platforms:Windows and Mac Bug: buffer-overflow Exploitation: remo

[Full-disclosure] They got into the town, the enemies

2008-01-10 Thread kcope
They got into the town, the enemies, they crushed the doors, the enemies, and we laughed in the neighborhoods, in the first day, They got into the town, the enemies, they took brothers, the enemies, and we looked at the ladies, the next day, They got into the town, the enemies, they burned us, the

Re: [Full-disclosure] PWDumpX v1.4 (and GUI:s)

2008-01-10 Thread Valdis . Kletnieks
On Thu, 10 Jan 2008 19:40:21 +0200, Markus Jansson said: > Make .bat / .cmd file that has that in it and save it in desktop. Next > time you need that, doubleclick that and have a party. OK, now I'm thoroughly convinced that you're trying to be intentionally dense. You missed two points: 1) You

[Full-disclosure] SunOS 5.10 ICMP Remote Kernel Crash Exploit Code

2008-01-10 Thread kcope
(see attached) - -kcope -- GMX FreeMail: 1 GB Postfach, 5 E-Mail-Adressen, 10 Free SMS. Alle Infos und kostenlose Anmeldung: http://www.gmx.net/de/go/freemail /* SunOS 5.10 Remote ICMP Kernel Crash Exploit by kcope Null Pointer Dereference in Kernel Space Seems to work only if attacked in the

Re: [Full-disclosure] PWDumpX v1.4 (and GUI:s)

2008-01-10 Thread Valdis . Kletnieks
On Wed, 09 Jan 2008 21:36:07 +0200, Markus Jansson said: > (BTW. My doubleclicking on desktop icon is maybe 200x faster than you > writing two lines of command line crap to get the program to do the > same thing I make it do with just doubleclicking it with my mouse.) Bullshit. A GUI is *fine* -

[Full-disclosure] ID-Commerce Security Advisory - SLR-2007-001

2008-01-10 Thread consultant gmail
Blind SQL injection : check : inurl:'liste.php?idFamille=' http://URL/liste.php?idFamille=1%20or%201=1# http://URL/liste.php?idFamille=1%20or%201=0# ___ Full-D

[Full-disclosure] (( PoC)) ID-Commerce Security Advisory - SLR-2007-001 (( PoC))

2008-01-10 Thread consultant gmail
Blind SQL injection : check : inurl:'liste.php?idFamille=' http://URL/liste.php?idFamille=1%20or%201=1# http://URL/liste.php?idFamille=1%20or%201=0# ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html H

[Full-disclosure] BT Home Flub: Pwnin the BT Home Hub (5) - exploiting IGDs remotely via UPnP

2008-01-10 Thread Adrian P
http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub-5 It's known that UPnP [1] is inherently insecure for a very simple reason: administrative tasks can be performed on a Internet Gateway Device (IGD) without needing to know the admin password whatsoever! This on its own is quite sca

[Full-disclosure] uCon 2008 call for participation - Recife, Brazil

2008-01-10 Thread uCon staff
.--. : .--' .-..-.: :.--. ,-.,-. : :; :: :__ ' .; :: ,. : `.__.'`.__.'`.__.':_;:_; CALL FOR PARTICIPATION uCon 2008, 1st edition Recife, Pernambuco, Brazil [ - Introduction - ] uCon will be a totally informal and non-profit con

Re: [Full-disclosure] PWDumpX v1.4 (and GUI:s)

2008-01-10 Thread Tonnerre Lombard
Salut, On Wed, 9 Jan 2008 21:36:07 +0200 "Markus Jansson" <[EMAIL PROTECTED]> wrote: > OK, OK, I get your point. No, you don't. > If you use GUI, you are lamer, because you > could do fine without them 20 years ago so you should be able to do > just fine without them now too. No, if you use a

[Full-disclosure] ID-Commerce Security Advisory - SLR-2007-001

2008-01-10 Thread consultant gmail
ID-Commerce Security Advisory - SLR-2007-001 ++ | Product | ID-Commerce | |+---| |

Re: [Full-disclosure] PWDumpX v1.4 (and GUI:s)

2008-01-10 Thread Stanislaw Klekot
On Wed, Jan 09, 2008 at 09:36:07PM +0200, Markus Jansson wrote: > OK, OK, I get your point. If you use GUI, you are lamer, because you > could do fine without them 20 years ago so you should be able to do > just fine without them now too. Its just "lazy mans way of doing > things" to use GUI, and e

Re: [Full-disclosure] PWDumpX v1.4 (and GUI:s)

2008-01-10 Thread Mattias Fliesberg
Just stop it, you're embarrassing yourself... Markus Jansson wrote: > OK, OK, I get your point. If you use GUI, you are lamer, because you > could do fine without them 20 years ago so you should be able to do > just fine without them now too. Its just "lazy mans way of doing > things" to use GUI,

Re: [Full-disclosure] PWDumpX v1.4 (and GUI:s)

2008-01-10 Thread Matthias Arnason
You really have a desktop icon for every possible option set for every tool you have? It's not a coincidence that the entire industry disagrees with you. Get tool-agnostic and accept that there are quite a few tasks for which the CLI is better suited. Or keep using winnuke95 or whatever. Markus Ja