Re: [Full-disclosure] us cyber command

2008-03-04 Thread scott
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 worried security wrote: > On Mon, Mar 3, 2008 at 2:31 PM, worried security > <[EMAIL PROTECTED]> wrote: >> [02:40] do you think cyber terrorism is real or its just the >> government softening ppl up for a couple of false flags for a reason >> to bomb

Re: [Full-disclosure] us cyber command

2008-03-04 Thread Slythers Bro
Mar 03 23:00:49then non-us hackers will stop posting to mailing lsits you will stop posting php include exploit ? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Se

[Full-disclosure] Vulnerability in Linux Kiss Server v1.2

2008-03-04 Thread vashnukad
From: [EMAIL PROTECTED] Site: http://www.vashnukad.com Application: Linux Kiss Server v1.2 Type: Format strings Priority: Medium Patch available: No The Linux Kiss Server contains a format strings vulnerability that, if run in foreground mode, can be leveraged for access. The vulnerability is demo

Re: [Full-disclosure] Hack into a Windows PC - no password needed

2008-03-04 Thread Valdis . Kletnieks
On Tue, 04 Mar 2008 19:00:33 EST, Larry Seltzer said: > So does the same capability exist on Macs? What, don't you remember? :) Google for the phrase "Owned by an iPod"... pgppkWLA8zBDg.pgp Description: PGP signature ___ Full-Disclosure - We believe

Re: [Full-disclosure] Hack into a Windows PC - no password needed

2008-03-04 Thread Eric Rachner
Actually, it's full system compromise -- if the machine is joined to a domain, then any domain account credentials known to that machine are compromised as well. And yes, the same capability exists not only on Macs but on any computer that implements the Firewire specification. (details at http:/

Re: [Full-disclosure] Hack into a Windows PC - no password needed

2008-03-04 Thread Eric Rachner
Actually, it's full system compromise -- if the machine is joined to a domain, then any domain account credentials known to that machine are compromised as well. And yes, the same capability exists not only on Macs but on any computer that implements the Firewire specification. (details at http:/

Re: [Full-disclosure] us cyber command

2008-03-04 Thread worried security
On Mon, Mar 3, 2008 at 2:31 PM, worried security <[EMAIL PROTECTED]> wrote: > [02:40] do you think cyber terrorism is real or its just the > government softening ppl up for a couple of false flags for a reason > to bomb iran? > [02:49] the u.s are still deciding where to build the cyber > command

Re: [Full-disclosure] Hack into a Windows PC - no password needed

2008-03-04 Thread Larry Seltzer
The key to the vulnerability: "To use the tool, hackers must connect a Linux-based computer to a Firewire port on the target machine. The machine is then tricked into allowing the attacking computer to have read and write access to its memory. " I assume this makes it a local login, not a domain l

[Full-disclosure] ZDNet Asia and TorrentReactor IFRAME-ed

2008-03-04 Thread Dancho Danchev
An in-depth overview of a currently active malware IFRAME campaign, that's targeting ZDNet Asia and TorrentReactor's search engine optimization practices of generating, and locally caching the search queries pages, thereby positioning the now cached popular keywords with the IFRAME between the firs

Re: [Full-disclosure] Hack into a Windows PC - no password needed

2008-03-04 Thread Steven Adair
I guess the release of this tool makes physical access pen-tests a little bit easier huh? Will have to try this out some time. Steven > http://www.smh.com.au/news/security/hack-into-a-windows-pc--no-password-needed/2008/03/04/1204402423638.html > > ___

Re: [Full-disclosure] Hack into a Windows PC - no password needed

2008-03-04 Thread jipe foo
2008/3/4, Ivan . <[EMAIL PROTECTED]>: > http://www.smh.com.au/news/security/hack-into-a-windows-pc--no-password-needed/2008/03/04/1204402423638.html > Here is a (totally unofficial) mirror of Metlstorm's files in case you can't reach his overloaded website :-\ http://www.hotsecuritynews.com/fearw

[Full-disclosure] [ GLSA 200803-09 ] Opera: Multiple vulnerabilities

2008-03-04 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200803-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[Full-disclosure] Hack into a Windows PC - no password needed

2008-03-04 Thread Ivan .
http://www.smh.com.au/news/security/hack-into-a-windows-pc--no-password-needed/2008/03/04/1204402423638.html ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://s

[Full-disclosure] [ GLSA 200803-08 ] Win32 binary codecs: Multiple vulnerabilities

2008-03-04 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200803-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[Full-disclosure] Arbitrary commands execution in Versant Object Database 7.0.1.3

2008-03-04 Thread Luigi Auriemma
### Luigi Auriemma Application: Versant Object Database http://www.versant.com/en_US/products/objectdatabase Versions: <= 7.0.1.3 Platforms:Windows, Solaris, HP-UX, AIX, Linux

[Full-disclosure] [DailyDave] I like to read

2008-03-04 Thread Dave Aitel
[Forwarded from DailyDave] Tom Clancy just writes about how cool the Catholic religion is. His latest novel is all about someone trying to talk about format strings and buffer overflows, you can call them "fish." I've read Dawson's Creek novels that were better written. Now, telling the public the

[Full-disclosure] lets go vishing

2008-03-04 Thread lsi
[19:15] lsi2lsi: hiya! ... so i was nearly vished today ... [19:16] lsi2lsi: mobile rings - hello, we're calling from Lloyds TSB, if you are not [name], you must press 2 [19:16] lsi2lsi: if you ARE [name], please press 1 [19:17] lsi2lsi: ..etc.. i went to bank - they'd never heard of such a thing

[Full-disclosure] CORE-2008-0124: Multiple vulnerabilities in Google's Android SDK

2008-03-04 Thread Core Security Technologies Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://www.coresecurity.com/corelabs Multiple vulnerabilities in Google's Android SDK *Advisory Information* Title: Multiple vulnerabilities in Google's Android SDK Advisory ID: CORE-2

[Full-disclosure] like goolag but online

2008-03-04 Thread Petko D. Petkov
cDc's goolag tool is pretty cool but here is an online alternative for those of you who are interested: http://www.gnucitizen.org/ghdb/ pdp -- http://www.gnucitizen.org http://www.gnucitizen.com GNUCITIZEN ___ Full-Disclosure - We believe in it. Cha

Re: [Full-disclosure] Exploring the UNKNOWN: Scanning the Internet via SNMP!

2008-03-04 Thread Adrian P
Well, such statement is simply derived from my personal experience of doing application-layer UDP scanning. Never ran a proper benchmark to compare speed results to be honest. On Tue, Mar 4, 2008 at 8:53 AM, Sebastian Krahmer <[EMAIL PROTECTED]> wrote: > On Tue, Mar 04, 2008 at 12:02:25AM +, A

Re: [Full-disclosure] Exploring the UNKNOWN: Scanning the Internet via SNMP!

2008-03-04 Thread Sebastian Krahmer
On Tue, Mar 04, 2008 at 12:02:25AM +, Adrian P wrote: > * Exploring the UNKNOWN: Scanning the Internet via SNMP! * > http://www.gnucitizen.org/blog/exploring-the-unknown-scanning-the-internet-via-snmp/ > > Hacking is not only about coming up with interesting solutions to > problems, but also