I have a buddy that is soliciting for help researching PIN numbers
used in
ATM's and things of that nature. He is in need of data-sets for
statistical
analysis. If you can help out... please do:
http://www.pinpop.com/contribute.html
http://www.pinpop.com/resources.html
Thanks
-KF
On Tue, Jul 22, 2008 at 8:25 PM, Maxime Ducharme <
[EMAIL PROTECTED]> wrote:
>
>
> ROFL agreed :-)
>
>
>
> +---+ .:\:\:/:/:.
> | PLEASE DO NOT |:.:\:\:/:/:.:
> | FEED THE TROLLS | :=.' - - '.=:
> |
Asterisk Project Security Advisory - AST-2008-011
++
| Product | Asterisk |
|+---|
Asterisk Project Security Advisory - AST-2008-010
++
| Product| Asterisk|
|--+-|
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:152
http://www.mandriva.com/security/
___
i would be happy if i would be able to cname recursion to make shure
i'm alive.
old.issue.com.google.com.
..
:p
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http:
but the cat is dead, cos it forgot to cname the recursion.
;)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
oh no, my god! the cat is alive!
it successfully recursed the cname=?
stupid=?
may be, or is not.
let the cache make his decision.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and spons
the cat is dead.
it fails to sucsessfully recurse the cname. ;)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
> ROFL agreed :-)
>
>
>
> +---+ .:\:\:/:/:.
> | PLEASE DO NOT |:.:\:\:/:/:.:
> | FEED THE TROLLS | :=.' - - '.=:
> | | '=(\ 9 9 /)='
> | Thank you, |
ROFL agreed :-)
+---+ .:\:\:/:/:.
| PLEASE DO NOT |:.:\:\:/:/:.:
| FEED THE TROLLS | :=.' - - '.=:
| | '=(\ 9 9 /)='
|
Le Tue, 22 Jul 2008 10:18:55 -0400,
Ureleet <[EMAIL PROTECTED]> a osé(e) écrire :
> sad. isnt it? dan is clearly making fun of u, and u think he wants to
> be ur friend and podcast w/ u. wow.
Please, pretty please everybody, stop prodding this ass hole on this
list, just put him in your killfile
On 7/21/08 8:36 PM, "[EMAIL PROTECTED]"
<[EMAIL PROTECTED]> wrote:
> from chargen 19/udp by ecopeland
0.
The cat is out of the bag.
Well done...a good read.
James
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disc
from chargen 19/udp by ecopeland
0.
The cat is out of the bag. Yes, Halvar Flake figured out the flaw
Dan Kaminsky will announce at Black Hat.
1.
Pretend for the moment that you know only the basic function of DNS
— that it translates WWW.VICTIM.COM into 1.2.3.4. The code that
does this is ca
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
PR08-15: Several Webroot Disclosures on Moodle
Vulnerability found: 20/06/2008
Vendor informed: 25/06/2008
Vulnerability fixed: 16/07/2008
Advisory publicly released: 22/07/2008
Severity: Low
Description:
Moodle 1.6.5 is vulnerable to several we
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
PR08-13: Persistent Cross-site Scripting (XSS) on Moodle via blog entry
title
Vulnerability found: 20/06/2008
Vendor informed: 25/06/2008
Vulnerability fixed: 16/07/2008
Advisory publicly released: 22/07/2008
Severity: High
Description:
By creat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
PR08-16: CSRF (Cross-site Request Forgery) on Moodle edit profile page
Vulnerability found: 25/06/2008
Vendor informed: 28/06/2008
Vulnerability fixed: 16/07/2008
Advisory publicly released: 22/07/2008
Severity: High
Description:
HTTP requests c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1613-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Devin Carraway
July 22, 2008
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
hi,
i think you should reinstall that box!
when "someone" gets root on it, it is more likely he/she installed also
some sort of rootkit. For the case he/she has done something illegal,
you should also make a image of the hole disk before re-install.
===
Ubuntu Security Notice USN-627-1 July 22, 2008
dnsmasq vulnerability
CVE-2008-1447
===
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS
This ad
that's cool. it's not like he was worth anything to this list anywayz.
thx netdev for your assistance in douching this list.
On Tue, Jul 22, 2008 at 9:20 AM, Ureleet <[EMAIL PROTECTED]> wrote:
> cause he is tired of reading ur bullshit, so he quit fd. i dont blame him.
>
> On Fri, Jul 18, 2008 at
you've agreed w/ some of his posts?
y'mean you've actually been reading all that shit that he types?
someone mustn't have anything better to do other than sucking off
everybody semi-famous in infosec.
On Wed, Jul 16, 2008 at 1:40 AM, Nate McFeters <[EMAIL PROTECTED]> wrote:
> n3td3v,
>
> Dino's b
On Tue, Jul 22, 2008 at 3:18 PM, Ureleet <[EMAIL PROTECTED]> wrote:
> sad. isnt it? dan is clearly making fun of u, and u think he wants to
> be ur friend and podcast w/ u. wow.
>
Its real, Dan is serious about it, you don't know what you're talking about.
I suggest you stop posting to the list
nate, he doesn't have a job in the security industry. so he's made that we do.
On Wed, Jul 16, 2008 at 2:40 AM, Nate McFeters <[EMAIL PROTECTED]> wrote:
> n3td3v,
>
> Dino's beyond well respected in the security community. Also, you
> won't know if it is an overhyped bug until Black Hat, and you
On Tue, 22 Jul 2008 10:51:48 +0200, Lucio Crusca said:
> tried looking for "2.6.24-1-686 exploit" and "2.6.24-1-686 poc" but I can't
> find anything.
Hint - try being a bit less restrictive in the version, and remember that
usually, the posting either includes the release that the hole was introd
you suck.
On Tue, Jul 22, 2008 at 7:09 AM, nigel <[EMAIL PROTECTED]> wrote:
>> razi garbie wrote:
>>
>>> Are you sure that a 0day is even needed? perhaps its a rather old
>>> kernel thats locally exploitable?
>>> shell# uname -r
>> 2.6.24-1-686
>>
>>> and then go google.
>> tried looking for "2.6.
oh noez, run for the hills, oh wait. turn off recursive dns where u
dont need it.
On Mon, Jul 21, 2008 at 6:56 PM, natron <[EMAIL PROTECTED]> wrote:
> It appears matasano posted an explanation of Dan Kaminsky's DNS issue
> to their blog today, but looks like it may have been yanked back down.
>
its been fagged up, and you want to add to it, instead of help making it better?
On Thu, Jul 17, 2008 at 5:33 AM, n3td3v <[EMAIL PROTECTED]> wrote:
> On Thu, Jul 17, 2008 at 3:02 AM, Professor Micheal Chatner
> <[EMAIL PROTECTED]> wrote:
>> I'm sick of your punk-ass shit. Why don't you go fag up s
cause he is tired of reading ur bullshit, so he quit fd. i dont blame him.
On Fri, Jul 18, 2008 at 9:48 PM, n3td3v <[EMAIL PROTECTED]> wrote:
> On Fri, Jul 18, 2008 at 6:13 PM, Kingcope Kingcope
> <[EMAIL PROTECTED]> wrote:
>> I am reachable
>> 0nly @ two addresses:
>>
>> http://www.milw0rm.com
>
--On Tuesday, July 22, 2008 09:35:03 +0200 Lucio Crusca <[EMAIL PROTECTED]>
wrote:
> Alex Howells wrote:
>
>> Probably not and I can't think anyone hiding a 0-day is going to
>> release it for this. Sorry.
> No 0-day needed here, Lenny does not have security updates, so all I need is
> some PoC c
sad. isnt it? dan is clearly making fun of u, and u think he wants to
be ur friend and podcast w/ u. wow.
On Tue, Jul 22, 2008 at 4:09 AM, n3td3v <[EMAIL PROTECTED]> wrote:
> -- Forwarded message --
> From: Dan Kaminsky <[EMAIL PROTECTED]>
> Date: Sun, Jul 20, 2008 at 7:16 AM
> Su
http://www.milw0rm.com/exploits/5092
2008/7/22 Lucio Crusca <[EMAIL PROTECTED]>:
> razi garbie wrote:
>
>> Are you sure that a 0day is even needed? perhaps its a rather old
>> kernel thats locally exploitable?
>> shell# uname -r
> 2.6.24-1-686
>
>> and then go google.
> tried looking for "2.6.24-1
> razi garbie wrote:
>
>> Are you sure that a 0day is even needed? perhaps its a rather old
>> kernel thats locally exploitable?
>> shell# uname -r
> 2.6.24-1-686
>
>> and then go google.
> tried looking for "2.6.24-1-686 exploit" and "2.6.24-1-686 poc" but I
> can't
> find anything. Is there any
razi garbie wrote:
> Are you sure that a 0day is even needed? perhaps its a rather old
> kernel thats locally exploitable?
> shell# uname -r
2.6.24-1-686
> and then go google.
tried looking for "2.6.24-1-686 exploit" and "2.6.24-1-686 poc" but I can't
find anything. Is there any PoC repository wh
-- Forwarded message --
From: Dan Kaminsky <[EMAIL PROTECTED]>
Date: Sun, Jul 20, 2008 at 7:16 AM
Subject: you know...
To: [EMAIL PROTECTED]
http://seclists.org/fulldisclosure/2008/Jul/0328.html
...the funny thing is how little we disagree about.
I did need Black Hat, and indeed
Are you sure that a 0day is even needed? perhaps its a rather old
kernel thats locally exploitable?
shell# uname -r
and then go google.
2008/7/22 Alex Howells <[EMAIL PROTECTED]>:
> 2008/7/21 Lucio Crusca <[EMAIL PROTECTED]>:
>> Believe it or not, I have a linux box (mine, yes it's mine) I need to
Alex Howells wrote:
> Probably not and I can't think anyone hiding a 0-day is going to
> release it for this. Sorry.
No 0-day needed here, Lenny does not have security updates, so all I need is
some PoC code already released in the last few months...
Paul Schmehl wrote:
> Ask the hosting company
37 matches
Mail list logo