Thanks everyone for your help.it solved my problem.
On Fri, Jul 25, 2008 at 11:52 PM, Albert R. Campa [EMAIL PROTECTED] wrote:
check this out
http://securabit.com/2008/07/24/latest-snort-signature-to-detect-dns-vulnerability/
On Fri, Jul 25, 2008 at 12:59 PM, crazy frog crazy frog
[EMAIL
On Sat, Jul 26, 2008 at 6:02 AM, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Instead of criticizing someone for releasing an exploit (which is a bit like
criticizing a cow for making milk) direct your attention to the fact that
and industry of professional security researchers sat indian style
On Fri, Jul 25, 2008 at 4:57 PM, Steven M. Christey
[EMAIL PROTECTED] wrote:
On Fri, 25 Jul 2008, [UTF-8] Jan MináÅ^Y wrote:
The commands do not have to be written there between (1) and (2), they
can be in the file long before the ./configure was started -- just
because the script does
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1616-2 [EMAIL PROTECTED]
http://www.debian.org/security/ Devin Carraway
July 26, 2008
That's retarded and I can only hope that this idea never turns into a law.
We shouldn't be afraid of information. If the ideas are never decimated
it doesn't matter the vulnerabilities still exist.
Your essentially making it illegal to talk about the purple elephant in
the living room, and that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1618-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
July 26, 2008
Joel Hruska from Ars Technica has said HD Moore and I)ruid are
enterprising little children.
New DNS exploit now in the wild and having a blast
http://arstechnica.com/news.ars/post/20080726-new-dns-exploit-now-in-the-wild-and-having-a-blast.html
All the best,
n3td3v
Hi Paul,
The attack isn't impossible, it's more like 1% chance *per hour* that
your IDS doesn't notice and stop the attempts. Big difference...
The information that I have says it's statistically impossible *if*
you are patched.
It's not statistically impossible; it just takes 2^16 times
--On Saturday, July 26, 2008 8:34 PM +0100 imipak [EMAIL PROTECTED] wrote:
The attack isn't impossible, it's more like 1% chance *per hour* that
your IDS doesn't notice and stop the attempts. Big difference...
The information that I have says it's statistically impossible *if*
you are
On Sat, Jul 26, 2008 at 11:10 PM, Paul Schmehl [EMAIL PROTECTED] wrote:
there *is* such a thing as criminal negligence.)
Could we not charge HD Moore and I)ruid with this?
All the best,
n3td3v
___
Full-Disclosure - We believe in it.
Charter:
But realizing that going from 11 seconds to (11 * 64512 =3D) 8.21 days
is not a significant jump ...
We had a browser pointed to an evil page making image requests for
aaa.victim.com, aab.victim.com etc, for a few seconds. You cannot expect
the browser to stay alive for days.
Cheers,
Paul
On Sun, 27 Jul 2008 09:05:35 +1000, Paul Szabo said:
But realizing that going from 11 seconds to (11 * 64512 =3D) 8.21 days
is not a significant jump ...
We had a browser pointed to an evil page making image requests for
aaa.victim.com, aab.victim.com etc, for a few seconds. You cannot
Why are you so Jealous of HD Moore? He's done more for the community than
you'll ever dream of doing.
Didn't you promise to leave this list? Why are you still here anyway?
Exibar
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of n3td3v
Sent:
13 matches
Mail list logo