Re: [Full-disclosure] DIE IN A FIRE post

2008-08-28 Thread mrdkaaa
Think about it. Původní zpráva Od: Randal T. Rioux [EMAIL PROTECTED] Předmět: Re: [Full-disclosure] DIE IN A FIRE post Datum: 27.8.2008 19:25:12 On Wed, August 27, 2008 11:34 am, Simon Smith wrote: Hi Mike, Next time

[Full-disclosure] reviving the botnets@ mailing list: a new statregy in fighting cyber crime

2008-08-28 Thread Gadi Evron
The public botnets@ mailing list, where malicious activity on the Internet can be openly shared, has been revived, and boy is it active. Warning: live samples and malicious URLs are openly shared there. Mailing list URL: http://www.whitestar.linuxbox.org/mailman/listinfo/botnets Reasons,

Re: [Full-disclosure] reviving the botnets@ mailing list: a new statregy in fighting cyber crime

2008-08-28 Thread n3td3v
On Thu, Aug 28, 2008 at 1:43 PM, Gadi Evron [EMAIL PROTECTED] wrote: The public botnets@ mailing list, where malicious activity on the Internet can be openly shared, has been revived, and boy is it active. Warning: live samples and malicious URLs are openly shared there. Mailing list URL:

Re: [Full-disclosure] ISO Standards

2008-08-28 Thread M . B . Jr .
On 8/26/08, Line Noise [EMAIL PROTECTED] wrote: The B there stands for British, so there it is. Some ISO's servers (from which downloads are done) are located in Switzerland, Geneva specifically. -- Marcio Barbado, Jr. ___ Full-Disclosure - We

Re: [Full-disclosure] ISO Standards

2008-08-28 Thread James Matthews
Where the ISO headquarters is. On Thu, Aug 28, 2008 at 8:38 AM, M. B. Jr. [EMAIL PROTECTED] wrote: On 8/26/08, Line Noise [EMAIL PROTECTED] wrote: The B there stands for British, so there it is. Some ISO's servers (from which downloads are done) are located in Switzerland, Geneva

Re: [Full-disclosure] Deep Blind SQL Injection Whitepaper

2008-08-28 Thread nummish
2008/8/19 David Litchfield [EMAIL PROTECTED] Hi Ferruh, This is a short whitepaper about a new way to exploit Blind SQL Injections. I just had a read of your paper. You open with: If the injection point is completely blind then the only way to extract data is using time based attacks

Re: [Full-disclosure] Deep Blind SQL Injection Whitepaper

2008-08-28 Thread Haroon Meer
Hi nummish.. * On 28/08/2008, [at 11:36:23 -0500] nummish [EMAIL PROTECTED] seemed to say: Sorry to resurrect a 9 day old thread here... It's an interesting concept, but like all timing based attacks, won't the digits be more susceptible to noise due to possible network latency? Even with two

Re: [Full-disclosure] [funsec] Internet attacks against Georgian web s ites

2008-08-28 Thread n3td3v
Putin blames US for Georgia role Russian Prime Minister Vladimir Putin has accused the US of provoking the conflict in Georgia, possibly for domestic election purposes. Mr Putin told CNN US citizens were in the area during the conflict over South Ossetia and were taking direct orders from their

Re: [Full-disclosure] [funsec] Internet attacks against Georgian web s ites

2008-08-28 Thread n3td3v
On Thu, Aug 28, 2008 at 8:33 PM, n3td3v [EMAIL PROTECTED] wrote: Putin blames US for Georgia role Russian Prime Minister Vladimir Putin has accused the US of provoking the conflict in Georgia, possibly for domestic election purposes. Mr Putin told CNN US citizens were in the area during the

[Full-disclosure] ZDI-08-054: Multiple Vendor libpurple MSN Protocol SLP Message Heap Overflow Vulnerability

2008-08-28 Thread zdi-disclosures
ZDI-08-054: Multiple Vendor libpurple MSN Protocol SLP Message Heap Overflow Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-08-054 August 28, 2008 -- CVE ID: CVE-2008-2927 -- Affected Vendors: Adium Pidgin -- Affected Products: Adium Adiumx Pidgin Pidgin -- Vulnerability

[Full-disclosure] [ MDVSA-2008:181 ] ipsec-tools

2008-08-28 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:181 http://www.mandriva.com/security/