[Full-disclosure] Google Offers Text Ads Linked to Malware Site

2008-11-15 Thread Ivan .
http://www.dailytech.com/Google+Offers+Text+Ads+Linked+to+Malware+Site/article13436.htm ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Speculation over back door in Skype

2008-11-15 Thread Ivan .
http://www.heise.de/english/newsticker/news/113353 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] MS OWA 2003 Redirection Vulnerability - [MSRC 7368br]

2008-11-15 Thread Elazar Broad
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 A quick test of OWA 2007 shows that it is not vulnerable... On Sat, 15 Nov 2008 11:36:26 -0500 Micheal Cottingham <[EMAIL PROTECTED]> wrote: >I found and reported this back in 2005/2006. Microsoft told me >that it >had been reported previously and tha

Re: [Full-disclosure] NTLM Multiprotocol Replay attacks

2008-11-15 Thread Kurt Grutzmacher
On Fri, Nov 14, 2008 at 09:37:46PM +0100, Andres Tarasco wrote: > I have published a new proof of concept tool, named "Smbrelay3", that is > able to replay NTLM authentication from several protocols like > SMB/HTTP/IMAP/.. > http://www.tarasco.org/security/smbrelay/index.html Great little tool fro

Re: [Full-disclosure] OS X malware family has a new member: OSX.Lamzev.A

2008-11-15 Thread adrian . lamo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 What the fuck are you talking about now, n3td3v? There is no mention of a vulnerability. There is no evolving situation. Please keep your technically misunderstood blogging to your own internet site and off of our lists. You probably don't even know

Re: [Full-disclosure] OS X malware family has a new member: OSX.Lamzev.A

2008-11-15 Thread adrian . lamo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 What the fuck are you talking about now, n3td3v? There is no mention of a vulnerability. There is no evolving situation. Please keep your technically misunderstood blogging to your own internet site and off of our lists. You probably don't even know

Re: [Full-disclosure] MS OWA 2003 Redirection Vulnerability - [MSRC 7368br]

2008-11-15 Thread Micheal Cottingham
I found and reported this back in 2005/2006. Microsoft told me that it had been reported previously and that it would be fixed in the next release, which I'm guessing they meant 2007. I do not know if they have fixed it in Exchange 2007. On Sat, Nov 15, 2008 at 5:33 AM, Piergiorgio Venuti <[EMAIL

Re: [Full-disclosure] MS OWA 2003 Redirection Vulnerability - [MSRC 7368br]

2008-11-15 Thread Piergiorgio Venuti
Hi all, also I've found this vulnerability 1 year ago during a pt and work fine with url obfuscation. I've read that with owa 2007 this vulnerability is patched but I don't have tried yet. Best regards, Piergiorgio Giuseppe Gottardi ha scritto: > Davide, let me comfort you... > > I found this

[Full-disclosure] Dynamic Port Scanner [DPS] a reliable spoofed source IP P.S.

2008-11-15 Thread AR Samhuri
Subject:Dynamic Port Scanner [DPS] v1.5 tool release Homepage: http://www.securebits.org/dps.html Download: http://www.securebits.org/projects/dps-v1.5.tar.gz = Dynamic Port Scanner - A Reliable Spoofed Source

Re: [Full-disclosure] OS X malware family has a new member: OSX.Lamzev.A

2008-11-15 Thread Juha-Matti Laurio
This is and was the situation when writing the entry. More information and information about the possibly previously unknown vulnerability related to the Trojan is not available. Now Symantec analysis says that -Trojan creates the file /tmp/com.apple.DockSettings -inserts its contents into ~/Libr