Re: [Full-disclosure] [Tool] - inundator - an intrusion detection false positives generator.

2010-07-05 Thread Jubei Trippataka
Want yet another go at replying to try and salvage what little credibility you have left? Or you just going to accept you got worked. JT ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and spo

Re: [Full-disclosure] [Tool] - inundator - an intrusion detection false positives generator.

2010-07-05 Thread Nelson Brito
Last message to you, kid. NNG was released in September 2008, and it doesn't mean it's not older than that. And I see you've checked my background... Good! Are you gonna to hire me? Maybe I could teach you how to deal with real Perl, such as: {(!($^O=~/^[M]*$32/i)&&($0=~s!^.*/!!))||($0=~s!.*\\!

Re: [Full-disclosure] [Tool] - inundator - an intrusion detection false positives generator.

2010-07-05 Thread Nelson Brito
If you don't deal well with criticism, don't send such "31337" tool to a public mailing list, keep it just for your friends. I got you incubator and it looks like: "look mom, I did my first Perl script". No offense, kid! Okay... Keep studying and you're gonna to learn more and more... Just to l

Re: [Full-disclosure] Full-Disclosure Digest, Vol 65, Issue 7

2010-07-05 Thread Valdis . Kletnieks
On Mon, 05 Jul 2010 21:48:53 EDT, Mary and Glenn Everhart said: > Might I suggest that in addition to discussing how to defend against > software attacks, that it is also useful to devise methods and protocols > that will function even where the systems being used to communicate are > infected w

Re: [Full-disclosure] Full-Disclosure Digest, Vol 65, Issue 7

2010-07-05 Thread Mary and Glenn Everhart
Might I suggest that in addition to discussing how to defend against software attacks, that it is also useful to devise methods and protocols that will function even where the systems being used to communicate are infected with malware? I have wondered whether such tricks as oblivious transfer

Re: [Full-disclosure] [Tool] - inundator - an intrusion detection false positives generator.

2010-07-05 Thread Nelson Brito
One more thing, just for the records and being polite: nobody works on such "bad idea" anymore... Why? Because doesn't make any sense you doing so many noise to evade an IPS. There much more effectiveness ways to do it without "scream wolf", little boy. Best regards. PS: Keep playing with "inc

Re: [Full-disclosure] [Tool] - inundator - an intrusion detection false positives generator.

2010-07-05 Thread Nelson Brito
Thanks for the credits and keep doing the great work! Just for the records: NNG is not a tool, it is just a PoC for the concept you are just mimicking. Really creative!!! 8) I will keep me the right to be polite. BTW, I don like my iPhone... 8) Specially my apps for that one. Nelson Brito Sec

Re: [Full-disclosure] [Tool] - inundator - an intrusion detection false positives generator.

2010-07-05 Thread epixoip
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Oh, for fuck's sake... Wow, you've really called us out on this one. How embarrassing for us. Please accept our sincerest apologies, Mr. Brito. We now understand how phrases like "inundator is a modern twist on an old concept" and "Snot, fwsnort

Re: [Full-disclosure] [Tool] - inundator - an intrusion detection false positives generator.

2010-07-05 Thread quispiam lepidus
I guess you missed this line? "We thought this was an original idea, but it looks like Snot, fwsnort's snortspoof, and possibly others beat us to the punch." On Tue, Jul 6, 2010 at 2:51 AM, Nelson Brito wrote: > That is not new and you should give the credits, not just for NNG > (http://packets

Re: [Full-disclosure] [Tool] - inundator - an intrusion detection false positives generator.

2010-07-05 Thread Nelson Brito
That is not new and you should give the credits, not just for NNG (http://packetstormsecurity.org/filedesc/nng-4.13r-public.rar.html), but you are missing STICK, SNOT and and IDSWAKEUP as well. Nelson Brito Security Researcher http://fnstenv.blogspot.com/ Sent on an  iPhone wireless device. Pl

[Full-disclosure] Secunia Research: Joomla BookLibrary From Same Author Module "id" SQL Injection

2010-07-05 Thread Secunia Research
== Secunia Research 05/07/2010 - Joomla BookLibrary From Same Author Module "id" SQL Injection - == Table of Contents Affected Softwar

Re: [Full-disclosure] Vulnerabilities in Google

2010-07-05 Thread PsychoBilly
More like a vuln in cluster Musn'tlive http://www.youtube.com/watch?v=0Hahlo1Bye4#t=3m35s Response Codes: » HTTP/1.0 301 Moved Permanently From http://is.gd/dcMxH To http://lmgtfy.com/?q=stfu » HTTP/1.1 200 OK # of Meta characters : 0# of Meta Words : 0 Text to Page Weight