Re: [Full-disclosure] Identifying handler and agency of police informant?

2010-10-25 Thread Jubei Trippataka
Tell them your mom says that they have to stop it. -- ciao JT ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Identifying handler and agency of police informant?

2010-10-25 Thread king of pain
Hi, For the past few years I have been having my friends turned into informants against me by an unknown investigator/group of investigators. Being able to identify their handler and agency would make life simpler. They've been being heavy handed, stealthy, lost friends have been threatene

[Full-disclosure] OT: Apple Store Removes Applications with Private API Calls

2010-10-25 Thread Jeffrey Walton
For all the testers Netstumbler, Wifi-Where and the like are now gone. I'm not sure if the "no private API calls" rule was applied equally on all Apple Store applications, or just those from certain class(es). http://www.netstumbler.org/f18/apple-pulls-all-wifi-scanning-apps-app-store-23568/

Re: [Full-disclosure] Windows Vista/7 lpksetup dll hijack

2010-10-25 Thread Thor (Hammer of God)
I've tested loading a library from an application that requires admin privileges from a normal user and it will prompt for UAC if needed or fail. I understand where the jacking takes place, but you are making it seem like you can bypass user permissions when you can't. At least that's what I g

Re: [Full-disclosure] Windows Vista/7 lpksetup dll hijack

2010-10-25 Thread TBorland1
Also, just to further clarify, the 'completely anonymous share' means all connecting users get treated as anonymous and given rights to connect to the same rights to the share. As Windows Vista/7 connect out using their own credentials to connect to the share, this is a must unless you are on

Re: [Full-disclosure] Windows Vista/7 lpksetup dll hijack

2010-10-25 Thread TBorland1
The language file installer can be completely legitimate. The actual exploit is the process running the library from the remote location. This will execute the library/code in the context of the running application under the current user and will not present a warning dialog box depending o

Re: [Full-disclosure] Windows Vista/7 lpksetup dll hijack

2010-10-25 Thread ACROS Security Lists
Hi Thor, Thanks to Microsoft's "defense in depth," double-clicking an .exe from a remote share pops up a security warning. In contrast, double-clicking a data file that opens a vulnerable application (which downloads and executes a .dll from the same share) doesn't trigger such security warning

Re: [Full-disclosure] Windows Vista/7 lpksetup dll hijack

2010-10-25 Thread Thor (Hammer of God)
If you are considering this "Remote Code Execution" then why not just have the victim run an .exe from the "complete anonymous share" you've managed to get people connected to and save all the trouble? This would still run as the user context, and if the hijacked DLL tried to do something a no

[Full-disclosure] Windows Vista/7 lpksetup dll hijack

2010-10-25 Thread Tyler Borland
/* Exploit: Windows Vista/7 lpksetup.exe (oci.dll) DLL Hijacking Vulnerability Extension: .mlc Author: Tyler Borland (tborla...@gmail.com) Date: 10/20/2010 Tested on: Windows 7 Ultimate (Windows Vista Ultimate/Enterpries and Windows 7 Enterprise should be vulnerable as well)

[Full-disclosure] [USN-959-2] PAM vulnerability

2010-10-25 Thread Kees Cook
=== Ubuntu Security Notice USN-959-2 October 25, 2010 pam vulnerability CVE-2010-0832 === A security issue affects the following Ubuntu releases: Ubuntu 10.10 This advisory a

Re: [Full-disclosure] African ISP SekuritY

2010-10-25 Thread dramacide
-Original Message- From: Duboucher Thomas Sent: Monday, October 25, 2010 07:02 AM To: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] African ISP SekuritY -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Le 25/10/2010 10:00, Louis McCarty a écrit : > Hej! > > Another day

Re: [Full-disclosure] African ISP SekuritY

2010-10-25 Thread Duboucher Thomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Le 25/10/2010 10:00, Louis McCarty a écrit : > Hej! > > Another day another pwn. You can see how they run things on negrolands. I stopped reading there. - -- Thomas. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG

Re: [Full-disclosure] African ISP SekuritY

2010-10-25 Thread Kenneth Voort
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Wow. What an effective way to victimize several hundred innocent users to stroke your own ego. We should all do this... publish password lists every time we come across another XSS bug. Please, go google "Responsible Disclosure"... On 10-10-25 4