Re: [Full-disclosure] password.incleartext.com

2011-04-07 Thread Peter Osterberg
I can see how it can be stored securely, but how would distribution after recovery be accomplished? In an envelope? Or by sending me a one-time random https-link where I can retrieve it myself? Sounds like more trouble compared to what can be gained from it. Wouldn't it be just as easy to send a

[Full-disclosure] SEC Consult SA-20110407-0 :: Libmodplug ReadS3M Stack Overflow

2011-04-07 Thread SEC Consult Vulnerability Lab
SEC Consult Vulnerability Lab Security Advisory 20110407-0 === title: Libmodplug ReadS3M Stack Overflow product: Libmodplug library vulnerable version: 0.8.8.1 fixed version: 0.8.8.2

Re: [Full-disclosure] password.incleartext.com

2011-04-07 Thread Cal Leeming
I guess so, in the sense that, they are both fucking retarded websites? On Wed, Apr 6, 2011 at 12:36 PM, maksim.file...@fuib.com wrote: Kinda plaintextoffenders.com? wbr, - Max full-disclosure-boun...@lists.grok.org.uk wrote on 01.04.2011 02:17:24: Inc leartext st...@incleartext.com

Re: [Full-disclosure] password.incleartext.com

2011-04-07 Thread Cal Leeming
People should be using a different password for every external service anyway, so technically this shouldn't even matter ;) On Wed, Apr 6, 2011 at 5:42 PM, Thor (Hammer of God) t...@hammerofgod.comwrote: This isn’t necessarily true – without knowledge of how the data may be encrypted and what

Re: [Full-disclosure] password.incleartext.com

2011-04-07 Thread Cal Leeming
Tbh, I'd be unhappy about any company storing a password in anything other than a hash of itself. But, like many things in life, we have absolutely no control over it, so best to just use a new pass for every external service :) On Wed, Apr 6, 2011 at 7:48 PM, Peter Osterberg j...@vel.nu wrote:

[Full-disclosure] Cipher detection

2011-04-07 Thread Maksim . Filenko
Hi Full-Disclosure, I'm trying to figure out what kind of cipher was used in this: GGobQ2bsqd64PXVAmaDiDBg= Looks like Base64, but it's not. The original string is: du...@example.com Thanks all! wbr, - Max___ Full-Disclosure - We believe in it.

[Full-disclosure] new facebook and twitter flaw

2011-04-07 Thread StrawHat
The facebook and twitter like button are bugued. You can easily increase their counters using a bug, and trick people into makink them believe that a webpage has been like by thousands of people. explanation here: http://blog.guessmyheritage.com/twitter-and-facebook-like-buttons/

Re: [Full-disclosure] password.incleartext.com

2011-04-07 Thread Valdis . Kletnieks
On Wed, 06 Apr 2011 18:10:29 BST, Cal Leeming said: People should be using a different password for every external service anyway, so technically this shouldn't even matter ;) You're new here, aren't you? :) pgpt9sj2oQD91.pgp Description: PGP signature

Re: [Full-disclosure] password.incleartext.com

2011-04-07 Thread Cal Leeming
People ***should*** be using so ***technically*** this shouldn't even matter I was taking the piss lol. On Thu, Apr 7, 2011 at 3:59 PM, valdis.kletni...@vt.edu wrote: On Wed, 06 Apr 2011 18:10:29 BST, Cal Leeming said: People should be using a different password for every external service

Re: [Full-disclosure] Cipher detection

2011-04-07 Thread Thor (Hammer of God)
Actually it is a valid Base64 string - it just decodes to 24, 106, 27, 67, 102, 236, 169, 222, 184, 61, 117, 64, 153, 160, 226, 12, 24. To get du...@example.commailto:du...@example.com you would have to XOR that resulting binary string with 124, 31, 118, 46, 31, 172, 108, 174, 217, 80, 5, 44,

Re: [Full-disclosure] Cipher detection

2011-04-07 Thread Tim
I'm trying to figure out what kind of cipher was used in this: GGobQ2bsqd64PXVAmaDiDBg= Looks like Base64, but it's not. The original string is: du...@example.com Thanks all! As Thor mentioned, since the ciphertext is not a multiple of a common block cipher's block size (8 or 16

Re: [Full-disclosure] Cipher detection

2011-04-07 Thread Valdis . Kletnieks
On Thu, 07 Apr 2011 11:22:56 +0300, maksim.file...@fuib.com said: I'm trying to figure out what kind of cipher was used in this: GGobQ2bsqd64PXVAmaDiDBg= Looks like Base64, but it's not. The original string is: du...@example.com I'll place a bet (based on the trailing =), that in fact

Re: [Full-disclosure] Cipher detection

2011-04-07 Thread Cal Leeming
lol thor ;p Max, can you give a little more information as to the source of this? Are you able to give us more samples? (preferably, du...@example.comm, du...@example.co, and test). If it's using a one time pad, you've got no chance lol, but sometimes these things just use really heavily

[Full-disclosure] phplist: cross site request forgery (CSRF), CVE-2011-0748

2011-04-07 Thread Hanno Böck
phplist: cross site request forgery (CSRF), CVE-2011-0748 References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748 http://int21.de/cve/CVE-2011-0748-phplist.html Description phplist is a mailing list software written in PHP. Up to version 2.10.12, it provided no protection