Gregory Evans wins Defcon 19 Charlatan of the Year!
http://twitter.com/#!/attritionorg/status/99977286002016257
an ever more distinguished career...
On Wed, Feb 2, 2011 at 6:54 PM, coderman coder...@gmail.com wrote:
On Wed, Feb 2, 2011 at 4:17 PM, bk cho...@gmail.com wrote:
Many
On Sat, 06 Aug 2011 23:17:25 PDT, coderman said:
Gregory Evans wins Defcon 19 Charlatan of the Year!
http://twitter.com/#!/attritionorg/status/99977286002016257
Wow, that takes some doing in this industry. :)
On Wed, Feb 2, 2011 at 6:54 PM, coderman coder...@gmail.com wrote:
Hi Everyone and welcome to a very late edition of MOHSEP.
As I'm sure you are all capable of tellin from the excedingly poor quality
of our photoshops, we are not actually that good with computers. As a
result, we were unable to bring you MOHSEP 0x5 in a timely fashion.
But, in the finest
Hi Guys!
Edition six of MOHSEP is here with no technical issues (we hired mexican guy
called manuel to run servers in latvia for us!).
Link is here:
http://mohsepblog.blogspot.com/2011/08/saturday-august-6th-2011.html
Enjoy!
Until tomorrow!
Herr E Balls
23,000+ showed up in July. Over 16,000 new ones in the first week of
August. Somebody doesn't get it.
http://mrhinkydink.blogspot.com/2011/08/tcp-port-8909-proxies.html
See also...
http://mrhinkydink.blogspot.com/2011/04/insecure-defaults-in-ppliveav-client.html
Herr E Balls mohsep.submissi...@googlemail.com wrote:
Hi Guys!
Edition six of MOHSEP is here with no technical issues (we hired mexican
guy called manuel to run servers in latvia for us!).
Link is here:
http://mohsepblog.blogspot.com/2011/08/saturday-august-6th-2011.html
I pity the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2289-1 secur...@debian.org
http://www.debian.org/security/Florian Weimer
August 07, 2011
The data you posted seems like the stuff from SRBLCHE Seem him around and
he's a nice guy. Well coming to think of it his site is currently not selling
military data.. Its just maintaining a repository of SQLi sites like the hell
lot of sites around... There are sites like thehackernews.com
Dear List,
This is to expose a security company who according to their website
(http://www.prolinux.net.uy) are the #1 in their country..yet they
fail at the simplest tasks such as securing their web server...
This file contains a dump of all their databases including
logins/passwords to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2290-1 secur...@debian.org
http://www.debian.org/security/Florian Weimer
August 07, 2011
On Sat, 06 Aug 2011 19:59:23 EDT, Mr. Hinky Dink said:
23,000+ showed up in July. Over 16,000 new ones in the first week of
August. Somebody doesn't get it.
http://mrhinkydink.blogspot.com/2011/08/tcp-port-8909-proxies.html
See also...
On Sun, Aug 7, 2011 at 8:36 AM, valdis.kletni...@vt.edu wrote:
...
In reality, Evans and his company have little real knowledge beyond
pedestrian hacking techniques found in plagiarized books and beginner
hacking texts.
The ironic part is that pedestrian hacking techniques *will* be
Valdis are you on the DEF CON network?
;)
On Sun, Aug 7, 2011 at 2:32 PM, valdis.kletni...@vt.edu wrote:
I am out of office right now and will get back to you when I return. If you
don't hear from me, my assistant should contact you shortly. I’m on sick
leave because of some news from my
On Sun, 07 Aug 2011 16:04:24 PDT, you said:
Valdis are you on the DEF CON network?
he recommended..Click
Herehttp://click22.vt.edu/cl/click.php?un=yaddayaddayadda
Well, first off, it's not GPG-signed. :)
Second, if I was gonna do something like this, I'd make sure that click22.vt.edu
Trustwave's SpiderLabs Security Advisory TWSL2011-008:
Focus Stealing Vulnerability in Android
https://www.trustwave.com/spiderlabs/advisories/TWSL2011-008.txt
Published: 2011-08-06
Version: 1.0
Vendor: Google http://www.android.com/
Product: Android
Versions affected: Tested on 2.1 - 2.3
hi all, here is an interesting trick to perform an xss attack with IE
browsers.
some rich text applications such as email and blog, may provide HTML uses
but have a policy to block the on-event execution to prevent the XSS attack.
However, this applications may also allow the HTML notes uses,for
Don't kill his creativity. He's (cr|d)ying for some (self-presumed
well-deserved) attention.
On Sun, Aug 7, 2011 at 9:00 PM, Tavis Ormandy tav...@cmpxchg8b.com wrote:
Herr E Balls mohsep.submissi...@googlemail.com wrote:
Hi Guys!
Edition six of MOHSEP is here with no technical issues (we
On 2011-08-07, at 19:53, CnCxzSec衰仔 wrote:
hi all, here is an interesting trick to perform an xss attack with IE
browsers.
some rich text applications such as email and blog, may provide HTML uses
but have a policy to block the on-event execution to prevent the XSS attack.
However, this
this is a normal use, but !--[ifimg/onerror=alert(1) src=] is an unnormal
use. IE should regard this as an HTML comment instead of a downlevel-hidden
comment, so the HTML tags inside the COMMENT should not be evaled.
On Mon, Aug 8, 2011 at 11:30 AM, Andrew Farmer andf...@gmail.com wrote:
On
19 matches
Mail list logo