Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Valdis . Kletnieks
On Mon, 03 Oct 2011 12:25:31 +1100, GloW - XD said: sheesh, have they already cached it :s hrm... lol...well, that was VERY fast then, considering i linked to it only a cpl days ago :s from the files, and I have on occasion posted to F-D during an ongoing thread, and then Googled for more info

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread GloW - XD
Ok, thats plain scary. I was told of google 'tracking' any popular thread they see in theyre engine or google words so i am assuming that, they have some very strong filters set for FD for things like, taslking about theyre own system of cache in google (yet another little test..). Still

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Rainer Duffner
Am Mon, 3 Oct 2011 17:25:34 +1100 schrieb GloW - XD doo...@gmail.com: Ok, thats plain scary. It happens with forums, too. Once you post, you can find it via google almost immediately. ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Ferenc Kovacs
i assume, there is way more credit-fraud and rape etc going on, than wares...or, police having to waste time, on wares... i think police themseves detedst those things, and hence why the clouds still linger over some websites wich should be 'down' yet, are not. it's not working like that, you

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread GloW - XD
if you allow the small fishes to play, they will grow big. rubbish. Complete rubbish. Thats a very broad spectrum of people here, and while i may not seem whitehat atall, and am no hat really, I try remain neutral, and, that guy, decided to show me he was attacking me aand, accusing, for things i

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Darren Martyn
Going back to my own example, say all three are first world countries, and A and C are in the EU whilst B is the US. All nations involved have good diplomatic relations and preexisting extradition treaties, and to add interest to it, lets say the LEO in B and C helped the investigation. The

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread xD 0x41
Laurelai , you think i did that for 'looks' :) I have had that up, BUT not spammed any links for it, never, and, i waited for anyone to pick it. not once until this topic came up, so atleast we will see, although i have already dealt with this, and oh, psychz.net know me very well and my website,

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Darren Martyn
lol, n3td3v strikes again. Fetch me the popcorn xD TBH, I was waiting for this to happen... On Mon, Oct 3, 2011 at 12:11 AM, xD 0x41 sec...@gmail.com wrote: Laurelai , you think i did that for 'looks' :) I have had that up, BUT not spammed any links for it, never, and, i waited for anyone to

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread GloW - XD
No not the broken window effect, his outlook about how being s asmall criminal, always becoming a bigger one, is that the same? Oh well.. then... i beg to differ with you but, i dont believe that statement, ifso, then we would have alot more arrests indeed. btw for those thinking there will be any

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Ferenc Kovacs
On Mon, Oct 3, 2011 at 10:15 AM, GloW - XD doo...@gmail.com wrote: if you allow the small fishes to play, they will grow big. rubbish. Complete rubbish. Thats a very broad spectrum of people here, and while i may not seem whitehat atall, and am no hat really, I try remain neutral, and, that

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Jacqui Caren-home
On 02/10/2011 18:38, Stefan Jon Silverman wrote: oy, list newbie meets n3td3v -- this should be fun Just looked at this site. Shudder. FYI: this is PART of one sentence! This site should be linked to within the wikip definition of tag soup :-) font color=#414B56 size=2 is a professional

[Full-disclosure] Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS, Emails Addresses, Much More

2011-10-03 Thread Di. Tled
http://www.androidpolice.com/2011/10/01/massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others-exposes-phone-numbers-gps-sms-emails-addresses-much-more/ ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread xD 0x41
Good move! Going back to my own example, say all three are first world countries, and A and C are in the EU whilst B is the US. All nations involved have good diplomatic relations and preexisting extradition treaties, and to add interest to it, lets say the LEO in B and C helped the

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread xD 0x41
Could just lok at the recent david cecil case here in .au. It does say alot, because he did breach some bigger networks.. and he was committing 'smaller' scale fraud but, still fraud, however, his main problem was what he did to a governemnt site, wich was deface it for personal gain, not profit.

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread xD 0x41
Hi! I did not see that bit, the frontpage was pretty shockin, for what he proclaims to be.. he is not very pro for a 'pro' , i thinnk his code speaks for itseklf to. lol..is he trying to find some new buffer overflow, using fonts!@ perhaps.. they say a little fish can turn into a big fish

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Kornél Lugosi
So pleease take the socialist theories elswhere. Could you elaborate on how the Broken Window effect is a Socialist theory ? Kornel ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and

Re: [Full-disclosure] Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS, Emails Addresses, Much More

2011-10-03 Thread GloW - XD
No surpise... theyre ext4 partitions are completely vulnerable.. try tell an anddroid user that, tho. Spender 9grsecurity.net0 has exposed the ext4 bug, wich allows remote user addition to, whatever kernel, i assume runs the ext4 right... with some small changes ofc to code... so, it is strange

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Darren Martyn
Thanks for the input, I will be putting this as a debate soon for thew Law Society in the Uni I attend, to see what the legal guys think. The issue in the example is not fraud, but damage done to the servers (lets assume root/deface) and perhaps leaking of stolen data - the case I am using as an

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Darren Martyn
Small criminal can become big criminal if put in current prison system. Not always, but a lot will. You put (As example) small hacker in prison with lots of crooks, etc. Crooks see him/her as an asset for future work, and on the putside they become bigger criminal. Max Butler is a fine example of

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread xD 0x41
none of them exactly screams IM A PROFESSIONAL No, but i dont claim to be an IT security pro, either. My site, is a personal, crappy lil blog, nothing more than a tool for me. it is the first osts i have made to it, in over 4yrs of it up :P so i am not really, one huge on self promotion.. so, i

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread doc mombasa
i dont think either one of you have nice sites none of them exactly screams IM A PROFESSIONAL quite the contrary.. 2011/10/3 xD 0x41 sec...@gmail.com Hi! I did not see that bit, the frontpage was pretty shockin, for what he proclaims to be.. he is not very pro for a 'pro' , i thinnk his code

Re: [Full-disclosure] Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS, Emails Addresses, Much More

2011-10-03 Thread Darren Martyn
NOTW Hacking method for phones is nothing to do with this. Voicemail hacking in the UK involves calling the victim, hammering the # button while the phone rings, and being redirected to their voicemail box. Then you just press and # and DONE! (sometimes they have a password, but a 4 digit

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread GloW - XD
Agreed, if exposed to this environment, one will retalliate usually, and then, hate authority... Although, I know people of an intellectual nature, could be used and,in society indeed, even if it is community work@ google! ha... 10hrs free unpaid work of fun! I would certainly take the

Re: [Full-disclosure] Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS, Emails Addresses, Much More

2011-10-03 Thread GloW - XD
haha.. reminds me of old days of pbxs! hang each others voicemail greetings for fun... rofl.. we used to press 1+# and 0+# or 1+* sometimes, always oen fo those combos.. together (produce a sharper tone) but had to be that combo,on old analogues, it would break thru most answering-machines and

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Darren Martyn
Well, thanks for the logical response :) Many people want these evil hackers locked up and such, but doing so will only achieve the folowing (in my opinion): A: Cost money. B: Turn them into a more hardened criminal. C: Cost the community a useful person who could be beneficial to them. Consider

Re: [Full-disclosure] Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS, Emails Addresses, Much More

2011-10-03 Thread Darren Martyn
*laughs* Ah I remember those days well... I just broke into my own voicemails off a friends phone to test... Still vuln to this day! (well, it is a feature, not a bug, or so I am told...) On Mon, Oct 3, 2011 at 12:36 PM, GloW - XD doo...@gmail.com wrote: haha.. reminds me of old days of pbxs!

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Darren Martyn
True, I know some hackers who really apply the Ballmers Peak ( http://xkcd.com/323/) principle... They simply need to dry up :) On Mon, Oct 3, 2011 at 12:51 PM, xD 0x41 sec...@gmail.com wrote: Well, statistics show that most crime is done on some form of drug, and drug addiction is probably

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Dave
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 03/10/2011 11:39, Jacqui Caren-home wrote: On 02/10/2011 18:38, Stefan Jon Silverman wrote: oy, list newbie meets n3td3v -- this should be fun Just looked at this site. Shudder. FYI: this is PART of one sentence! This site should be

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 4:56 AM, Darren Martyn wrote: True, I know some hackers who really apply the Ballmers Peak (http://xkcd.com/323/) principle... They simply need to dry up :) Yeah i know quite a few of those myself. ___ Full-Disclosure - We believe in

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread SanguineRose
That is awesome. I approve of this 90s HTML code and bring back the good old days! HTML 3.0 is the stuff but that might be HTML 2.0 I don't remember. On Mon, Oct 3, 2011 at 4:39 AM, Jacqui Caren-home jacqui.ca...@ntlworld.com wrote: On 02/10/2011 18:38, Stefan Jon Silverman wrote: oy, list

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Laurelai
On 10/3/2011 5:51 AM, SanguineRose wrote: That is awesome. I approve of this 90s HTML code and bring back the good old days! HTML 3.0 is the stuff but that might be HTML 2.0 I don't remember. On Mon, Oct 3, 2011 at 4:39 AM, Jacqui Caren-home jacqui.ca...@ntlworld.com wrote: On 02/10/2011

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Darren Martyn
Nothing wrong with it per se, I was known to enjoy large bottles of rum during extended coding sessions. Now I can attest to the massive fall-off in epic skillz associated with too much alcohol - my code starts OK, gets better, then becomes an epic mess of typoes. I stopped doing that a while back

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 7:10 AM, Darren Martyn wrote: Nothing wrong with it per se, I was known to enjoy large bottles of rum during extended coding sessions. Now I can attest to the massive fall-off in epic skillz associated with too much alcohol - my code starts OK, gets better, then becomes an epic

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Darren Martyn
People used to LSD can do pretty amazing things. This guy in college was throwing a mini-rave/house party at his home, and he was tripping when the police came to ask us to turn the music down. He managed to talk to them for about 5 minutes, appeared totally fine, and they were none the wiser to

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Laurelai
On 10/3/2011 7:15 AM, doc mombasa wrote: it's on purpose! trust him! he's a security professional 2011/10/3 Laurelai laure...@oneechan.org mailto:laure...@oneechan.org On 10/3/2011 5:51 AM, SanguineRose wrote: That is awesome. I approve of this 90s HTML code and bring back the

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Laurelai
On 10/3/2011 7:31 AM, Darren Martyn wrote: I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is legit or not.

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Laurelai
On 10/3/2011 7:31 AM, Darren Martyn wrote: I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is legit or not.

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Darren Martyn
Thats one worry of mine, which is why I need a computer to test it on :) I wish I had my own computers to test with right now... Dont think the Uni will be happy if I accidentally their boxen :P On Mon, Oct 3, 2011 at 5:32 PM, Laurelai laure...@oneechan.org wrote: On 10/3/2011 7:31 AM, Darren

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Dan Dart
I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Make an RSS feed to regex through everything for interesting stuff.. Maybe: /^[0-9a-f]{32}$/ Or: /nuclear weapons/ Or even: /^ssh-rsa/ Would be brilliant!

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Kai
On Mon, 3 Oct 2011 15:31:29 +0100, Darren Martyn wrote: I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Laurelai
On 10/3/2011 7:46 AM, Dan Dart wrote: I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Make an RSS feed to regex through everything for interesting stuff.. Maybe: /^[0-9a-f]{32}$/ Or: /nuclear weapons/ Or even:

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Dan Dart
http://pastebin.com/search?cx=partner-pub-4339714761096906%3A1qhz41g8k4mcof=FORID%3A10ie=UTF-8sa.x=0sa.y=0sa=Searchq=BEGIN%20RSA%20PRIVATE%20KEYtbs=0 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread adam
/* KEEP PRIV8!! leak and i will find you :) ~ desg */ * * Probably should have been a good indication that he *wanted* you to run it. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Jacqui Caren-home
On 03/10/2011 16:16, Laurelai wrote: that html makes my eyes want to bleed The site is obviously commercial, hence getting the below revoked should be a doddle via a complaint to enom. Registrant: Andrew Wallace Registrant type: UK Individual Registrant's address:

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Christian Sciberras
Here's a great idea that doesn't need LSD or being doped;* shut the fuck up* . On Mon, Oct 3, 2011 at 6:31 PM, Laurelai laure...@oneechan.org wrote: On 10/3/2011 7:30 AM, doc mombasa wrote: yeah ive been in similar situations several times unless the dose is too high then its doable

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Dan Dart
/* KEEP PRIV8!! leak and i will find you :) ~ desg */ /* DON'T LEAVE KEYS ON THE INTERNET YOU FOOL */ Classic... ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia -

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread xD 0x41
Ok.. my final posts on this matter i think... and opinons, (No, seriously, I wonder what your opinions are on rehabilitative rather than punitative measures to be taken against criminal hackers, assuming fraud was *not* involved, and what benefit they can be to the community and whether it

[Full-disclosure] Netvolution referer header SQL injection vulnerability

2011-10-03 Thread Dimitris Glynos
Netvolution CMS v2.5.8 is vulnerable to a blind SQL injection attack in the HTTP “referer” header. A malicious user may utilize this vulnerability to modify content on the vulnerable website, inject malicious javascript code to a visitor’s browser, collect CMS usernames and plaintext passwords

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread xD 0x41
Well, statistics show that most crime is done on some form of drug, and drug addiction is probably about 90% of most major crime evens, so, i think this gives people of the IT nature, a much higher chance, staitstically speaking, it would be of more benfit to simply rehab them, rather than make

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread doc mombasa
well n3td3v is n3td3v in you he finally found someone who will reply to his rants and ravings to save yourself a lot of time just disregard everything he says 2011/10/3 xD 0x41 sec...@gmail.com none of them exactly screams IM A PROFESSIONAL No, but i dont claim to be an IT security pro,

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread doc mombasa
it's on purpose! trust him! he's a security professional 2011/10/3 Laurelai laure...@oneechan.org On 10/3/2011 5:51 AM, SanguineRose wrote: That is awesome. I approve of this 90s HTML code and bring back the good old days! HTML 3.0 is the stuff but that might be HTML 2.0 I don't

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread doc mombasa
if you are used to the effects of LSD then its not a problem i like to code on psychedelics and/or alcohol myself :) 2011/10/3 Laurelai laure...@oneechan.org On 10/3/2011 7:10 AM, Darren Martyn wrote: Nothing wrong with it per se, I was known to enjoy large bottles of rum during extended

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread doc mombasa
yeah ive been in similar situations several times unless the dose is too high then its doable hehehehe 2011/10/3 Darren Martyn d.martyn.fulldisclos...@gmail.com People used to LSD can do pretty amazing things. This guy in college was throwing a mini-rave/house party at his home, and he was

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 7:57 AM, Christian Sciberras wrote: Here's a great idea that doesn't need LSD or being doped;*shut the fuck up*. On Mon, Oct 3, 2011 at 6:31 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/3/2011 7:30 AM, doc mombasa wrote: yeah ive

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread John Jacobs
http://packetstormsecurity.org/files/25728/w000t-shell.c.html It's a trojan, based on the w00t-shell.c code; the shell code adds a passwordless root account under the name w000t. Date: Mon, 3 Oct 2011 15:31:29 +0100 From: d.martyn.fulldisclos...@gmail.com To:

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread nix
I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is legit or not. http://pastebin.com/ygByEV2e Thanks :)

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Christian Sciberras
Manners, on FD list? Are you trying to be funny? On Mon, Oct 3, 2011 at 7:04 PM, Laurelai laure...@oneechan.org wrote: On 10/3/2011 7:57 AM, Christian Sciberras wrote: Here's a great idea that doesn't need LSD or being doped;* shut the fuck up*. On Mon, Oct 3, 2011 at 6:31 PM,

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Christian Sciberras
I'm not sure who's the the one acting like a child, the guy spamming people with bullshit or the other one telling him to do everyone a favor and shut up. On Mon, Oct 3, 2011 at 7:13 PM, Laurelai laure...@oneechan.org wrote: On 10/3/2011 8:06 AM, Christian Sciberras wrote: Manners, on FD

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Andrew Farmer
On 2011-10-03, at 07:31, Darren Martyn wrote: I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is legit or not.

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 8:16 AM, Christian Sciberras wrote: I'm not sure who's the the one acting like a child, the guy spamming people with bullshit or the other one telling him to do everyone a favor and shut up. On Mon, Oct 3, 2011 at 7:13 PM, Laurelai laure...@oneechan.org

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 8:06 AM, Christian Sciberras wrote: Manners, on FD list? Are you trying to be funny? On Mon, Oct 3, 2011 at 7:04 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/3/2011 7:57 AM, Christian Sciberras wrote: Here's a great idea that

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Guillaume Friloux
On 03/10/2011 16:31, Darren Martyn wrote: I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is legit or not.

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Christian Sciberras
I know a guy who codes perl on LSD, writes good code too. That's as much useful as what is commonly found in toilets. Or if you prefer a better comparison, regular spam is more useful. Too bad your spam gets past Google filters. On Mon, Oct 3, 2011 at 7:21 PM, Laurelai laure...@oneechan.org

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Laurelai
On 10/3/2011 8:02 AM, John Jacobs wrote: http://packetstormsecurity.org/files/25728/w000t-shell.c.html It's a trojan, based on the w00t-shell.c code; the shell code adds a passwordless root account under the name w000t. Date: Mon, 3 Oct 2011 15:31:29 +0100 From:

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread nix
http://packetstormsecurity.org/files/25728/w000t-shell.c.html It's a trojan, based on the w00t-shell.c code; the shell code adds a passwordless root account under the name w000t. Nice try though. I was not aware that this shellcode was freely available but after debugging the same

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Valdis . Kletnieks
On Mon, 03 Oct 2011 09:11:33 PDT, Laurelai said: I know a guy who codes perl on LSD, writes good code too. To be fair, it's hard to tell if perl code was written with or without the use of LSD. It's certainly a language that shows LSD influence in the design. :) pgpWPsbzpC23f.pgp

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Dan Dart
You need to be root to use raw sockets - yeah... I do... ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 8:36 AM, valdis.kletni...@vt.edu wrote: On Mon, 03 Oct 2011 09:11:33 PDT, Laurelai said: I know a guy who codes perl on LSD, writes good code too. To be fair, it's hard to tell if perl code was written with or without the use of LSD. It's certainly a language that shows LSD

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread dave bl
On 4 October 2011 02:36, Dan Dart dand...@googlemail.com wrote: You need to be root to use raw sockets - yeah... I do... Of course you do! ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Dan Dart
You need to be root to use raw sockets :( Translation: I shall destroy you. Mwahahaha. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread adam
Also, make sure you guys don't miss out on this 0day either: http://pastebin.com/R8XdsUgK It's an .exe so you don't have to worry about nasty shellcode being present in the source code. I wish everyone would release that way. On Mon, Oct 3, 2011 at 10:51 AM, Dan Dart dand...@googlemail.com

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread PsychoBilly
OMG! This ... actually WORKS! GR8 Job, m8+! L33+ cC l33+ W00+ FB Bwana! ... ! connection reseted by peer [[ adam ]] @ [[ 03/10/2011 17:56 ]]-- Also, make sure you guys don't miss out on this 0day either: http://pastebin.com/R8XdsUgK

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Darren Martyn
*laughs* I wholeheartedly agree, and the fact it is considered a beautiful language shows me that anyone who considers it beautiful in any way shape or form MUST be on fairly heavy doses of LSD... (I myself use Perl quite a bit, as I can understand it and it is relatively easy to use). My

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Darren Martyn
I may have to set up such an RSS + REGEX along with a google alerts to get the best of both :) Since my lack of computing facilities has gotten worse in the last month I have actually begun to forget ASM, so decoding shellcode is not so easy for me :( Nor do I have (currently) access to a Linux

[Full-disclosure] DDIVRT-2011-36 Cybele Software, Inc. ThinVNC Product Suite Arbitrary File Retrieval

2011-10-03 Thread ddivulnalert
Title - DDIVRT-2011-36 Cybele Software, Inc. ThinVNC Product Suite Arbitrary File Retrieval Severity High Date Discovered --- September 6th, 2011 Discovered By - Digital Defense, Inc. Vulnerability Research Team Credit: r@b13$ Vulnerability Description

[Full-disclosure] DDIVRT-2011-34 Metropolis Technologies OfficeWatch Directory Traversal

2011-10-03 Thread ddivulnalert
Title - DDIVRT-2011-34 Metropolis Technologies OfficeWatch Directory Traversal Severity High Date Discovered --- August 15, 2011 Discovered By - Digital Defense, Inc. Vulnerability Research Team Credit: Chris Graham and r@b13$ Vulnerability Description

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Rove Monteux
I was just about to ask the same, how old are yous, 13 or something ? Dne 3.10.2011 17:16, Christian Sciberras napsal(a): I'm not sure who's the the one acting like a child, the guy spamming people with bullshit or the other one telling him to do everyone a favor and shut up. On Mon, Oct

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Security Mailing List
Yeah, sure it is. 1. if (fork() == 0) 2. execl(/bin/sh, sh, -c, evil, 0); 3. else 4. wait(NULL); This line shows that the code will run /bin/sh on local machine and it has evil[] as a parameter. By decoding evil[], I can get

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Sergito
never suspected hahahahahahah 2011/10/3 Dan Dart dand...@googlemail.com You need to be root to use raw sockets - yeah... I do... ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Tim Gurney
How do you unsubscribe from this list, i have already been to the site and entered my details and got the link and clicked on it, yet i am still getting email! On 03/10/11 16:27, Rove Monteux wrote: I was just about to ask the same, how old are yous, 13 or something ? Dne 3.10.2011 17:16,

[Full-disclosure] [SECURITY] [DSA 2314-1] puppet security update

2011-10-03 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-2314-1secur...@debian.org http://www.debian.org/security/ Nico Golde Oct 3, 2011

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 10:42 AM, Antony widmal wrote: Using an external VPN provider to cover your trace clearly shows your incompetency and your idiot assumption. Trying to blame the VPN provider rather than accepting your mistake and learning from it clearly show your 3 years old mentality. Also,

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Ferenc Kovacs
On Mon, Oct 3, 2011 at 10:35 PM, Laurelai laure...@oneechan.org wrote: On 10/3/2011 10:42 AM, Antony widmal wrote: Using an external VPN provider to cover your trace clearly shows your incompetency and your idiot assumption. Trying to blame the VPN provider rather than accepting your mistake

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 12:16 PM, Ferenc Kovacs wrote: On Mon, Oct 3, 2011 at 10:35 PM, Laurelailaure...@oneechan.org wrote: On 10/3/2011 10:42 AM, Antony widmal wrote: Using an external VPN provider to cover your trace clearly shows your incompetency and your idiot assumption. Trying to blame the VPN

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 12:21 PM, Antony widmal wrote: If you're stupid enough to trust a cloud vpn, then you deserve to get busted. Dry your tears and grow the fuck up. EOF. On Mon, Oct 3, 2011 at 4:35 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/3/2011 10:42

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Antony widmal
If you're stupid enough to trust a cloud vpn, then you deserve to get busted. Dry your tears and grow the fuck up. EOF. On Mon, Oct 3, 2011 at 4:35 PM, Laurelai laure...@oneechan.org wrote: On 10/3/2011 10:42 AM, Antony widmal wrote: Using an external VPN provider to cover your trace

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread adam
Darren, There are places like codepad.org that let you compile/execute various programming/scripting languages, of course you don't have the control/access that you'd normally have but for some things - it may just be enough. On Mon, Oct 3, 2011 at 11:41 AM, Darren Martyn

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread xD 0x41
Nice. Oh, i did not mean hackers and drugs, they are not really what I classify as a hardcore, criminalised addict who is now at the point where the drug runs them... most hard non-pc crimes, are this way. Although, i know of many many people who abuse benzodiazepedines, and thats where it can get

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread GloW - XD
Wow, i am impressed jacqui, you are VERY very aware of the law,moreso than me! I have not seen that yet..well, not so good!@ I am impressed, because I dont really look at taking out the sites otr, people who claim to be pros etc, and, reaally, i should never had began the thread...altho, i saw he

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread GloW - XD
Well ok, true that html is more secure. I would rather run html2/3 , well 2 is the norm isnt it.. than php anyday. good point out. cheers, xd On 3 October 2011 23:51, SanguineRose sanguiner...@occultusterra.comwrote: That is awesome. I approve of this 90s HTML code and bring back the good old

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread GloW - XD
Yes is legit,... however thats a backdoored copy i believe, the actual 'proper' , has a execl() type method... no shellcode, and, no evil ;) On 4 October 2011 01:31, Darren Martyn d.martyn.fulldisclos...@gmail.comwrote: I regularly trawl Pastebin.com to find code - often idiots leave some 0day

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread GloW - XD
naw naw... really, it workx... pls exec and attack apaches ;') lol. On 4 October 2011 02:02, John Jacobs flamdu...@hotmail.com wrote: http://packetstormsecurity.org/files/25728/w000t-shell.c.html It's a trojan, based on the w00t-shell.c code; the shell code adds a passwordless root

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread GloW - XD
Hey Jeff, I am glad there are people here who understand the need for real privacy in the modern age. The US Government has proven *repeatedly* that the more power it has the less trustworthy it is especially when it comes to privacy concerns. This is mainly aimed at Jeffs posting, I think i

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Jeffrey Walton
On Mon, Oct 3, 2011 at 5:21 PM, Laurelai laure...@oneechan.org wrote: On 10/3/2011 12:16 PM, Ferenc Kovacs wrote: On Mon, Oct 3, 2011 at 10:35 PM, Laurelai laure...@oneechan.org wrote: On 10/3/2011 10:42 AM, Antony widmal wrote: Using an external VPN provider to cover your trace clearly

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread GloW - XD
The media and such often gloss over the human aspects of an incident. Bang, thats the thing that will get you behind jail, or no jail. The press pushes it on, the people are always then arrested, because the public need*answers* even when they do not understand much of the time what exactly has

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread GloW - XD
There's only 4 billion IP's to scan if he want to get all out of his trick. Synscan can do a subnet (class b) in ~3 minutes nowdays ;) I would think he would find it. i did a scan on a kit i found, root:barcelona123 , and, got like 100 boxes in 10minutes of scanning, ofc, i looked up the IP

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread GloW - XD
laurelai, this guiy is crazier than i first thought, altho i do agree that this whole thread is now abit old and, only a few people are *really* interested in the legal issues wich im trying to break through. I do like how google does theyre security, Id like to hear why they do accept a PoC as

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread xD 0x41
Hrm interesting.. I do Index of /what-i-am-after , in some different ways and usually, find many 'dumps' of interesting scanners/kits/whatever.. have not read most of it...archived tars now.. anyhow... interesting to maybe make a 'catcher' for these thi8ngs, i was once trying todo a sniffer for

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread xD 0x41
Reminds me of Front Page 2.0 gen'd code. lol, very true... it and a few other apps for web building, seem todo these kind of muckups or rather, just tag in an idiotic manner... pretty weird, I just stick with WP and hope i aint vuln ;p cheers, xd On 3 October 2011 23:39, Dave

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Laurelai
On 10/3/2011 4:29 PM, GloW - XD wrote: There's only 4 billion IP's to scan if he want to get all out of his trick. Synscan can do a subnet (class b) in ~3 minutes nowdays ;) I would think he would find it. i did a scan on a kit i found, root:barcelona123 , and, got like 100 boxes in 10minutes

  1   2   >