On Mon, 03 Oct 2011 12:25:31 +1100, GloW - XD said:
sheesh, have they already cached it :s hrm... lol...well, that was VERY fast
then, considering i linked to it only a cpl days ago :s from the files, and
I have on occasion posted to F-D during an ongoing thread, and then Googled for
more info
Ok, thats plain scary.
I was told of google 'tracking' any popular thread they see in theyre engine
or google words so i am assuming that, they have some very strong
filters set for FD for things like, taslking about theyre own system of
cache in google (yet another little test..).
Still
Am Mon, 3 Oct 2011 17:25:34 +1100
schrieb GloW - XD doo...@gmail.com:
Ok, thats plain scary.
It happens with forums, too.
Once you post, you can find it via google almost immediately.
___
Full-Disclosure - We believe in it.
Charter:
i assume, there is way more credit-fraud and rape etc going on, than
wares...or, police having to waste time, on wares... i think police
themseves detedst those things, and hence why the clouds still linger over
some websites wich should be 'down' yet, are not.
it's not working like that, you
if you allow the small fishes to play, they will grow big.
rubbish.
Complete rubbish.
Thats a very broad spectrum of people here, and while i may not seem
whitehat atall, and am no hat really, I try remain neutral, and, that guy,
decided to show me he was attacking me aand, accusing, for things i
Going back to my own example, say all three are first world countries, and A
and C are in the EU whilst B is the US. All nations involved have good
diplomatic relations and preexisting extradition treaties, and to add
interest to it, lets say the LEO in B and C helped the investigation. The
Laurelai , you think i did that for 'looks' :) I have had that up, BUT not
spammed any links for it, never, and, i waited for anyone to pick it.
not once until this topic came up, so atleast we will see, although i have
already dealt with this, and oh, psychz.net know me very well and my
website,
lol, n3td3v strikes again. Fetch me the popcorn xD
TBH, I was waiting for this to happen...
On Mon, Oct 3, 2011 at 12:11 AM, xD 0x41 sec...@gmail.com wrote:
Laurelai , you think i did that for 'looks' :) I have had that up, BUT not
spammed any links for it, never, and, i waited for anyone to
No not the broken window effect, his outlook about how being s asmall
criminal, always becoming a bigger one, is that the same? Oh well.. then...
i beg to differ with you but, i dont believe that statement, ifso, then we
would have alot more arrests indeed.
btw for those thinking there will be any
On Mon, Oct 3, 2011 at 10:15 AM, GloW - XD doo...@gmail.com wrote:
if you allow the small fishes to play, they will grow big.
rubbish.
Complete rubbish.
Thats a very broad spectrum of people here, and while i may not seem
whitehat atall, and am no hat really, I try remain neutral, and, that
On 02/10/2011 18:38, Stefan Jon Silverman wrote:
oy, list newbie meets n3td3v -- this should be fun
Just looked at this site. Shudder.
FYI: this is PART of one sentence!
This site should be linked to within the wikip definition of tag soup :-)
font color=#414B56 size=2 is a professional
http://www.androidpolice.com/2011/10/01/massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others-exposes-phone-numbers-gps-sms-emails-addresses-much-more/
___
Full-Disclosure - We believe in it.
Charter:
Good move!
Going back to my own example, say all three are first world countries, and A
and C are in the EU whilst B is the US. All nations involved have good
diplomatic relations and preexisting extradition treaties, and to add
interest to it, lets say the LEO in B and C helped the
Could just lok at the recent david cecil case here in .au.
It does say alot, because he did breach some bigger networks.. and he was
committing 'smaller' scale fraud but, still fraud, however, his main problem
was what he did to a governemnt site, wich was deface it for personal gain,
not profit.
Hi!
I did not see that bit, the frontpage was pretty shockin, for what he
proclaims to be.. he is not very pro for a 'pro' , i thinnk his code speaks
for itseklf to. lol..is he trying to find some new buffer overflow, using
fonts!@
perhaps.. they say a little fish can turn into a big fish
So pleease take the socialist theories elswhere.
Could you elaborate on how the Broken Window effect is a Socialist theory ?
Kornel
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and
No surpise... theyre ext4 partitions are completely vulnerable.. try tell an
anddroid user that, tho. Spender 9grsecurity.net0 has exposed the ext4 bug,
wich allows remote user addition to, whatever kernel, i assume runs the ext4
right... with some small changes ofc to code... so, it is strange
Thanks for the input, I will be putting this as a debate soon for thew Law
Society in the Uni I attend, to see what the legal guys think.
The issue in the example is not fraud, but damage done to the servers (lets
assume root/deface) and perhaps leaking of stolen data - the case I am using
as an
Small criminal can become big criminal if put in current prison system. Not
always, but a lot will. You put (As example) small hacker in prison with
lots of crooks, etc. Crooks see him/her as an asset for future work, and on
the putside they become bigger criminal. Max Butler is a fine example of
none of them exactly screams IM A PROFESSIONAL
No, but i dont claim to be an IT security pro, either.
My site, is a personal, crappy lil blog, nothing more than a tool for me.
it is the first osts i have made to it, in over 4yrs of it up :P
so i am not really, one huge on self promotion..
so, i
i dont think either one of you have nice sites
none of them exactly screams IM A PROFESSIONAL
quite the contrary..
2011/10/3 xD 0x41 sec...@gmail.com
Hi!
I did not see that bit, the frontpage was pretty shockin, for what he
proclaims to be.. he is not very pro for a 'pro' , i thinnk his code
NOTW Hacking method for phones is nothing to do with this. Voicemail
hacking in the UK involves calling the victim, hammering the # button while
the phone rings, and being redirected to their voicemail box. Then you just
press and # and DONE! (sometimes they have a password, but a 4 digit
Agreed, if exposed to this environment, one will retalliate usually, and
then, hate authority...
Although, I know people of an intellectual nature, could be used and,in
society indeed, even if it is community work@ google! ha... 10hrs free
unpaid work of fun!
I would certainly take the
haha.. reminds me of old days of pbxs!
hang each others voicemail greetings for fun...
rofl.. we used to press 1+# and 0+# or 1+* sometimes, always oen fo those
combos.. together (produce a sharper tone) but had to be that combo,on old
analogues, it would break thru most answering-machines and
Well, thanks for the logical response :)
Many people want these evil hackers locked up and such, but doing so will
only achieve the folowing (in my opinion):
A: Cost money.
B: Turn them into a more hardened criminal.
C: Cost the community a useful person who could be beneficial to them.
Consider
*laughs* Ah I remember those days well... I just broke into my own
voicemails off a friends phone to test... Still vuln to this day! (well, it
is a feature, not a bug, or so I am told...)
On Mon, Oct 3, 2011 at 12:36 PM, GloW - XD doo...@gmail.com wrote:
haha.. reminds me of old days of pbxs!
True, I know some hackers who really apply the Ballmers Peak (
http://xkcd.com/323/) principle... They simply need to dry up :)
On Mon, Oct 3, 2011 at 12:51 PM, xD 0x41 sec...@gmail.com wrote:
Well, statistics show that most crime is done on some form of drug, and
drug addiction is probably
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 03/10/2011 11:39, Jacqui Caren-home wrote:
On 02/10/2011 18:38, Stefan Jon Silverman wrote:
oy, list newbie meets n3td3v -- this should be fun
Just looked at this site. Shudder.
FYI: this is PART of one sentence!
This site should be
On 10/3/2011 4:56 AM, Darren Martyn wrote:
True, I know some hackers who really apply the Ballmers Peak
(http://xkcd.com/323/) principle... They simply need to dry up :)
Yeah i know quite a few of those myself.
___
Full-Disclosure - We believe in
That is awesome. I approve of this 90s HTML code and bring back the
good old days! HTML 3.0 is the stuff but that might be HTML 2.0 I
don't remember.
On Mon, Oct 3, 2011 at 4:39 AM, Jacqui Caren-home
jacqui.ca...@ntlworld.com wrote:
On 02/10/2011 18:38, Stefan Jon Silverman wrote:
oy, list
On 10/3/2011 5:51 AM, SanguineRose wrote:
That is awesome. I approve of this 90s HTML code and bring back the
good old days! HTML 3.0 is the stuff but that might be HTML 2.0 I
don't remember.
On Mon, Oct 3, 2011 at 4:39 AM, Jacqui Caren-home
jacqui.ca...@ntlworld.com wrote:
On 02/10/2011
Nothing wrong with it per se, I was known to enjoy large bottles of rum
during extended coding sessions. Now I can attest to the massive fall-off in
epic skillz associated with too much alcohol - my code starts OK, gets
better, then becomes an epic mess of typoes. I stopped doing that a while
back
On 10/3/2011 7:10 AM, Darren Martyn wrote:
Nothing wrong with it per se, I was known to enjoy large bottles of
rum during extended coding sessions. Now I can attest to the massive
fall-off in epic skillz associated with too much alcohol - my code
starts OK, gets better, then becomes an epic
People used to LSD can do pretty amazing things. This guy in college was
throwing a mini-rave/house party at his home, and he was tripping when the
police came to ask us to turn the music down. He managed to talk to them for
about 5 minutes, appeared totally fine, and they were none the wiser to
On 10/3/2011 7:15 AM, doc mombasa wrote:
it's on purpose!
trust him!
he's a security professional
2011/10/3 Laurelai laure...@oneechan.org mailto:laure...@oneechan.org
On 10/3/2011 5:51 AM, SanguineRose wrote:
That is awesome. I approve of this 90s HTML code and bring back the
On 10/3/2011 7:31 AM, Darren Martyn wrote:
I regularly trawl Pastebin.com to find code - often idiots leave some
0day and similar there and it is nice to find.
Well, seeing as I have no test boxes at the moment, can someone check
this code in a VM? I am not sure if it is legit or not.
On 10/3/2011 7:31 AM, Darren Martyn wrote:
I regularly trawl Pastebin.com to find code - often idiots leave some
0day and similar there and it is nice to find.
Well, seeing as I have no test boxes at the moment, can someone check
this code in a VM? I am not sure if it is legit or not.
Thats one worry of mine, which is why I need a computer to test it on :)
I wish I had my own computers to test with right now... Dont think the Uni
will be happy if I accidentally their boxen :P
On Mon, Oct 3, 2011 at 5:32 PM, Laurelai laure...@oneechan.org wrote:
On 10/3/2011 7:31 AM, Darren
I regularly trawl Pastebin.com to find code - often idiots leave some 0day
and similar there and it is nice to find.
Make an RSS feed to regex through everything for interesting stuff..
Maybe:
/^[0-9a-f]{32}$/
Or:
/nuclear weapons/
Or even:
/^ssh-rsa/
Would be brilliant!
On Mon, 3 Oct 2011 15:31:29 +0100, Darren Martyn wrote:
I regularly trawl Pastebin.com to find code - often idiots leave some
0day
and similar there and it is nice to find.
Well, seeing as I have no test boxes at the moment, can someone check
this
code in a VM? I am not sure if it is
On 10/3/2011 7:46 AM, Dan Dart wrote:
I regularly trawl Pastebin.com to find code - often idiots leave some 0day
and similar there and it is nice to find.
Make an RSS feed to regex through everything for interesting stuff..
Maybe:
/^[0-9a-f]{32}$/
Or:
/nuclear weapons/
Or even:
http://pastebin.com/search?cx=partner-pub-4339714761096906%3A1qhz41g8k4mcof=FORID%3A10ie=UTF-8sa.x=0sa.y=0sa=Searchq=BEGIN%20RSA%20PRIVATE%20KEYtbs=0
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
/* KEEP PRIV8!! leak and i will find you :) ~ desg */
*
*
Probably should have been a good indication that he *wanted* you to run it.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and
On 03/10/2011 16:16, Laurelai wrote:
that html makes my eyes want to bleed
The site is obviously commercial, hence getting the below revoked
should be a doddle via a complaint to enom.
Registrant:
Andrew Wallace
Registrant type:
UK Individual
Registrant's address:
Here's a great idea that doesn't need LSD or being doped;* shut the fuck up*
.
On Mon, Oct 3, 2011 at 6:31 PM, Laurelai laure...@oneechan.org wrote:
On 10/3/2011 7:30 AM, doc mombasa wrote:
yeah ive been in similar situations several times
unless the dose is too high then its doable
/* KEEP PRIV8!! leak and i will find you :) ~ desg */
/* DON'T LEAVE KEYS ON THE INTERNET YOU FOOL */
Classic...
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia -
Ok.. my final posts on this matter i think... and opinons,
(No, seriously, I wonder what your opinions are on rehabilitative rather
than punitative measures to be taken against criminal hackers, assuming
fraud was *not* involved, and what benefit they can be to the community and
whether it
Netvolution CMS v2.5.8 is vulnerable to a blind SQL injection attack
in the HTTP “referer” header. A malicious user may utilize this
vulnerability to modify content on the vulnerable website, inject
malicious javascript code to a visitor’s browser, collect CMS usernames
and plaintext passwords
Well, statistics show that most crime is done on some form of drug, and drug
addiction is probably about 90% of most major crime evens, so, i think this
gives people of the IT nature, a much higher chance, staitstically speaking,
it would be of more benfit to simply rehab them, rather than make
well n3td3v is n3td3v
in you he finally found someone who will reply to his rants and ravings
to save yourself a lot of time just disregard everything he says
2011/10/3 xD 0x41 sec...@gmail.com
none of them exactly screams IM A PROFESSIONAL
No, but i dont claim to be an IT security pro,
it's on purpose!
trust him!
he's a security professional
2011/10/3 Laurelai laure...@oneechan.org
On 10/3/2011 5:51 AM, SanguineRose wrote:
That is awesome. I approve of this 90s HTML code and bring back the
good old days! HTML 3.0 is the stuff but that might be HTML 2.0 I
don't
if you are used to the effects of LSD then its not a problem
i like to code on psychedelics and/or alcohol myself :)
2011/10/3 Laurelai laure...@oneechan.org
On 10/3/2011 7:10 AM, Darren Martyn wrote:
Nothing wrong with it per se, I was known to enjoy large bottles of rum
during extended
yeah ive been in similar situations several times
unless the dose is too high then its doable hehehehe
2011/10/3 Darren Martyn d.martyn.fulldisclos...@gmail.com
People used to LSD can do pretty amazing things. This guy in college was
throwing a mini-rave/house party at his home, and he was
On 10/3/2011 7:57 AM, Christian Sciberras wrote:
Here's a great idea that doesn't need LSD or being doped;*shut the
fuck up*.
On Mon, Oct 3, 2011 at 6:31 PM, Laurelai laure...@oneechan.org
mailto:laure...@oneechan.org wrote:
On 10/3/2011 7:30 AM, doc mombasa wrote:
yeah ive
http://packetstormsecurity.org/files/25728/w000t-shell.c.html
It's a trojan, based on the w00t-shell.c code; the shell code adds a
passwordless root account under the name w000t.
Date: Mon, 3 Oct 2011 15:31:29 +0100
From: d.martyn.fulldisclos...@gmail.com
To:
I regularly trawl Pastebin.com to find code - often idiots leave some 0day
and similar there and it is nice to find.
Well, seeing as I have no test boxes at the moment, can someone check this
code in a VM? I am not sure if it is legit or not.
http://pastebin.com/ygByEV2e
Thanks :)
Manners, on FD list? Are you trying to be funny?
On Mon, Oct 3, 2011 at 7:04 PM, Laurelai laure...@oneechan.org wrote:
On 10/3/2011 7:57 AM, Christian Sciberras wrote:
Here's a great idea that doesn't need LSD or being doped;* shut the fuck
up*.
On Mon, Oct 3, 2011 at 6:31 PM,
I'm not sure who's the the one acting like a child, the guy spamming people
with bullshit or the other one telling him to do everyone a favor and shut
up.
On Mon, Oct 3, 2011 at 7:13 PM, Laurelai laure...@oneechan.org wrote:
On 10/3/2011 8:06 AM, Christian Sciberras wrote:
Manners, on FD
On 2011-10-03, at 07:31, Darren Martyn wrote:
I regularly trawl Pastebin.com to find code - often idiots leave some 0day
and similar there and it is nice to find.
Well, seeing as I have no test boxes at the moment, can someone check this
code in a VM? I am not sure if it is legit or not.
On 10/3/2011 8:16 AM, Christian Sciberras wrote:
I'm not sure who's the the one acting like a child, the guy spamming
people with bullshit or the other one telling him to do everyone a
favor and shut up.
On Mon, Oct 3, 2011 at 7:13 PM, Laurelai laure...@oneechan.org
On 10/3/2011 8:06 AM, Christian Sciberras wrote:
Manners, on FD list? Are you trying to be funny?
On Mon, Oct 3, 2011 at 7:04 PM, Laurelai laure...@oneechan.org
mailto:laure...@oneechan.org wrote:
On 10/3/2011 7:57 AM, Christian Sciberras wrote:
Here's a great idea that
On 03/10/2011 16:31, Darren Martyn wrote:
I regularly trawl Pastebin.com to find code - often idiots leave some
0day and similar there and it is nice to find.
Well, seeing as I have no test boxes at the moment, can someone check
this code in a VM? I am not sure if it is legit or not.
I know a guy who codes perl on LSD, writes good code too.
That's as much useful as what is commonly found in toilets.
Or if you prefer a better comparison, regular spam is more useful.
Too bad your spam gets past Google filters.
On Mon, Oct 3, 2011 at 7:21 PM, Laurelai laure...@oneechan.org
On 10/3/2011 8:02 AM, John Jacobs wrote:
http://packetstormsecurity.org/files/25728/w000t-shell.c.html
It's a trojan, based on the w00t-shell.c code; the shell code adds a
passwordless root account under the name w000t.
Date: Mon, 3 Oct 2011 15:31:29 +0100
From:
http://packetstormsecurity.org/files/25728/w000t-shell.c.html
It's a trojan, based on the w00t-shell.c code; the shell code adds a
passwordless root account under the name w000t.
Nice try though. I was not aware that this shellcode was freely available
but after debugging the same
On Mon, 03 Oct 2011 09:11:33 PDT, Laurelai said:
I know a guy who codes perl on LSD, writes good code too.
To be fair, it's hard to tell if perl code was written with or without the use
of LSD.
It's certainly a language that shows LSD influence in the design. :)
pgpWPsbzpC23f.pgp
You need to be root to use raw sockets - yeah... I do...
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On 10/3/2011 8:36 AM, valdis.kletni...@vt.edu wrote:
On Mon, 03 Oct 2011 09:11:33 PDT, Laurelai said:
I know a guy who codes perl on LSD, writes good code too.
To be fair, it's hard to tell if perl code was written with or without the
use of LSD.
It's certainly a language that shows LSD
On 4 October 2011 02:36, Dan Dart dand...@googlemail.com wrote:
You need to be root to use raw sockets - yeah... I do...
Of course you do!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
You need to be root to use raw sockets
:(
Translation: I shall destroy you. Mwahahaha.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Also, make sure you guys don't miss out on this 0day either:
http://pastebin.com/R8XdsUgK
It's an .exe so you don't have to worry about nasty shellcode being present
in the source code. I wish everyone would release that way.
On Mon, Oct 3, 2011 at 10:51 AM, Dan Dart dand...@googlemail.com
OMG!
This ...
actually WORKS!
GR8 Job, m8+!
L33+ cC l33+
W00+ FB Bwana!
...
! connection reseted by peer
[[ adam ]] @ [[ 03/10/2011 17:56
]]--
Also, make sure you guys don't miss out on this 0day either:
http://pastebin.com/R8XdsUgK
*laughs* I wholeheartedly agree, and the fact it is considered a beautiful
language shows me that anyone who considers it beautiful in any way shape
or form MUST be on fairly heavy doses of LSD... (I myself use Perl quite a
bit, as I can understand it and it is relatively easy to use).
My
I may have to set up such an RSS + REGEX along with a google alerts to get
the best of both :)
Since my lack of computing facilities has gotten worse in the last month I
have actually begun to forget ASM, so decoding shellcode is not so easy for
me :(
Nor do I have (currently) access to a Linux
Title
-
DDIVRT-2011-36 Cybele Software, Inc. ThinVNC Product Suite Arbitrary File
Retrieval
Severity
High
Date Discovered
---
September 6th, 2011
Discovered By
-
Digital Defense, Inc. Vulnerability Research Team
Credit: r@b13$
Vulnerability Description
Title
-
DDIVRT-2011-34 Metropolis Technologies OfficeWatch Directory Traversal
Severity
High
Date Discovered
---
August 15, 2011
Discovered By
-
Digital Defense, Inc. Vulnerability Research Team
Credit: Chris Graham and r@b13$
Vulnerability Description
I was just about to ask the same, how old are yous, 13 or something ?
Dne 3.10.2011 17:16, Christian Sciberras napsal(a):
I'm not sure who's the the one acting like a child, the guy spamming
people with bullshit or the other one telling him to do everyone a
favor and shut up.
On Mon, Oct
Yeah, sure it is.
1.
if (fork() == 0)
2.
execl(/bin/sh, sh, -c, evil, 0);
3.
else
4.
wait(NULL);
This line shows that the code will run /bin/sh on local machine and it
has evil[] as a parameter. By decoding evil[], I can get
never suspected hahahahahahah
2011/10/3 Dan Dart dand...@googlemail.com
You need to be root to use raw sockets - yeah... I do...
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
How do you unsubscribe from this list, i have already been to the site
and entered my details and got the link and clicked on it, yet i am
still getting email!
On 03/10/11 16:27, Rove Monteux wrote:
I was just about to ask the same, how old are yous, 13 or something ?
Dne 3.10.2011 17:16,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA-2314-1secur...@debian.org
http://www.debian.org/security/ Nico Golde
Oct 3, 2011
On 10/3/2011 10:42 AM, Antony widmal wrote:
Using an external VPN provider to cover your trace clearly shows your
incompetency and your idiot assumption.
Trying to blame the VPN provider rather than accepting your mistake
and learning from it clearly show your 3 years old mentality.
Also,
On Mon, Oct 3, 2011 at 10:35 PM, Laurelai laure...@oneechan.org wrote:
On 10/3/2011 10:42 AM, Antony widmal wrote:
Using an external VPN provider to cover your trace clearly shows your
incompetency and your idiot assumption.
Trying to blame the VPN provider rather than accepting your mistake
On 10/3/2011 12:16 PM, Ferenc Kovacs wrote:
On Mon, Oct 3, 2011 at 10:35 PM, Laurelailaure...@oneechan.org wrote:
On 10/3/2011 10:42 AM, Antony widmal wrote:
Using an external VPN provider to cover your trace clearly shows your
incompetency and your idiot assumption.
Trying to blame the VPN
On 10/3/2011 12:21 PM, Antony widmal wrote:
If you're stupid enough to trust a cloud vpn, then you deserve to
get busted.
Dry your tears and grow the fuck up.
EOF.
On Mon, Oct 3, 2011 at 4:35 PM, Laurelai laure...@oneechan.org
mailto:laure...@oneechan.org wrote:
On 10/3/2011 10:42
If you're stupid enough to trust a cloud vpn, then you deserve to get
busted.
Dry your tears and grow the fuck up.
EOF.
On Mon, Oct 3, 2011 at 4:35 PM, Laurelai laure...@oneechan.org wrote:
On 10/3/2011 10:42 AM, Antony widmal wrote:
Using an external VPN provider to cover your trace
Darren,
There are places like codepad.org that let you compile/execute various
programming/scripting languages, of course you don't have the control/access
that you'd normally have but for some things - it may just be enough.
On Mon, Oct 3, 2011 at 11:41 AM, Darren Martyn
Nice.
Oh, i did not mean hackers and drugs, they are not really what I classify as
a hardcore, criminalised addict who is now at the point where the drug runs
them... most hard non-pc crimes, are this way.
Although, i know of many many people who abuse benzodiazepedines, and thats
where it can get
Wow, i am impressed jacqui, you are VERY very aware of the law,moreso than
me!
I have not seen that yet..well, not so good!@
I am impressed, because I dont really look at taking out the sites otr,
people who claim to be pros etc, and, reaally, i should never had began the
thread...altho, i saw he
Well ok, true that html is more secure.
I would rather run html2/3 , well 2 is the norm isnt it.. than php anyday.
good point out.
cheers,
xd
On 3 October 2011 23:51, SanguineRose sanguiner...@occultusterra.comwrote:
That is awesome. I approve of this 90s HTML code and bring back the
good old
Yes is legit,... however thats a backdoored copy i believe, the actual
'proper' , has a execl() type method... no shellcode, and, no evil ;)
On 4 October 2011 01:31, Darren Martyn d.martyn.fulldisclos...@gmail.comwrote:
I regularly trawl Pastebin.com to find code - often idiots leave some 0day
naw naw... really, it workx... pls exec and attack apaches ;')
lol.
On 4 October 2011 02:02, John Jacobs flamdu...@hotmail.com wrote:
http://packetstormsecurity.org/files/25728/w000t-shell.c.html
It's a trojan, based on the w00t-shell.c code; the shell code adds a
passwordless root
Hey Jeff,
I am glad there are people here who understand the need for real privacy
in the modern age.
The US Government has proven *repeatedly* that the more power it has the
less trustworthy it is especially when it comes to privacy concerns.
This is mainly aimed at Jeffs posting, I think i
On Mon, Oct 3, 2011 at 5:21 PM, Laurelai laure...@oneechan.org wrote:
On 10/3/2011 12:16 PM, Ferenc Kovacs wrote:
On Mon, Oct 3, 2011 at 10:35 PM, Laurelai laure...@oneechan.org wrote:
On 10/3/2011 10:42 AM, Antony widmal wrote:
Using an external VPN provider to cover your trace clearly
The media and such often gloss over the human aspects of an incident.
Bang, thats the thing that will get you behind jail, or no jail.
The press pushes it on, the people are always then arrested, because the
public need*answers* even when they do not understand much of the time what
exactly has
There's only 4 billion IP's to scan if he want to get all out of his
trick.
Synscan can do a subnet (class b) in ~3 minutes nowdays ;)
I would think he would find it.
i did a scan on a kit i found, root:barcelona123 , and, got like 100 boxes
in 10minutes of scanning, ofc, i looked up the IP
laurelai, this guiy is crazier than i first thought, altho i do agree that
this whole thread is now abit old and, only a few people are *really*
interested in the legal issues wich im trying to break through.
I do like how google does theyre security, Id like to hear why they do
accept a PoC as
Hrm interesting.. I do Index of /what-i-am-after , in some different ways
and usually, find many 'dumps' of interesting scanners/kits/whatever.. have
not read most of it...archived tars now.. anyhow... interesting to maybe
make a 'catcher' for these thi8ngs, i was once trying todo a sniffer for
Reminds me of Front Page 2.0 gen'd code.
lol, very true... it and a few other apps for web building, seem todo these
kind of muckups or rather, just tag in an idiotic manner...
pretty weird, I just stick with WP and hope i aint vuln ;p
cheers,
xd
On 3 October 2011 23:39, Dave
On 10/3/2011 4:29 PM, GloW - XD wrote:
There's only 4 billion IP's to scan if he want to get all out of his
trick.
Synscan can do a subnet (class b) in ~3 minutes nowdays ;)
I would think he would find it.
i did a scan on a kit i found, root:barcelona123 , and, got like 100
boxes in 10minutes
1 - 100 of 102 matches
Mail list logo