Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread James Smith
Well I have been in their irc chat rooms. A few of them are very Intelligent in Information Security. Well if you are only defining say #AntiSec- I would say about less then a third. As for the other 97% they just know how to attack and exploit vulnerabilities. From: Laurelai Sent: Wednesday, J

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Laurelai
On 1/11/12 1:21 AM, valdis.kletni...@vt.edu wrote: > On Tue, 10 Jan 2012 23:18:40 CST, Laurelai said: > >> real opportunities for a career and they are often right. Microsoft >> hired some kid who hacked their network, it is a safe bet he isn't going >> to be causing any trouble anymore. > How safe

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Valdis . Kletnieks
On Tue, 10 Jan 2012 23:18:40 CST, Laurelai said: > real opportunities for a career and they are often right. Microsoft > hired some kid who hacked their network, it is a safe bet he isn't going > to be causing any trouble anymore. How safe a bet, exactly? Safe enough to bet your business on it?

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Laurelai
On 1/11/12 1:15 AM, Kyle Creyts wrote: How many of those engaged in these attacks _could_ actually fix the vulns they exploit? What is a good "rough estimate" in your opinion? On Jan 11, 2012 12:47 AM, "Laurelai" > wrote: On 1/10/12 11:32 PM, James Smith wr

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Laurelai
On 1/10/12 11:32 PM, James Smith wrote: > Well I do agree with what you are stating. As I have seen incidents > like this happen to many times. > This mailing list is a big part of the IT Security community. > > > > -Original Message- From: Laurelai > Sent: Wednesday, January 11, 2012 1:18

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Laurelai
On 1/10/12 10:18 PM, Byron Sonne wrote: >> Don't piss off a talented adolescent with computer skills. > Amen! I love me some stylin' pwnage :) > > Whether they were skiddies or actual hackers, it's still amusing (and > frightening to some) that companies who really should know better, in > fact, do

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Byron Sonne
> Don't piss off a talented adolescent with computer skills. Amen! I love me some stylin' pwnage :) Whether they were skiddies or actual hackers, it's still amusing (and frightening to some) that companies who really should know better, in fact, don't. -- freebyron.org ___

[Full-disclosure] [SECURITY] [DSA 2385-1] pdns security update

2012-01-10 Thread Florian Weimer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2385-1 secur...@debian.org http://www.debian.org/security/Florian Weimer January 10, 2012

[Full-disclosure] ZDI-12-009 : Citrix Provisioning Services Stream Service 0x40020000 Remote Code Execution Vulnerability

2012-01-10 Thread ZDI Disclosures
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ZDI-12-009 : Citrix Provisioning Services Stream Service 0x4002 Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-009 January 10, 2012 - -- CVE ID: - -- CVSS: 10, AV:N/AC:L/Au:N/C:C/I:C/A:C - -- Affected Ven

[Full-disclosure] ZDI-12-011 : Novell Netware XNFS caller_name xdrDecodeString Remote Code Execution Vulnerability

2012-01-10 Thread ZDI Disclosures
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ZDI-12-011 : Novell Netware XNFS caller_name xdrDecodeString Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-011 January 10, 2012 - -- CVE ID: - -- CVSS: 10, AV:N/AC:L/Au:N/C:C/I:C/A:C - -- Affected Vendors:

[Full-disclosure] ZDI-12-010 : Citrix Provisioning Services Stream Service 0x40020006 Remote Code Execution Vulnerability

2012-01-10 Thread ZDI Disclosures
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ZDI-12-010 : Citrix Provisioning Services Stream Service 0x40020006 Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-010 January 10, 2012 - -- CVE ID: - -- CVSS: 10, AV:N/AC:L/Au:N/C:C/I:C/A:C - -- Affected Ven

[Full-disclosure] ZDI-12-008 : Citrix Provisioning Services streamprocess.exe vDisk Name Parsing Remote Code Execution Vulnerability

2012-01-10 Thread ZDI Disclosures
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ZDI-12-008 : Citrix Provisioning Services streamprocess.exe vDisk Name Parsing Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-008 January 10, 2012 - -- CVE ID: - -- CVSS: 10, AV:N/AC:L/Au:N/C:C/I:C/A:C - -- A

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Jeffrey Walton
On Tue, Jan 10, 2012 at 7:58 AM, Ferenc Kovacs wrote: > Albeit you didn't addressed to me, but I also called them kiddies, so here > are my thoughts. >> >> Valdis you make me curious - how do you know that most are kids, and >> script kiddies? > > Valdis didn't stated that the majority of the hack

[Full-disclosure] [ MDVSA-2012:003 ] apache

2012-01-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:003 http://www.mandriva.com/security/ _

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Ferenc Kovacs
Albeit you didn't addressed to me, but I also called them kiddies, so here are my thoughts. > > Valdis you make me curious - how do you know that most are kids, and > script kiddies? Valdis didn't stated that the majority of the hackers are kids, or script kiddies, what he did stated: >> Perha

Re: [Full-disclosure] Astaro Security Gateway v8.1 - Input Validation Vulnerability

2012-01-10 Thread Ferenc Kovacs
On Mon, Jan 9, 2012 at 3:15 PM, Markus Hennig wrote: > Hi all, > > Astaro hereby confirms the described vulnerability. > > In spite of the text below it is not remote exploitable, but needs a valid > administration account to access the web configuration interface called > "WebAdmin". > if it is

[Full-disclosure] SafeSEH+SEHOP all-at-once bypass explotation method principles

2012-01-10 Thread x90c
Hello, I wrote this to introduce a small paper for my exploitation method of SafeSEH+SEHOP bypass in Oct, 2010. (http://www.x90c.org/SEH all-at-once attack.pdf, http://www.exploit-db.com/exploits/15184) Sadly it's not portable. But leave some thoughts about the method. - SafeSEH+SEHOP all-at-onc

[Full-disclosure] p0f3 release candidate

2012-01-10 Thread Michal Zalewski
Hi folks, I wanted to share the news of p0f v3, a complete rewrite and redesign of my passive fingerprinting tool. == Synopsis == P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communica