Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-30 Thread Christian Sciberras
No, it follows the fact that vengeance (the fuck you Byron mentioned) isn't fruitful to remedy the situation. On Mon, Jan 30, 2012 at 8:54 AM, Mike Hale eyeronic.des...@gmail.comwrote: What you said doesn't follow. Making a digital copy isn't burning down a business. The analogy

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-30 Thread Mike Hale
Not necessarily. Look at the effects of people posting DeCSS and the HDDVD keys a while back. The industry ended up giving in precisely because people said, en masse, fuck off. On Mon, Jan 30, 2012 at 12:05 AM, Christian Sciberras uuf6...@gmail.com wrote: No, it follows the fact that vengeance

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-30 Thread Christian Sciberras
Uhm, that was a ridiculous situation anyway (@illegal primes). So lets leave it at 'not necessarily'. On Mon, Jan 30, 2012 at 9:08 AM, Mike Hale eyeronic.des...@gmail.comwrote: Not necessarily. Look at the effects of people posting DeCSS and the HDDVD keys a while back. The industry

Re: [Full-disclosure] Exploit Pack - New video - Ultimate 2.1

2012-01-30 Thread Peter Osterberg
This is Juan Sacco's new spam puppet. He just posted the same thing using his real name elsewhere. nore...@exploitpack.com skrev: Exploit Pack - New video! Release - Ultimate 2.1 Check it out! http://www.youtube.com/watch?v=4TrsFry13TU Exploit Pack Team http://exploitpack.com

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-30 Thread Zach C.
Just to be clear, what's been done in the name of intellectual property protection is fucking ridiculous. I just do not see how getting something someone put a non-zero value of work and materials into without even so much as asking or being given permission from the person who made it is somehow

Re: [Full-disclosure] Exploit Pack - New video - Ultimate 2.1

2012-01-30 Thread Mario Vilas
I fear the day when he finally succeeds in making enough people believe he's a real security researcher. I wish attrition.org did a piece on him in the charlatans section. 2012/1/30 Peter Osterberg j...@vel.nu: This is Juan Sacco's new spam puppet. He just posted the same thing using his real

[Full-disclosure] eBank IT Online Banking - Multiple Web Vulnerabilities

2012-01-30 Thread resea...@vulnerability-lab.com
Title: == eBank IT Online Banking - Multiple Web Vulnerabilities Date: = 2012-01-26 References: === http://www.vulnerability-lab.com/get_content.php?id=313 VL-ID: = 313 Introduction: = As a leading provider of innovative online banking software solutions,

[Full-disclosure] ME Monitoring Manager v9.x; v10.x - Multiple Vulnerabilities

2012-01-30 Thread resea...@vulnerability-lab.com
Title: == ME Monitoring Manager v9.x; v10.x - Multiple Vulnerabilities Date: = 2012-01-27 References: === http://www.vulnerability-lab.com/get_content.php?id=115 VL-ID: = 115 Introduction: = Mit dem ManageEngine Applications Manager können IT-Administratoren

[Full-disclosure] FAA US Academy (AFS) - Auth Bypass Vulnerability

2012-01-30 Thread resea...@vulnerability-lab.com
Title: == FAA US Academy (AFS) - Auth Bypass Vulnerability Date: = 2012-01-28 References: === http://vulnerability-lab.com/get_content.php?id=171 VL-ID: = 171 Introduction: = This is a FAA computer system. FAA computer systems are provided for the

[Full-disclosure] honeypots

2012-01-30 Thread lallantada
i am looking for a good honeypot thanks___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] FatCat Auto SQLl Injector

2012-01-30 Thread Julius Kivimäki
How does this compete with already existing tools? 2012/1/28 sandeep k sandeepk.l...@gmail.com This is an automatic SQL Injection tool called as FatCat, Use of FatCat for testing your web application and exploit your application more deeper. FatCat Features that help you to extract the

Re: [Full-disclosure] ..twitter rights

2012-01-30 Thread Michael Straughan
Twitter said recently they would start deleting posts in countries that require it but the tweets would still be visible to the rest of the world http://www.cnn.com/2012/01/27/tech/twitter-deleting-posts/index.html On Jan 28, 2012 1:40 PM, RandallM randa...@fidmail.com wrote: is posting

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-30 Thread Julius Kivimäki
Of course I wouldn't, downloading a car would be like stealing a car. Piracy is horrible and all the boats used by the pirate scum should be taken away. 2012/1/28 Laurelai laure...@oneechan.org On this topic i saw this https://thepiratebay.org/torrent/6960965/1970_Chevelle_Hot-Rod_3d_model ,

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-30 Thread Julius Kivimäki
DDoS their boats. 2012/1/28 Laurelai laure...@oneechan.org On 1/28/2012 3:13 PM, Julius Kivimäki wrote: Of course I wouldn't, downloading a car would be like stealing a car. Piracy is horrible and all the boats used by the pirate scum should be taken away. 2012/1/28 Laurelai

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-30 Thread Alex Buie
On Sat, Jan 28, 2012 at 5:41 PM, Benjamin Kreuter ben.kreu...@gmail.com wrote: The best compromise I can think of is to treat noncommercial copyright infringement like a parking violation:  you get a ticket for some small but annoying amount of money. This is the best solution I've seen

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-30 Thread goatropinbastards
Saw this subject on the work email. Follow this list to learn random stuff ans stay informed, so thanks for all your posts and such. Also do the music thing, and I can tell you that if you ask ten musicians who write and record their own music, you'll get ten different answers. From

[Full-disclosure] [ GLSA 201201-18 ] bip: Multiple vulnerabilities

2012-01-30 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201201-18 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-disclosure] [ GLSA 201201-19 ] Adobe Reader: Multiple vulnerabilities

2012-01-30 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201201-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-disclosure] Fw: honeypots

2012-01-30 Thread Jerry dePriest
winnie the pooh would know... (had to) bma - Original Message - From: lallant...@tvazteca.com.mx To: J. von Balzac Cc: Full Disclosure ; Security Basics ; listbou...@securityfocus.com Sent: Friday, January 27, 2012 12:56 PM Subject: [Full-disclosure] honeypots i am looking for a

[Full-disclosure] Fw: Fw: honeypots

2012-01-30 Thread Jerry dePriest
http://www.sans.org/security-resources/idfaq/honeypot3.php good paper on how to build your own and some links to commercial products. Sorry for the pooh add em. Still recovering from open heart surgery and the meds get to me... bma - Original Message - From: Jerry dePriest To:

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-30 Thread Valdis . Kletnieks
On Mon, 30 Jan 2012 01:22:23 PST, Zach C. said: (Fair use being the main exception there, but fair use usually implies something distinctive being done to the work, too, as opposed to minor editing/shitty encoding. Feel free to correct!) Two of the major areas of fair use *are* minor

Re: [Full-disclosure] Fw: Fw: honeypots

2012-01-30 Thread Justin Klein Keane
In terms of SSH honeypots Kojoney (http://kojoney.sourceforge.net/) is very good but is sort of abandoned, so be prepared to do your own customization. I hear very good things about Kippo (https://code.google.com/p/kippo/) as well. For HTTP I ran Glastopf (http://glastopf.org/) for a while but

Re: [Full-disclosure] Fw: Fw: honeypots

2012-01-30 Thread Julius Kivimäki
Here is a short step by step guide on how to make a honeypot. 1.Acquire a pot, refer to some other guide on how to do this. 2.Acquire some honey, refer to some other guide on how to do this. 3.Put honey in pot, refer to some other guide on how to do this. 4.Congratulations you now have a

[Full-disclosure] Advisory: sudo 1.8 Format String Vulnerability

2012-01-30 Thread joernchen of Phenoelit
Hi, FYI, see attached. cheers, joernchen -- joernchen ~ Phenoelit joernc...@phenoelit.de ~ C776 3F67 7B95 03BF 5344 http://www.phenoelit.de ~ A46A 7199 8B7B 756A F5AC Phenoelit Advisory wir-haben-auch-mal-was-gefunden #0815 +--++ [ Authors ] joernchen joernchen () phenoelit de

Re: [Full-disclosure] honeypots

2012-01-30 Thread Vipul Agarwal
Hi there, You may first need identify the purpose of using it. - If you want to collect malwares exploiting Windows vulnerabilities, you've Nepenthes which is a low-interaction honeypot. It can be easily installed in Debian from the official repo. - If you're looking something to

Re: [Full-disclosure] Advisory: sudo 1.8 Format String Vulnerability

2012-01-30 Thread Henri Salo
On Mon, Jan 30, 2012 at 02:56:26PM +0100, joernchen of Phenoelit wrote: Hi, FYI, see attached. cheers, joernchen Reported to Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657985 - Henri Salo ___ Full-Disclosure - We believe in it.

Re: [Full-disclosure] Fw: Fw: honeypots

2012-01-30 Thread Dave
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Played with this for a year or so.. It's OSS easy to use and understand, uses recognised components, easy to hack and bend to your whim. http://www.honeynet.org https://projects.honeynet.org/honeywall/ http://www.honeynet.pk/honeywall/roo/index.htm

Re: [Full-disclosure] Advisory: sudo 1.8 Format String Vulnerability

2012-01-30 Thread Henri Salo
On Mon, Jan 30, 2012 at 02:56:26PM +0100, joernchen of Phenoelit wrote: Hi, FYI, see attached. cheers, joernchen -- joernchen ~ Phenoelit joernc...@phenoelit.de ~ C776 3F67 7B95 03BF 5344 http://www.phenoelit.de ~ A46A 7199 8B7B 756A F5AC This seems to be CVE-2012-0809 and

[Full-disclosure] ZDI-12-019 : IBM SPSS mraboutb.dll ActiveX Control SetLicenseInfoEx Method Remote Code Execution Vulnerability

2012-01-30 Thread ZDI Disclosures
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ZDI-12-019 : IBM SPSS mraboutb.dll ActiveX Control SetLicenseInfoEx Method Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-019 January 30, 2012 - -- CVE ID: CVE-2012-0188 - -- CVSS: 7.5,

[Full-disclosure] ZDI-12-020 : IBM SPSS VsVIEW6.ocx ActiveX Control Multiple Methods Remote Code Execution Vulnerability

2012-01-30 Thread ZDI Disclosures
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ZDI-12-020 : IBM SPSS VsVIEW6.ocx ActiveX Control Multiple Methods Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-020 January 30, 2012 - -- CVE ID: CVE-2012-0189 - -- CVSS: 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P -

Re: [Full-disclosure] Advisory: sudo 1.8 Format String Vulnerability

2012-01-30 Thread nicolas vigier
On Mon, 30 Jan 2012, Henri Salo wrote: On Mon, Jan 30, 2012 at 02:56:26PM +0100, joernchen of Phenoelit wrote: Hi, FYI, see attached. cheers, joernchen -- joernchen ~ Phenoelit joernc...@phenoelit.de ~ C776 3F67 7B95 03BF 5344 http://www.phenoelit.de ~ A46A 7199 8B7B

[Full-disclosure] [SECURITY] [DSA 2398-1] curl security update

2012-01-30 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2398-1 secur...@debian.org http://www.debian.org/security/Moritz Muehlenhoff January 30, 2012

Re: [Full-disclosure] Advisory: sudo 1.8 Format String Vulnerability

2012-01-30 Thread root
Beautiful would have become Like a winter blossom Died too soon On 01/30/2012 10:56 AM, joernchen of Phenoelit wrote: Hi, FYI, see attached. cheers, joernchen ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] VMSA-2012-0001 VMware ESXi and ESX updates to third party library and ESX Service Console

2012-01-30 Thread VMware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 -- VMware Security Advisory Advisory ID: VMSA-2012-0001 Synopsis:VMware ESXi and ESX updates to third party library and ESX Service Console Issue