It's OK anybody start vulnerability research from script(php or perl),
but it's not good for someone to stay at script kid level, huh?
-
mailto:[EMAIL PROTECTED]
http://www.wang-labs.com
2006/10/21, Gadi Evron [EMAIL PROTECTED]:
On Fri, 20 Oct 2006, Dr. Neal Krawetz wrote:
On Fri Oct 20
well~, that's interesting~~
--
mailto:[EMAIL PROTECTED]
2006/9/30, Peter Dawson [EMAIL PROTECTED]:
I had to share this wierd err
http://www.google.com/reader/next?go=noitems
--
http://peterdawson.typepad.com
PeterDawson Home of ThoughtFlickr's
This message is printed on Recycled
hi there
i've collected a lot of pretty good security site, FYI.
Please see my blog here:
http://lwangdotorg.spaces.live.com/Lists/cns!C2277416A864A62F!118/
--
mailto:[EMAIL PROTECTED]
http://www.lwang.org
2006/8/11, KT [EMAIL PROTECTED]:
what are they? I am tasked with keeping up on
your email address is interesting, googlemail.com, not gmail.com? are
you from google?
--
mailto:[EMAIL PROTECTED]
http://www.lwang.org
2006/8/6, stop killing civilians [EMAIL PROTECTED]:
LIKE SAY
___
Full-Disclosure - We believe in it.
Charter:
In China, if you google some sensitive word, your ip will be block for
a while to visit google, these words includes government leader's
name, political sensitve words and may some others i didn't try.
--
mailto:[EMAIL PROTECTED]
Have a Good Day
___
looks like crazy for money...
2006/8/2, Thierry Zoller [EMAIL PROTECTED]:
Reads (partially) like a ransom :
http://www.matousec.com/purchase.php
--
http://secdev.zoller.lu
Thierry Zoller
Fingerprint : 4813 c403 58f1 1200 7189 a000 7cf1 1200 9f89 a000
Thank you, duke~~
2006/7/26, Duke [EMAIL PROTECTED]:
i`ve send your mail to my spam friends,
and post it to spam forums.
wait for a half billion mail gift )
- Original Message -
From: [EMAIL PROTECTED]
To: Cardoso [EMAIL PROTECTED]
Cc: Full Disclosure
hi Guys:
I am collecting spam for research using the mailbox
[EMAIL PROTECTED] I have try a lot to spread this mailbox to get
more spam. But I can only receive about 60 spams per day. Could
anybody help me to get more spam at [EMAIL PROTECTED]
Thanks in advance!
--
http:www.lwang.org
2006/7/24, [EMAIL PROTECTED] [EMAIL PROTECTED]:
On Mon, 24 Jul 2006 15:58:13 +0800, Alice Bryson said:
I am collecting spam for research using the mailbox
[EMAIL PROTECTED]
Step one: Convince us you're really Alice Bryson and this isn't an
attempt to beseige Alice with spam
Yes, i
2006/7/24, Nigel Horne [EMAIL PROTECTED]:
Alice Bryson wrote:
hi Guys:
I am collecting spam for research using the mailbox
[EMAIL PROTECTED] I have try a lot to spread this mailbox to get
more spam. But I can only receive about 60 spams per day. Could
anybody help me to get more spam
hi Eaton
The secret number you sent to me is 2255577441073564473.
Could you send spam to [EMAIL PROTECTED] now? Thank you for your help.
2006/7/25, Brian Eaton [EMAIL PROTECTED]:
On 7/24/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Yes, she could have hijacked the real Alice's
Thank you Aaron, please sent them to me or put online. i will check
them one by one.
Alice,
I can parcel up 6500 odd spams in a zip or gzip file for you, just specify
which.
I use SpamPal, on Windows :-
http://www.spampal.org/
Which identifies 95% of them using a number of DNS
hi ad,
that's sounds a good idea, let me try it.
--original message--
not needed me I get 200-300 each days by simply posting here or bugtraq
, juste replace what you did put as Alice Bryson with your email , it
shows like To: [EMAIL PROTECTED] [EMAIL PROTECTED] ,
and enjoy the spam :)
Alice
hi there
http://www.lwang.org provide free online code and decode service
website, including base64, hashes, cipher analyze and etc.
--
mailto:[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter:
Yes, i agree that a Windows application with many kinds of encoding
and decoding algorithms all-in-one is good. but web service feel more
convenience some time when you don't want install something.
thanks.
2006/7/21, Roman Medina-Heigl Hernandez [EMAIL PROTECTED]:
Alice Bryson escribió:
hi
hi Guys:
I'm analyzing a protocol, for debugging purpose, i need to do some
modify to normal packet which i have captured.
I'm now use Ethereal to capture the packets, it is a very good to
see the packets, but i can't modify the packets as i want.
I need a tool that can block and capture
you like spam? let me help you!-- Homepage: http://www.lwang.orgmailto:[EMAIL PROTECTED]
Thu Jun 22 03:55:24 2006, [EMAIL PROTECTED] [EMAIL PROTECTED]:
SPAM ME AT [EMAIL PROTECTED] BY SPOOFING MAIL FROM
full-disclosure@lists.grok.org.ukSPAM ME AT [EMAIL PROTECTED] BY SPOOFING MAIL FROM
hi
http://www.Google.com can not access these days in China? Is
google's problem or other thing? Is there anyone know why?
--
Homepage: http://www.lwang.org
mailto:[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter:
Illegal or not may depend on local law. but vulnerability scan is
dangerous, it has some protential DoS possibility, even if the scanner
is configured as a safety-scan.
So, make sure you will not be catched.
2006/6/2, Nightfall Nightfall [EMAIL PROTECTED]:
Is it illegal if I perform a
i think you may exploit this vuln and get several SSN, and then email
to the institute to show the severity of your report.
2006/4/22, CrYpTiC MauleR [EMAIL PROTECTED]:
If there is a security hole in a site of an educational institute that
exposes social security numbers and they have not
[EMAIL PROTECTED]:
Chinese government people and Chinese technical people are different,
you must be aware of this.
2006/4/17, [EMAIL PROTECTED] [EMAIL PROTECTED]:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[EMAIL PROTECTED] wrote:
information security',
Now you must leave. By by
hi there:
When I use IE 6 web browser, Apache 1.3 accept this kind of request
but Apache 2.0 doesn't.
When I use IE 7 web browser, Apache 2.0 also accept this kind of request.
2006/3/15, gboyce [EMAIL PROTECTED]:
On Tue, 14 Mar 2006, Chris Umphress wrote:
On 3/14/06, gboyce [EMAIL PROTECTED]
hi there
It is very strange thing. I have done the following tries.
trying result
http://172.21.12.250success
http://2887060730 failed
http://2887060730/ failed
telent 2887060730 80 failed
ping 2887060730
Yes, this is only a way of expressing an IP address.
Try the following C code, you would find out the answer.
#include stdio.h
#include sys/socket.h
#include netinet/in.h
#include arpa/inet.h
int main()
{
printf(%lu\n, htonl(inet_addr(83.211.166.179)));
return 0;
}
it prints out
BTW, this kind of ip address would not always work. i try to use
http://2887060730/ to access an internal web server
http://172.21.12.250, but failed.
It said 400 bad request.
I use Windows XP IE 6, web server is Apache on Windows 2003, does
anyone know why?
2006/3/11, Jianqiang Xin [EMAIL
hi,
have you try spike?
http://www.immunitysec.com
2006/3/9, Q Beukes [EMAIL PROTECTED]:
Hey,
Anyone know of any tools similiar to FuzzyFiles, FuzzySniffAndSend and
PeachFuzz
but for the linux/bsd platform?
Above mentioned can be found at:
hi, there
Most of vulnerabilities are also remotely exploitable although
enhanced security configuration and firewall enabled. For example, an
IE flaw will cause pc's registry modified when the host browse some
malicious website.
Client-Server model is a considerable solution. But our
hi there:
I'm engaged in design a Remote Vulnerability Scanner. We have done
a non-preemptive multithread engine and written almost 2000
vulnerability plugins. Each one of plugins according to one CVE ID.
After we done these work, we get confused and don't know what to
do. first, although
28 matches
Mail list logo