GSM firmware is still not open-source though (as that would make
phone not suitable for legal usage in USA)
I'd like to see a law link that says you cannot legally use your own
open source GSM compliant stack to communicate over a GSM network.
Since the GSM f/w controls a radio, and thus
GSM firmware is still not open-source though (as that would make
phone not suitable for legal usage in USA)
I'd like to see a law link that says you cannot legally use your own
open source GSM compliant stack to communicate over a GSM network.
Since the GSM f/w controls a radio, and thus
McAfee just release a patch for their Host IPS and VirusScan Enterprise.
See https://kc.mcafee.com/corporate/index?page=contentid=SB10034
Notice no CVE number or US Cert notification info. So when did this
security vendor decide that they don't need to tell US Cert about a
vulnerability that
In Re(action to): [Full-disclosure] Full-Disclosure Digest, Vol 89, Issue 15
suspicion of rootkit (Alexandru Balan)
On Thu, Jul 12, 2012 at 1:02 PM, phocean 0...@phocean.net wrote:
* If only you stopped with this weird english.
After analysis of more than 2x(n-1) of MustntLive postings,
I
The libary system from the university Regensburg is vulnerable:
http://rzblx10.uni-regensburg.de/dbinfo/dbliste.php?bib_id=wlbcolors=15ocolors=40lett=ccollid=%27
http://pastebin.com/4Z57qUky
___
Full-Disclosure - We believe in it.
Charter:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
hey guys,
thought the world needed this leaked, if only so j35t3r cannot
continue his nonsense with his 31337 0day tool
http://pastebin.com/raw.php?i=MLFs5m1K
Thats the sauce :)
Have fun, and I will be watching this to see when it is patched.
BTW,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dan seems to be on the money here, and remember - if the attacker
can get you to click on their file or open it, you are fscked
anyways.
Hence, it is moreso a way to hide your .exe unless I am very
mistaken...
(again, I hope I am doing the CC/BCC
modified
(read as: he added a GUI) version...
Fellow Full Disclosure Users, I apologise if my CC'ing method is
incorrect, just trying to ensure we all get it :)
On Fri, 08 Jul 2011 19:55:02 +0100 Laurelai Storm
laure...@oneechan.org wrote:
Oh snap.
On Jul 8, 2011 1:52 PM, anonymous-t...@hushmail.me
more effective against
live targets than this technique.
On Fri, 08 Jul 2011 20:42:57 +0100 Laurelai laure...@oneechan.org
wrote:
On 7/8/2011 1:58 PM, anonymous-t...@hushmail.me wrote:
Laurelai, nice of you to join us.
How this tool seems to work is it just routes via a literal ton
of
TOR
Vulnerable URL
/d_wnl_ads/?did=14dc=1gid=28
Users:
demolaymain
demolaystore
phpmyadmin
root
Tables from DEMOLAY database
ADVISOR_TYPE..WORK_GROUP_PERMISSION (75 tables)
This ought to be fixed, SWIM tells me there's tons of personal stuff in
these tables.
I prefer that crap many more:
http://www.voltairenet.org/en
¤¤
Sounds much like a marketing operations
http://www.pbs.org/wgbh/nova/spyfactory/
-naif
http://infosecurity.ch
This anonymous
this has to be bullshit.
This anonymous email message was sent from:
http://CyberAtlantis.com/anonymous_email.php
Sorry, as our system is 100% ANONYMOUS we cannot assist you in tracking down
the
sender as we have NEITHER
DNA (Daily News Analysis) epaper Server Hacked on 4th Anniversary @
http://sky.net.in/dna-india-epaper-server-hacked/
This anonymous email message was sent from:
http://CyberAtlantis.com/anonymous_email.php
Sorry, as our
On Fri, Feb 6, 2009 at 6:01 PM, rembrandt rembra...@jpberlin.de wrote:
Is somebody aware of security contacts at Netgear or D-Link?
Products of those vendors do suffer from possible DoS, propably default
hardcoded root accounts (D-Link) and other issues.
[...]
Kind regards,
Rembrandt
On Thu, Jan 15, 2009 at 4:11 AM, Peter Ferrie peter.fer...@gmail.com wrote:
I finally made it to the penultimate level of Important enough to be
spoofed
So what's the level above that?
Capable of using Word
___
Full-Disclosure - We believe in
On Mon, Jan 12, 2009 at 9:56 PM, Dante Lanznaster dant...@gmail.com wrote:
Ladies and gentlemen,
I have a simple request. A lot of people here has already added the
usual shitbags to /dev/null, I added them myself recently too. What I
ask is simple: could you please stop feeding the trolls
- Acceptable Content -
Any information pertaining to vulnerabilities is acceptable, for
instance announcement and discussion thereof, exploit techniques and
code, related tools and papers, and other useful information.
Vulnerability is the susceptibility to physical or emotional injury or
Dear Martin,
Fuck off.
Best regards,
anonymouspimp
--
lots of bullshit that no non-self-conceited individual would put as a signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and
On Mon, Jan 5, 2009 at 3:35 PM, Gary Wilson dra...@dragons.org.uk wrote:
Having had enough of the non-topic junk this list has become recently, I
went to unsub, but it seems the SSL cert is not valid/trusted.
For the mods, I guess:
Secure Connection Failed
lists.grok.org.uk uses an
On Tue, Jan 6, 2009 at 2:45 AM, Tim tim-secur...@sentinelchicken.org wrote:
Alright, enough of the off-topic crap. Back to the topic, being that
lists.grok.co.uk should get a non-self-signed cert. The cancer
infesting fd and the merits of CAs are irrelevant to the thread.
Oh, ok, so maybe
When will this thread die?
Bitching at each other will prove nothing: beliefs in topics such as
national identity cannot be swayed by mere words, especially in the
form of argument.
Now, everyone stfu.
kthnxbai
___
Full-Disclosure - We believe in it.
What kind of a skiddie fuck sends every phished account to his email?
This is the kind of phish every 12 year old kid on both sides of
Turkey uses. Is this supposed to make you seem smart?
gtfo of fd.
___
Full-Disclosure - We believe in it.
Charter:
2008/12/21 Kristo pher krist...@mail.ru:
You need to obscure the images you post to FD better my friend. For example,
I can tell that you are a PhD student at University College London, Faculty
of Biomedical Sciences, Institute of Neurology Department of Brain Repair
Rehabilitation and
On Fri, Dec 19, 2008 at 2:51 AM, xyberpix xyber...@xyberpix.com wrote:
Thanks to all who responded on this one, I've managed to contact someone.
xyberpix
Maybe next time you could manage to google it your-fucking-self, and
not use your work email while you're at it. A wannabe security firm
On Fri, Dec 19, 2008 at 7:28 PM, Andy McKnight andy.mckni...@gmail.com wrote:
This had less of the couldn't find and more of the we really want
everyone to know that we've a reason to find.
2008/12/19 anonymous pimp anonymousp...@gmail.com
A wannabe security firm (xyberpix.com) not able
On Fri, Dec 19, 2008 at 12:11 AM, Chris Pritchard
mailingl...@brainiacghost.co.uk wrote:
Reporting Security Issues
If you are a Google user and have a security issue to report regarding your
personal Google account, please visit our contact page. This includes
password problems, login issues,
And that, my friends, is the basis of all Christianity.
No it isn't.
Christianity is... based on the teachings of Jesus Christ [0]
[0] http://www.bbc.co.uk/religion/religions/christianity/
--
anonymouspimp
___
Full-Disclosure - We believe in it.
You're proposing them? You're suggesting them?
There's no question, what do you expect us to answer privately?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia -
for interested pplz (windows only)
mail me in private.
Let's look at what he's doing. He's offering something for free to a
bunch of people he doesn't know. Not only that, but he wrote it
pplz. I think it's safe to assume that he's 12 and discovered
ardamax or something similar and thinks that
Don't you already have your own mailing list? Go there.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Your Bluetooth nonsense is getting kind of boring.
By the way, you should check out security more close to home:
hxxP://secdev.zoller.lu/
website Vulnerable to:
1 PHP Tend_Hash_Del_Key_Or_Index vulnerability
2 PHP HTML Entity Encoder Heaper Overflow Vulnerability
3 Unfiltered Header Injection in
, with the backdoor removed, I will post here the name of the
company or person with the accompanying code proving this backdoor.
I will not be responding to comments regarding this issue.
--I wish to remain anonymous, and this email account is not the email
account I normally use to post
A very serious remote denial of service was recently patched in asterisk
some limited information on the problem can be found here
http://asterisk.org/taxonomy/term/32
the bug exists in the asterisk SIP channel driver, anyone using asterisk
running SIP is advised to patch their systems as soon
Security Advisory
Xbox 360 Hypervisor Privilege Escalation Vulnerability
Release Date:
February 28, 2007
Author:
Anonymous Hacker [EMAIL PROTECTED]
Timeline:
Oct 31, 2006 - release of 4532 kernel, which is the first version
containing the bug
Nov 16, 2006 - proof
it have disappeared in the deep void of an infamous character-device
node with major and minor number 1 respectively 3.
Please help to locate this missing antique.
It's a picture similar to [3], but a less happy turkey with its head and
body pointing to the left.
Best regards,
The Anonymous
heres all i had on my hd
spread any you have
http://filexoom.com/files/2006/11/8/42966/TOKENSRC.zip
http://filexoom.com/files/2006/11/8/42966/secdsrc.zip
http://filexoom.com/files/2006/11/8/42966/ntfsisrc.zip
http://filexoom.com/files/2006/11/8/42966/fmifs.zip
www.AnonymousSpeech.com,
the worlds leading anonymous email provider.
***
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia
On 4/1/06, Mike Nice [EMAIL PROTECTED] wrote:
1) Any different social engineering besides login to your bank
account. For example, Chase will pay you $20 to fill out a short
survey! (of course, after filling out the survey you must provide
your debit card number or account login information
is likely to happen, so
we'll have to deal with phish forever. That's just like in the
physical world. After thousands of years, we still have people
performing con jobs.
-- Although I've found many nuts, I'm back to being anonymous,
___
Full-Disclosure
A Vendor Information
http://www.microsoft.com
8D~
Contact
Something Anonymous [EMAIL PROTECTED]
1-888-565-9428
GSAE SSP-CNSA CAP SSCP
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full
This thread is fascinating...but a bit misguided. Consider
that somone's home computer in the US is used for their finances (e.g.
Quicken), tax returns, and other applications. Think of the
wealth of identity-related information in those applications. If
the computer is compromised, the
I see SANS has put the Mac OS X in it's Top 20 list of
vulnerabilities. Not parts of the OS, and not misconfigurations,
but ALL of the Mac OS X. Is that OS really a vulnerability of
such magnitude that it deserves a Top 20 listing?
I'm puzzled, SANS remediation is merely patch, turn on the
At the risk of this discussion running far afield, I think Jason and
Paul may be talking past each other. My understanding is that
Jason has a point -- corporations can't suffer the same punishment as
individuals. They aren't deprived of their freedom in
prisons. The most common corporate
http://slashdot.org/comments.pl?sid=168695cid=14063591
it can only occur if a user knowingly provides their credentials,
elhacker will next give us all online banking sites vulnerable to
valid un/pw attack
http://www.elhacker.net/gmailbug/english_version.htm
Someone asked for the video of Cisco riping shit out:
http://42.pl/lynn/cisco.mov
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
45 matches
Mail list logo