Re: [Full-disclosure] HP Tru64 dtmail bug - Really exploitable?

2006-10-22 Thread Dude VanWinkle
On 10/22/06, K F (lists) [EMAIL PROTECTED] wrote: Where were the politics? I was simply stating the facts. -KF crap, trolls. I just responded to the same person or one of his friends who disputed the usage of the word their.. damn It seems to be trying to get a response with a one liner that

Re: [Full-disclosure] Ask for spam...

2006-10-16 Thread Dude VanWinkle
On 10/16/06, Michael Holstein [EMAIL PROTECTED] wrote: Here's what I did when researching the same thing ... Google free stuff. Find a page with thousands of free offers. Fill one out and check *every* box. Reply to whatever confirm emails come in. Technically thats not spam. since you

Re: [Full-disclosure] UNOFFICIAL ZERT PATCH CAUSES NYC PLANECRASH

2006-10-14 Thread Dude VanWinkle
On 10/13/06, Turgut Baumann [EMAIL PROTECTED] wrote: Welcome to RACISM FULL-DISCLOSURE. What was this list supposed to be? An Chatbox for Stupid White american male, with their CNN-view-of-life, stupid nazi scum, with the old, lame arguments about jews, colored people and the true Herrenrasse,

Re: [Full-disclosure] Firefox Vulnerabilities FAKED

2006-10-03 Thread Dude VanWinkle
if [EMAIL PROTECTED] is actually Mischa Spiegelmock i'll eat my two week old tighty whities on youtoube.com and about the claim that it is a fake: The JavaScript issue appears to be a real vulnerability, Window Snyder, Mozilla's security chief, said after watching a video of the presentation

Re: [Full-disclosure] Firefox Vulnerabilities FAKED

2006-10-03 Thread Dude VanWinkle
. - Original Message - From: Pink Hat To: Dude VanWinkle Cc: [EMAIL PROTECTED] ; full-disclosure@lists.grok.org.uk Sent: Wednesday, October 04, 2006 12:16 AM Subject: Re: [Full-disclosure] Firefox Vulnerabilities FAKED Seeing how you obviously can't trust a boy to do a man's job

Re: [Full-disclosure] VML Exploit vs. AV/IPS/IDS signatures

2006-09-26 Thread Dude VanWinkle
Has anyone tested these against the (very) recent MS patch? -JP On 9/26/06, H D Moore [EMAIL PROTECTED] wrote: Nice work Aviv! All of these methods, along with a few extras, are implemented in the Metasploit 2.6 version of this module. Last I checked, not a single AV or IPS could pick it up.

Re: [Full-disclosure] AFS - The Ultimate Sulution? -- What is the point?

2006-09-16 Thread Dude VanWinkle
why not just use a dumb terminal if you are going to go to all that trouble? -JP On 9/15/06, Dean Pierce [EMAIL PROTECTED] wrote: There is the convenience issue of the speed that the image transfers across the network. There is also the issue that infected workstations may be collecting

Re: [Full-disclosure] 0day IE6? ActiveX COM

2006-09-16 Thread Dude VanWinkle
If history truely repeats itself, I expect we will see these after every patch tuesday for sometime to come. -JP On 9/15/06, Juha-Matti Laurio [EMAIL PROTECTED] wrote: SANS ISC: http://isc.sans.org/diary.php?storyid=1701 MS Security Advisory #925444:

Re: [Full-disclosure] [botnets] the world of botnets article and wrong numbers

2006-09-15 Thread Dude VanWinkle
On 9/15/06, Richard Golodner [EMAIL PROTECTED] wrote: As we had seen today everybody has an opinion about how the Botnet metrics are computed. I have been reading Gadi's post for many years now and believe he is a very knowledgeable and competent person. Give the guy a break, he has

Re: [Full-disclosure] Backdooring PDF Files

2006-09-14 Thread Dude VanWinkle
On 9/14/06, Geo. [EMAIL PROTECTED] wrote: POC did nothing for my Foxit PDF reader. No www-page was opened and no script was executed. Maybe you folks should just dump the clumsy and insecure Acrobat Reader and move onto something better for reading .pdf documents? ;) Good suggestion but

Re: [Full-disclosure] [botnets] the world of botnets article and wrong numbers

2006-09-14 Thread Dude VanWinkle
On 9/14/06, Jose Nazario [EMAIL PROTECTED] wrote: i guess i'm curious about your position, then, and what you're meaning by our instinctive ideas about what's possible. You see, the universe operates with a distinct prejudice towards individuals with an inclination towards lunacy... they

Re: [Full-disclosure] [botnets] the world of botnets article and wrong numbers

2006-09-14 Thread Dude VanWinkle
On 9/14/06, Gadi Evron [EMAIL PROTECTED] wrote: This counts bot samples. Whether they are variants (changed) or insignificant changes such as only the IP address to the CC, they are counted as unique. So if you have multiple machines NAT'ed under one IP, that is one pot. err bot eh? OK.

Re: [Full-disclosure] Re: Re: George Bush appoints a 9 year old to be the chairperson of the Information Security Deportment

2006-08-29 Thread Dude VanWinkle
this ones for you Paul ;-) http://www.workingforchange.com/comic.cfm?itemid=21200 On 8/29/06, Paul Schmehl [EMAIL PROTECTED] wrote: --On Tuesday, August 29, 2006 16:59:41 +0100 teh kids [EMAIL PROTECTED] wrote: try googling BBC and Hezbollah - it took me all of 30 seconds to find _and_ read

Re: [Full-disclosure] Re: Re: George Bush appoints a 9 year old to be the chairperson of the Information Security Deportment

2006-08-29 Thread Dude VanWinkle
On 8/29/06, Paul Schmehl [EMAIL PROTECTED] wrote: Or this? http://news.bbc.co.uk/2/hi/middle_east/4781551.stm On the evening of 23 July, he and two other medics answered a call to rendezvous with an ambulance from Tibnin, in the hills to the east, to relay three civilian patients down to Tyre.

Re: [Full-disclosure] Re: Re: George Bush appoints a 9 year old to be the chairperson of the Information Security Deportment

2006-08-29 Thread Dude VanWinkle
On 8/29/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: I can think of two explanations. Either the story isn't fake (very unlikely if you read the evidence) or the media isn't controlled by the jews after all. Drat, foiled again! Damn you Schmehl! :-) -JP

Re: [Full-disclosure] Secure OWA

2006-08-26 Thread Dude VanWinkle
On 8/26/06, ... [EMAIL PROTECTED] wrote: Secure OWA: Oxymoron Really? go for it: https://mail.microsoft.com/exchange -JPwho thinks sendmail is a little less secure ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Secure OWA

2006-08-26 Thread Dude VanWinkle
On 8/26/06, Adriel Desautels [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dude, which is more secure in your opinion. A base install of sendmail or a base install of OWA/exchange? sorry, that was a bad comparison/joke. They are two different products. One is a

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-18 Thread Dude VanWinkle
On 8/18/06, ... [EMAIL PROTECTED] wrote: forth: getting angry if someone spots you fifth: insulting for free (i did not, you uneducated subject). Your email forensics skills are only matched by your command of the english language, and only surpassed by your deductive reasoning. -JP

Re: [Full-disclosure] Wireless hacks

2006-08-17 Thread Dude VanWinkle
On 8/17/06, Fetch, Brandon [EMAIL PROTECTED] wrote: /secures tinfoil hat And didn't Intel just announce here recently they were making their hardware drivers open source for the ...betterment of the Linux community...? http://ipw3945.sourceforge.net/ seems like they have been open source

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-15 Thread Dude VanWinkle
On 8/15/06, Peter Besenbruch [EMAIL PROTECTED] wrote: Dude VanWinkle wrote: What? you can dish it but you cant take it?No, I just filter. I suspect a lot fewer people will be reading youre-mails, Dude.You do know I didnt send out the pr0n right? Just trying to make light of the situation

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-15 Thread Dude VanWinkle
VanWinkle To: Peter Besenbruch Cc: full-disclosure Sent: Tuesday, August 15, 2006 12:31 PM Subject: Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN On 8/15/06, Peter Besenbruch [EMAIL PROTECTED] wrote: Dude VanWinkle wrote: What? you can dish it but you cant take it? No, I just filter. I

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-15 Thread Dude VanWinkle
On 8/15/06, cardoso [EMAIL PROTECTED] wrote: Back in the old BBS days it was an old trick already.Oh, it wasn´t me. My friend/cousing/dog/pel llama used my computer andsent those lucky charm chain mails and all the get rich fast schemes,please do not ban me from your BBS Damn you busted me, I am

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Dude VanWinkle
On 8/15/06, Julio Cesar Fort [EMAIL PROTECTED] wrote: Dude VanWinkle, snip - Looks to me like they are using port 0. http://www.grc.com/port_0.htm -JP *NEVER TRUST* Steve Gibson. I bet he smokes crack. See http://attrition.org/errata/charlatan.html#gibson

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Dude VanWinkle
On 8/15/06, Darren Bounds [EMAIL PROTECTED] wrote: Adriel, I was replying to Dude VanWinkle, who's been chasing down the src/dst port 0 unnecessarily. Nah, I realized after the 4th post it was an ICMP packet and was just curious about port 0 Only TCP/UDP have ports, I know that :-) -JPone

Re: [Full-disclosure] what can be done with botnet CC's? (fwd)

2006-08-14 Thread Dude VanWinkle
On 8/14/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: On Sun, 13 Aug 2006 08:32:16 EDT, Dude VanWinkle said: When I worked at a university, the students were always getting compromised till we implemented sandboxing. People DHCP'ing into the network were placed in a subnet by themselves till

Re: [Full-disclosure] what can be done with botnet CC's? (fwd)

2006-08-14 Thread Dude VanWinkle
On 8/14/06, Peter Besenbruch [EMAIL PROTECTED] wrote: I keep hitting reply, and not posting to the list. Original Message [EMAIL PROTECTED] wrote: On Sun, 13 Aug 2006 08:32:16 EDT, Dude VanWinkle said: When I worked at a university, the students were always getting

Re: [Full-disclosure] what can be done with botnet CC's? (fwd)

2006-08-14 Thread Dude VanWinkle
On 8/14/06, Jonathan Glass (gm) [EMAIL PROTECTED] wrote: Peter Besenbruch wrote: I keep hitting reply, and not posting to the list. Original Message [EMAIL PROTECTED] wrote: On Sun, 13 Aug 2006 08:32:16 EDT, Dude VanWinkle said: When I worked at a university

Re: [Full-disclosure] LOL HY

2006-08-14 Thread Dude VanWinkle
who is bernal? On 8/14/06, Time 4 [EMAIL PROTECTED] wrote: LOL THIS IS PORN FOR BERNAL AND THE WHITEHATS BERNAL CANNOT STOP FULL DISCLOSURE ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

[Full-disclosure] Anti - LOL HY ME

2006-08-14 Thread Dude VanWinkle
Oh yeah, well take this, punk: attachment: ent_beaarthur_pic.jpg ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-14 Thread Dude VanWinkle
What? you can dish it but you cant take it? attachment: bea-arthur.jpg ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] if this is funny, you need a check up LOL HELLO FURRY PORN

2006-08-14 Thread Dude VanWinkle
attachment: yo_mama.jpg ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Anti - LOL HY ME

2006-08-14 Thread Dude VanWinkle
On 8/14/06, Eric Ericson [EMAIL PROTECTED] wrote: Dude, You know damn well the Geneva Convention states very clearly that there shall be NO FIRST USE OF BEA ARTHUR. Expect a summons to the ICC at the Hague to account for these war crimes.I thought I showed amazing restraint actually.I found

Re: [Full-disclosure] what can be done with botnet CC's? (fwd)

2006-08-13 Thread Dude VanWinkle
On 8/13/06, Gadi Evron [EMAIL PROTECTED] wrote: Hi guys, here is a forward of my follow-up to the previous message. Gadi. -- Forwarded message -- Date: Sat, 12 Aug 2006 13:12:30 -0500 (CDT) From: Gadi Evron [EMAIL PROTECTED] To: botnets@whitestar.linuxbox.org Subject:

Re: [Full-disclosure] Exploit for MS06-040 Out?

2006-08-11 Thread Dude VanWinkle
On 8/11/06, Brendan Dolan-Gavitt [EMAIL PROTECTED] wrote: Is there any technical reason that an exploit cannot be developed against XP SP2 and Server 2003 SP1? Or is this only a limitation of the current Metasploit exploit? I think the poster you are referring to was talking about Core IMPACT

Re: [Full-disclosure] If we can read 19, 832 n3td3v posts, we can do 1 open hate mail to Lieberman!

2006-08-11 Thread Dude VanWinkle
On 8/11/06, Peter Dawson [EMAIL PROTECTED] wrote: ACK that !! :)- On 8/11/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: What a maroon http://www.google.com/search?hl=enq=%22Alif+Terranson%22btnG=Google+Search from the listed google search, 1st hit Alif Terranson, a former Savvis

Re: [Full-disclosure] Re: [WEB SECURITY] Top sites for Application security news

2006-08-11 Thread Dude VanWinkle
On 8/11/06, root [EMAIL PROTECTED] wrote: Some (web) security blogs/sites I like: http://ha.ckers.org/ - in my opinion this is (by far) the best web security related blog. RSnake rocks! http://isc.sans.org/ - security news, latest stuff http://netsec.blogspot.com/ - latest links

Re: [Full-disclosure] Exploit for MS06-040 Out?

2006-08-10 Thread Dude VanWinkle
On 8/10/06, H D Moore [EMAIL PROTECTED] wrote: On Wednesday 09 August 2006 13:10, Matt Davis wrote: Did I completely miss exploit code being released in the wild for that vulnerability? The Metasploit Framework module is now public, I included a copy of the email I sent to the Framework

Re: [Full-disclosure] Attacking the local LAN via XSS

2006-08-08 Thread Dude VanWinkle
On 8/7/06, Nikolay Kubarelov [EMAIL PROTECTED] wrote: On Friday 04 August 2006 16:06, pdp (architect) wrote: IMHO, if you want to do stuff on lower level, you need to think of something else. JavaScript, Flash and Java Applets are technologies that are designed to run on the WEB. This is why,

Re: [Full-disclosure] RE: when will AV vendors fix this???

2006-08-07 Thread Dude VanWinkle
On 8/7/06, Thomas D. [EMAIL PROTECTED] wrote: -Original Message- From: Bipin Gautam Sent: Saturday, August 05, 2006 9:21 AM Subject: when will AV vendors fix this??? to keep things simple, let me give you a situation; if there is a directory/file a EVIL_USER is willing to hide

Re: [Full-disclosure] FD Charter

2006-08-02 Thread Dude VanWinkle
On 8/2/06, Matt Burnett [EMAIL PROTECTED] wrote: The charter says the list is supposed to be self-policing. How do we take action against offending members, short of a d0s? The charter also says that management can remove members for spamming or misappropriation. Have anyone from management read

Re: [Full-disclosure] EEYE: research.eeye.com

2006-08-01 Thread Dude VanWinkle
On 8/1/06, Marc Maiffret [EMAIL PROTECTED] wrote: Hi, I am happy to announce to the first incarnation of http://research.eEye.com. On this site you can find everything from our previously released advisories to our previously unreleased research tools. A lot of these tools are seeing daylight

Re: [Full-disclosure] Hushmail addresses are being used to impersonate n3td3v

2006-07-31 Thread Dude VanWinkle
On 7/31/06, Stan Bubrouski [EMAIL PROTECTED] wrote: On 7/31/06, n3td3v v3dt3n [EMAIL PROTECTED] wrote: That goes for you too mister. Stop impersonating me or i will tell your mom, I am the real n3td3v as i own n3td3v.com So there you little twerp. I've never bothered to impersonate you,

Re: [Full-disclosure] Do world's famous companies take care of their security?

2006-07-31 Thread Dude VanWinkle
On 7/31/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: My experience has been that many companies simply do not care about security until they are forced to. opinion The problem with companies is that they are pubicly traded. This means that if total profits for your company are

[Full-disclosure] Happy SysAdmin Day!

2006-07-28 Thread Dude VanWinkle
http://www.sysadminday.com/ Happy SysAdmin day all :-) -JP ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Re: corporate uses for Google malware finding, etc. [was: [funsec] more than just malware..]

2006-07-18 Thread Dude VanWinkle
On 7/18/06, Gadi Evron [EMAIL PROTECTED] wrote: A couple more notes... This can have significant uses for corporations. For example, finding lost source code by using the filetype: feature, or as Dude already mentioned on this thread, to find wrongly named executables. Also, using the site:

Re: Using Magic Values along with filetype to find malicious files (was RE: [Full-disclosure] Google Malware Search)

2006-07-17 Thread Dude VanWinkle
On 7/17/06, Debasis Mohanty [EMAIL PROTECTED] wrote: Nice .. Realy nice pointers H.D. !! :) Really nice pointers yourself! By searching for: site:.il signature: 4550 filetype:pif I find a site with badtrans.b www.arava.co.il/matan/svgalib/hypermail/att-1469/01-fun.MP3.pif Hmm, any

Re: Using Magic Values along with filetype to find malicious files (was RE: [Full-disclosure] Google Malware Search)

2006-07-17 Thread Dude VanWinkle
On 7/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: On Mon, 17 Jul 2006 17:27:30 EDT, Dude VanWinkle said: Hmm, any bets on who is the most infected TLD... :-) -JPwho is betting on .ru Biggest source of malware isn't the same as most infected. I'm betting on .com/.net (the US

Re: Using Magic Values along with filetype to find malicious files (was RE: [Full-disclosure] Google Malware Search)

2006-07-17 Thread Dude VanWinkle
top 2 weird malware distribution sites: http://lists.w3.org/Archives/Public/site-comments/2003Aug/att-0008/movie0045.pif lists.suse.com/archive/suse-sparc/2004-Jan/att-0009/message.pif -JP ___ Full-Disclosure - We believe in it. Charter:

Re: Using Magic Values along with filetype to find malicious files (was RE: [Full-disclosure] Google Malware Search)

2006-07-17 Thread Dude VanWinkle
On 7/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: On Mon, 17 Jul 2006 21:45:07 EDT, Dude VanWinkle said: Still, AV was around then, and for some reason i feel w3.org should be a site that didnt allow viruses in its mailing lists, public or not You must be the only guy who's never had

Re: [Full-disclosure] 70 million computers are using Windows 98rightnow

2006-07-13 Thread Dude VanWinkle
On 7/13/06, Castigliola, Angelo [EMAIL PROTECTED] wrote: This doesn't mean that W98 is secure. On Secunia's site the latest(corrected) vulnerability is dated 20060613, less than 1 month ago, andtomorrow someone could find a new one that won't be corrected. Sure, that could happen but seeing how

Re: [Full-disclosure] 70 million computers are using Windows 98rightnow

2006-07-12 Thread Dude VanWinkle
On 7/12/06, Flavio Visentin [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Castigliola, Angelo wrote: There are no known remote exploits for the Windows 98 operating system. This doesn't mean that W98 is secure. On Secunia's site the latest (corrected) vulnerability

Re: [Full-disclosure] Postfix configuration

2006-07-10 Thread Dude VanWinkle
On 7/10/06, Line Noise [EMAIL PROTECTED] wrote: On 7/10/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: On Mon, 10 Jul 2006 06:21:17 -0500 Bartlomiej Szymanski [EMAIL PROTECTED] wrote: Hello, I have a problem with message delivery via Postfix... [snip] Refrain from off-topic discussions

Re: [Full-disclosure] CFP: DA Workshop - ISOI

2006-07-08 Thread Dude VanWinkle
On 7/8/06, Gadi Evron [EMAIL PROTECTED] wrote: On Sat, 8 Jul 2006, J.A. Terranson wrote: On Sat, 8 Jul 2006, Gadi Evron wrote: And, for the second time, in the second forum (but with no answer as yet), I ask Why is this closed to these communities?. These are the very communities most

[Full-disclosure] Re: [funsec] Vishing (voice/phone phishing) - public incident

2006-06-23 Thread Dude VanWinkle
On 6/23/06, Gadi Evron [EMAIL PROTECTED] wrote: Last year some of us made jokes about Vishing on funsec, today it's a reality. Here is the incident going public: http://www.websense.com/securitylabs/alerts/alert.php?AlertID=534 Special thanks to the good guys at Websense and the PIRT guys at

Re: [Full-disclosure] Five Ways to Screw Up SSL

2006-05-23 Thread Dude VanWinkle
On 5/22/06, Brian Dessent [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: On Mon, 22 May 2006 12:02:23 EDT, Dude VanWinkle said: DNS foo to the client, how easy is that? Would you have to get the upstream DNS server to cache your bogus entry? You'd be *amazed* how many are still

Re: [Full-disclosure] Five Ways to Screw Up SSL

2006-05-23 Thread Dude VanWinkle
On 5/23/06, Brian Eaton [EMAIL PROTECTED] wrote: On 5/23/06, Dude VanWinkle [EMAIL PROTECTED] wrote: I guess you would hijack their machines with a bug that would edit the local cache, refresh the cache, then report to you about the websites the victim's machine had visited, and you could

Re: Re[2]: [Full-disclosure] Five Ways to Screw Up SSL

2006-05-22 Thread Dude VanWinkle
On 5/21/06, Thierry Zoller [EMAIL PROTECTED] wrote: Dear Dude VanWinkle, DV Why would it matter who signed it? As long as the data is encrypted as DV it travels over the internet, I am happy. Why would it matter who signed it? I am happy to handle the ssl handshake mitm for you. All your

Re: [Full-disclosure] Five Ways to Screw Up SSL

2006-05-22 Thread Dude VanWinkle
On 5/22/06, Michael Holstein [EMAIL PROTECTED] wrote: I was referring to the CA that signs it. It was implied that freessl.com, who gives out trial certificates, is an unreliable CA. I do not understand why their certs would be any less valid than anothers. Not less valid, less trusted. SSL

Re: [Full-disclosure] Five Ways to Screw Up SSL

2006-05-21 Thread Dude VanWinkle
On 5/21/06, Ginsu Rabbit [EMAIL PROTECTED] wrote: Stuff The only thing that matters about SSL is the fact that it encrypts the data. You can reduce your checklist to: - 1: Make sure you use a good cipher |

Re: [inbox] Re: [Full-disclosure] [funsec] fuzzing mailing list

2006-04-16 Thread Dude VanWinkle
On 4/16/06, n3td3v [EMAIL PROTECTED] wrote: On 4/16/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Some whiney BS, You guys are just pissed that Gadi gets paid for his knowledge, while you are forced to try and gain notoriety by tossing unasked for opinions on non-moderated mailing lists.

Re: [inbox] Re: [Full-disclosure] [funsec] fuzzing mailing list

2006-04-16 Thread Dude VanWinkle
On 4/16/06, J.A. Terranson [EMAIL PROTECTED] wrote: On Sat, 15 Apr 2006, nocfed wrote: ---SNIP--- DIGITAL WILL BE GIVING A PRODUCT PRESENTATION OF THE NEWEST MEMBERS OF THE DECSYSTEM-20 FAMILY; THE DECSYSTEM-2020, 2020T, 2060, AND 2060T. THE DECSYSTEM-20 FAMILY OF COMPUTERS HAS EVOLVED

[Full-disclosure] [ADVISORY] ~ x Thu Mar 16 14:19:11 EST 2006 x ~ Heap Overflow in ISC OpenReg

2006-03-16 Thread Dude VanWinkle
==D~~ Appendix A Vendor Information 8==D~~ http://www.isc.org/index.pl?/sw/openreg/ 8==D~~ Appendix B References 8==D~~ RFC 863 8==D~~ Contact 8==D~~ Dude

Re: [Full-disclosure] Re: Fedex Kinkos Smart Card Authentication Bypass

2006-03-01 Thread Dude VanWinkle
On 2/28/06, Lance James [EMAIL PROTECTED] wrote: Eric B wrote: Wait, so if I read this right, consumers with existing cards could dupe their legit cards for fake ones and cash in the fake ones yet still have credit on the legit card? So I'm assuming Fedex has no database/authentication

Re: [Full-disclosure] Fwd: FAQ: How to subscribe and or contribute to cypherpunks

2006-02-27 Thread Dude VanWinkle
On 2/27/06, coderman [EMAIL PROTECTED] wrote: ::Question:: How do I observe/participate in cypherpunks list discussions? Err, would [EMAIL PROTECTED] be an OK place request subscription? The http://www.cypherpunks.to/list/ site? had that listed, but I could be in the wrong place..

Re: [Full-disclosure] Automated Vulnerability Scanners

2006-02-24 Thread Dude VanWinkle
On 2/24/06, Q Beukes [EMAIL PROTECTED] wrote: no, what I was talking about was programs/algorithms that actually scan software to find new unknown problems. i have never heard of anything like this myself nor can't think of an efficient way of implementing it, yet someone claimed they exist.

Re: [Full-disclosure] Johnny Long's e-mail addy?

2006-02-20 Thread Dude VanWinkle
I would hope X already has that kind of brains, or maybe his GF hasent let him reclaim those brains from the jar atop her bedframe =P -JP On 2/20/06, Native. Code [EMAIL PROTECTED] wrote: Why dont u send email to johnny at ihackstuff.com and confirm? On 2/21/06, xyberpix [EMAIL PROTECTED]

Re: [Full-disclosure] Cisco Security Advisory: Cisco VPN3000Concentrator Vulnerable to Crafted HTTP Attack

2006-01-29 Thread Dude VanWinkle
On 1/26/06, Dario Ciccarone (dciccaro) [EMAIL PROTECTED] wrote: So, in closing, you are not 'plain out of luck' - there is a process in place for you to be able to obtain a fixed software release, for free, even without a service contract. S, if we find enough flaws in IOS

Re: [Full-disclosure] Urgent Alert: Possible BlackWorm DDay February 3rd (Snort signatures included)

2006-01-27 Thread Dude VanWinkle
On 1/27/06, Charles Cala [EMAIL PROTECTED] wrote: BlackWorm has a LAN infection vector. So does some kid hacking directly into your box, but he isnt a worm No action on the part of the user of the box on the LAN must happen for them to get got, thus this is a worm.

Re: [Full-disclosure] Urgent Alert: Possible BlackWorm DDay February 3rd (Snort signatures included)

2006-01-24 Thread Dude VanWinkle
On 1/24/06, Gadi Evron [EMAIL PROTECTED] wrote: now known as the TISF BlackWorm task force. Why do you call a .scr you have to manually install a worm? Why not BlackVirus the worm moniker is very misleading (actually got me worried for a sec). The email worm is also misleading, because it only

Re: Re[2]: [Full-disclosure] Personal firewalls.

2006-01-21 Thread Dude VanWinkle
On 1/20/06, Eliah Kagan [EMAIL PROTECTED] wrote: Z sends spoofed packets coming from the DNS server of X even more interesting.. When Sygate PRO blackholes a host, does it block only unsolicited packets (bad), or does it block *all* incoming packets from that host (worse)? It blocks all

Re: [Full-disclosure] Startup company

2006-01-18 Thread Dude VanWinkle
On 1/17/06, Shyaam [EMAIL PROTECTED] wrote: Hello All, My friend is starting a new company for providing Anti-reversing security and related to forensics. Can someone give some tips and guidance. If you are involved in this foray into Anti-reversing make sure your friend gives you a signed

Re: [Full-disclosure] Vulnerability/Penetration Testing Tools

2006-01-18 Thread Dude VanWinkle
On 1/18/06, Madison, Marc [EMAIL PROTECTED] wrote: I understand your point about TCO, even though you don't make a very good case for it. snip Now for the Math, and why your TCO argument wasn't so good, Developer $60K/year divided by the adopted 2080 man hours year (this is the average

Re: [Full-disclosure] ntpd stack evasion exploit

2006-01-14 Thread Dude VanWinkle
On 1/10/06, !bSt bitwarz Security Team [EMAIL PROTECTED] wrote: We are a cell of pr0j3kt m4yh3m in Latin America and western Europe. -snip- --ntpd_stack_evasion.c-- /* ntpd remote root no-exec stack evasion spl0it -snip- I thought pr0j3kt m4yh3m and the PHC were promoting non-disclosure. I

Re: [Full-disclosure] Signal to noise ratio XSS issues and heads hitting the ceilings.

2005-12-21 Thread Dude VanWinkle
On 12/21/05, Leif Ericksen [EMAIL PROTECTED] wrote: Do I need to change that to Herry Qwanakkadamanas to account for a missed holiday. You forgot Solstice: Meppy Solqwannakakkamas! -JP Satanists are Christians too -JP ___ Full-Disclosure - We

Re: [Full-disclosure] RE: Execution Prevention (Was: A small editorial)

2005-12-20 Thread Dude VanWinkle
On 12/19/05, Ben Nagy [EMAIL PROTECTED] wrote: www.eeye.com/research/whitepapers Generic Anti-Exploitation Technology for Windows I would like to read it, but I get a 404 error when folloowing the link err this one seems to work www.eeye.com/html/research/whitepapers/

Re: [Full-disclosure] RE: Execution Prevention (Was: A small editorial)

2005-12-20 Thread Dude VanWinkle
On 12/20/05, Valentin Baciu [EMAIL PROTECTED] wrote: Try this: http://www.eeye.com/html/research/whitepapers/index.html :) On 12/20/05, Dude VanWinkle [EMAIL PROTECTED] wrote: On 12/19/05, Ben Nagy [EMAIL PROTECTED] wrote: www.eeye.com/research/whitepapers Generic Anti-Exploitation

Re: [Full-disclosure] [Clips] A small editorial about recent events. (fwd)

2005-12-19 Thread Dude VanWinkle
On 12/18/05, Jamie C. Pole [EMAIL PROTECTED] wrote: As far as the rest of your point, I actually agree with you. I see no reason why the government needs to know which books you are reading, and I don't believe the government should know how long you are talking to your psychic-phone-sex

Re: [Full-disclosure] .An uncontrolled fiscal crisis.. America.s future under George Bush.

2005-12-19 Thread Dude VanWinkle
On 12/19/05, J.A. Terranson [EMAIL PROTECTED] wrote: While we're debunking George... Hey man, save this for netdev's next thread that is the _only_ good excuse for filling ppl's inboxes with political rhetoric jeez of all ppl, I am saying this ;-) -JP

Re: [Full-disclosure] [Clips] A small editorialaboutrecentevents.(fwd)

2005-12-19 Thread Dude VanWinkle
On 12/19/05, InfoSecBOFH [EMAIL PROTECTED] wrote: You kniow guys... all I havef to say is... fuck politics... we all have common ground so lets not go into the political debate bullshit. Now you know how I feel with your troll feeding BS, -JP turnabout is fair play -Your Wife

Re: [Full-disclosure] [Clips] A small editorial about recent events. (fwd)

2005-12-18 Thread Dude VanWinkle
On 12/18/05, Andrew A [EMAIL PROTECTED] wrote: Trends like these will continue to worsen until someone performs a coup. Luckily, it has been suprisingly easy throughout history to do so. All that is needed is for someone with the will to walk up and seize power. Were someone to perform an

Re: [Full-disclosure] [Clips] A small editorial about recent events. (fwd)

2005-12-18 Thread Dude VanWinkle
On 12/18/05, Jamie C. Pole [EMAIL PROTECTED] wrote: I'm sorry, but I was also FAR too close to one of the 09/11 attacks. Just cause you are scared, doesnt mean you need trounce on my liberties in a vain attempt to protect yourself. You arent even protecting yourself: just cause GWB knows what

Re: [Full-disclosure] [Clips] A small editorial about recent events. (fwd)

2005-12-18 Thread Dude VanWinkle
Well, for one thing, I am a veteran, and have EARNED these rights that you liberal whiners take for granted. When you believe in something enough to die for it, come back and talk to me. Lemme guess: You defended my freedom by going to 'nam? Beause if you hadnt, the viet-cong would have

Re: [Full-disclosure] [Clips] A small editorial about recent events. (fwd)

2005-12-18 Thread Dude VanWinkle
p.s.: I know this has nothing to do with infosec, But J.A. is right about something, its better noise than you-know-who ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia

Re: [Full-disclosure] [Clips] A small editorial about recent events. (fwd)

2005-12-18 Thread Dude VanWinkle
On 12/18/05, Jamie C. Pole [EMAIL PROTECTED] wrote: Well, some of the more recent ones were as follows: 1) Singapore, 2) Russia, 3) Spain, Agreed, and point taken; those are probably worse than the states, but at least they admit to their evil, we hide ours behind protection. Still you have

Re: [Full-disclosure] [Clips] A small editorial aboutrecentevents.(fwd)

2005-12-18 Thread Dude VanWinkle
GroundZero Security but hey lets forget about this and go back to the original topic, shall we ? There was an original topic? Damn, I musta missed that one,... Ohh right the topic was the fact that since windows has nops you cant actually watch all the code executing on a system to see whether

[Full-disclosure] Seasons Beatings

2005-12-17 Thread Dude VanWinkle
I had taken a pause, from beating Santa Clause to remember your deeds, and the things that they breed I remembered my goal of Judging you all: Disclosures are Good, but I still wonder why you should; for secrets are precious, and keep your worthless family fed, After you reveal them, it doesn't

Re: [Full-disclosure] [U] sorrowful goodbye

2005-12-16 Thread Dude VanWinkle
On 12/16/05, Stoltz, Eric CIV [EMAIL PROTECTED] wrote: The majority of the email is still useful stuff but it shows how easy it is to send a list into termoil. See you guys in a month hopefully. -snip- Ok, this stinks, I know too many good people who have unsubscibed cuz we are letting the

Re: [Full-disclosure] OT: Amazing, the Diebold insider said.

2005-12-15 Thread Dude VanWinkle
On 12/13/05, Jei [EMAIL PROTECTED] wrote: Shortly before the election, ten days to two weeks, we were told that the date in the machine was malfunctioning, the source recalled. So we were told 'Apply this patch in a big rush. Later, the Diebold insider learned that the patches were never

Re: [Full-disclosure] OT: Amazing, the Diebold insider said.

2005-12-15 Thread Dude VanWinkle
p.s.: http://www.house.gov/mckinney/voterrights.htm ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Re: 0-day for sale on ebay - New auction!

2005-12-13 Thread Dude VanWinkle
dave77f ( 48Feedback score is 10 to 49) US $510.00 Dec-13-05 08:49:11 PST holy exploits batman, thats a bunch of bucks! -JP On 12/13/05, Georgi Guninski [EMAIL PROTECTED] wrote: On Mon, Dec 12, 2005 at 03:45:37PM -0700, [EMAIL PROTECTED] wrote: It looks like the same

Re: [Full-disclosure] McAfee VirusScan vs Metasploit Framework v2.x

2005-12-09 Thread Dude VanWinkle
On 12/9/05, Michael Holstein [EMAIL PROTECTED] wrote: Because I'll catch the kiddies when they try and actually use Metasploit on something, and then they'll get expelled from school after a student conduct hearing. Hmm, when I was working at a state run institute, we had a policy of letting

Re: [Full-disclosure] 0-day for sale on ebay

2005-12-08 Thread Dude VanWinkle
This should be the new standard for responsible disclosure when you get a reply from MS like that for a valid exploit ;-) lol jk -JP ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and

[Full-disclosure] Gainful Employment Opportunities and Those Seeking Them

2005-12-07 Thread Dude VanWinkle
For those of you (and there seem to be a ton hitting the market, and this list) who want to break in on the scene. If you want a job and don't have experience cuz you are: -fresh out of school -just turning the legal age to work -Switching from a different career -Learned IS on the side while

Re: [Full-disclosure] Clever crooks can foil wiretaps, security flaw in tap technology

2005-11-30 Thread Dude VanWinkle
On 11/30/05, Andy Lindeman [EMAIL PROTECTED] wrote: I think we're talking about legal wiretaps, e.g. a law enforcement agency with a court order. The problem is if you can easily fool the system, the evidence is possibly unreliable and/or tainted. However, even if you can temporarily fool

[Full-disclosure] Fwd: Report to Recipient(s)

2005-11-30 Thread Dude VanWinkle
Apparently found a way to foil email wiretaps unintentionally ;-) -JP -- Forwarded message -- From: [EMAIL PROTECTED] [EMAIL PROTECTED] Date: Nov 30, 2005 1:04 PM Subject: Report to Recipient(s) To: Dude VanWinkle [EMAIL PROTECTED] Cc: full-disclosure@lists.grok.org.uk Incident

Re: [Full-disclosure] Clever crooks can foil wiretaps, security flaw in tap technology

2005-11-30 Thread Dude VanWinkle
Mike sed: http://www.phrack.org/show.php?p=60a=13 Probably comes with a free trip to quiet little bay in Cuba if you get caught. - Not sure if I want to carry around a car battery though ;-) I wonder what today's GPS system is transmitting under. from :

Re: [Full-Disclosure] Return of the Phrack High Council

2005-11-28 Thread Dude VanWinkle
On 11/28/05, dead troll [EMAIL PROTECTED] wrote: nothing important This is the first email I have recieved in a long time with netdev being the topic of the email. Please respect those that are smarter than you and put netdev in the subject or body so that my filters can put these kinds of

Fwd: [YXZ-45186]: Re: [Full-Disclosure] Return of the Phrack High Council

2005-11-28 Thread Dude VanWinkle
Anyone know about this? -- Forwarded message -- From: 4Daily.com Hotline [EMAIL PROTECTED] Date: Nov 28, 0005 9:28 AM Subject: [YXZ-45186]: Re: [Full-Disclosure] Return of the Phrack High Council To: [EMAIL PROTECTED] == Please reply above this line == Dude VanWinkle

Re: [Full-disclosure] Return of the Phrack High Council

2005-11-24 Thread Dude VanWinkle
On 11/24/05, InfoSecBOFH [EMAIL PROTECTED] wrote: Actually its the time to celebrate the killing of native Indians and the stealing of their land. http://www.alternet.org/story/28584 ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Hacking Boot camps!

2005-11-23 Thread Dude VanWinkle
On 11/23/05, Koen Van Impe [EMAIL PROTECTED] wrote: InfoSecBOFH wrote: WRONG. SANS does not provide anything but marketing opportunities for vendors who cannot sell product any other way and a thicker wallet for those at the top of the pyramid scheme. I agree that training when you are

<    1   2   3   >