Re: [Full-disclosure] hiding routers

2007-04-18 Thread Felix Lindner
s.com | GSM: +49 171 7402062 Wrangelstrasse 4 | PGP: A740 DE51 9891 19DF 0D05 10997 Berlin, Germany | 13B3 1759 C388 C92D 6BBB HRB 105213 B, Amtsgericht Charlottenburg, GF Felix Lindner ___ Full-Disclosure - We believe in it.

Re: [Full-disclosure] Check Point Connectra End Point security bypass

2007-01-22 Thread Felix Lindner
Hi, On Mon, 22 Jan 2007 07:37:29 +0200 "Roni Bachar" <[EMAIL PROTECTED]> wrote: > The vulnerability can be exploited by doing the following stages: > > Sending a post request as followed: > > POST https://serverip/sre/params.php HTTP/1.1 > Content-Type: application/x-www-form-urlencoded > User-A

Re: [Full-disclosure] HTTP AUTH BASIC monowall.

2006-03-17 Thread Felix Lindner
Hi, On Thu, 16 Mar 2006 09:48:07 -0500 Simon Smith <[EMAIL PROTECTED]> wrote: > My first thought was on how to harden the > authentication because the basic auth didn't cut it for me. Thats what I > am looking for ideas for. you may be looking for Digest Authentication: http://www.ietf.org/rfc/rf

Re: [Full-disclosure] SAP Security Contact

2005-09-23 Thread Felix Lindner
On Fri, 23 Sep 2005 09:54:00 -0300 Leandro Meiners <[EMAIL PROTECTED]> wrote: > Does anyone know the security contact for SAP, more precisely SAP WAS? Try [EMAIL PROTECTED], it works. cheers Felix ___ Full-Disclosure - We believe in it. Charter: http://

[Full-disclosure] tool release: n.bug

2005-08-09 Thread Felix Lindner
es by identifying callers of interesting functions with user provided data in closed source applications. Download link: http://www.nruns.com/contentarchiv/de/nbug.zip regards, Felix Lindner -- Felix Lindner, CISSP | Senior Security Consultant, n.runs GmbH [EMAIL PROTECTED] | +49 (0)171 7