> I'm the first one among many who want to learn RE and low level things,
> but I think both of the sides are complex enough.
>
I am not sure if you follow the teachings of Fredrick Diggle but to
paraphrase you may imagine security as a disc. On one side you have web app
Actually even the dumber monkeys are above average pen testers (except
for BoBo*).
*BoBo is a retarded monkey who Fredrick Diggle took pity on and signed
up for a gmail account (Perhaps you have heard of n3td3v).
On Mon, Jul 27, 2009 at 3:00 PM, T Biehn wrote:
> Travis wonders when Fredr
Fredrick Diggle Security has been made aware through its extensive
network of underground connections and informants that the security
firm Matasano was recently viciously attacked by a group of hackers.
Fredrick Diggle would like to personally offer his (and his cronies)
services in responding to
Or just
'start \\DiggleSec.com\fredrick\connectback.exe'
would have also been acceptable.
But Fredrick is sure that your 20 page write-up was fantastically entertaining.
On Fri, Jul 3, 2009 at 5:50 AM, Ferruh Mavituna wrote:
> This is a different and more practical approach to get a reverse she
Yes, but PDP writes extremely high quality exploits for some of the
world most critical vulnerabilities. Fredrick Diggle Security should
not be compared in any way to GNU Citizen as it would necessarily come
up lacking.
Fredrick is a little angry at you for even bringing it up :<
On Mon, Jun
Fredrick Diggle Security would like to announce that all Fredrick
Diggle Security exploit codes come with free tech support. Simply
contact the Fredrick Diggle Exploit Not Working Hotline for full
software support in the event of exploit failure.
Fredrick Diggle finds in ludicrous that other
Fredrick Diggle Security is proud to disclose a new denial of service
attack against Starbucks coffee and biscuity goodness. Other retailers
are also affected by this critical vulnerability but do not provide as
critical a service and therefore are not enumerated in this
disclosure. The attack was
Fredrick Diggle Security has taken it upon itself to reverse this
highly mystical encryption schema and has employed its crack
cryptanalysis experts and reverse engineers including the highly
acclaimed Mustache to get answers to your questions.
The team has spent a restless 48 hours reverse
Fredrick Diggle security is proud to announce that an offer has been
made to the established internet security expert and ethical hacker
Valdis Kletniek's Mustache. Fredrick Diggle was confused at first when
the application was received as Fredrick was under the impression that
the mustach
bitter much?
> -- Forwarded message --
> From: Fredrick Diggle <[EMAIL PROTECTED]>
> Date: Thu, Nov 20, 2008 at 11:18 AM
> Subject: Re: DiggleSec Application
> To: Green Monster <[EMAIL PROTECTED]>
>
>
> Fredrick Diggle has reviewed your appli
mustache power
On Fri, Nov 21, 2008 at 12:48 AM, <[EMAIL PROTECTED]> wrote:
> On Thu, 20 Nov 2008 23:28:31 CST, Fredrick Diggle said:
>
>> everyone's best interest. Also Diggle Sec is working on iptables
>> patches to allow those who do not want to be attacked to
Breaking, version 1.1 patch to Fredrick Diggl evil bit patch released!
That will show Fredrick Diggle for having fat fingers.
--- linux-2.6.27.7-patched/net/core/sock.c 2008-11-21
00:24:00.0 -0600
+++ linux-2.6.27.7-patch-1.1/net/core/sock.c2008-11-21
01:03:45.0 -0600
> Message: 13
>> > Date: Wed, 19 Nov 2008 15:43:03 -0600
>> > From: "Fredrick Diggle" <[EMAIL PROTECTED]>
>> > Subject: [Full-disclosure] Fredrick Diggle Security is looking for a
>> >few good men (or mediocre women)
>> >
Given the recent rise in blackhat hacker activity on the internet
Fredrick Diggle Security has decided to submit the following patch for
The Linux implementing RFC 3514.
http://www.ietf.org/rfc/rfc3514.txt
All blackhat internet hackers should immediately apply this patch and
have all malicious
It is unclear what you mean? You signed up for a hotmail account, or
did you computer hack this hotmail account?
Fredrick Diggle Security only employs Certified Whitehat Hackers and
the Whitehat Hacking Code of Ethics clearly states in section 35
paragraph 8
"The computer hacking of web ba
Fredrick Diggle Security has taken the the world wide web by storm in
recent years with disclosures in some of the most popular software
ever written including
- The Internet
- Notepad
- The Linux
- Fredrick Diggle Security execve exploit program
Due to the massive feedback they have received
I've been using Gmail and thought you might like to try it out. Here's
an invitation to create an account.
---
Fredrick Diggle has invited you to open a free Gmail account.
To accept this invitation and registe
I've been using Gmail and thought you might like to try it out. Here's
an invitation to create an account.
---
Fredrick Diggle has invited you to open a free Gmail account.
To accept this invitation and registe
Why are you sending Fredrick Diggle this informations?
On Tue, Nov 18, 2008 at 3:47 PM, Steve McChortle
<[EMAIL PROTECTED]> wrote:
> SID=IIOSUDGIWEBUOUiewfiweubhiughOUhdoisfISDGOfiGHoIFBvODISFyuoWUbieLJKHDSFaskldfh29834bnfj23f90f2jkadjkhKJHdLKdfh978o9dSHFkjh;
>
> Full Name:
Fredrick would advise you not to trust a mustache at a time like this.
Let's rehash
"This is believed to be linked to terrorism and possibly communism."
- Fredrick Diggle (Nov 18th 2008)
http://www.lazarusrising.com/wp-content/uploads/2007/01/osama.jpg = mustache
http://w
Matasano seems to be doing forensic investigation of this issue
"
www.matasano.com technical difficulties
Jeremy Rauch | October 24th, 2008
We're still working on recovering content. Please be patient.
"
On Tue, Nov 18, 2008 at 3:32 PM, Fredrick Diggle <[EMAIL PROTECT
As a supplement to your revealing md5 hash Fredrick Diggle security
has also identified the following encrypted string as paramount to
this investigation.
Ij48c2NyaXB0PmRvY3VtZW50LmxvY2F0aW9uPSJtYWlsdG86ZmRpZ2dsZUBnbWFpbC5jb20
Fredrick Diggle has recently noted an upswelling of defacement on the
internet and believes it is worth noting. Most notably Matasano
Security has apparently been "owned" and their popular internet "blog"
replaced with a defacement page.
http://www.matasano.com/log/
The group
Would you like just a normal CVE or a custom one. Either way submit
payment over paypal to [EMAIL PROTECTED], regular linear CVEs cost
$15.99.. For a custom CVE it would be $59.99 and please specify the
number you would like in your submission.
Also please make sure the number you want is not take
stop speculating dammit!
On Fri, Jul 25, 2008 at 2:38 PM, coderman <[EMAIL PROTECTED]> wrote:
> On Fri, Jul 25, 2008 at 11:37 AM, Fredrick Diggle <[EMAIL PROTECTED]> wrote:
>> ... Fredrick Diggle security would like to
>> disclose a critical vulnerability in the
ally just reported
> the status that Ptacek had changed his mind about the flaw, causing
> the thought that people should consider it an issue.
>
> Nate
>
> On Fri, Jul 25, 2008 at 1:37 PM, Fredrick Diggle <[EMAIL PROTECTED]> wrote:
>> Fredrick Diggle security would
Fredrick Diggle security would like to thank Dan Kaminsky for his new
methodology for vulnerability disclosure. The Dan Kaminsky Method
consists of the following steps.
1. Think of technology or protocol that has high exposure throughout
the internets
2. Contact all of the vendors and tell them
###
Fredrick Diggle Security Advisory
Application: HTTP RFC
Versions: All Versions
Platforms: All Implementations Affected
Bugs: Insecure Encoding Mechanism
Exploitation: Remote
Severity: Severe
Date
Fredrick Diggle would like to apply to contribute to your quality
publication. He offers the support of Diggle Security and all of its
resources. Please reply with your offer letter.
Thank you
Fredrick Diggle FDCSP
On Wed, Jul 9, 2008 at 8:24 PM, Kenneth F. Belva <[EMAIL PROTECTED]>
. There are other ideas, too.
Thomas Ptacek^H^H^H^H^H^H^H^H^H^H^H^H^HDan Kaminsky at EnterAct,
L.L.C.^H^H^H^H^H^H^H^H^H^H^H^H^H^H^H^HDoxpara Research, Chicago,
IL^H^H^H^H^H^H^H^H^H^H^H []
"If you're so special, why aren't you dead?"
^H^H
~ whoosh ~
o
|
^
On Tue, Jul 8, 2008 at 10:24 PM, Nate McFeters <[EMAIL PROTECTED]> wrote:
> Yeah, this has been all over the news today. In fact, I've
> interviewed Dan Kaminsky on the issue, and also covered thoughts by
> Tom Ptacek on whether the issue is as big a deal as everyone is making
>
Yes Fredrick Diggle will get you a copy :)
On Sun, May 18, 2008 at 10:13 AM, bob harley <[EMAIL PROTECTED]> wrote:
> Anyone have a copy of rsa.2048.tar.bzip2? The web server isn't playing
> nicely ;-)
>
> On Thu, May 15, 2008 at 2:35 AM, Markus Müller <[EMAIL PROTEC
no one cares :(
On Sat, May 17, 2008 at 5:41 AM, <[EMAIL PROTECTED]> wrote:
> On Sat, 17 May 2008 04:54:24 +1000, Fredrick Diggle said:
>> yes fredrick is very jealous :> your ability to accidentally crash
>> software is astounding, almost as astounding as your inabi
t's your
mustache. Is it real or did you glue a squirrel to your face?
On Sat, May 17, 2008 at 3:32 AM, <[EMAIL PROTECTED]> wrote:
> On Sat, 17 May 2008 02:36:33 +1000, Fredrick Diggle said:
>> Has your mustache contributed any opps logs to kernel dev lately
>
> No, but
Fredrick Diggle security is proud to announce that it will now be
offering FDCSP certification as a service. For further information on
this offering or our other services please contact
Fredrick Diggle FDCSP
Av Cons Carrão 3101
Sao Paulo, 03403003, Brazil
T: 1-800-422-4453
F: (480) 922-7061
thank you for the qualified opinion valdis. everyone cares very much.
can't you see how much we are all caring. also I saw a deal on
mustache wax the other day, email fredrick off list for linkage.
On Fri, May 16, 2008 at 5:10 AM, <[EMAIL PROTECTED]> wrote:
> On Thu, 15 May 2008 09:11:37 PDT, Mor
Has your mustache contributed any opps logs to kernel dev lately
valdis? keep them coming they really benefit society. If you find 10
more random crashes in retarded configurations humanity will have the
technology to cure all disease and bring about world peace. Fredrick
Diggle suggests a statue
Fredrick Diggle's code was signed by Fredrick Diggle himself. How much
more credibility do you want?
On Fri, May 16, 2008 at 7:33 AM, <[EMAIL PROTECTED]> wrote:
>
>
>
> On Wed, 14 May 2008 13:49:35 -0700, "Peter Ferrie" <[EMAIL PROTECTED]>
> wrote:
&g
HAHAHA Fredrick Diggle thinks that skyout was running his el8 assembly
machine program in a debugger running as administrator :( opps...
for the kids to test at home fred diggle has written easier program
which isn't as el8 (fred doesn't know the computer assembly language
as he is
Valdis,
Is your mustache a lawyer now?
Sincerely,
Fredrick
On Tue, May 13, 2008 at 2:07 AM, <[EMAIL PROTECTED]> wrote:
> On Sun, 11 May 2008 20:22:42 BST, n3td3v said:
>
> > Shut up before I prosecute you.
> >
> > All the best,
>
> First off, "prosecute" is a term usually reserved for the go
Fredrick Diggle would like to disclose a vulnerability in email auto
responders. Using these auto responders causes information disclosure
that the victim is currently not in the office. an attacker could use
this information to know when a victim is not in the office and XSS
their browser for fun
1 row returned -> Fredrick Diggle Security
On Sat, May 10, 2008 at 9:45 PM, coderman <[EMAIL PROTECTED]> wrote:
> On Sat, May 10, 2008 at 7:26 PM, reepex <[EMAIL PROTECTED]> wrote:
> > ...
>
> > Also where did the 100,000 hackers figure come from? Did you ma
Fredrick Diggle Security is sad to report that it's founder the
Fredrick Diggle III Esquire CISSP has not been feeling well due to
increased responsibility at the zoo. This basically means that Fred
would like to apologize for his lack of 0day disclosings of late. HE
does however have hope th
been there,
Fredirick Diggle finds it easier to steal toothpaste. There security
guys ae all over you as soon as you pocket a tube or two. Its odd,
they don't seem to care about the more expensive stuff but toothpaste
they watch like a hawk. I guess they don't want poor people to have
clean teeth.
also diggle sec has been in mourning for our emo monkey friend and
therefore unable to disclose elite 0day. stop blocking us joey.
On Feb 19, 2008 3:37 PM, Simon Smith <[EMAIL PROTECTED]> wrote:
> Thats because you've been writing less you moron.
>
> Joey Mengele wrote:
> > SPAM levels greatly dec
0442c3fd857eb411b071891ab3a3883e
On Feb 19, 2008 7:02 AM, Darkie Duck <[EMAIL PROTECTED]> wrote:
>
> At first glance perhaps , until you take a better look at the post of Joey
> Mengele.
> Something with a "c35312fb3a7e05b7a44db2326bd29040"
>
> -DD
>
>
>
>
> >
> Sure, we aren't always right... I quite
> often have changed a position in the face of
> irrefutable evidence. It is a mark of character to
> admit when you are wrong.
Fredrick Diggle imagines that happens quite often to you eh? Also the
hippo says hello :D
On Feb 17, 20
Dude VanWinkle the emo monkey... down here v
http://bp2.blogger.com/_KWacUiLHjgY/RnVed2bQSFI/AG0/510KZVdVeJM/s320/DSCF8430.JPG
On Feb 14, 2008 6:09 PM, Peter Dawson <[EMAIL PROTECTED]> wrote:
> You insensitive bastard . TASK will get you !! :)-
>
> .pd
>
>
>
> On Thu, Feb 14, 2008 at
Fredrick Diggle named one of the monkeys at the zoo after him... Only
its not a very good effigy because Dude VanWinkle the monkey is
actually quite smart. I guess he should have named the little emo
monkey who sits in the corner and cuts himself after Dude instead. Oh
wells.
On Feb 15, 2008 3:11
But then what will Fredrick Diggle do with free time at zoo? google
code search regexing is all he knows :(
On Feb 15, 2008 2:17 PM, reepex <[EMAIL PROTECTED]> wrote:
> I could not agree more! no talent = do not post ... every one else agree
> with me and securfrog?
>
> On Fri,
Not having a mustache capable of sustaining an entire ecosystem does
not make Fredrick Diggle a troll.
On Feb 12, 2008 5:14 PM, <[EMAIL PROTECTED]> wrote:
> On Tue, 12 Feb 2008 17:05:14 CST, Randy Mueller said:
> > STOP FEEDING THESE IDIOT TROLLS
>
> Many would claim, based
Fredrick Diggle has it on good authority that netdev, Anonymous, and L
Ron Hubbard's ghost are one and the same. I would be careful who you
insult Mr college sys admin man.
On Feb 11, 2008 10:57 AM, <[EMAIL PROTECTED]> wrote:
> On Sat, 09 Feb 2008 21:29:59 GMT, worried security s
Fredrick Diggle would like to remind Gadi that everyone he knows is
going to die. If that simple fact means that you can't be mean to
anyone then this is not a world that Fredrick Diggle wants to live in.
YAY!
On Feb 11, 2008 2:43 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:
> I was
SkyOut is a Fredrick Diggle Sec contributer... We suggest you think
very carefully before insulting him further. Consider yourself on the
list reepex.
On Feb 6, 2008 9:57 PM, reepex <[EMAIL PROTECTED]> wrote:
> your 'disclosure' is lame and so is your site. Could you please
How much does the reputation Defender charge for to send the emails to
mailing lists begging that they take down bad things about Fredrick
Diggle. He is interested in their services and also for to have them
ban certain libel people from the internets. Is this possible and how
much will it cost
Hear that H.D.? While analyzing security for UT Dallas Paul came to
the conclusion that you suck...
On Jan 17, 2008 5:32 PM, Paul Schmehl <[EMAIL PROTECTED]> wrote:
> --On Thursday, January 17, 2008 15:16:30 -0600 Fredrick Diggle
> <[EMAIL PROTECTED]> wrote:
>
> > Seems
All men have some prejudice, but few have true genius.
On Jan 18, 2008 10:13 AM, T Biehn <[EMAIL PROTECTED]> wrote:
> This thread has a lot of promise.
> <- Sits back with a cold one.
>
>
> On Jan 18, 2008 10:56 AM, Byron Sonne <[EMAIL PROTECTED]> wrote:
> > > Not exactly Info-sec but I think many
Fredrick Diggle apologizes, he always forgets that exploitation is
IMPOSSIBLE if there is no how-to in phrack. Racing your own buffer is
hard Lombard so he feels your pain :(
Also how dare you accuse Diggle Sec of releasing fake vulnerabilities.
Continue down that train of thought and you are
Seems to Fredrick Diggle that if you are any good at your job you
should be thanking the sheltered research corner for keeping you in
mustache wax. If you inform your clients of the realistic risks
involved then you also must realize that very few researchers are
actually finding the types of bugs
Sascha,
Thank you for your disclosure of similar vulnerabilities in
Dreamweaver, vi, and emacs. Fredrick Diggle Security will be happy to
publicly disclose these in future FDSA's. We will credit you for
finding these vulnerabilities.
Thank you,
Fredrick Diggle, Esq.
On Jan 17, 2008 12:
###
Fredrick Diggle Security Advisory
Application: Sort
Versions: 5.1.2600.0 verified to be vulnerable
Platforms: Microsoft Windows (All Versions)
Bugs: Format String Vulnerability
Severity: Quite
###
Fredrick Diggle Security Advisory
Application: Notepad
Versions: 5.1.2600.2180 verified to be vulnerable
Platforms: Microsoft Windows (All Versions)
Bugs: Cross Site Scripting (XSS)
Severity
its called wireshark now... shows how el8 you are.
On Jan 17, 2008 10:29 AM, reepex <[EMAIL PROTECTED]> wrote:
> so gadi can use ethereal and uninstall malware? congrats?
>
>
>
> On 1/17/08, Richard Golodner <[EMAIL PROTECTED] > wrote:
> > I have been friends with Gadi through email for ma
Who knew Gadi was actually smart... He should post some of his
smartness to the list to convince us all. Also Fredrick Diggle uses
his real name but no one steps up for him :(
P.S. Hello frederal agents. I have been trying to contact you but your
offices always hang up on me. I wanted to tell you
also keep all moneys in mattress bank. is only safe place and interest is good.
On Jan 16, 2008 9:38 AM, coderman <[EMAIL PROTECTED]> wrote:
> On Jan 16, 2008 4:53 AM, Frank Sanders <[EMAIL PROTECTED]> wrote:
> > Can any one recommend such system ?
>
> ingredients:
> - c7 core with padlock crypto
Fredrick Diggle Security has a similar mantra. I feel that our groups
have a lot in common and could greatly benefit from sharing
information. I would like to propose a partnership. Fredrick Diggle
Security currently participates in an international allegiance of
corporations which support one
No
On Jan 15, 2008 12:32 PM, Neeraj Agarwal <[EMAIL PROTECTED]> wrote:
> Hello,
>
> Please go through the attached file.
>
> --
> With Best Regards,
> Neeraj Agarwal
> BITS Pilani
> Mobile : +91 9983523130
> ___
> Full-Disclosure - We believe in it.
> Ch
###
Fredrick Diggle Security Advisory
Application: Your Computer
Versions: All Versions Affected
Platforms: All Platforms Affected
Bugs: Buffer Overflows
Severity: Xtreme
Date: 15 Jan 2008
Credit
architect
pdp: what's up bro
fred diggle: have you found the xss lately
pdp: yes many xss bugs
fred diggle: monkey()
pdp: your sarcasm is quite childish and kind of dull really, have you
though about that ? <-- how rude :( [smile]
fred diggle: Fredrick Diggle tries not to think about himsel
The evil .gov are gonna subpoena hushmail for his identity because he
told the sec review guy things about a company no one cares about...
Oh noes!
On Dec 20, 2007 6:32 PM, coderman <[EMAIL PROTECTED]> wrote:
> On Dec 20, 2007 4:06 PM, Dude VanWinkle <[EMAIL PROTECTED]> wrote:
> > ...
> > WTF are
You hax0red the hushmail and stole his ip address information thing?
Can I has your sploitz plz?
On Dec 20, 2007 5:35 PM, don bailey <[EMAIL PROTECTED]> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> reepex wrote:
> > nothing don ever does is useful or funny
> >
> > On Dec 20, 2007 2
###
Fredrick Diggle Security Advisory
Application: The Internet
Versions: All Versions Affected
Platforms: All Platforms Affected
Bugs: XSS (Xtra Serious Software bugs)
Exploitation: Remote
Severity
the
> command 'pkill -11' on the program, for example, memory corruption
> seems to occur, and most modern operating systems output the buffer
> overflow code:
>
> Segmentation fault
>
> I hope you consult with experts before being so hasty to post your
> attempt at
also
YAY!
On Dec 13, 2007 10:20 PM, Fredrick Diggle <[EMAIL PROTECTED]> wrote:
> You should post this to milw0rm as it can always use quality exploit code
> like this. I also have some priv8 code which I would like to disclose which
> is the same type of vulnerability.
>
You should post this to milw0rm as it can always use quality exploit code
like this. I also have some priv8 code which I would like to disclose which
is the same type of vulnerability.
/*
* Author: Fredrick Diggle
* Vuln: execve system call allows arbitrary code execution
* Status: VERY PRIV8
http://www.awarenetwork.org/home/outlaw/ezines/h0no/h0no2.txt
"Sirs, you are very missinformed as to MY involvment in this "video". I
share a site with "illwill", it was his decision solely to post and the
paypal link is under his name."
Way to stand up for you friends there MW.
YAY!
On Dec 13,
You have write perms on a users home directory and this was the best way you
could come up with to execute commands? Please send me details on your
recipe for boiled water. Be sure to gzip it though as I imagine it is
several pages long.
YAY!
On Dec 13, 2007 2:18 PM, kcope <[EMAIL PROTECTED]> wro
WRONG! Once again xss is not the exploit it is just the delivery mechanism.
You aren't doing anything here that you couldn't also do by posting the
exploit on your damn live journal right next to the paris hilton video.
Did you end up paying damages?
YAY!
On Dec 13, 2007 11:46 AM, Morning Wood <
se stop. it is getting really out
> of control and it is rather annoying,
>
> On Dec 13, 2007 3:36 PM, Fredrick Diggle <[EMAIL PROTECTED]> wrote:
>
> > Once again you completely fail at reading comprehension. Let me help.
> >
> > 1. "Saying XSS isn't a vu
em
> feel intelluctually superior to tear down the ideas of others whether they
> deserve it or not. In some cases they do. Are members of this community so
> starved for their own self worth that they strive to squash the ideas of
> others instinctively? Would make for a interesting study.
t;
> On Dec 12, 2007 10:32 PM, Fredrick Diggle <[EMAIL PROTECTED]> wrote:
> > Yes way to go MW you made his day! MW I understand how hard it is to
> turn
> > things into viable exploits :(... sometimes the best move is just to
> wait
> > for the metasploit guys to do it.
Yes way to go MW you made his day! MW I understand how hard it is to turn
things into viable exploits :(... sometimes the best move is just to wait
for the metasploit guys to do it. They are elite at bof sploitin' etc. You
should stick to the more interesting research like XSS and SQL tampering :<
de thinks its rubbish.
>
> So let it die and then all the folks who are so bored with XSS and
> CSRF can post their remarkable works and amaze us all.
>
> Jay
>
>
> - Original Message -
> From: Fredrick Diggle [mailto:[EMAIL PROTECTED]
> To: full-discl
e in plain text. Would you store your user's
password in there? Yes its a vulnerability! and I repeat, I am not gonna
lecture you on how to implement it correctly. Go read a book sir.
damn communists.
YAY!
On Dec 12, 2007 12:47 PM, Joao Inacio <[EMAIL PROTECTED]> wrote:
> On Dec 12
What no one seems to realize is that XSS by its very nature is not a
vulnerability. It is a perfectly valid mechanism to aid in exploitation but
can anyone cite me an example where xss in and of itself accomplishes
anything? I can think of pretty much 3 examples of XSS (granted without
giving it mu
85 matches
Mail list logo