On Dec 22, 2008, at 4:24 PM, anonymous pimp wrote:
> What kind of a skiddie fuck sends every phished account to his email?
Who the hell knows... maybe someone here that was bored is interested
in looking into that.
> This is the kind of phish every 12 year old kid on both sides of
> Turkey us
>
Someone is bored and out making the rounds exploiting random asp pages
and web-services.
wget http://www.adehkz.net/eb.zip
https://signin.ebay.com/ws/eBayISAPI.dll?SignIn&errmsg=8&pUserId=&co_partnerId=2&siteid=0&pageType=1883&pa1=&i1=-1&UsingSSL=1&bshowgif=0&favoritenav=&ru=http%3A%2F%2Fmy
Does anyone have an archive of the script that was being used to send
furry porn to the list via spoofed list members? I recall it was using
a mysql db on the backend.
It was sent out during this time frame:
http://www.security-express.com/archives/fulldisclosure/2006-08/thread.html
thanks
I have a buddy that is soliciting for help researching PIN numbers
used in
ATM's and things of that nature. He is in need of data-sets for
statistical
analysis. If you can help out... please do:
http://www.pinpop.com/contribute.html
http://www.pinpop.com/resources.html
Thanks
-KF
I've been beating on CS3 a bit the past few days myself... I ran
across the same issue. Here is a little helper function
def addr_to_asc_pad(addr)
low = (addr & 0x)
high = (addr & 0x) >> 16
a = (low & 0x00ff)
b = (low & 0xff00) >> 8
c
You are black too?
-KF
On Apr 4, 2008, at 6:36 AM, Kollberg, Dirk wrote:
>
>
> BTW, if someone know why I receive these penis reduction spam,
> please let me know.
>
> Thanks,
> Dirk
>
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Mary
> Landesman
worth of booze. :)
>
>
> Kevin Finisterre (lists) wrote:
>> post it here.
>>
>> http://www.tsa.gov/blog
>>
>> -KF
>>
>> ___
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.gr
post it here.
http://www.tsa.gov/blog
-KF
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
I don't recall off the top of my head what they were but there are
other ways to use this program to obtain root. I believe the scheduled
recording can be used to leverage root if I remember correctly.
-KF
On Nov 26, 2007, at 10:15 AM, David Wharton wrote:
> Version 1.0
> October 1996
>
http://www.scottstevens.podshow.com/
-KF
On Nov 13, 2007, at 11:49 AM, <[EMAIL PROTECTED]> wrote:
> Check this out...
>
> http://www.rollingstone.com/politics/story/16956300/the_prophet_of_c
> limate_change_james_lovelock
>
>
>
> --
> Need cash? Click to get a loan.
> http://tagline.hushmail.com
>
*cough* *cough* Sprint *cough* *cough*
excuse me. I have a bad cold.
-KF
>
> 2) Abuse of the legally mandated CALEA infrastructure by a hacker.
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.h
wow... now you are talking iDefense money!
Hell... I'll buy one for 500 bucks... then turn and resell it.
-KF
On Nov 10, 2007, at 4:49 PM, don bailey wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Ok, so the first person to disclose a Linux kernel
> zero day exploit in the next wee
ker.
>
> On Fri, 28 Sep 2007 14:00:25 -0400 "Kevin Finisterre (lists)"
> <[EMAIL PROTECTED]> wrote:
>> The *REAL* questions should be:
>>
>> is it "oh" day or is it "zero" day?
>>
>> What is proper syntax?
>>
>
The *REAL* questions should be:
is it "oh" day or is it "zero" day?
What is proper syntax?
0day
0day
0day
0day
Should you capitalize the D?
how about the Z if you choose to go with Zero?
-KF
On Sep 28, 2007, at 1:24 PM, [EMAIL PROTECTED] wrote:
> On Fri, 28 Sep 2007 17:29:51 BST, worried
Partial disclosure rocks...
-KF
On Sep 21, 2007, at 3:53 PM, Thierry Zoller wrote:
> Dear All,
>
> pa> http://www.gnucitizen.org/blog/0day-pdf-pwns-windows
> Is this the way responsible disclosure works these days ?
> "Adobe’s representatives can contact me from the usual place."
>
> Wow, now th
Not sure if you guys have all seen this yet but it is interesting to
say the least all I can say is .u wow.
http://www.info-pull.com/code/pwnpress-gui.rb
Looks like even grandma can play along now!
-KF
Begin forwarded message:
From: "Michael Myers" <[EMAIL PROTECTED]>
Date: Septemb
What you mean like Jerry Franke ?
The name is Toby btw... and they are not name drops .. they are call
outs.
-KF
On Aug 30, 2007, at 12:02 AM, Joey Mengele wrote:
> Dear List,
>
> On Wed, 29 Aug 2007 23:22:27 -0400 "Kevin Finisterre (lists)"
> <[EMAIL PROTECTED]>
Great... Sprint's incompetent ass running a secure network for
eavesdropping. How ironic these goons can't even keep a handle on
things down in Kansas City, now this.
Lauren Proctor you still out there buddy?
Sprint Security spreads lies
-KF
On Aug 29, 2007, at 9:27 PM, Ivan . wrote
MCA. They were worried
> security researchers would be sued for trying to release vulnerability
> information. But since that turned out to be unfounded, I guess we
> don't
> have to worry about the German thing. ;)
>
> BB
>
>
Would you have honestly provided *MORE* detail prior to the law being
in effect?
Doesn't the law refer to things that are intended to be used for
illegal activity?
I don't recall the advisories being any more verbose pre law
Thanks.
-KF
On Aug 27, 2007, at 4:41 PM, Sergio Alvarez wrote:
> On Fri, 17 Aug 2007 11:39:20 -0400 "Kevin Finisterre (lists)"
> <[EMAIL PROTECTED]> wrote:
>> He is a company conduit in my mind... if people are still having
>> problems with with latin based tech support and I happen to have
>> an
>> alternate conduit
else.
>
> J
>
>
> On Fri, 17 Aug 2007 00:12:19 -0400 "Kevin Finisterre (lists)"
> <[EMAIL PROTECTED]> wrote:
>> Hrmm I am wondering if several people are toying with me or if
>>
>> something is really going on over in Xbox Live support?
>>
Hrmm I am wondering if several people are toying with me or if
something is really going on over in Xbox Live support?
Well Slavik Plotnikov after posting my information at http://
www.digitalmunition.com/StolenUpdate.html and speaking with the media
Scott Hirnle ultimately took
care of
On Aug 9, 2007, at 12:20 PM, Jay wrote:
> This list is about Full Disclosure, exploits vulnerabilities etc.
>
> Noone gives a rat arse whether some whiny n00bz cant play Halo.
>
> Find another list to gripe about customer service issues.
Fire up your inbox filter... gripe about your list issues
rdware queue are not even Xbox
> Live customers. Therefore, they don't have the same data to verify
> against and as a result, our agents don't have visibility into it
> and our entitlement process is different for each line of business.
>
> Scott
>
> -----Or
I find it kind of ironic that my Xbox broke last night after an
update and I am now on the phone with a Xbox live representative.
After the whole stolen accounts fiasco I remember calling in an
having techs flat out refuse to work with you until you verified your
full name, address, phone n
Hi Ashley... I can certainly understand your frustration. Although my
account was "taken care of" and I was ultimately given some things to
quiet me down, I never got an explanation of what *really* happened,
I never got any information about who I could prosecute or anything
like that. As
Yeah... Adriel loves the cock.
-KF
On Jul 23, 2007, at 6:40 PM, Joey Mengele wrote:
No, I forgot. I now remember, thank you. As long as we agree that
you were wrong, I was right, and you are an ignorant jackass who
may or may not have had sexual relations with the Oreo named KF, I
see no need
This is a heads up email to let you know that Kismet wireless sniffer
once again compiles on OSX machines and is now able to sniff on some
Airport Extreme enabled macs.
http://www.kismetwireless.net/blog/index.php?entry=/kismet/
entry-1183695339.txt
I have tested multiple intel based Macs an
I DO NOT agree with selling any exploit and I definitely believe
this is stupid.
Do you agree that you are often spoon fed free information by
individuals that are not paid for providing you a service?
Is it so bad that some of these nice people would ask for a little
compensation here a
If anyone winds up with crash dumps from when Tunes syncs with the
iPhone I wouldn't mind having a few of them.
They should be located in /Library/Logs/CrashReporter/MobileDevice/
Wee everything runs with Effective UID: 0
-KF
On Jul 1, 2007, at 6:32 PM, Stephen Hildrey wrote:
Fabio Pie
While you are at it...
http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/
061-3538.20070629.B7vXa/iPhone1,1_1.0_1A543a_Restore.ipsw
-KF
On Jun 29, 2007, at 8:10 PM, John Smith wrote:
> http://www.andrew.cmu.edu/user/xsk/iPhoneSecuritySettings.html
>
> John
>
> _
http://www.ifixit.com/Guide/iPhone
-KF
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
The 522+ stuff I can confirm as vulnerable. That particular build
number is associated with the current version of the "nightly" webkit
build.
http://nightly.webkit.org/
419.3 is associated with the current Security updates on 10.4.9 I am
pretty sure.
-KF
On Jun 5, 2007, at 2:08 PM, Michal
Small plane or Balloon perhaps?
http://arstechnica.com/articles/culture/warflying.ars
-KF
On Apr 6, 2007, at 4:41 PM, Troy Cregger wrote:
> Where I'm at, you'd be in a tree.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/
Anyone wanna buy a used BPA100?
=]
-KF
On Apr 1, 2007, at 2:15 PM, Giorgio Fedon wrote:
> - To Thierry:
>
> > Oh, dear, here is my "thinly veiled advert" for you :
>
> > - You can potentially be sued for this (I would sue you,
> > see you are slandering a consultant here that g
Giorgio if anything he is blowing the whistle on the vendors that
charge a metric shit ton for a piece of hardware that is not necessary.
-KF
On Apr 1, 2007, at 11:17 AM, Giorgio Fedon wrote:
> | Hi,
> |
> | You missed the point completely. He's not promoting software
> piracy but
> | showing
Here is my current update on the situation.
http://www.digitalmunition.com/StolenUpdate.html
-KF
On Mar 25, 2007, at 3:52 PM, David Vernaci wrote:
> Hi, i have been a victim of the Xbox live accounts being stolen.The
> way he
> stole my account wasnt that he hacked it, but he gained "my" tru
There are lots of folks that mention obtaining the IP in order to
hack your account. They usually say they have done this with Cain and
Able or Commview or any other sniffer out there. You IP can be easily
obtained by the usual standby groups or bridgers The only reason
they want your
Dates indicate thread start date not necessarily the offending post
date.
Clan Homepages of *some* of those that are responsible for the
attacks on Xbox live accounts.
3-19-2007 (See the blacklist and member list)
o InFamOuS o clan
http://www.oinfamouso.moonfruit.com/
3-19-2007
This Site i
ms.xbox.com/search/SearchResults.aspx?q=stolen%20account&forum=&u=&PageIndex=3
http://forums.xbox.com/search/SearchResults.aspx?q=stolen+gamertag&forum=&u=
-KF
On Mar 17, 2007, at 5:21 PM, Kevin Finisterre (lists) wrote:
There have been rumor going around that Bungie.net was
Here is someone on youtube with the same problem using a capture
card to get the guy on video talking about it. He blatantly says he
can steal any account on your xbox with just your IP address. One
side of the conversation has been cut out but you can clearly hear
the gentleman talking
?? WoW and
SL has virtual $$ being bartered into real world value...
On 3/17/07, Jason Miller <[EMAIL PROTECTED]> wrote:
I'm sorry but I find this funny actually. :-P Seems Microsoft has a
weakness.
On 3/17/07, Kevin Finisterre (lists) <[EMAIL PROTECTED]>
wrote:
> T
icrosoft has a
> weakness.
>
> On 3/17/07, Kevin Finisterre (lists) <[EMAIL PROTECTED]>
> wrote:
>> There have been rumor going around that Bungie.net was hacked and
>> that a portion of Xbox live has been taken over because of it. Some
>> folks are having
There have been rumor going around that Bungie.net was hacked and
that a portion of Xbox live has been taken over because of it. Some
folks are having their Microsoft points stolen and or points
purchased via their stolen gamer tag.
I just got off the phone with a Microsoft Tech for Xbox liv
45 matches
Mail list logo