Re: [Full-disclosure] [SPAM] Re: Ektron CMS TakeOver Part (2) - PaylPal-Forward.com demonstration

2014-02-05 Thread Randal T. Rioux
On 2/4/2014 6:36 PM, Mark Litchfield wrote: On 2/4/2014 3:13 PM, security curmudgeon wrote: : This is not the behavior of the site as of 48 hours ago. : Let me check. Normal registration should also be available ? Infact I : will remove the registration. : : The purpose of this whole

Re: [Full-disclosure] INSECT Pro - Free tool for pentest - New version release 2.7

2011-08-28 Thread Randal T. Rioux
On 8/28/2011 6:52 PM, Juan Sacco wrote: This isnt a company making a big product, Im doing this because I like doing it. Good for you. I think that is great. But you are pretending to be a big company. Stop that. I am happy to see you removed that silly donation-for-download scheme. I'm

Re: [Full-disclosure] International Master In Computer Security and Cyberwarfare

2011-05-26 Thread Randal T. Rioux
How can you expect to be taken seriously when your Web site doesn't have pictures of attractive, multi-ethnic women in business attire pointing at holographic displays of random binary digits? Bah! Randy On 5/23/2011 10:10 AM, Mastere NIS wrote: Our master “/Network and Information security/”

Re: [Full-disclosure] Stuxnet

2011-05-01 Thread Randal T. Rioux
On 05/01/2011 01:38 PM, satyam pujari wrote: *request* Hello FD, Can anyone handle this guy please ? Allow me to spin this broken record again... Censorship = Bad E-Mail Filters = Good Take control of your inbox and don't rely on others! Randy ___

Re: [Full-disclosure] SSL Capable NetCat and more

2011-03-30 Thread Randal T. Rioux
On 3/27/2011 4:29 PM, Dan Tulovsky wrote: Beside that, scnc is written in pure-Perl, and is easily modifiable by anyone. Such really simple (dumb?) stuff should not be written in low-level languages such as C. You can't be serious... Shirley, he is. Perl is shite. It's a dependency hell,

Re: [Full-disclosure] Your email message was blocked

2011-03-30 Thread Randal T. Rioux
On 3/30/2011 11:31 PM, r...@bellaliant.ca wrote: The following email message was *blocked* by Bell Aliant Content Filtering Device: *From:* ra...@procyonlabs.com *To:*peter.mo...@bellaliant.ca *Subject:* Re: [Full-disclosure] SSL Capable NetCat and more

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread Randal T. Rioux
On 3/29/2011 9:13 PM, runlvl wrote: Insecurity Research is happy to announce the release of version 2.5, get it now while is still hot ! Insect Pro 2.5 is a penetration security auditing and testing software solution designed to allow organizations of all sizes mitigate, monitor and manage

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-03-30 Thread Randal T. Rioux
On 3/29/2011 9:13 PM, runlvl wrote: Insecurity Research is happy to announce the release of version 2.5, get it now while is still hot ! snip Oh! And you list the Dept. of Energy as a customer. I used to work there, and still talk to a lot of the security offices for various locations. They've

Re: [Full-disclosure] from hbgary: stuxnet, WL attack, Psyop and Anonymous trackdown

2011-02-15 Thread Randal T. Rioux
Thought this would be appropriate :-) http://xkcd.com/149/ On 2/15/2011 4:00 PM, Eyeballing Weev wrote: What do you expect from a woman? Rebecca, kindly make me a sandwich On 02/15/2011 03:44 PM, Cal Leeming [Simplicity Media Ltd] wrote: I did apologise, no need to drag it out into the

Re: [Full-disclosure] OpenBSD Paradox

2010-12-15 Thread Randal T. Rioux
On 12/15/2010 5:00 PM, BMF wrote: 2010/12/15 musnt live musntl...@gmail.com: What is this time to stop the press! This fake broken English schtick is really stupid and annoying. Knock it off. In the meantime you are kill filed. I suggest everyone else do the same as nothing useful has ever

Re: [Full-disclosure] Windows is 100% self-modifying assembly code?(Interesting security theory)

2010-12-10 Thread Randal T. Rioux
On 12/10/2010 10:10 AM, John Horn wrote: Is this a joke? -- John Horn City of Tucson, IT Department Network Services (Network security) Phone: (520) 837-6036 -- CONFIDENTIALITY NOTICE: If you have received this

Re: [Full-disclosure] Paypal XSS Vulnerability - Resolved

2010-03-27 Thread Randal T. Rioux
I find it humorous that an organization that pretends to be a bank and regularly steals money from its members has the balls to distribute a PayPal Responsible Disclosure Policy. Good luck with that. Randy On Fri, March 26, 2010 10:49 pm, Orbeton, Jon wrote: All: The XSS vulnerability

Re: [Full-disclosure] SecurityFocus to partially shut down

2010-03-12 Thread Randal T. Rioux
On Fri, March 12, 2010 1:45 pm, Michal Zalewski wrote: http://www.securityfocus.com/news/11582 While the news portal section of SecurityFocus will no longer be offered, we think our readers will be better served by this change as we combine our efforts with Symantec Connect and continue to

Re: [Full-disclosure] How I become Vice President of Security at Yahoo! 1999-2005.

2010-02-19 Thread Randal T. Rioux
Decent attempt at trolling. Some beginner mistakes, but the message was relayed as intended (I'm sure). Comments inline. On Fri, February 19, 2010 6:45 pm, John Q Public wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings. I've been holding this one back for a while. It's been

Re: [Full-disclosure] Peiter Mudge Zatko petition to be named U.S. Cybersecurity Chief

2009-09-17 Thread Randal T. Rioux
The Sp3ctacle wrote: http://www.ipetitions.com/petition/mudge4cyberczar/index.html This petition is posted in support for the nomination of Peiter Zatko (aka mudge) to the President's post of Cybersecurity Chief. We've all seen how effective past efforts have been regarding this initiative,

Re: [Full-disclosure] Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

2009-09-14 Thread Randal T. Rioux
It's fun :-) On Mon, September 14, 2009 12:14 pm, D-vice wrote: You wrote an exploit in java *head explodes* On Mon, Sep 14, 2009 at 6:02 AM, Randal T. Rioux ra...@procyonlabs.comwrote: After testing my version of the exploit (using Java instead of Python) I tried it against

Re: [Full-disclosure] Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

2009-09-14 Thread Randal T. Rioux
On Mon, September 14, 2009 12:02 am, Randal T. Rioux wrote: After testing my version of the exploit (using Java instead of Python) I tried it against a Windows Server 2008 R2 installation - it went down. http://www.procyonlabs.com/software/smb2_bsoder Randy laurent gaffie wrote: Advisory

Re: [Full-disclosure] Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

2009-09-13 Thread Randal T. Rioux
After testing my version of the exploit (using Java instead of Python) I tried it against a Windows Server 2008 R2 installation - it went down. http://www.procyonlabs.com/software/smb2_bsoder Randy laurent gaffie wrote: Advisory updated : = -

Re: [Full-disclosure] Slashdot hacked?

2009-07-23 Thread Randal T. Rioux
On Thu, July 23, 2009 5:47 pm, Compsec Guy wrote: What's wrong with Slashdot today? Nothing. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Black Hat USA Videos available to D/L

2009-04-02 Thread Randal T. Rioux
On Mon, March 30, 2009 8:14 pm, jmoss wrote: Hey Full Disclosure, I am proud to announce that the audio and video from BH USA 2008 is now available for free download, and is in several formats, the first of which is a large, hi-res format with video-sync speaker and presentation:

Re: [Full-disclosure] Microsoft takes 7 years to 'solve' a problem?!

2008-11-25 Thread Randal T. Rioux
On Tue, November 25, 2008 1:44 am, Memisyazici, Aras wrote: SSNNIIPP OK... Maybe I'm going a bit extreme, but WTH?! Am I the only one who is interpreting this, this way? Really? When has releasing a solution to a problem 7 years later ever been acceptable? May not be acceptable, but it is

Re: [Full-disclosure] n3td3v not a troll

2008-09-15 Thread Randal T. Rioux
On Mon, September 15, 2008 1:08 pm, n3td3v wrote: On Mon, Sep 15, 2008 at 5:49 PM, [EMAIL PROTECTED] wrote: On Mon, 15 Sep 2008 08:09:12 BST, n3td3v said: n3td3v is outspoken but hes not a troll. he is a serious security researcher with his own mailing list. ... and then someone hurtfully

Re: [Full-disclosure] security news on cnet???

2008-09-02 Thread Randal T. Rioux
On Tue, Sep 2, 2008 at 11:07 AM, n3td3v [EMAIL PROTECTED] wrote: you've not post any security news all week, what's going on cnet??? is the journalist that does the security news off ill??? :( yours, cnet fan surely they will cave to pressure from the global powers of the netdev group. i

Re: [Full-disclosure] DIE IN A FIRE post

2008-08-27 Thread Randal T. Rioux
On Wed, August 27, 2008 11:34 am, Simon Smith wrote: Hi Mike, Next time you decide to say something stupid make sure that you do it anonymously. Michael C Shirk Home: 4205 Chapel Gate Pl Belcamp, MD 21017-1636 (410) 273-1377 M. Shirk wrote: DIE IN A FIRE !!!1!1! Shirkdog ' or

Re: [Full-disclosure] simple phishing fix

2008-07-29 Thread Randal T. Rioux
On Tue, July 29, 2008 2:31 pm, [EMAIL PROTECTED] wrote: You might eliminate phishing but there are occasionally messages from people at these institutions also. This sort of thing is in essence allowing phishers a denial of service attack against anyone they choose to make themselves a

Re: [Full-disclosure] Panda ActiveScan 2.0 remote code execution

2008-07-04 Thread Randal T. Rioux
On Fri, July 4, 2008 7:02 am, Panda Security Response wrote: Please allow at least one week for us to respond before public disclousure. We only received this information a few days ago. Regards, -- Pedro Bustamante Senior Research Advisor Panda

Re: [Full-disclosure] Snort Signature to detect credit cards

2008-05-09 Thread Randal T. Rioux
FYI - http://www.emergingthreats.net This was discussed on the snort-sigs mailing list back in 2003. Check out http://marc.info/?l=snort-sigsm=106601612825950w=2 Also, as Ray mentioned, the Emerging Threats emerging-policy.rules contains some PCRE CC# checks. This will show you some: $ more

Re: [Full-disclosure] Out of Office AutoReply: Snort Signature to det ect credit cards

2008-05-09 Thread Randal T. Rioux
On Fri, May 9, 2008 4:23 am, West, Bill (USA) wrote: I am no longer on-site full time and have limited access to e-mail. I will respond to you as soon as I can. If your issue is an emergency, please use the contacts below. Emergencies for MTU Users: Contact Augustin Schuster, +1-860-667-6620

[Full-disclosure] netdev threadjack and spam and al-qaeda mi5 underground contacts secrets

2008-04-11 Thread Randal T. Rioux
On Fri, April 11, 2008 4:41 pm, n3td3v wrote: I'm an unemployed working class dude, i'm not part of the industry. Can one be unemployed and working class at the same time? If one works in security in a capacity to earn an income, would that not automatically place them in the industry?

Re: [Full-disclosure] hacking a pacemaker

2008-03-14 Thread Randal T. Rioux
On Wed, March 12, 2008 4:57 am, Gadi Evron wrote: Almost a year ago I gave a talk at the CCC Camp in Germany I called hacking the bionic man. It even made Wired, in some fashion. http://blog.wired.com/27bstroke6/2007/08/will-the-bionic.html

Re: [Full-disclosure] Dude VanWinkle's Death

2008-02-11 Thread Randal T. Rioux
I always think of these pics when those precious snowflakes post nonsense: http://i118.photobucket.com/albums/o100/EMPulse_of_KC/itg_quarterly.jpg http://www.stevelambe.com/posts/Nerd.jpg http://www.encyclopediadramatica.com/images/8/88/Itg.jpg Attention whores, the lot of them. Par for the

Re: [Full-disclosure] [FDSA] Notepad Highly CriticalCross-SiteScripting (XSS) Vulnerability

2008-01-17 Thread Randal T. Rioux
Fredrick Diggle Security Advisory Application: Notepad Versions: 5.1.2600.2180 verified to be vulnerable Platforms: Microsoft Windows (All Versions) Bugs: Cross Site Scripting (XSS) Severity: Critically High Date: 17 Jan 2008 Credit: Estr Hinan

[Full-disclosure] Was secreview crap - now OpenVMS!!

2008-01-02 Thread Randal T. Rioux
[EMAIL PROTECTED] said: Bonus points for knowing that VMS was mostly written in Bliss/32 or some such, and VM and MVS were a mixture of assembler and (later on) PL/S. No C knowledge needed for those critters... OpenVMS is less than 40% Blissful... though I'm not familiar with the original

Re: [Full-disclosure] [Professional IT Security Providers - Exposed]QuietMove ( D - )

2007-12-31 Thread Randal T. Rioux
snip hack snip snip QuiteMove http://www.quitemove.com QuietMove snip snip hack snip A tad more attention to details would be nice. Good thing you're not graded on spelling here. C-. Happy New Year, Randy ___ Full-Disclosure - We believe in it.

Re: [Full-disclosure] Security contact in att

2007-09-22 Thread Randal T. Rioux
minor float wrote: hi has anybody security contact in att? http://www.nsa.gov/contacts/index.cfm ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia -

Re: [Full-disclosure] Am I missing anything ?

2007-07-24 Thread Randal T. Rioux
http://uncyclopedia.org/wiki/Pot_v._Kettle Kradorex Xeron wrote: Simon and Joey, Your comments are not contributing anything of value to the list and is causing SNR of the list to go down. I strongly suggest for you to both take your personal banter off-list. I suspect that the rest

Re: [Full-disclosure] Macro threats

2007-06-05 Thread Randal T. Rioux
Muscarella, Sebastian (IT) wrote: snip NOTICE: If received in error, please destroy and notify sender. Sender does not intend to waive confidentiality or privilege. Use of this email is prohibited when received in

Re: [Full-disclosure] The Cyber war on Iran

2007-04-04 Thread Randal T. Rioux
Paul Schmehl wrote: SNIP You seem to be living under the delusion that your actions can somehow influence the extremists. There's only two actions that will influence the extremists in any way and that is to kill or imprison them. Anything else you might try, like trying to make nice with

Re: [Full-disclosure] Simcard 0day.

2007-01-01 Thread Randal T. Rioux
Blue Boar wrote: dfklsddshd wrote: 1. Open attachment. Does this actually work on people on a security mailing list? BB Complete scanning result of Simcard.com, received in VirusTotal at 01.02.2007, 02:38:58 (CET). SNIP you would be quite

Re: [Full-disclosure] EEYE: Intel Network Adapter Driver Local Privilege Escalation

2006-12-12 Thread Randal T. Rioux
Josh Bressers wrote: eEye Research - http://research.eeye.com Intel Network Adapter Driver Local Privilege Escalation Release Date: December 7, 2006 Date Reported: July 10, 2006 Severity: Medium (Local Privilege Escalation to Kernel) Systems Affected: Windows 2000, XP, 2003, Vista

Re: [Full-disclosure] Enron Mail archive..... oops

2006-10-30 Thread Randal T. Rioux
Thierry Zoller wrote: Dear List , Search the Enron mail archives, for example Password : http://enron.trampolinesystems.com/search/FBI#focus=/search/password I hope this code was changed: * Aspen Security Codes Email details From: Sally Keepers

[Full-disclosure] [OT for crybaby list-nazis] blah blah now D.O.A.P.

2006-09-02 Thread Randal T. Rioux
William Lefkovics wrote: Tangental to this discussion is the no doubt (to be) controversial UK film D.O.A.P. soon to be screening in Toronto. http://www.e.bell.ca/filmfest/2006/media_centre/news_releaseItem.asp?id=261 It's a docu-drama of the possible ramifications following the ficticious

Re: [Full-disclosure] Re: George Bush appoints a 9 year old to... blah blah blah

2006-09-01 Thread Randal T. Rioux
Paul Schmehl wrote: --On Tuesday, August 29, 2006 17:34:24 -0400 [EMAIL PROTECTED] wrote: On Tue, 29 Aug 2006 14:55:09 CDT, Paul Schmehl said: 1] Hezbollah has managed to become an important presence in the Lebanese Parliament They just left out - by killing opposition leaders and

Re: [Full-disclosure] IBM to buy ISS

2006-08-24 Thread Randal T. Rioux
Mike Owen wrote: Sounds like IBM is going to buy out ISS. Having too much experience in dealing with IBM contractors and support, I don't think this is a good thing for ISS or their customers. http://www.iss.net/about/press_center/releases/us_ibm_08233006.html You would think IBM would try

Re: [Full-disclosure] Tempest today

2006-08-20 Thread Randal T. Rioux
[EMAIL PROTECTED] wrote: On Sat, 19 Aug 2006 18:49:09 -0500 Bipin Gautam [EMAIL PROTECTED] wrote: Ok, here is something from the book that I was trying to assemble/write. Some Links: http://www.eskimo.com/~joelm/tempest.html http://www.erikyyy.de/tempest/ Lets begin SNIP SNIP SNIP

Re: [Full-disclosure] PassMark?

2006-06-12 Thread Randal T. Rioux
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Gary E. Miller wrote: Yo All! I thought I'd actually risk a real security question here. Any one seen the PassMark (www.passmarksecurity.com) security system in action? Yes. Bank of Bangalore^H^H^H^H^H^H^H^H^HAmerica uses it, as well

Re: [Full-disclosure] Tool Release - Tor Blocker

2006-06-04 Thread Randal T. Rioux
Jason Areff wrote: Those acronoyms prove that I know more than you apparently. Way to demonstrate your l33t hax0r skills. Jason Areff CISSP, A+, MCSE, Security+ == Better than Steven Rakick I haven't heard someone brag about an MCSE in almost a decade. The + ones are just pay to have.

Re: [Full-disclosure] Full Disclosure Code of conduct

2006-05-06 Thread Randal T. Rioux
or something. I do appreciate your goal, however this is a dirty and nasty arena. It was designed to be an alternative to the cleansed and censored corporate controlled lists. I must say, FD is still friendlier than the underground BBSs of the 80's 90's. Good times. Randal T. Rioux | Procyon Labs

Re: [Full-disclosure] IE7 Zero Day

2006-05-04 Thread Randal T. Rioux
[EMAIL PROTECTED] wrote: If you are interested in bidding. I can provide you wtih an account to provide the funds. Social Security numbers are for American citizens only so don't assume I am such a person. I'll start the bidding at $1.25 USD. Do you take checks? I have a slighty used

Re: [Full-disclosure] security at .edus

2006-04-23 Thread Randal T. Rioux
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Brian Eaton wrote: On 4/22/06, Sol Invictus [EMAIL PROTECTED] wrote: What you don't realize is that just by posting here that an Educational Institution is vulnerable to this, Some Readers (not me) might already be scanning for web

Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-19 Thread Randal T. Rioux
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Rodrigo Barbosa wrote: On Wed, Apr 19, 2006 at 07:09:11AM +0100, n3td3v wrote: On 4/19/06, Randal T. Rioux [EMAIL PROTECTED] wrote: I don't think the industry needs someone to verify an advisory for them. Actually, you are wrong

Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-18 Thread Randal T. Rioux
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 n3td3v wrote: If they did something special with their website like Securityfocus does, then I might be able to bare their illegal footer message spam, and their scene whore republication of advisories they claim are Secunia exclusives.

Re: [Full-disclosure] Noise

2006-03-29 Thread Randal T. Rioux
No. He needs to disconnect from AOL because his sister needs the phone and his mom just yelled to him in the basement to come up for dinner. php0t wrote: You need a hug. -Original Message- *From:* [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] *On Behalf Of *n3td3v

Re: [Full-disclosure] Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-26 Thread Randal T. Rioux
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Gadi Evron wrote: snip.cut.hack of security attitude I wonder why anybody believes OpenBSD is the most secure OS around. No - that would be OpenVMS duck! :-) At least until HP kills it. Randy. still wondering what is 'open' about

Re: [Full-disclosure] Fwd: SURROUNDED / SF Symantec

2006-03-21 Thread Randal T. Rioux
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Javor Ninov wrote: do you realize that your so-called popularity is based on the fact that FD is not moderated ? strange .. i don't see you on securityfocus.com n3td3v wrote: No THINK required, IS BIG, FACT. Not to defend the mighty

Re: [Full-disclosure] Re: Reported Google Vuln

2006-02-23 Thread Randal T. Rioux
Dave Korn wrote: nodialtone wrote: Google funzies. [Snip] Reference: http://seclists.org/lists/fulldisclosure/2006/Feb/0553.html Ok, I give up. Why are you posting a report to the full-disclosure list to announce a post that was posted to... the full-disclosure list? Is this