.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
--
Regards
Aditya Balapure
___
Full-Disclosure - We believe in it.
Charter: http
- http://secunia.com/
--
Regards
Aditya Balapure
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Please if you could share the code, I would like to test it for my router
as well.
Thanks
On Wed, Nov 28, 2012 at 6:02 PM, Bogdan Calin bog...@acunetix.com wrote:
Thanks aditya,
The code is not published on the blog post but it's visible in the video.
It's very simple to reproduce
pdp (architect) wrote:
http://www.gnucitizen.org/blog/0day-pdf-pwns-windows
I am closing the season with the following HIGH Risk vulnerability:
Adobe Acrobat/Reader PDF documents can be used to compromise your
Windows box. Completely!!! Invisibly and unwillingly!!! All it takes
is to open a
Hi
After looking at the mail wars , I want to say only two lines.
I dont know who Meta Info is , Lamer Buster is , LSNN is and all.
I dont know how they are generating mails and putting my name
everywhere. Thats it.
Thanks to all.
Regards
Aks
___
Hi
I have released core research paper on SIP comprising of Payload
problems and Attack vectors.
This research paper lays stress on the potential weaknesses present in
the SIP which make it vulnerable to stringent attacks. The point of
discussion is to understand the weak spots in the
Advisory : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos
Vulnerability
Dated : 15 August 2007
Severity : Critical
Explanation :
The vulnerability persists in the popup blocker functioning to allow
specific websites to execute
popup in the running instance of Internet Explorer.
security sites like secunia or idefence.
This would certainly save you from public embarrassment.
-d
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Aditya K
Sood
Sent: 17 August 2007 09:07
To: full-disclosure@lists.grok.org.uk; [EMAIL PROTECTED
hi
A specific white paper have been released comprising of
specific application problems related to Bison.
You can look into it.
http://www.secniche.org/papers/Ser_Insec_Bison.pdf
Regards
AKS
http://www.secniche.org
___
Full-Disclosure
Hi joey
Thanks. no Problem.
Regards
AKS
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Hi
WAZ is a Anti Zombie Healer written specifically for windows
platform. WAZ crafts a UDP and ICMP packets based on the ID's
and signature checks of various Zombie Agents.
WAZ consists of :
=
1. waz_tester.exe : A level 1 infection tester for zombie ports.
2. waz_killer.exe :
Aditya K Sood
SecNiche Security.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
to external templates. For more details :
http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf
Links:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3816
http://nvd.nist.gov/cpe.cfm?cvename=CVE-2007-3816
Regards
Aditya K Sood
SecNiche Security
://www.weblogs.com/clickthru?url=http://www.google.com
Vendor Status : Reported.
Regards
Aditya K Sood
http://www.secniche.org
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia
/clickthru?url=http://www.google.com
Vendor Status : Reported.
Regards
Aditya K Sood
http://www.secniche.org
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia
..
=
Regards
Aditya K Sood aka Zeroknock
http://www.secniche.org
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full
Pranay Kanwar wrote:
Hi,
Aditya Sood is no longer part of metaeye, he was
thrown out because of this kind of behaviour,
as MZ describes it.
warl0ck // MSG
http://www.metaeye.org
Michal Zalewski wrote:
On Tue, 12 Jun 2007 [EMAIL PROTECTED] wrote:
In an admittedly brief review
Pranay Kanwar wrote:
dont stretch it. do your work. threat ?? whoha! what then, are you
going to do double trap us ? or exploit us in the global space ?.
Stop vandalizing the lists and shitting on the security community.
warl0ck // MSG
http://www.metaeye.org
Aditya K Sood wrote
Michal Zalewski wrote:
On Tue, 12 Jun 2007 [EMAIL PROTECTED] wrote:
In an admittedly brief review of this page, I saw nothing useful or
informative to my career in information assurance.
Aditya has a history of using security mailing lists to advertise
his various security
message from Aditya K Sood [EMAIL PROTECTED]:
--
Hi all
The Sec Niche : dwelling Security portal is up fully. Its a
personal working arena and consultancy domain of mine.You
can check it:
http://www.secniche.org
Number of papers have been transformed ot secniche
.
Aditya K Sood aka Zeroknock
http://www.secniche.org
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Hi all
Due to some previous complexitites , there is bit
delay in work. the mlabs have been shifted to SecNiche
fully.
http://mlabs.secniche.org
You can see the things directly on this sub domain
Regards
Aditya K Sood aka Zeroknock
http://secniche.org
to
the singular group.
Thanks
Regards
Aditya K Sood a.k.a Zeroknock
http://www.secniche.org
http://zeroknock.blogspot.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http
needs.
you can find it at :
http://cera.metaeye.org/wpana.xhtml
http://zeroknock.blogspot.com/2007/06/adverse-vectors-of-coding-in-wordpress.html
Regards
Aditya K Sood
Zerkn0ck
http://www.metaeye.org
___
Full-Disclosure - We believe in it.
Charter: http
Hi all
Project CERA : Cutting Edge Research Arena is undertaken.
The project provides detailed analysis of untamed issues related
to Web exploitation , Web penetration and Web security. Due
to its wide acceptance it is projected as prime base.
http://cera.metaeye.org
Regards
Aditya K
Hi all
The penetration of web leads to origin of some new artifacts.This in turn
helps in understanding the weaknesses and flaws persist in the web
applications that lead to origin of exceptions.
Asp.net issue have been analyzed.
Links:
http://zeroknock.metaeye.org/analysis
Hi
The PHP based redirection pages inherits a design flaw in
websites.
This makes it vulnerable to phishing attacks.Look into desired issue at:
http://zeroknock.blogspot.com/2007/04/vulnerable-vectors-in-php-based.html
http://zeroknock.metaeye.org/analysis/
Regards
Zeroknock
Hi all
The PHP based applications are severely vulnerable to
global space exploitation. This gives rise to XSS .A very generic
analysis have been undertaken. Cutting edge research is on your way.
Look at the issue at:
Michal Zalewski wrote:
On Sat, 31 Mar 2007, Aditya K Sood wrote:
http://zeroknock.metaeye.org/analysis/gspace.xhtml
Just like your previous double trap XSS advisory, I fail to see the
novelty or significance of this report.
You seem to discuss an ages-old issue that had been used
- Original Message -
From: Aditya K Sood [EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Sent: Wednesday, March 28, 2007 8:49 PM
Subject: [Full-disclosure] NewOrder.box.sk Inherits Severe
RedirectionVulnerability
Hi
Previous Rootkit.com Vulnerability have been patched
://www.cgisecurity.com/ Application security news and more.
http://www.cgisecurity.com/index.rss [RSS Feed]
Hello Aditya,
I see your point there. Hope they get it fixed. Should the patch involve
some referrer checking?
Regards,
-Nikolay Kichukov
- Original Message -
From: Aditya K
Hi
Previous Rootkit.com Vulnerability have been patched.
The neworder.box.sk is famous security website.It inherits very specific
redirection attacks. The domain forwarding or URL forwarding not only
directly possible through the website but can be called from third party
directly.
A very
Hi all
Due to some server problems , the website remain down
for one day.Now its up.You can look into the desired issue at:
http://zeroknock.blogspot.com/2007/03/rootlitcom-prone-to-redirection-and.html
http://zeroknock.metaeye.org/analysis/rootkit_red.xhtml
Regards
Zeroknock
Hi
The famous rootkit.com website is prone to redirection looping
attacks.The domain context can be manipulated.
The full analysis with concept has been explained.You can look
at the desired issue.
http://zeroknock.blogspot.com/2007/03/rootlitcom-prone-to-redirection-and.html
Hi all
The intra programmed search engines are XSS driven.
you can look into the desired issue.
http://zeroknock.blogspot.com/2007/03/intraprogrammed-search-engines-prone-to.html
Regards
Zeroknock
http://zeroknock.metaeye.org/mlabs
Hi all
This analysis will enable you to the different realm of XSS injection
attacks.
No XSS cheatsheat is used in this. I am presenting the full analysis of
it.
The demonstration target is SecTheory security consultation website.
This process goes in both ways. This will throw light on the
Hi all
The security mlabs is on the way.The Link:
http://zeroknock.metaeye.org/mlabs
Regards
Aditya K Sood
http://www.metaeye.org
http://zeroknock.blogspot.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure
Advisory : Redirection Vulnerability In Versigin Weblogs
Expalantion:
The weblogs is a verisign service for currently
updating the blogs and provide requisite information
to the users of specific blog which has been updated.
The weblog can act as a base for redirection attacks
because traffic
.
The security parameters are changed.
Aditya K Sood
Handle : Zeroknock
http://zeroknock.metaeye.org
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored
Hi Everyone
Orkut help search possess spamdexing search.A full advisory you cam see at
http://www.metaeye.org/?p=24#more-24
Regards:
ZeroKnock
MetaEye Security
___
Full-Disclosure - We believe in it.
Charter:
Hi Everyone.
A very specific vulnerability occured in the AOL Website.
The advisory you can check at main metaeye website.
http://www.metaeye.org/?p=25#more-25
Regards:
ZeroKnock
MetaEye Security
___
Full-Disclosure - We believe in it.
Charter:
Dave No, not that one Korn wrote:
Aditya Sood wrote:
This post deals with the googling effects that google provide with its
search engine.
You just invented a new phrase that does not exist in any dictionary.
What are googling effects? And how did you expect everyone else
Aditya Sood wrote:
Dave No, not that one Korn wrote:
Aditya Sood wrote:
This post deals with the googling effects that google provide with its
search engine.
You just invented a new phrase that does not exist in any dictionary.
What are googling effects
Hi Everyone
This post is text version of my previous post which is in PDF.
That people asked to be in text , so its here.
Abstract:
This post deals with the googling effects that google provide with its
search engine.Since in searching algorithms the metacharacters are
handled with proper
Hi
This is not portal to show obscene stuff.Dont take
it wrong but this is not the right way.
Pink Hat wrote:
Prove it or its FUD. You and your crackhead friend already fucked it
up at Toorcon so now you are trying here.
On 10/10/06, darkcube [EMAIL PROTECTED]
Andrew Farmer wrote:
On 10 Oct 06, at 18:29, Aditya Sood wrote:
This post deals with the googling effects that google provide with its
search engine.Since in searching algorithms the metacharacters are
handled with proper filtering techniques which we have not seen it in
google.Already
Why not do a self-regulating list? Something along the lines
of keeping
track of signup dates and IP addresses, then when a yahoo starts
spouting crap, put it to a vote on list. (only members older then xyz
date have a vote) If the list's wish is to have the user
banned, then so
be
Hows about instead of moderation, we try vote-kicking?
I support this one, but who decides how many votes are
sufficent to get someone kicked ? And what about the
Votes that can be automated ?
I bet someone will create a huge farm for voting
Whenever there is any voting all the results
No offense intended directly to the OP:
Honestly, who gives a shit. Is this what this list is to be used for
these days? Are there no better OT forums, channels, cups w/string
that can be reserved for this type of chatter?
For this kind of posts we have a mailing list :
Fun and Misc
Heck they even block WinPcap_3_1.exe the network drivers that are
Used by many programs And these are just the drivers.
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)
See below marc email part
Aditya Deshmukh [EMAIL PROTECTED] wrote:
If you read the last line in para 6 you will find that anon
mailbox is
a requirement for SOX compliance.
And mailbox was ment for email Michael :)
But I think that with a post and some concrete mailbox
Why cant you use google to find out this ?
The same reason you can't use Google and find your answer fuckbag.
Are you n3td3v ?
*In the para 4*
Protecting whistleblowers is an essential component of an ethical
and open work environment.
No mention of an anon email address here.
Hi list, I've been a firm advocate of Sygate Pro for some
time but as Symantec
has bought and canned it I'm wondering what you guys would
recommend as a
replacement.
Tiny Firewall 2005 works for both 64 and 32 bit machines
And is good - I have been using in since version 2.1.5
And now
How about one-time passwords? Just go ahead and *let* them
keylog it all
they like; by the time they've snarfed a pw, it's no use any
more. (See S/Key for more details.)
Please no one time passwords: they are a nightmare to manage
That is a help and support account that you should disable.
Also set very long random password and forget it.
I prefer simply delete it. Good choice?
But I heard a rumours that this account can be activated remotely
without user's aware decision and used for Remote Assistance (e.g.
Hello full-disclosurers,
Does anyone know anything interesting about Support_388945a0 account
which is created by default during Windows XP/2003 installation?
I have seen MS technet links, maybe someone knows more about?
That is a help and support account that you should disable.
Also
I has wondered the meaning of support_388945a0 too,
but not the meaning of the account, but the meaning of 388945a0.
As you may know, it can be interpreted as 4 Bytes hexadecimal
number...
It's a randomly generated number that generated for this
account name
Seeing how my question was ignored. I will tell you the answer.
There is no requirement in SOX to do this.
Why cant you use google to find out this ?
---
http://www.nonprofitrisk.org/nwsltr/archive/employprac091005-p.htm
*In
How do I create a totally anon mailbox as required by the sox ?
How are you doing this in your site ?
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)
I hope the turkey returns... we need more useless local root
exploits...
Which can run only when you are root ;)
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)
create an folder on deskop and name it as notepad.
open internet explorer go to view source code this
will open the
contents of notepad folder!!
Even better: rename any exe to notepad.exe ;)
Is this IE being so stupid as to run with a CWD of Desktop
and effectively doing
this does not work on win2k sp4
srp5
Not sure if you guys are aware of this issue windows
XP...!!
create an folder on deskop and name it as "notepad".
open internet explorer go to view source code this will
open the contents of notepad folder!!
Sorry for the top post
If you are going to do something like this then RSA cards are the best
specially securid
It can be implemented almost out of the box and it has great lib support
also.
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf
Was doing some testing [xfocus-AD-051115]
Ie Multiple antivirus failed to scan
malicous filename bypass vulnerability
The system is windows 2000 sp4 srp5 with
all other patches upto date.
At the command prompt cmd.exe execute
the following with the results.
I copy and paste from cmd.exe
axo Demonstration here:
axo Choose a malicious file which would be detected, such as nc.exe,
axo rename the file as nc??.exe (?? =Hex C0 D7 BA DC)
axo Because these special names are unable directly to input, so if you
axo want to run these file, you should use the following way:
Could you please stop mailing your Bug-Fix-Reports aka Package xyz
updated to the Full*-Mailinglist?
I don't find those mailings objectionable. I think this is an
appropriate forum.
These mailings are not objectionable but when they have their own
Mail list so why send a copy to full
ideas for other good bug lists besides full disclosure?
VulnWatch: vulnerability disclosure list
http://www.vulnwatch.org/
This one is good. There is a discuss list also that you might want to
subscribe...
___
Full-Disclosure - We
Blocking Skype Using Squid and OpenBSD
Hey I cant wait to try out this one - this is really intresting one.
Very informative writeup. Thanks rootn0de
Delivered using the Free Personal Edition of Mailtraq
Thanks in advance if you can send in .txt format
No need - you can download most of it off the Spamcop web site then
write a trivial wrapper.
trivial wrapper! No it is not. There is some java script in that
form which is stopping the mail reports from being send out, to the
Admins, ISP
If the term future law suits for copyright infringement
pops into your head, you wouldn't be alone.
Would you give them any real info ?
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)
Has anyone got a automated spamcop reporting script?
Thanks in advance if you can send in .txt format
preferably offlist.
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)
Has anyone got a automated spamcop reporting script?
Thanks in advance if you can send in .txt format
preferably offlist.
I hit the send before I could explain what I wanted to do...
I have a spamcop account - and I managed to get the spamcop
Url with the reportID to a file using
Yes
Note to list admins -- add filtering rule to reject messages with
Subject: lines matching *Digest, Vol*...
Nick, hi... why would you want to filter out the digests? will this
eliminate digests from my subscriptioin?
He is saying to filter the replies to the digest that have the
something else that's different between your two setups?
This I would agree, would you both be helpful to send the .dmp file
Or aleast windbg.exe output ?
Delivered using the Free Personal Edition of Mailtraq
I have been seeing this in my logs over all the public smtp server, from
all over the net.
Anyone know what sends these kinds of helo ?
*please* when responding to this mail trim out anything below this --
124 09/10/2005 09:54:35 HELO -1209283632 --- 250 my.smtp.domain.server
125
Sorry for the very noob question, but I'm having very hard times finding
such products.
What are you going to use that product for. Give us a idea of the end users
and how they are going to use this Your details right now are bit on the
less side.
For what I make out of your post are your
I myself use this method to open up the SSH port for a particular IP
address. When you try to open a particular URL on my website,
you get a 404
because that document doesn't exist. The webserver logs this.
A script in
the background sees in the log that this happened, and opens
up
FYI,
I've had the site www.ok-ok.biz disabled by the ISP, at least
it will deny the
perps the ability to find out who has been compromised. The
molecularmultimedia
site is obvioulsy just a front, will see what can be done about this.
The site was found after 2 different attempts here are
I have one user who keeps getting cyrilic spam, but I cant find a rule
anywhere.
Is anyone else getting this kind of spam??
Welcome to the club of cyrilic spam recipects, we have many existing members
The rule that you want to create is this
If the message body or header contains
As for people committing suicide, I believe those who did commit suicide
actually were in possession with intent. If not why commit suicide. I
would have fought tooth and nail.
I hate to say this but with these kinds of cases where the media crucify the
accused even before they are convicted.
say... a backdoor want to communicate to its server... It can do
is, use a trusted internal application to do the job. Suppose; it
creates a batch file run the batch file (evil.bat) executes this
command
this has been going on for years - there are some trojans that create
An
Not if the U.S security services decide to have a war on
cyber terror sites.
On 9/27/05, str0ke [EMAIL PROTECTED] wrote:
KF is right on the dot. There will always be a defacement site.
Where is this going ? By your (netdev's) logic: we should shut down all the
defacement sites because
SUICIDE bombers...typically DEAD. Tough to solicit videos from
them, and rather pointless to keep a top ten list as
they...well...can't exactly do it again.
Now the real entertainment begins
Delivered using the Free
[EMAIL PROTECTED] Wrote :
IPSEC has nothing to do with PGP. Also there is really no such thing
as a PGP key. PGP uses what ever key scheme you ask it to use. IPSEC
is the same way. Both use keys, but are not themselves key standards.
OpenVPN similarly can use what ever key scheme you
-Original Message-
From: [EMAIL PROTECTED]
Maybe you should send this to [EMAIL PROTECTED]
More info at
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Many of the people at this list are subscribed over
at funsec...
smime.p7s
Description: S/MIME cryptographic signature
What alternatives are there to pgpnet ?
Have a look at OpenVPN.
Thanks Martijn, but isn`t that a SSL vpn ? And from what I
have read about PGPnet I need a IPSEC VPN that uses
PGP keys to do the auth.
I know for ipsec VPNs I could use the winxp's builtin
But that would require moving all
(on system you want to copy)
dd if=/dev/hda | nc otherhost 5000
(on your lappy or whatever)
nc -l -p 5000 | dd of=./blah
That's a cool way to do it! We always use ssh pipes but the crypto
overhead is sometimes unnecessarily slow. A great piece of *nixfoo.
I have been using
(on system you want to copy)
dd if=/dev/hda | nc otherhost 5000
If you are running bash, then you do not even need netcat:
dd if=/dev/hda /dev/tcp/otherhost/5000
This is interesting. Which version of bash are you using ?
I havent found it in my man page!
I have a client who was using pgp corporate desktop on win2k for VPN,
security and email encryption. ( it has a built in disk encryption,
firewall, email encryption and vpn with very good key management ) security
was something that happened almost automatically.
Now they are planning to move to
One of domains is getting a *very* high number of 419 spams from an address
delegated to multilinks.com.
Where do I send the spam reports ? I have already send everything to
spamcop.net but that has not stopped anything yet
Is there a best practice for assign a router name ?
e.g.: router type + city + room.id and so on
Wich method is usually used to assign a router name ?
Think of social engg. Put in some name that would not
thing that is not so simple to guess because if someone
manages to figure out how they
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf
Of Bernardo MartÃn
Sent: Tuesday, August 30, 2005 1:11 PM
To: Full Disclosure
Subject: RE: [Full-disclosure] RE: Example firewall script (iptables)
In my first email i requested about bad example
root:OM0PNa4I9RlNk:0:3:gecos:/home/root:/sbin/sh
If you have this level of access why don't you just change
The password ?
To obtain this password if it was easy one it should take
2 days at the most or you will be looking for a 2 month
hammering on the password without knowing for sure that
I forget the name of a tool that can be used to intercept TCP
packet and allow you to modify the packet before it was
sent out.
Netcat ?
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)
Personally, I'm very afraid of the power that Google is gaining . I
mean, most searches are done through google, so they know what you're
interested in, then a lot of peoples email's going through them, with
gmail, now italk . next is world domination?
Why do you have to use gmail
thinking security-minded people always backed up their hdds daily :D
Backups are for hobos - we prefer rsync over ssh :)
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)
I myself have an agent with a few basic O/S rules like :
- No application may write other applications memory space
- No application may inject code into other programs
(dll hooks and such)
- No application may access system functions from code
executing in data or stack space
- No
netstat gives me the following results
inetinfo.exe LISTENING on port 80
if I am not mistaken this is the internet father
process present in all the windows systems
Very good points, but can you think of another worm that
downloaded XXX
spyware/adware ?
I can't give you a specific name -- when I first saw it it didn't
strike me as any more significant than the warez and porn FTP servers
I'd seen years earlier, so didn't make specific note of it --
Very hard to say without having a sample or knowing what service your
server
performs. svchost.exe is a valid Windows process and also commonly used
by/with many many malware.
Care to send a sample ?
Delivered using
1 - 100 of 118 matches
Mail list logo