Re: [Full-disclosure] Topera The new IPv6 TCP port scanner invisible to SNORT...

2012-12-21 Thread aditya
. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- Regards Aditya Balapure ___ Full-Disclosure - We believe in it. Charter: http

Re: [Full-disclosure] The email that hacks you

2012-11-28 Thread aditya
- http://secunia.com/ -- Regards Aditya Balapure ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] The email that hacks you

2012-11-28 Thread aditya
Please if you could share the code, I would like to test it for my router as well. Thanks On Wed, Nov 28, 2012 at 6:02 PM, Bogdan Calin bog...@acunetix.com wrote: Thanks aditya, The code is not published on the blog post but it's visible in the video. It's very simple to reproduce

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-20 Thread Aditya K Sood
pdp (architect) wrote: http://www.gnucitizen.org/blog/0day-pdf-pwns-windows I am closing the season with the following HIGH Risk vulnerability: Adobe Acrobat/Reader PDF documents can be used to compromise your Windows box. Completely!!! Invisibly and unwillingly!!! All it takes is to open a

[Full-disclosure] A Request To Everyone

2007-09-20 Thread Aditya K Sood
Hi After looking at the mail wars , I want to say only two lines. I dont know who Meta Info is , Lamer Buster is , LSNN is and all. I dont know how they are generating mails and putting my name everywhere. Thats it. Thanks to all. Regards Aks ___

[Full-disclosure] [Mlabs] Scrutinising SIP Payloads : Traversing Attack Vectors in VOIP and IM

2007-09-19 Thread Aditya K Sood
Hi I have released core research paper on SIP comprising of Payload problems and Attack vectors. This research paper lays stress on the potential weaknesses present in the SIP which make it vulnerable to stringent attacks. The point of discussion is to understand the weak spots in the

[Full-disclosure] SecNiche : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos Vulnerability

2007-08-15 Thread Aditya K Sood
Advisory : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos Vulnerability Dated : 15 August 2007 Severity : Critical Explanation : The vulnerability persists in the popup blocker functioning to allow specific websites to execute popup in the running instance of Internet Explorer.

Re: [Full-disclosure] SecNiche : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos Vulnerability

2007-08-15 Thread Aditya K Sood
security sites like secunia or idefence. This would certainly save you from public embarrassment. -d -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Aditya K Sood Sent: 17 August 2007 09:07 To: full-disclosure@lists.grok.org.uk; [EMAIL PROTECTED

[Full-disclosure] [Whitepaper SecNiche] Insecurities in Implementing Serialization in BISON

2007-08-02 Thread Aditya K Sood
hi A specific white paper have been released comprising of specific application problems related to Bison. You can look into it. http://www.secniche.org/papers/Ser_Insec_Bison.pdf Regards AKS http://www.secniche.org ___ Full-Disclosure

[Full-disclosure] [Whitepaper SecNiche] Insecurities in Implementing Serialization in BISON

2007-08-02 Thread Aditya K Sood
Hi joey Thanks. no Problem. Regards AKS ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [SecNiche Security] WAZ (v 1.0) : Windows Anti Zomb Killer Released

2007-07-25 Thread Aditya K Sood
Hi WAZ is a Anti Zombie Healer written specifically for windows platform. WAZ crafts a UDP and ICMP packets based on the ID's and signature checks of various Zombie Agents. WAZ consists of : = 1. waz_tester.exe : A level 1 infection tester for zombie ports. 2. waz_killer.exe :

[Full-disclosure] [CVE 2007-3816] [Advisory] Vulnerability Facts Related JWIG Advisory

2007-07-22 Thread Aditya K Sood
Aditya K Sood SecNiche Security. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos

2007-07-19 Thread Aditya K Sood
to external templates. For more details : http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf Links: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3816 http://nvd.nist.gov/cpe.cfm?cvename=CVE-2007-3816 Regards Aditya K Sood SecNiche Security

[Full-disclosure] [Advisory] Phishing Vulnerability in Verisign Network

2007-07-13 Thread Aditya K Sood
://www.weblogs.com/clickthru?url=http://www.google.com Vendor Status : Reported. Regards Aditya K Sood http://www.secniche.org ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia

[Full-disclosure] [Advisory] Phishing Vulnerability in Verisign Network

2007-07-12 Thread Aditya K Sood
/clickthru?url=http://www.google.com Vendor Status : Reported. Regards Aditya K Sood http://www.secniche.org ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia

[Full-disclosure] [Advisory] Phishing Vulnerability in Yahoo Search Engine and Yahoo Network. [Multiple]

2007-06-20 Thread Aditya K Sood
.. = Regards Aditya K Sood aka Zeroknock http://www.secniche.org ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full

Re: [Full-disclosure] SECNICHE : Dwelling Security is On the Run

2007-06-16 Thread Aditya K Sood
Pranay Kanwar wrote: Hi, Aditya Sood is no longer part of metaeye, he was thrown out because of this kind of behaviour, as MZ describes it. warl0ck // MSG http://www.metaeye.org Michal Zalewski wrote: On Tue, 12 Jun 2007 [EMAIL PROTECTED] wrote: In an admittedly brief review

Re: [Full-disclosure] SECNICHE : Dwelling Security is On the Run

2007-06-16 Thread Aditya K Sood
Pranay Kanwar wrote: dont stretch it. do your work. threat ?? whoha! what then, are you going to do double trap us ? or exploit us in the global space ?. Stop vandalizing the lists and shitting on the security community. warl0ck // MSG http://www.metaeye.org Aditya K Sood wrote

Re: [Full-disclosure] SECNICHE : Dwelling Security is On the Run

2007-06-15 Thread Aditya K Sood
Michal Zalewski wrote: On Tue, 12 Jun 2007 [EMAIL PROTECTED] wrote: In an admittedly brief review of this page, I saw nothing useful or informative to my career in information assurance. Aditya has a history of using security mailing lists to advertise his various security

Re: [Full-disclosure] [WEB SECURITY] Re: SECNICHE : Dwelling Security is On the Run

2007-06-12 Thread Aditya K Sood
message from Aditya K Sood [EMAIL PROTECTED]: -- Hi all The Sec Niche : dwelling Security portal is up fully. Its a personal working arena and consultancy domain of mine.You can check it: http://www.secniche.org Number of papers have been transformed ot secniche

[Full-disclosure] SECNICHE : Dwelling Security is On the Run

2007-06-11 Thread Aditya K Sood
. Aditya K Sood aka Zeroknock http://www.secniche.org ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] SecNiche : MLabs Shifted Fully

2007-06-08 Thread Aditya K Sood
Hi all Due to some previous complexitites , there is bit delay in work. the mlabs have been shifted to SecNiche fully. http://mlabs.secniche.org You can see the things directly on this sub domain Regards Aditya K Sood aka Zeroknock http://secniche.org

[Full-disclosure] SecNiche - CERA Project is Reoriginated

2007-06-06 Thread Aditya K Sood
to the singular group. Thanks Regards Aditya K Sood a.k.a Zeroknock http://www.secniche.org http://zeroknock.blogspot.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http

[Full-disclosure] Adverse Vectors of Coding in Wordpress : Post Modifications

2007-06-04 Thread Aditya K Sood
needs. you can find it at : http://cera.metaeye.org/wpana.xhtml http://zeroknock.blogspot.com/2007/06/adverse-vectors-of-coding-in-wordpress.html Regards Aditya K Sood Zerkn0ck http://www.metaeye.org ___ Full-Disclosure - We believe in it. Charter: http

[Full-disclosure] Project CERA : Cutting Edge Research Arena

2007-06-04 Thread Aditya K Sood
Hi all Project CERA : Cutting Edge Research Arena is undertaken. The project provides detailed analysis of untamed issues related to Web exploitation , Web penetration and Web security. Due to its wide acceptance it is projected as prime base. http://cera.metaeye.org Regards Aditya K

[Full-disclosure] URL Encoding/Decoding Flaw Mechanism In ASP.net[1.0-2.0] Based Web Applications.

2007-04-15 Thread Aditya K Sood
Hi all The penetration of web leads to origin of some new artifacts.This in turn helps in understanding the weaknesses and flaws persist in the web applications that lead to origin of exceptions. Asp.net issue have been analyzed. Links: http://zeroknock.metaeye.org/analysis

[Full-disclosure] Vulnerable Vectors in PHP Based Redirection Pages[redirect.php4/redirect.php5]

2007-04-03 Thread Aditya K Sood
Hi The PHP based redirection pages inherits a design flaw in websites. This makes it vulnerable to phishing attacks.Look into desired issue at: http://zeroknock.blogspot.com/2007/04/vulnerable-vectors-in-php-based.html http://zeroknock.metaeye.org/analysis/ Regards Zeroknock

[Full-disclosure] Global Space Exploitation In PHP Based Web Applications

2007-03-31 Thread Aditya K Sood
Hi all The PHP based applications are severely vulnerable to global space exploitation. This gives rise to XSS .A very generic analysis have been undertaken. Cutting edge research is on your way. Look at the issue at:

Re: [Full-disclosure] [WEB SECURITY] Re: Global Space Exploitation In PHP Based Web Applications

2007-03-31 Thread Aditya K Sood
Michal Zalewski wrote: On Sat, 31 Mar 2007, Aditya K Sood wrote: http://zeroknock.metaeye.org/analysis/gspace.xhtml Just like your previous double trap XSS advisory, I fail to see the novelty or significance of this report. You seem to discuss an ages-old issue that had been used

Re: [Full-disclosure] NewOrder.box.sk Inherits Severe RedirectionVulnerability

2007-03-29 Thread Aditya K Sood
- Original Message - From: Aditya K Sood [EMAIL PROTECTED] To: full-disclosure@lists.grok.org.uk Sent: Wednesday, March 28, 2007 8:49 PM Subject: [Full-disclosure] NewOrder.box.sk Inherits Severe RedirectionVulnerability Hi Previous Rootkit.com Vulnerability have been patched

Re: [Full-disclosure] NewOrder.box.sk Inherits Severe

2007-03-29 Thread Aditya K Sood
://www.cgisecurity.com/ Application security news and more. http://www.cgisecurity.com/index.rss [RSS Feed] Hello Aditya, I see your point there. Hope they get it fixed. Should the patch involve some referrer checking? Regards, -Nikolay Kichukov - Original Message - From: Aditya K

[Full-disclosure] NewOrder.box.sk Inherits Severe Redirection Vulnerability

2007-03-28 Thread Aditya K Sood
Hi Previous Rootkit.com Vulnerability have been patched. The neworder.box.sk is famous security website.It inherits very specific redirection attacks. The domain forwarding or URL forwarding not only directly possible through the website but can be called from third party directly. A very

[Full-disclosure] Rootkit.com Redirection Looping Attack Analysis

2007-03-27 Thread Aditya K Sood
Hi all Due to some server problems , the website remain down for one day.Now its up.You can look into the desired issue at: http://zeroknock.blogspot.com/2007/03/rootlitcom-prone-to-redirection-and.html http://zeroknock.metaeye.org/analysis/rootkit_red.xhtml Regards Zeroknock

[Full-disclosure] Rootkit.com : Prone To Redirection and Looping Attacks

2007-03-26 Thread Aditya K Sood
Hi The famous rootkit.com website is prone to redirection looping attacks.The domain context can be manipulated. The full analysis with concept has been explained.You can look at the desired issue. http://zeroknock.blogspot.com/2007/03/rootlitcom-prone-to-redirection-and.html

[Full-disclosure] IntraProgrammed Search Engines Are XSS Driven

2007-03-22 Thread Aditya K Sood
Hi all The intra programmed search engines are XSS driven. you can look into the desired issue. http://zeroknock.blogspot.com/2007/03/intraprogrammed-search-engines-prone-to.html Regards Zeroknock http://zeroknock.metaeye.org/mlabs

[Full-disclosure] Double Trap XSS Injection : An Analysis

2007-03-16 Thread Aditya K Sood
Hi all This analysis will enable you to the different realm of XSS injection attacks. No XSS cheatsheat is used in this. I am presenting the full analysis of it. The demonstration target is SecTheory security consultation website. This process goes in both ways. This will throw light on the

[Full-disclosure] MLabs Is Up

2007-02-12 Thread Aditya K Sood
Hi all The security mlabs is on the way.The Link: http://zeroknock.metaeye.org/mlabs Regards Aditya K Sood http://www.metaeye.org http://zeroknock.blogspot.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure

[Full-disclosure] Advisory : Redirection Vulnerability In Versigin Weblogs

2007-01-05 Thread Aditya Sood
Advisory : Redirection Vulnerability In Versigin Weblogs Expalantion: The weblogs is a verisign service for currently updating the blogs and provide requisite information to the users of specific blog which has been updated. The weblog can act as a base for redirection attacks because traffic

[Full-disclosure] Advisory : Redirection And Phishing Vulnerability In AOL My.ScreeName.com

2006-11-29 Thread Aditya Sood
. The security parameters are changed. Aditya K Sood Handle : Zeroknock http://zeroknock.metaeye.org ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored

[Full-disclosure] Orkut Help Search Bug : Spamdexing Proliferation

2006-11-02 Thread Aditya Sood
Hi Everyone Orkut help search possess spamdexing search.A full advisory you cam see at http://www.metaeye.org/?p=24#more-24 Regards: ZeroKnock MetaEye Security ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] Severe PHP Injection Vulnerability in AOL

2006-11-02 Thread Aditya Sood
Hi Everyone. A very specific vulnerability occured in the AOL Website. The advisory you can check at main metaeye website. http://www.metaeye.org/?p=25#more-25 Regards: ZeroKnock MetaEye Security ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Googling:Google Meta Bugs

2006-10-11 Thread Aditya Sood
Dave No, not that one Korn wrote: Aditya Sood wrote: This post deals with the googling effects that google provide with its search engine. You just invented a new phrase that does not exist in any dictionary. What are googling effects? And how did you expect everyone else

Re: [Full-disclosure] Googling:Google Meta Bugs

2006-10-11 Thread Aditya Sood
Aditya Sood wrote: Dave No, not that one Korn wrote: Aditya Sood wrote: This post deals with the googling effects that google provide with its search engine. You just invented a new phrase that does not exist in any dictionary. What are googling effects

[Full-disclosure] Googling:Google Meta Bugs

2006-10-10 Thread Aditya Sood
Hi Everyone This post is text version of my previous post which is in PDF. That people asked to be in text , so its here. Abstract: This post deals with the googling effects that google provide with its search engine.Since in searching algorithms the metacharacters are handled with proper

Re: [Full-disclosure] Is Firefox JavaScript flawed ?

2006-10-10 Thread Aditya Sood
Hi This is not portal to show obscene stuff.Dont take it wrong but this is not the right way. Pink Hat wrote: Prove it or its FUD. You and your crackhead friend already fucked it up at Toorcon so now you are trying here. On 10/10/06, darkcube [EMAIL PROTECTED]

Re: [Full-disclosure] Googling:Google Meta Bugs

2006-10-10 Thread Aditya Sood
Andrew Farmer wrote: On 10 Oct 06, at 18:29, Aditya Sood wrote: This post deals with the googling effects that google provide with its search engine.Since in searching algorithms the metacharacters are handled with proper filtering techniques which we have not seen it in google.Already

RE: [Full-disclosure] Moderated lists

2005-12-15 Thread Aditya Deshmukh
Why not do a self-regulating list? Something along the lines of keeping track of signup dates and IP addresses, then when a yahoo starts spouting crap, put it to a vote on list. (only members older then xyz date have a vote) If the list's wish is to have the user banned, then so be

RE: [Full-disclosure] Administrivia: Requests for Moderation

2005-12-15 Thread Aditya Deshmukh
Hows about instead of moderation, we try vote-kicking? I support this one, but who decides how many votes are sufficent to get someone kicked ? And what about the Votes that can be automated ? I bet someone will create a huge farm for voting Whenever there is any voting all the results

RE: [Full-disclosure] Re: 0-day for sale on ebay - New auction!

2005-12-13 Thread Aditya Deshmukh
No offense intended directly to the OP: Honestly, who gives a shit. Is this what this list is to be used for these days? Are there no better OT forums, channels, cups w/string that can be reserved for this type of chatter? For this kind of posts we have a mailing list : Fun and Misc

RE: [Full-disclosure] Re: McAfee VirusScan vs Metasploit Framework v2.x

2005-12-11 Thread Aditya Deshmukh
Heck they even block WinPcap_3_1.exe the network drivers that are Used by many programs And these are just the drivers. Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)

RE: [Full-disclosure] Re: SOX whistleblowers' clause Compliance

2005-12-01 Thread Aditya Deshmukh
See below marc email part Aditya Deshmukh [EMAIL PROTECTED] wrote: If you read the last line in para 6 you will find that anon mailbox is a requirement for SOX compliance. And mailbox was ment for email Michael :) But I think that with a post and some concrete mailbox

RE: [Full-disclosure] Re: SOX whistleblowers' clause Compliance

2005-12-01 Thread Aditya Deshmukh
Why cant you use google to find out this ? The same reason you can't use Google and find your answer fuckbag. Are you n3td3v ? *In the para 4* Protecting whistleblowers is an essential component of an ethical and open work environment. No mention of an anon email address here.

RE: [Full-disclosure] Software Firewalls for Windows

2005-12-01 Thread Aditya Deshmukh
Hi list, I've been a firm advocate of Sygate Pro for some time but as Symantec has bought and canned it I'm wondering what you guys would recommend as a replacement. Tiny Firewall 2005 works for both 64 and 32 bit machines And is good - I have been using in since version 2.1.5 And now

RE: [Full-disclosure] Re: Most common keystroke loggers?

2005-12-01 Thread Aditya Deshmukh
How about one-time passwords? Just go ahead and *let* them keylog it all they like; by the time they've snarfed a pw, it's no use any more. (See S/Key for more details.) Please no one time passwords: they are a nightmare to manage

RE: [Full-disclosure] Support_388945a0 account in Win XP/2003

2005-12-01 Thread Aditya Deshmukh
That is a help and support account that you should disable. Also set very long random password and forget it. I prefer simply delete it. Good choice? But I heard a rumours that this account can be activated remotely without user's aware decision and used for Remote Assistance (e.g.

RE: [Full-disclosure] Support_388945a0 account in Win XP/2003

2005-11-30 Thread Aditya Deshmukh
Hello full-disclosurers, Does anyone know anything interesting about Support_388945a0 account which is created by default during Windows XP/2003 installation? I have seen MS technet links, maybe someone knows more about? That is a help and support account that you should disable. Also

RE: [Full-disclosure] Support_388945a0 account in Win XP/2003

2005-11-30 Thread Aditya Deshmukh
I has wondered the meaning of support_388945a0 too, but not the meaning of the account, but the meaning of 388945a0. As you may know, it can be interpreted as 4 Bytes hexadecimal number... It's a randomly generated number that generated for this account name

RE: [Full-disclosure] Re: SOX whistleblowers' clause Compliance

2005-11-30 Thread Aditya Deshmukh
Seeing how my question was ignored. I will tell you the answer. There is no requirement in SOX to do this. Why cant you use google to find out this ? --- http://www.nonprofitrisk.org/nwsltr/archive/employprac091005-p.htm *In

[Full-disclosure] SOX whistleblowers' clause Compliance

2005-11-29 Thread Aditya Deshmukh
How do I create a totally anon mailbox as required by the sox ? How are you doing this in your site ? Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)

RE: [Full-disclosure] Return of the Phrack High Council

2005-11-24 Thread Aditya Deshmukh
I hope the turkey returns... we need more useless local root exploits... Which can run only when you are root ;) Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)

RE: [Full-disclosure] Window's O/S

2005-11-24 Thread Aditya Deshmukh
create an folder on deskop and name it as notepad. open internet explorer go to view source code this will open the contents of notepad folder!! Even better: rename any exe to notepad.exe ;) Is this IE being so stupid as to run with a CWD of Desktop and effectively doing

RE: [Full-disclosure] Window's O/S

2005-11-24 Thread Aditya Deshmukh
this does not work on win2k sp4 srp5 Not sure if you guys are aware of this issue windows XP...!! create an folder on deskop and name it as "notepad". open internet explorer go to view source code this will open the contents of notepad folder!!

RE: [Full-disclosure] SmartCards programming...

2005-11-23 Thread Aditya Deshmukh
Sorry for the top post If you are going to do something like this then RSA cards are the best specially securid It can be implemented almost out of the box and it has great lib support also. From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf

[Full-disclosure] another filename bypass vulnerability - from cmd.exe

2005-11-16 Thread Aditya Deshmukh
Was doing some testing [xfocus-AD-051115] Ie Multiple antivirus failed to scan malicous filename bypass vulnerability The system is windows 2000 sp4 srp5 with all other patches upto date. At the command prompt cmd.exe execute the following with the results. I copy and paste from cmd.exe

RE: [Full-disclosure] Re: [xfocus-AD-051115]Multiple antivirus failedto scan malicous filename bypass vulnerability

2005-11-15 Thread Aditya Deshmukh
axo Demonstration here: axo Choose a malicious file which would be detected, such as nc.exe, axo rename the file as nc??.exe (?? =Hex C0 D7 BA DC) axo Because these special names are unable directly to input, so if you axo want to run these file, you should use the following way:

RE: [Full-disclosure] [FLSA-2005:158801] Updated bzip2 packages fixsecurity issues

2005-11-14 Thread Aditya Deshmukh
Could you please stop mailing your Bug-Fix-Reports aka Package xyz updated to the Full*-Mailinglist? I don't find those mailings objectionable. I think this is an appropriate forum. These mailings are not objectionable but when they have their own Mail list so why send a copy to full

RE: [Full-disclosure] In Sony's Defense Over Virus Writers

2005-11-13 Thread Aditya Deshmukh
ideas for other good bug lists besides full disclosure? VulnWatch: vulnerability disclosure list http://www.vulnwatch.org/ This one is good. There is a discuss list also that you might want to subscribe... ___ Full-Disclosure - We

RE: [Full-disclosure] Blocking Skype

2005-11-13 Thread Aditya Deshmukh
Blocking Skype Using Squid and OpenBSD Hey I cant wait to try out this one - this is really intresting one. Very informative writeup. Thanks rootn0de Delivered using the Free Personal Edition of Mailtraq

RE: [Full-disclosure] Spamcop automated reporting script...

2005-11-11 Thread Aditya Deshmukh
Thanks in advance if you can send in .txt format No need - you can download most of it off the Spamcop web site then write a trivial wrapper. trivial wrapper! No it is not. There is some java script in that form which is stopping the mail reports from being send out, to the Admins, ISP

RE: [Full-disclosure] the Sony/BMG virus

2005-11-11 Thread Aditya Deshmukh
If the term future law suits for copyright infringement pops into your head, you wouldn't be alone. Would you give them any real info ? Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)

[Full-disclosure] Spamcop automated reporting script...

2005-11-10 Thread Aditya Deshmukh
Has anyone got a automated spamcop reporting script? Thanks in advance if you can send in .txt format preferably offlist. Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)

[Full-disclosure] RE: Spamcop automated reporting script...

2005-11-10 Thread Aditya Deshmukh
Has anyone got a automated spamcop reporting script? Thanks in advance if you can send in .txt format preferably offlist. I hit the send before I could explain what I wanted to do... I have a spamcop account - and I managed to get the spamcop Url with the reportID to a file using

RE: [Full-disclosure] RE: Full-Disclosure Digest, Vol 9, Issue 3

2005-11-05 Thread Aditya Deshmukh
Yes Note to list admins -- add filtering rule to reject messages with Subject: lines matching *Digest, Vol*... Nick, hi... why would you want to filter out the digests? will this eliminate digests from my subscriptioin? He is saying to filter the replies to the digest that have the

RE: [Full-disclosure] Re: new IE bug (confirmed on ALL windows)

2005-11-02 Thread Aditya Deshmukh
something else that's different between your two setups? This I would agree, would you both be helpful to send the .dmp file Or aleast windbg.exe output ? Delivered using the Free Personal Edition of Mailtraq

[Full-disclosure] Funny smtp helo in the logs

2005-10-30 Thread Aditya Deshmukh
I have been seeing this in my logs over all the public smtp server, from all over the net. Anyone know what sends these kinds of helo ? *please* when responding to this mail trim out anything below this -- 124 09/10/2005 09:54:35 HELO -1209283632 --- 250 my.smtp.domain.server 125

RE: [Full-disclosure] password vaults-

2005-10-13 Thread Aditya Deshmukh
Sorry for the very noob question, but I'm having very hard times finding such products. What are you going to use that product for. Give us a idea of the end users and how they are going to use this Your details right now are bit on the less side. For what I make out of your post are your

RE: [Full-disclosure] Interesting idea for a covert channel or I justdidn't research enough?

2005-10-07 Thread Aditya Deshmukh
I myself use this method to open up the SSH port for a particular IP address. When you try to open a particular URL on my website, you get a 404 because that document doesn't exist. The webserver logs this. A script in the background sees in the log that this happened, and opens up

RE: [Full-disclosure] http://molecularmultimedia.com/ an exploitdistribution point (update2)

2005-10-04 Thread Aditya Deshmukh
FYI, I've had the site www.ok-ok.biz disabled by the ISP, at least it will deny the perps the ability to find out who has been compromised. The molecularmultimedia site is obvioulsy just a front, will see what can be done about this. The site was found after 2 different attempts here are

RE: [Full-disclosure] Cyrilic

2005-10-04 Thread Aditya Deshmukh
I have one user who keeps getting cyrilic spam, but I cant find a rule anywhere. Is anyone else getting this kind of spam?? Welcome to the club of cyrilic spam recipects, we have many existing members The rule that you want to create is this If the message body or header contains

RE: [Full-disclosure] Re: Careless LEO Forensics and Suicides

2005-10-04 Thread Aditya Deshmukh
As for people committing suicide, I believe those who did commit suicide actually were in possession with intent. If not why commit suicide. I would have fought tooth and nail. I hate to say this but with these kinds of cases where the media crucify the accused even before they are convicted.

RE: [Full-disclosure] Bypassing Personal Firewall, is it that* hard?

2005-10-03 Thread Aditya Deshmukh
say... a backdoor want to communicate to its server... It can do is, use a trusted internal application to do the job. Suppose; it creates a batch file run the batch file (evil.bat) executes this command this has been going on for years - there are some trojans that create An

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-28 Thread Aditya Deshmukh
Not if the U.S security services decide to have a war on cyber terror sites. On 9/27/05, str0ke [EMAIL PROTECTED] wrote: KF is right on the dot. There will always be a defacement site. Where is this going ? By your (netdev's) logic: we should shut down all the defacement sites because

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Aditya Deshmukh
SUICIDE bombers...typically DEAD. Tough to solicit videos from them, and rather pointless to keep a top ten list as they...well...can't exactly do it again. Now the real entertainment begins Delivered using the Free

RE: [Full-disclosure] PGPNet Upgrade path ?

2005-09-17 Thread Aditya Deshmukh
[EMAIL PROTECTED] Wrote : IPSEC has nothing to do with PGP. Also there is really no such thing as a PGP key. PGP uses what ever key scheme you ask it to use. IPSEC is the same way. Both use keys, but are not themselves key standards. OpenVPN similarly can use what ever key scheme you

RE: [Full-disclosure] SA Security Bulletin: Unique attack vectoruncovered during packet analysis

2005-09-17 Thread Aditya Deshmukh
-Original Message- From: [EMAIL PROTECTED] Maybe you should send this to [EMAIL PROTECTED] More info at https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Many of the people at this list are subscribed over at funsec... smime.p7s Description: S/MIME cryptographic signature

RE: [Full-disclosure] PGPNet Upgrade path ?

2005-09-16 Thread Aditya Deshmukh
What alternatives are there to pgpnet ? Have a look at OpenVPN. Thanks Martijn, but isn`t that a SSL vpn ? And from what I have read about PGPnet I need a IPSEC VPN that uses PGP keys to do the auth. I know for ipsec VPNs I could use the winxp's builtin But that would require moving all

RE: [Full-disclosure] Re: Full-Disclosure Digest, Vol 7, Issue 25

2005-09-13 Thread Aditya Deshmukh
(on system you want to copy) dd if=/dev/hda | nc otherhost 5000 (on your lappy or whatever) nc -l -p 5000 | dd of=./blah That's a cool way to do it! We always use ssh pipes but the crypto overhead is sometimes unnecessarily slow. A great piece of *nixfoo. I have been using

RE: [Full-disclosure] Re: Full-Disclosure Digest, Vol 7, Issue 25

2005-09-13 Thread Aditya Deshmukh
(on system you want to copy) dd if=/dev/hda | nc otherhost 5000 If you are running bash, then you do not even need netcat: dd if=/dev/hda /dev/tcp/otherhost/5000 This is interesting. Which version of bash are you using ? I havent found it in my man page!

[Full-disclosure] PGPNet Upgrade path ?

2005-09-13 Thread Aditya Deshmukh
I have a client who was using pgp corporate desktop on win2k for VPN, security and email encryption. ( it has a built in disk encryption, firewall, email encryption and vpn with very good key management ) security was something that happened almost automatically. Now they are planning to move to

[Full-disclosure] multilinks.com security contact ?

2005-09-10 Thread Aditya Deshmukh
One of domains is getting a *very* high number of 419 spams from an address delegated to multilinks.com. Where do I send the spam reports ? I have already send everything to spamcop.net but that has not stopped anything yet

RE: [Full-disclosure] router naming

2005-09-02 Thread Aditya Deshmukh
Is there a best practice for assign a router name ? e.g.: router type + city + room.id and so on Wich method is usually used to assign a router name ? Think of social engg. Put in some name that would not thing that is not so simple to guess because if someone manages to figure out how they

RE: [Full-disclosure] RE: Example firewall script (iptables)

2005-08-30 Thread Aditya Deshmukh
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Bernardo Martín Sent: Tuesday, August 30, 2005 1:11 PM To: Full Disclosure Subject: RE: [Full-disclosure] RE: Example firewall script (iptables) In my first email i requested about bad example

RE: [Full-disclosure] beginning to count the time

2005-08-24 Thread Aditya Deshmukh
root:OM0PNa4I9RlNk:0:3:gecos:/home/root:/sbin/sh If you have this level of access why don't you just change The password ? To obtain this password if it was easy one it should take 2 days at the most or you will be looking for a 2 month hammering on the password without knowing for sure that

RE: [Full-disclosure] anybody remember the name of this tool

2005-08-24 Thread Aditya Deshmukh
I forget the name of a tool that can be used to intercept TCP packet and allow you to modify the packet before it was sent out. Netcat ? Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)

RE: [Full-disclosure] talk.google.com

2005-08-24 Thread Aditya Deshmukh
Personally, I'm very afraid of the power that Google is gaining . I mean, most searches are done through google, so they know what you're interested in, then a lot of peoples email's going through them, with gmail, now italk . next is world domination? Why do you have to use gmail

RE: [Full-disclosure] An old/new security list

2005-08-22 Thread Aditya Deshmukh
thinking security-minded people always backed up their hdds daily :D Backups are for hobos - we prefer rsync over ssh :) Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)

RE: [Full-disclosure] Zotob Worm Remover

2005-08-22 Thread Aditya Deshmukh
I myself have an agent with a few basic O/S rules like : - No application may write other applications memory space - No application may inject code into other programs (dll hooks and such) - No application may access system functions from code executing in data or stack space - No

RE: [Full-disclosure] windows netstat

2005-08-19 Thread Aditya Deshmukh
netstat gives me the following results inetinfo.exe LISTENING on port 80 if I am not mistaken this is the internet father process present in all the windows systems

RE: [Full-disclosure] Re: pnp worm unknown variant - post infectionactions

2005-08-17 Thread Aditya Deshmukh
Very good points, but can you think of another worm that downloaded XXX spyware/adware ? I can't give you a specific name -- when I first saw it it didn't strike me as any more significant than the warez and porn FTP servers I'd seen years earlier, so didn't make specific note of it --

RE: [Full-disclosure] svchost.exe try to send http outside

2005-08-17 Thread Aditya Deshmukh
Very hard to say without having a sample or knowing what service your server performs. svchost.exe is a valid Windows process and also commonly used by/with many many malware. Care to send a sample ? Delivered using

  1   2   >