Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure

2013-08-09 Thread mezgani ali
I know that Kingcope does nice jobs, I follow you some times ago and I found that your exploits are simply awesome. hope that you continue in that way =) Regards, On Fri, Aug 9, 2013 at 12:21 PM, R. Whitney wrote: > I would concern myself more with the web hosting providers which utilize > su

Re: [Full-disclosure] My ISP is routing traffic to private addresses...

2013-05-17 Thread mezgani ali
There are many ISP that route IP traffic through networks with private addresses, my ISP to do the same thing and has 10.0.0.0 class A addresses routable. May be it is a miss of IP addresses or may be a NAT that was published due to some network need. regards, On Fri, May 17, 2013 at 8:08 PM, ky

Re: [Full-disclosure] trixd00r v0.0.1 - Advanced and invisible TCP/IP based userland backdoor

2012-02-08 Thread mezgani ali
I was working on a backdoor kernel land, using netfilter =] Kind regards, On Wed, Feb 8, 2012 at 10:17 PM, Levent Kayan wrote: > On 02/08/12 22:55, Kryton Jones wrote: > > Is this something like Port Knocking ?? > you can see that kinda as port knocking yes. > > > > > http://en.wikipedia.org/w

Re: [Full-disclosure] About reDuh

2011-10-17 Thread mezgani ali
Is there any version that support https ? 2009/2/8 seclists > Thx for your kind help,bro. > > The jsp version of reDuh is powerful, so cool. > > 在2009-02-08 07:39:41,"Haroon Meer" 写道: > >Hi.. > > > >* seclists [secli...@126.com] seemed to say: > >> Hi,bro > >> Thx For shareing reDuh. I ha

Re: [Full-disclosure] Linux kernel exploit

2010-12-08 Thread mezgani ali
it's worked on 2.6.35.7, nice exploit On Wed, Dec 8, 2010 at 6:09 AM, Rem7ter wrote: > Why gcc exp.c -o exp alert "Error: too many Argument"? I test it in Linux > 2.6.X. > > 2010/12/7 coderman > > On Tue, Dec 7, 2010 at 12:25 PM, Dan Rosenberg >> wrote: >> > ... I've included here a proof-of-

Re: [Full-disclosure] NiX - Linux Brute Force beta testers wanted

2010-10-23 Thread mezgani ali
Hello, Please can communicate the repository of your tool On Sat, Oct 23, 2010 at 2:12 PM, wrote: > Hi, this tool is alternative to Hydras´s. It is based on NiX Proxy > Checker. Here´s the page for development status: > http://myproxylists.com/nix-brute-force > > The tool will be freeware and I

Re: [Full-disclosure] NMAP Vulnerable to attack

2010-09-10 Thread mezgani ali
I agree, it is not a very useful bug On Fri, Sep 10, 2010 at 8:48 PM, wrote: > On Fri, 10 Sep 2010 16:32:16 EDT, musnt live said: > > c:\nmap -sSV -P0 c:\win95\system\nmap.exe > > # ./nmap -sSV -P0 /usr/speling/Собака/bin/nmap > > That's not a vulnerability, that's a fucktard who's running secur

Re: [Full-disclosure] PacketStorm

2010-06-22 Thread mezgani ali
Check mirror website : http://packetstormsecurity.nl/ http://packetstorm.linuxsecurity.com/ On Tue, Jun 22, 2010 at 4:20 PM, wrote: > Anyone know what happen to packetstorm.org > > The site is down! > > > > > James Smith > Email: ja...@smithwaysecurity.com > Website: www.smithwaysecurity.com

[Full-disclosure] Update for PS

2010-06-17 Thread mezgani ali
I got a tweet today about a Nice and real message in the last update IANA" for .PS", http://www.iana.org/domains/root/db/ps.html Hope that this information will merge quickly and update all *Brainstorming routines. *Best regards, -- Ali MEZGANI Network Engineering/Security http://securfox.wordpr

Re: [Full-disclosure] Fingerprinting web applications (Joomla, Mediawiki and Wordpress)

2010-01-29 Thread mezgani ali
Hello, Yep, very nice idea, so the big job is done, what about an automated scan even a new release ? I think that you must keep an cron eyes on. Great job, On Fri, Jan 29, 2010 at 10:30 PM, wrote: > Hi List, > > I just posted a document on fingerprinting web applications where I show > some i

Re: [Full-disclosure] Can I manipulate packet’s sp ecific field using Squid?

2010-01-27 Thread mezgani ali
Hello, You may do that with u32 module of iptables. 2010/1/28 김무성 > Hello list > > > > Can I manipulate packet’s specific field using Squid (transparent proxy)? > > > > KIM > > > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.gr

Re: [Full-disclosure] nmap

2009-07-30 Thread mezgani ali
Yes i like what you say, and many times i said that when some friends ask me what i am doing,. Well my reply was i'm playing piano :) On Thu, Jul 30, 2009 at 7:01 PM, Peter Bruderer wrote: > Programming is like playing Piano: Just press the right key at the > right time in the right order with t

Re: [Full-disclosure] what is DNS response that 255.255.255.255?

2009-03-17 Thread mezgani ali
Hello, Well, the blocklist of IPv4 address is (0.0.0.0 - 255.255.255.255), and the IPv4 defines many classes A,B,C,D,E, the address 255.255.255.255 reside in class E (240.0.0.0 - 255.255.255.255) and that class should not be used on IP networks. it's just for experimental purpose. Anyway, the ad