[Full-disclosure] Advisory 2006-03-11 Off-by-one in

2006-03-11 Thread mike king\r\n
-861530 to this issue. APPENDIX A. - Vendor Information http://www.vmware.com/ APPENDIX B. - References NONE CONTACT: *mike king [EMAIL PROTECTED] *1-888-LOL-WHAT *CISSP GSAE CCE CEH CSFA GREM SSP-CNSA SSP-MPA GIPS GHTQ GWAS ___ Full-Disclosure - We

[Full-disclosure] Re: Miscrosoft Registry Editor 5.1/XP/2K long string key vulnerability

2005-08-24 Thread mike king
oworldhelloworldhelloworldhelloworldhelloworldhellow orldhelloworldhelloworl REG_SZ E:\ After removing the key from the registry with Reglyzer E:\ reg query HKEY_LOCAL_MACHINE\SOFTWARE\empty ! REG.EXE VERSION 3.0 HKEY_LOCAL_MACHINE\SOFTWARE\empty E:\ Best of luck mike king time® is a trademark of Universe© Public use

RE: [Full-disclosure] Malicious Code Analysis

2005-08-05 Thread mike king
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thanks for all the feedback. I have always taken the poor mans approach to this since its not really my job, but a fun hobby on the side. regards mike On Fri, 05 Aug 2005 02:49:49 -0700 Peter Kruse [EMAIL PROTECTED] wrote: Hey, These were not

Re: [Full-disclosure] Malicious Code Analysis

2005-08-04 Thread mike king
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Here you go; I got this malware from a friend’s machine that had been infected. This was about 2 months ago so there about. Use a hex editer to give you what it was packed with and then just go from there. Good luck and have fun. download it from

Re: [Full-disclosure] KIBUV.B or variant?

2005-05-24 Thread mike king
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 the src code to these bots are traded around a great deal. most likley either the irc owner changed the port /banner in which the bot is to listen or they have coded it with a different port and banner. this is not at all uncommon. so chances are its