Re: [Full-disclosure] www.dia.mil

2008-10-30 Thread nocfed
http://www.whitehouse.gov/omb/memoranda/m00-13.html draw your own conclusions... On Thu, Oct 30, 2008 at 11:18 AM, Jorrit Kronjee [EMAIL PROTECTED] wrote: On 10/27/2008 8:03 PM, Gary E. Miller wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yo All! On Mon, 27 Oct 2008, [EMAIL

Re: [Full-disclosure] Crafted SYN Packets...

2007-11-13 Thread nocfed
Google for ephemeral port tcp syn On Nov 13, 2007 5:43 PM, Dean Pierce [EMAIL PROTECTED] wrote: Simon Smith wrote: Kelly, SYN packets and ports do not correlate. And yes, SYN is TCP. You should read up on TCP/IP etc so that you understand protocols before posting to mailing

Re: [Full-disclosure] Bank Of America Vulnerable

2007-11-03 Thread nocfed
On 11/3/07, Jamal Al-Aseer [EMAIL PROTECTED] wrote: Dear SF, I am writing this to inform the public that bank of America's two step authentication is fundamentally flawed. The user at there website will enter a user name then tell there systems which state it originates from but the next step

Re: [Full-disclosure] Distributed SSH username/password brute forceattack

2007-10-23 Thread nocfed
On 10/22/07, Anders B Jansson [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: Hi, Oct 22 20:36:13 nms sshd[90657]: Failed password for invalid user gopher from 77.46.152.2 port 55120 ssh2 user/password authentication for SSH? one way of cleaning up your logs and killing this type

Re: [Full-disclosure] New term RDV is born

2007-09-28 Thread nocfed
Due to this RDV called email I suggest the following patch: procmail || ${insert other filter here} This work around will allow you to avoid the n3td3v RDV shenanigans. Thank you. On 9/28/07, Jimby Sharp [EMAIL PROTECTED] wrote: I asked you to stop your bullshit you mad man. It is crazy to

Re: [Full-disclosure] New RFID Mailing List Owner 0day

2007-09-28 Thread nocfed
On 9/28/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: #!/bin/sh # # Secure v9.3.1b # This is to be used on a NEW install only! # This script will go through your box and lock the inside down. # Copyright [EMAIL PROTECTED] | [EMAIL PROTECTED], ([EMAIL PROTECTED]) # Thanks to jericho from

Re: [Full-disclosure] New term RDV is born

2007-09-28 Thread nocfed
Sil, Don't let that shit out! Keep it UG! On 9/28/07, J. Oquendo [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: Two months is still recently. Think about In recent history we invaded Iraq, In recent times terrorism has become more prominent. The real problem here is that 0-day

Re: [Full-disclosure] Putty Proxy login/password discolsure....

2006-11-03 Thread nocfed
On 11/2/06, Tonnerre Lombard [EMAIL PROTECTED] wrote: Salut, On Thu, 2006-11-02 at 01:15 -0600, nocfed wrote: And if you have physical access then you can simply use a floppy, usb dongle, or any other type of removable media to boot from. Once physical access is obtained then you pretty

Re: [Full-disclosure] Vhoning

2006-07-11 Thread nocfed
On 7/10/06, mikeiscool [EMAIL PROTECTED] wrote: On 7/11/06, n3td3v [EMAIL PROTECTED] wrote: What (I and) the underground call it: Vhoning vhoning looks alot like whoring ... to me anyway. .. my proposal for the name is mikeiscool'ing. it will help my brand (of me). thanks. I second

Re: [Full-disclosure] Re: [WEB SECURITY] Cross Site Scripting in Google

2006-07-07 Thread nocfed
On 7/7/06, Mike Duncan [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Martin O'Neal wrote: Actually, I think this is the point the author was trying to make. We should not be thinking about the interests of a company who has ignored issues in the past. Ignored what?

Re: [Full-disclosure] United States Secret Service

2006-07-02 Thread nocfed
On 6/30/06, n3td3v [EMAIL PROTECTED] wrote: They replace a website with the USSS logo., like what happened in the case of the shadow crew. I'm not pro Shadow crew but I find it highly offensive that the USSS are acting in such a This is now property of the USSS with logo, asking the remaining

Re: [Full-disclosure] Orkut exploit

2006-06-28 Thread nocfed
On 6/28/06, Ademar Gonzalez [EMAIL PROTECTED] wrote: Don't know if you guys have seen this. Just got it in my gmail account, it tries to execute the file scrapbook.exe from : http://www.yourfreespace.net/users/orkut2/scrapbook/scrapbook.exe Karpesky says is Trojan-Spy.Win32.Banker.anv

Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread nocfed
On 6/12/06, c0ntex [EMAIL PROTECTED] wrote: On 12/06/06, David Loyall [EMAIL PROTECTED] wrote: Oh, I've CC'd [EMAIL PROTECTED], but if someone else would give them a proper write-up, and encourage them to close the hole, that'd be wonderful. I know this guy who has over 7 years of direct

Re: [Full-disclosure] full disclosure archive mail-scanning bot

2006-06-03 Thread nocfed
On 6/3/06, Anil Gulecha [EMAIL PROTECTED] wrote: Joined this list recently, and was browsing the archives online. Was wondering that someone not really interested could easily download the compressed archives and use a script to read through and gather email IDs. Simple searching for *_at_*.*

Re: [Full-disclosure] For the attention of Mi5, Mi6 or Symantec

2006-05-22 Thread nocfed
On 5/22/06, ... [EMAIL PROTECTED] wrote: HAHAHAHAHAHAHAHAHAHAHAHAH Hello KGB, CIA, FBI, McAfee - Original Message - From: n3td3v [EMAIL PROTECTED] To: full-disclosure@lists.grok.org.uk Sent: Monday, May 22, 2006 1:46 AM Subject: [Full-disclosure] For the attention of Mi5, Mi6 or

Re: [Full-disclosure] blue security folds

2006-05-19 Thread nocfed
On 5/19/06, Abuse 007 [EMAIL PROTECTED] wrote: This is a cop out. I don't believe they folded just because of one DDoS attack. What did they do to try to mitigate it? I believe there is a fair few anti-DDoS devices that will scrub/filter traffic. I also believe that there is providers that

Re: [Full-disclosure] Call for moderation

2006-05-19 Thread nocfed
On 5/19/06, Andrew Smith [EMAIL PROTECTED] wrote: There are a lot of moderated lists. This isn't moderated. That is the point of this list. Don't be an idiot, just because there are a few idiots about doesn't mean that you should call for a fd-bugtraq change. On 5/19/06, [EMAIL PROTECTED]

Re: [Full-disclosure] blue security folds

2006-05-17 Thread nocfed
On 5/17/06, Peter Besenbruch [EMAIL PROTECTED] wrote: Mike Adams wrote: I'm really disappointed. All this will do is give all the other scumbag spammers out there proof that using these tactics will work, and they will be able to extort anyone. Who will be next, Trend Micro? Fortinet?

Re: [Full-disclosure] [funsec] fuzzing mailing list

2006-04-15 Thread nocfed
On 4/15/06, Gadi Evron [EMAIL PROTECTED] wrote: Hi guys. There is a mailing list to discuss fuzzing. It's technical. You can subscribe here: http://www.whitestar.linuxbox.org/mailman/listinfo/fuzzing Gadi. Thanks for spamming your own list. Glad to see that you are following the

Re: [inbox] Re: [Full-disclosure] [funsec] fuzzing mailing list

2006-04-15 Thread nocfed
On 4/15/06, Exibar [EMAIL PROTECTED] wrote: ok, so how the heck else is he supposed to let everyone know about the new mailing list? Pay everyone a personal visit??? Send smoke signals? Telepathy? Gadi sent ONE message to this list to let everyone know that the new list has been

Re: [Full-disclosure] function *() php/apache Crash PHP 4.4.2 and 5.1.2

2006-04-09 Thread nocfed
On 4/8/06, Maksymilian Arciemowicz [EMAIL PROTECTED] wrote: Source: http://securityreason.com/achievement_securityalert/35 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [function *() php/apache Crash PHP 4.4.2 and 5.1.2] Author: Maksymilian Arciemowicz (cXIb8O3) Date: - -Written:

Re: [Full-disclosure] I give up, no more posts to Full-Disclosure and DailyDave about Full Trust and .Net /Java Sandboxes

2006-04-07 Thread nocfed
On 4/6/06, Dinis Cruz [EMAIL PROTECTED] wrote: First off all, I want to apologize to the Full-Disclosure and DailyDave readers for the last couple of posts which I CCed to these lists (the ones about Full Trust, managed browsers, verifier issues in Java/.Net and Sandboxing) I know that

Re: [Full-disclosure] I give up, no more posts to Full-Disclosure and DailyDave about Full Trust and .Net /Java Sandboxes

2006-04-07 Thread nocfed
On 4/8/06, nocfed [EMAIL PROTECTED] wrote: On 4/6/06, Dinis Cruz [EMAIL PROTECTED] wrote: First off all, I want to apologize to the Full-Disclosure and DailyDave readers for the last couple of posts which I CCed to these lists (the ones about Full Trust, managed browsers, verifier

Re: [Full-disclosure] Critical PHP bug - act ASAP if you are running web with sensitive data

2006-03-29 Thread nocfed
On 3/29/06, Tõnu Samuel [EMAIL PROTECTED] wrote: ---SNIP--- There is a one vector most people do not seem to know. You can telnet to port 80 and say GET ?php . write full script there and include web server log file later. Who knows what else blackhats can do. Every single hole must be

Re: [Full-disclosure] Critical PHP bug - act ASAP if you are running web with sensitive data

2006-03-29 Thread nocfed
On 3/29/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: On Wed, 29 Mar 2006 02:40:49 CST, nocfed said: Right, that is a vector that nobody knows about unless they have common sense. There were previous bugs with text editor(s) which used logfiles to push the payload. Why someone would ever

Re: [Full-disclosure] Security Alert: Unofficial IE patches appear on internet

2006-03-28 Thread nocfed
On 3/28/06, Micheal Espinola Jr [EMAIL PROTECTED] wrote: Patch Tuesday = Good before third party patches appear Third party patch = Evil Patch Tuesday = Bad for everyone after third party patches appear, even Microsoft... Ahh, but you forgot one: n3td3v = Annoying. Posting as an

Re: [Full-disclosure] Re: Re: Re: Links to Google's cache of626FrSIRTexploits

2006-03-25 Thread nocfed
On 3/25/06, Jorrit Kronjee [EMAIL PROTECTED] wrote: nocfed wrote: You have failed to understand the 'hint' part. It was a hint at ONE of the switches to use.. As you apparently have not read the manpage for wget, here is the full command. wget -e robots=off -Hr -nd -np --domains

Re: [Full-disclosure] Re: Re: Re: Links to Google's cache of626FrSIRTexploits

2006-03-24 Thread nocfed
On 3/23/06, Dave Korn [EMAIL PROTECTED] wrote: nocfed wrote: Really, do you ``hackers'' really not know howto at least read the manpage for wget? There is no need for any script, only a few switches to wget. Hint: -e robots=off Wow! j00 R so 1337! Hint: -e clue=on Seriously

Re: [Full-disclosure] Re: Re: Links to Google's cache of 626FrSIRTexploits

2006-03-22 Thread nocfed
Really, do you ``hackers'' really not know howto at least read the manpage for wget? There is no need for any script, only a few switches to wget. Hint: -e robots=off ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] !ADVISORY! | x Thu Mar 16 13:59:14 EST 2006 x | Directory Transversal in Ethereal

2006-03-16 Thread nocfed
(CVE) project has assigned the name CVE-2006-592631 to this issue +++ CONTACT +++ nocfed [EMAIL PROTECTED] 1-888-565-9428 BEWARE THE JIZZTAPO

[Full-disclosure] -advisory- + x Thu Mar 16 14:05:41 EST 2006 x + Buffer Overflow in Snort

2006-03-16 Thread nocfed
+ This issue has no identified workarounds on the vulnerability. + CONTACT + nocfed [EMAIL PROTECTED] CISSP GSAE CCE CEH CSFA SSP-CNSA GHTQ SSCP ___ Full

Re: [Full-disclosure] Internet Explorer 0day

2006-03-15 Thread nocfed
Mozilla isn't any better these days. Let's all improve on netcat! Well, OpenBSD's has an option to work via HTTP proxies in the upcoming 3.9 release... ;-) Joachim HUH? You mean like when they added basic HTTP CONNECT back in October of 2004?

Re: [Full-disclosure] Yahoo security give blogger the thumbs up

2006-03-13 Thread nocfed
On 3/12/06, SO SECURITY RESEARCH INSTITUTE [EMAIL PROTECTED] wrote: If you can provide the evidence to support your claim that the information published by the blogger was already in the public non-corporate circuit prior to the blog entry being made, do get in touch. You got me thinking

Re: [Full-disclosure] New MSN Servers

2006-03-03 Thread nocfed
On 3/3/06, ZeuZ [EMAIL PROTECTED] wrote: Hi everybody, yesterday I was about to update something in my MSN Space and I found out something... Suddenly logginet.passport.com redirected me to www.msn-int.com (65.54.202.62) and at first I thought it was some kinda spyware, so I Switched to Linux

Re: [Full-disclosure] reduction of brute force login attempts via SSH through iptables --hashlimit

2006-03-02 Thread nocfed
On 3/1/06, GroundZero Security [EMAIL PROTECTED] wrote: Well i had a few minutes time, so i updated the script a bit. I did not use lastb though, as it wouldnt work (read the manpage.) Anyhow, maybe someone found it usefull so here is v.0.2 :

Re: [Full-disclosure] Unofficial Microsoft patches help hackers, not security

2006-01-04 Thread nocfed
On 1/4/06, Joe Average [EMAIL PROTECTED] wrote: It has been said on C|NET/SecurityFocus and other places that experts are telling people to use unofficial patches, and to make things worse the experts are releasing patches. ... You've got to wonder who these experts are. Uhmm, really?

Re: [inbox] [Full-disclosure] Breaking LoJack for Laptops

2005-12-28 Thread nocfed
On 12/27/05, Michael Holstein [EMAIL PROTECTED] wrote: Don't a lot of systems include just this? Any system which supports PXE boot can pretty much do all of the above from the BIOS. True, but Intel's PXE spec expects it to fetch the instructions from the TFTP server, and get all the

Re: [Full-disclosure] bash vulnerability?

2005-08-18 Thread nocfed
I have two more 0day's for you to look into. This may take YEARS to figure out! 1) exec - WHOA! WHAT HAS HAPPEN!? 2) kill -9 -1 WASH, REPEAT! Nobody has been informed of the aformentioned '0day' and common knowledge has been ignored. ___