http://www.whitehouse.gov/omb/memoranda/m00-13.html
draw your own conclusions...
On Thu, Oct 30, 2008 at 11:18 AM, Jorrit Kronjee
[EMAIL PROTECTED] wrote:
On 10/27/2008 8:03 PM, Gary E. Miller wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yo All!
On Mon, 27 Oct 2008, [EMAIL
Google for ephemeral port tcp syn
On Nov 13, 2007 5:43 PM, Dean Pierce [EMAIL PROTECTED] wrote:
Simon Smith wrote:
Kelly,
SYN packets and ports do not correlate. And yes, SYN is TCP. You
should
read up on TCP/IP etc so that you understand protocols before posting to
mailing
On 11/3/07, Jamal Al-Aseer [EMAIL PROTECTED] wrote:
Dear SF,
I am writing this to inform the public that bank of America's two step
authentication is fundamentally flawed. The user at there website will
enter a user name then tell there systems which state it originates
from but the next step
On 10/22/07, Anders B Jansson [EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] wrote:
Hi,
Oct 22 20:36:13 nms sshd[90657]: Failed password for invalid user gopher
from 77.46.152.2 port 55120 ssh2
user/password authentication for SSH? one way of cleaning up your
logs and killing this type
Due to this RDV called email I suggest the following patch:
procmail || ${insert other filter here}
This work around will allow you to avoid the n3td3v RDV shenanigans.
Thank you.
On 9/28/07, Jimby Sharp [EMAIL PROTECTED] wrote:
I asked you to stop your bullshit you mad man. It is crazy to
On 9/28/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
#!/bin/sh
#
# Secure v9.3.1b
# This is to be used on a NEW install only!
# This script will go through your box and lock the inside down.
# Copyright [EMAIL PROTECTED] | [EMAIL PROTECTED],
([EMAIL PROTECTED])
# Thanks to jericho from
Sil,
Don't let that shit out! Keep it UG!
On 9/28/07, J. Oquendo [EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] wrote:
Two months is still recently. Think about In recent history we invaded
Iraq, In recent times terrorism has become more prominent.
The real problem here is that 0-day
On 11/2/06, Tonnerre Lombard [EMAIL PROTECTED] wrote:
Salut,
On Thu, 2006-11-02 at 01:15 -0600, nocfed wrote:
And if you have physical access then you can simply use a floppy, usb
dongle, or any other type of removable media to boot from. Once
physical access is obtained then you pretty
On 7/10/06, mikeiscool [EMAIL PROTECTED] wrote:
On 7/11/06, n3td3v [EMAIL PROTECTED] wrote:
What (I and) the underground call it:
Vhoning
vhoning looks alot like whoring ... to me anyway.
..
my proposal for the name is mikeiscool'ing. it will help my brand
(of me). thanks.
I second
On 7/7/06, Mike Duncan [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Martin O'Neal wrote:
Actually, I think this is the point the author was trying to make. We
should not be thinking about the interests of a company who has ignored
issues in the past.
Ignored what?
On 6/30/06, n3td3v [EMAIL PROTECTED] wrote:
They replace a website with the USSS logo., like what happened in the
case of the shadow crew. I'm not pro Shadow crew but I find it highly
offensive that the USSS are acting in such a This is now property of
the USSS with logo, asking the remaining
On 6/28/06, Ademar Gonzalez [EMAIL PROTECTED] wrote:
Don't know if you guys have seen this. Just got it in my gmail
account, it tries to execute the file scrapbook.exe from :
http://www.yourfreespace.net/users/orkut2/scrapbook/scrapbook.exe
Karpesky says is Trojan-Spy.Win32.Banker.anv
On 6/12/06, c0ntex [EMAIL PROTECTED] wrote:
On 12/06/06, David Loyall [EMAIL PROTECTED] wrote:
Oh, I've CC'd [EMAIL PROTECTED], but if someone else would give them a proper
write-up, and encourage them to close the hole, that'd be wonderful.
I know this guy who has over 7 years of direct
On 6/3/06, Anil Gulecha [EMAIL PROTECTED] wrote:
Joined this list recently, and was browsing the archives online. Was
wondering that someone not really interested could easily download the
compressed archives and use a script to read through and gather email IDs.
Simple searching for *_at_*.*
On 5/22/06, ... [EMAIL PROTECTED] wrote:
HAHAHAHAHAHAHAHAHAHAHAHAH
Hello KGB, CIA, FBI, McAfee
- Original Message -
From: n3td3v [EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Sent: Monday, May 22, 2006 1:46 AM
Subject: [Full-disclosure] For the attention of Mi5, Mi6 or
On 5/19/06, Abuse 007 [EMAIL PROTECTED] wrote:
This is a cop out. I don't believe they folded just because of one DDoS
attack.
What did they do to try to mitigate it?
I believe there is a fair few anti-DDoS devices that will scrub/filter
traffic.
I also believe that there is providers that
On 5/19/06, Andrew Smith [EMAIL PROTECTED] wrote:
There are a lot of moderated lists.
This isn't moderated.
That is the point of this list.
Don't be an idiot, just because there are a few idiots about doesn't mean
that you should call for a fd-bugtraq change.
On 5/19/06, [EMAIL PROTECTED]
On 5/17/06, Peter Besenbruch [EMAIL PROTECTED] wrote:
Mike Adams wrote:
I'm really disappointed.
All this will do is give all the other scumbag spammers out there proof
that using these tactics will work, and they will be able to extort
anyone.
Who will be next, Trend Micro? Fortinet?
On 4/15/06, Gadi Evron [EMAIL PROTECTED] wrote:
Hi guys. There is a mailing list to discuss fuzzing. It's technical.
You can subscribe here:
http://www.whitestar.linuxbox.org/mailman/listinfo/fuzzing
Gadi.
Thanks for spamming your own list. Glad to see that you are following
the
On 4/15/06, Exibar [EMAIL PROTECTED] wrote:
ok, so how the heck else is he supposed to let everyone know about the new
mailing list? Pay everyone a personal visit??? Send smoke signals?
Telepathy?
Gadi sent ONE message to this list to let everyone know that the new list
has been
On 4/8/06, Maksymilian Arciemowicz [EMAIL PROTECTED] wrote:
Source: http://securityreason.com/achievement_securityalert/35
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[function *() php/apache Crash PHP 4.4.2 and 5.1.2]
Author: Maksymilian Arciemowicz (cXIb8O3)
Date:
- -Written:
On 4/6/06, Dinis Cruz [EMAIL PROTECTED] wrote:
First off all, I want to apologize to the Full-Disclosure and DailyDave
readers for the last couple of posts which I CCed to these lists (the ones
about Full Trust, managed browsers, verifier issues in Java/.Net and
Sandboxing)
I know that
On 4/8/06, nocfed [EMAIL PROTECTED] wrote:
On 4/6/06, Dinis Cruz [EMAIL PROTECTED] wrote:
First off all, I want to apologize to the Full-Disclosure and DailyDave
readers for the last couple of posts which I CCed to these lists (the ones
about Full Trust, managed browsers, verifier
On 3/29/06, Tõnu Samuel [EMAIL PROTECTED] wrote:
---SNIP---
There is a one vector most people do not seem to know. You can telnet to port
80 and say
GET ?php .
write full script there and include web server log file later. Who knows what
else blackhats can do. Every single hole must be
On 3/29/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
On Wed, 29 Mar 2006 02:40:49 CST, nocfed said:
Right, that is a vector that nobody knows about unless they have
common sense. There were previous bugs with text editor(s) which used
logfiles to push the payload. Why someone would ever
On 3/28/06, Micheal Espinola Jr [EMAIL PROTECTED] wrote:
Patch Tuesday = Good before third party patches appear
Third party patch = Evil
Patch Tuesday = Bad for everyone after third party patches appear,
even Microsoft...
Ahh, but you forgot one:
n3td3v = Annoying. Posting as an
On 3/25/06, Jorrit Kronjee [EMAIL PROTECTED] wrote:
nocfed wrote:
You have failed to understand the 'hint' part. It was a hint at ONE
of the switches to use..
As you apparently have not read the manpage for wget, here is the full
command.
wget -e robots=off -Hr -nd -np --domains
On 3/23/06, Dave Korn [EMAIL PROTECTED] wrote:
nocfed wrote:
Really, do you ``hackers'' really not know howto at least read the
manpage for wget?
There is no need for any script, only a few switches to wget.
Hint: -e robots=off
Wow! j00 R so 1337! Hint: -e clue=on
Seriously
Really, do you ``hackers'' really not know howto at least read the
manpage for wget?
There is no need for any script, only a few switches to wget.
Hint: -e robots=off
___
Full-Disclosure - We believe in it.
Charter:
(CVE) project has assigned the name
CVE-2006-592631 to this issue
+++
CONTACT
+++
nocfed [EMAIL PROTECTED]
1-888-565-9428
BEWARE THE JIZZTAPO
+
This issue has no identified workarounds on the vulnerability.
+
CONTACT
+
nocfed [EMAIL PROTECTED]
CISSP GSAE CCE CEH CSFA SSP-CNSA GHTQ SSCP
___
Full
Mozilla isn't any better these days. Let's all
improve on netcat!
Well, OpenBSD's has an option to work via HTTP proxies in the upcoming
3.9 release... ;-)
Joachim
HUH?
You mean like when they added basic HTTP CONNECT back in October of 2004?
On 3/12/06, SO SECURITY RESEARCH INSTITUTE [EMAIL PROTECTED] wrote:
If you can provide the evidence to support your claim that the information
published by the blogger was already in the public non-corporate circuit
prior to the blog entry being made, do get in touch.
You got me thinking
On 3/3/06, ZeuZ [EMAIL PROTECTED] wrote:
Hi everybody, yesterday I was about to update something in my MSN Space and
I found out something... Suddenly logginet.passport.com redirected me to
www.msn-int.com (65.54.202.62) and at first I thought it was some kinda
spyware, so I Switched to Linux
On 3/1/06, GroundZero Security [EMAIL PROTECTED] wrote:
Well i had a few minutes time, so i updated the script a bit.
I did not use lastb though, as it wouldnt work (read the manpage.)
Anyhow, maybe someone found it usefull so here is v.0.2 :
On 1/4/06, Joe Average [EMAIL PROTECTED] wrote:
It has been said on C|NET/SecurityFocus and other places that experts are
telling people to use unofficial patches, and to make things worse the
experts are releasing patches.
...
You've got to wonder who these experts
are.
Uhmm, really?
On 12/27/05, Michael Holstein [EMAIL PROTECTED] wrote:
Don't a lot of systems include just this? Any system which supports
PXE boot can pretty much do all of the above from the BIOS.
True, but Intel's PXE spec expects it to fetch the instructions from the
TFTP server, and get all the
I have two more 0day's for you to look into. This may take YEARS to figure out!
1) exec -
WHOA! WHAT HAS HAPPEN!?
2) kill -9 -1
WASH, REPEAT!
Nobody has been informed of the aformentioned '0day' and common
knowledge has been ignored.
___
38 matches
Mail list logo