I had no idea division-by-zero was a person until I read n3td3v's posts on
FD.
http://img.4chan.org/b/src/1211167023499.jpg
p.
> Shut up you fucking fag, you just want this presentation given so you
> can sell more tickets and become rich you complete dick head,
> I know the national securi
Connections are coming from all over the Internet (various
different IPs) specifically to this IP.
This sounds like a textbook case of Cross Site Scripting (XSS).
[see attachment]
<>___
Full-Disclosure - We believe in it.
Charter: http://lists.grok
From: "trains" <[EMAIL PROTECTED]>
> The "AddType" statement for php is normally system-wide, which means
> the web server will execute php scripts that may be found in the
> upload directory. This can be fixed multiple ways:
They will just place an .htaccess and do addtype themselves.
"php_admin
> Yes we are an easy
> target for php0t etc right now, but in the future we will be the
> biggest on the internet in the long term.
I didn't know 'being targetted' means somebody replies to one of your mails
(OFF LIST!) to express an opinion. What is going to change
I think he meant the hushmail users (at least those mentioned in the
article), not the crew.
- Original Message -
From: "Simon Smith" <[EMAIL PROTECTED]>
To: "Paul Melson" <[EMAIL PROTECTED]>
Cc:
Sent: Thursday, November 08, 2007 8:20 PM
Subject: Re: [Full-disclosure] Hushmail == Narqz
After all this crap, you guys still fall for the trollbait? f*cking sad :-(
> No? I've just recently applied here https://www.mi5careers.gov.uk/ homo, so
> watch your
> back with who you're talking to.
___
Full-Disclosure - We believe in it.
Charte
Does anybody else have something obvious to point out regarding this
flatdev-started trollbait?
Keep it coming, get it out of your system! :-)
p.
How do you know the hacker was attacking from his own IP address? That's a
pretty bold assumption. Surely he could've hacked from a compromised
> As long as we're sharing random thoughts; has anyone here considered the
> possibility that trying to hide catches more attention than sitting
> quietly
> as part of a vast crowd?
> Just for the record, that's a sincere question.
Reminds me of virustotal.com's "Don't send a copy to anti-virus c
Is bungie.net's title originally 'Satisfying Your Mom Since 1991' ?
Google says, it should be "This One Goes To Eleven."
If it's obvious or normal, discard this email.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-di
How exactly does such data get captured? Somebody placed a link
somewhere with the url having the user/password in it ? What would be
the point of that? And if not, where did that come from? I peeked at
http://www.google.com/tools/firefox/safebrowsing/faq.html to learn more
but it only has obvio
> It just can't be that simple. There has to be more to what happened to
the guy. Lots of computers are offline for several
> days at a time, it's inconceivable that they didn't test that.
Yeah, probably - but just for the fun of it I'm curious what happened
(unless it's some dumb user error).
> One thing you might try is instead of cutting it off entirely from the
internet, use an external device to limit what internet
> addresses it can talk to so that it has a valid and working gateway
but it can't phone home.
I doubt Vista wants to google for porn instead of phoning home.
After r
Didn't have the chance / interest to meet Vista myself as of yet, but
if what you wrote isn't user error or something specific and limited to
only a few computers then excuse me a moment while i lmao. BTW, is there
anything in vista's agreement in legalish that could be translated into
'you agre
This is probably the funnier part, whatever is causing it
"[ Illegal characters in file path:
/home/system/www/bbcone/listings/nav_today">"
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Thierry
Zoller
Sent: Sunday, August 27, 2006 10:13 PM
To: full-di
g
the user. (There might be some circumstances blocking this in practice,
like if they require a Turing test for completing money transactions
etc).
php0t
ps: a poc showing how to fake a whole webpage?! :-)
> I wonder what is interesting in this , usually a poc show us we can
> upload a cr
Thanks for the 0day advisory! It helped out a lot.
(ps: 10yrs English course, 10yrs security would have been a better
choice for you if you ask me)
> HELLO, MY NAME AMIT. I SECURITY RESEARCH FROM ALL OVER WORLD AND
CURRENTLY THIS MY FIRST
> ADVISORY TO ANYONE RESARCHING. I POST TO MAILING LI
what's up - If your problem is that I do not get paid for
this - well - I am happy
that you are so much after what's best for me but I can do fine on my
own - thanks.
php0t / zorro.hu
> You are wasting your time trying to prove you can find holes in
software that you AREN'T *P
Title: Message
That
doesn't work any more.
Another one, for Internet Explorer however does work that i found the
other day.
Send
yourself one using my POC :)
http://zmailhost.ath.cx/
or
http://zmail.zorro.hu/
php0t
/ zorro.hu
-Original Message-From:
[EMAIL PROT
Found a new javascript escape for yahoo webmail, works with explorer,
cookie stealing can begin yet again.
You must give a correct source address to be able to get a cookie. Do
not abuse, thx.
Proof-of-concept (kind-of):
http://zmailhost.ath.cx/
php0t
www.zorro.hu
From how
many different IP's?
It could be just a proxy or a firewall set up to change the user-agent
to some random string, but whether they're surfers or bots you can tell
by looking at all such lines - to me, an index.html alone doesn't tell
me much, maybe others have seen this thou
iled - see default
logfile
[EMAIL PROTECTED]:/tmp$
Vulnerable
iPlanet Messaging Server 5.2 HotFix 1.16 (built May 14 2003)
php0t / zorro.hu
www.zorro.hu
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-
Title: Message
For
the record: 30 minutes after I posted this, onLoad got changed to onfiltered -
problem fixed by yahoo. :)
-Original Message-From:
[EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
php0tSent: Tuesday, June 13, 2006 2:28 AMTo:
full-disclosu
Title: Message
> Oh, I've CC'd [EMAIL PROTECTED], but if someone else would
give them a proper write-up, and encourage
>
them to close the hole, that'd be wonderful.
Since
yahoo isn't known for fixing bugs fast unless it's serious (and even then),
here's something i wrote up today.
The
more money involved than (people help me out with this one)...
$5000(?), Jason still couldn't catch the hacker, so blocking tor
globally won't help the problem more than it hurts privacy towards legit
tor users.
> Blacklisting IP addresses is no substitute for actually
Title: Message
Would
it be a big think to ask that you try to get along?
Steven: hardcoding tor node IP's into a module, blocking tor as a
means of security is weird I agree but cussing and flaming never
helped anybody - I've read other replies in the thread that were a lot more
useful t
and bursted into laugter. The bubbles
were kind of painful, I have to give him credits for finding a 0day to
cause pain to some remote guy using only email.
What I actually meant to say was: LOL (literally).
php0t
___
Full-Disclosure - We believe in it.
Char
I have a white hat, photo included, expecting office bug now. ;P
On 4/20/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> On Wed, 19 Apr 2006 23:19:32 +0200, "[EMAIL PROTECTED]" said:
> > auction is up for whitehat industry only, proof required.
>
> Somebody can prove themselves a black hat pr
> ok, lets take this a bit further, and go under the assumption that
hell
> exists according to the myth of heaven and hell... and hell were to
freeze
> over, there's be lots of stuff that I'd have to do that isn't
appealing.
Learning to ice skate ? :)
___
> Ha Ha. Yes, not a proper fiend hey. But I take it that I would be
anonymous
> technically.
> If I were to do it for real I'd probably set up an internet connection
in an
> assumed name complete with a fake bank account so there'd be no one
for the
> cops to berate, just the computer [with no l
to share with the probably
not-so-interested list members. I responded this time because 1) it was a
personal attack based on nothing, and 2) because it's my last email that has the
word netdev in it. (sent or received ;]) - and i can keep my word, unlike 'some
people'.
php0t
Title: Message
If you
kept your word (and didn't post my emails back to the list), it'd be better.
:)
-Original Message-From: n3td3v
[mailto:[EMAIL PROTECTED] Sent: Friday, March 31, 2006 10:47
PMTo: php0t; full-disclosure@lists.grok.org.ukSubject:
Re: [Full-
Title: Message
No,
please.. Really, keep your word just this one time.
-Original Message-From:
[EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
n3td3vSent: Thursday, March 30, 2006 10:55 PMTo:
s89df987 s9f87s987f; full-disclosure@lists.grok.org.ukSubject: Re:
Title: Message
You
need a hug.
-Original Message-From:
[EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
n3td3vSent: Thursday, March 30, 2006 12:57 AMTo:
full-disclosure@lists.grok.org.ukSubject: Re: [Full-disclosure]
Noise
I finished school 11 years ago, i
cause they take the default CentOS page for a 'hack'.
Priceless.)
php0t
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
e running off the thread now with your tail between
your legs, huh?
chiq: ...
n3td3v: fine, go screw yourself, be proud to be an american, you just
couldn't help bash other peoples google and yahoo vulnerabilities!
chiq:
n3td3v: Oh well, time to get back to what counts, and thats research
into
risk
vulnerabilities, and I am sure I speak in all FD posters` names when I say
that you are the yet the most helpful person in the IT business, and you have a
big future.
php0t.
-Original Message-From:
[EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
Jesus tap dancing christ, this can't be even half serious.
> OR MAYBE YOU GUYS JUST DON'T GET HOW BIG I'VE BEEN GROWING THE N3TD3V
> GROUP SINCE EIGHT YEARS BEFORE I STARTED EH?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.u
to do and when you
get bored with it or just simply don't like what you see, you can always
filter outgoing data or just disconnect the poor bastard. Manual
honeypot, we could say.. :-)
ciao
php0t
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Mich
If they're using subscribed people's emails, it wouldn't make deleting
much
easier, since then you'd have to pay attention to not delete legit
subscribers`
emails. They could just send one email 'from' each subscriber that
posted in
the last couple of months.
php0t
_
> > Then the spam would simply come "from" list subscribers :-(
> But then it would all be coming from one or two addresses. It's easier
to delete that way.
SMTP. They can come from whatever address.
___
Full-Disclosure - We believe in it.
Charter: h
This has been going on for about a day... Come on. I know it's Sunday,
but... You know.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Yes, because firefox probably doesn't execute javascript if the
location is in an IMG tag.
I don't know why they posted that in the first place.
Here's a link that will probably work under both browsers
http://ws.arin.net/whois/?queryinput=%3Cscript%3Ealert('666')%3C/script%
3E
> Right,
>
dns for the IP, etc.
Plus, when i do a whois at the shell, i wouldn't like to
see </> instead of the the html opening tags. The idea ain't
bad though, it's probably fun to see info about some percentage of the people
that do wh
7;t use constant parts (font, background, colors)
5) use rotation, deformation, maybe letters in 3D (adding extra edges
;])
6) layer more words on each other
7) if you sense too much spam, change a few things
etc
etc
etc
I probably left out a lot of things that should be
elope or a gazelle?"
You're right, I don't like the idea of having a database of all the
possible answers, and the antelope/gazelle thing certainly got me pissed
on the captcha site. When I tested it, first it was a couple of bugs (I
didn't find neither insect, neither b
as it is usually the case - none at all),
we can make the situation better by using captcha-like implementations.
This is all I said, but you're both right about pointing out the
problems of spammers having money / using people, etc as well.
php0t
___
php0t wrote:
> > A big part of the problem you mention can be solved by requiring a
> > Turing test for the actions that you don't want a bot to be able to
> > do.
> I guess you missed all the historic discussion of how cheap it is, in
> "Western"
A big part of the problem you mention can be solved by requiring a
Turing test for the actions that you don't want a bot to be able to do.
php0t
> Recently, new bots rendered current anti spam techniques for blogs
> almost useless. Here is a short write-up on the subject of c
I hope... this is all a joke.. right?
php0t.
ps: looking into postfix regexp filters when i wake
up, thanks for the tip.
- Original Message -
From:
Joe
Average
To: GroundZero Security ; full-disclosure@lists.grok.org.uk
Sent: Sunday, December 18, 2005 4:47
nce this is all specific and doesn't have any relevant info i suggest
not boring the others with it.
Next time you have something to say, tell me in advance that you're _NOT_
quoting otherwise I will think it's spam and not really your opinion.
Cheers,
php0t.
- Origi
Poem was horrific, [EMAIL PROTECTED] notified about the gif.exe.
- Original Message -
From: "Dude VanWinkle" <[EMAIL PROTECTED]>
To:
Sent: Saturday, December 17, 2005 11:28 AM
Subject: [Full-disclosure] Seasons Beatings
p.s.: here is your card: http://tinyurl.com/9tz5g
_
Jesus tap dancing christ. Stop.
- Original Message -
From: "n3td3v" <[EMAIL PROTECTED]>
To:
Sent: Sunday, December 11, 2005 4:09 PM
Subject: Re: [Full-disclosure] Famous n3td3v quotes - The Director's
Cut(outnow on DVD)
You haven't been able to find in vulnerabilities in Google and
Fav post & fav answer
" > I could make you look more stupid in public by reveiling my
nickname on your IRC channel and your direct involvement with me by
yourself and your channel operators and users of BSRF.
If you are an active user of BSRF, and if you are a "great friend" of
mine, and you d
Proof of concept: http://www.google.com/url?sa=D&q=http://www.google.com?
alert(document.cookie)">
Remarks: This is my second Google disclosure in under a year. That
makes two vulnerabilities for Google I have discovered.
Credit: n3td3v
wall ... bad... head .. hurt. ouch.
Yes, obviously not perfect or even near, i didn't even say that. Just a
plus, an alternative to having to depend on keyboard / screen / files to
help out with the authentication discussed.
php0t
- Original Message -
From: "Nick FitzGerald" <[EMAIL PROTECTED]&g
How'bout adding direct printing on lpt of new one-time usage passwords? :)
In order to get the passwords, they'd have to hook the printing, too. Not
too common, yet.
I agree but what about the second random password and challenge
authentification? Both should be unique and usage once.
_
ody flaming him,
like it is now. Now I feel kind of bad that i added to this noise. sorry.
Thanks for all your 20 seconds:
php0t.
- Original Message -
From: "Jason" <[EMAIL PROTECTED]>
To:
Sent: Friday, November 25, 2005 6:20 PM
Subject: Re: [Full-disclosure] Re: Re
57 matches
Mail list logo