Re: [Full-disclosure] sha1 sums

2011-10-25 Thread N-SR
On Tue, Oct 25, 2011 at 6:51 AM, HI-TECH . isowarez.isowarez.isowa...@googlemail.com wrote: 24405398b27585676f0191b493839e9c02f3ec5a file1 e676c17b21f5a96fe278c0cdb32152357d5e10f6 file2 A bit of netiquette and use the subject 'noise' for hashes. http://seclists.org/fulldisclosure/2011/Jul/21

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread sr.
LAN ip's. sr. 2009/6/16 Vladimir '3APA3A' Dubrovin 3ap...@security.nnov.ru Dear Tom Neaves, It still can be exploited from Internet even if remote management is only accessible from local network. If you can trick user to visit Web page, you can place a form on this page which

Re: [Full-disclosure] ICQ 6 protocol bug?

2009-02-14 Thread sr.
ohthis reminds of the days subseven would send ICQ pager alertsahh...the gold 'ol days. On Sat, Feb 14, 2009 at 4:49 PM, valdis.kletni...@vt.edu wrote: On Sat, 14 Feb 2009 23:26:48 +0200, James Matthews said: ICQ is known to have a few remote bugs. I use meebo.com instead of a

Re: [Full-disclosure] 1234567890 today

2009-02-13 Thread sr.
that just means it's the end of the world... On Fri, Feb 13, 2009 at 12:25 PM, the.soylent the.soyl...@gmail.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 hi.. according to http://en.wikipedia.org/wiki/Unixtime unixtime will have today the 'magic' number 1234567890

Re: [Full-disclosure] metasploit.com = 127.0.0.1

2009-02-11 Thread sr.
...@gmail.com CC: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] metasploit.com = 127.0.0.1 DDOS On Tue, Feb 10, 2009 at 4:05 PM, sr. static...@gmail.com wrote: anybody else seeing this? can't get to metasploit because it's currently resolving to 127.0.0.1 sr

Re: [Full-disclosure] metasploit.com = 127.0.0.1

2009-02-11 Thread sr.
Well, i can resolve the IP's just fine. just can't connect to port 80. I'm the fw / network person at my job, and i don't remember adding a rule for this :-P I can get there just fine now, seemed inaccessible to me for a short time. thx all... fabrizio On Wed, Feb 11, 2009 at 11:00 AM, Michael

[Full-disclosure] connect back PHP hack

2009-02-10 Thread sr.
the connect back code does. any input is much appreciated. thx, sr. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] connect back PHP hack

2009-02-10 Thread sr.
/info/o_meni/config.inc.php in my case, a bunch of php files were modified. i'll zip everything up and host it so you can all analyze... thx, sr. aka fabrizio siciliano On Tue, Feb 10, 2009 at 2:10 PM, Gustavo Castro gcast...@gmail.com wrote: Sr. This is base64 encoded. 2009/2/10 sr

[Full-disclosure] metasploit.com = 127.0.0.1

2009-02-10 Thread sr.
anybody else seeing this? can't get to metasploit because it's currently resolving to 127.0.0.1 sr. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http

Re: [Full-disclosure] metasploit.com = 127.0.0.1

2009-02-10 Thread sr.
.metasploit.com dns02.metasploit.com has address 66.240.213.81 [hhoff...@localhost ~]$ host 66.240.213.81 81.213.240.66.in-addr.arpa domain name pointer core.metasploit.com. On Tue, 2009-02-10 at 17:05 -0500, sr. wrote: anybody else seeing this? can't get to metasploit because it's currently

Re: [Full-disclosure] Barack Obama -- Not Appropriate

2009-01-22 Thread sr.
sentiar? or sentier? watch it, you might be considered a troll...! On Thu, Jan 22, 2009 at 4:44 PM, j-f sentier j.sent...@gmail.com wrote: It's sad to get to this point, but it seems that an trisomic like you need this kind of speach to catch the puck. Look at your mailbox archives, no ones

Re: [Full-disclosure] Anybody having a mobile phone (Iphone, Nokia.) willing to test ?

2009-01-18 Thread sr.
i'll take one. my company tests a vast majority of phones for our GPS app which currently sits on a number of carriers. would love to check out your code. sr. Thu, Jan 15, 2009 at 5:40 PM, Ivan . ivan...@gmail.com wrote: yeah I do On Fri, Jan 16, 2009 at 3:12 AM, Thierry Zoller thie

Re: [Full-disclosure] WTF people?

2009-01-11 Thread sr.
amazing how every message becomes tainted with bullshit. On Sun, Jan 11, 2009 at 6:01 PM, sexyazngr...@mac.hush.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 pics? On Sun, 11 Jan 2009 17:48:53 -0500 waveroad waveroad waver...@gmail.com wrote: N3td3v other alias spotted.

Re: [Full-disclosure] This is WAR!

2009-01-11 Thread sr.
maybe i'm not getting the joke, but it's not escape - colon - i. it's escape - i is this the twilight zone? sr. On Sat, Jan 10, 2009 at 1:45 AM, Ed Carp e...@pobox.com wrote: I'm sure George doesn't even wash his hands after using emacs! The only reason you'd use escape - colon - i

[Full-disclosure] Netgear WGR614v9 DoS to Admin Interface (internal and external)

2008-11-13 Thread sr .
either, but whatever. e.g., http://192.168.1.1/? all you need to do is add a ? to the end of the URL. This is with the latest firmware from netgear's site. that's all folks. keep on talkin that smack you talk so well. sr. ___ Full-Disclosure - We believe