By that same standard.. if you leave your house unlocked does that give
someone the right to enter it?
just my thoughts
Date: Wed, 16 Jun 2010 19:58:27 +0200
From: uuf6...@gmail.com
To: tbi...@gmail.com
CC: full-disclosure@lists.grok.org.uk; valdis.kletni...@vt.edu
Subject: Re: [Full-discl
There is a big difference between being secure and being compliant.If its a
company's desire to be compliant, they may never be secure. However, if they
strive to be secure, they will always be compliant no mater what framework they
are chasing.
I agree... money spent on compliance is us
As you will all know I am one never to post, but I had to bring this to a
discussion point.
I received an e-mail today from the Gallup Journal inviting me to join their
LEET management spam list.
Within this inventation, they had provided me with my username (Ahhh how nice)
and my password (
The CISSP is a management certification... not a techie cert... I dont need to
hack to keep one out..
-Jeff-BEGIN GEEK CODE BLOCK-Version: 3.1GIT/CM/CS/O d- s:+ a C+++ UH++
P L++ E- w-- N+++ o-- K- w O- M--V-- PS+ PE- Y++ PGP++ t+ 5- X-- R* tv b++ DI++
D++G e* h--- r- y+++*--END G
Does anyone have a snort signature to detect credit cards or social security
numbers?
Thank you in advance,
Jeff___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia
Actually the QSA is for the employee... the QSC & ASV is for the company.
In order for a person to have/keep/maintain their QSA cert, they must work for
QSC.
If a QSA quits working for a QSC, they no longer have their QSA
certification.-Jeff WilderCISSP,QSA,CCE,C/EH-BEGIN GEEK COD
Anyone have any tools to crack a cisco secret 5 password? I know cain will
crack a 7 password...
If you would please respond off list I would be appreicative.
any help out there?
-Jeff Wilder
CISSP,CCE,C/EH
___
Full-Disclosure - We believe in it.
The site is off line now. :)
-Jeff Wilder
CISSP,CCE,C/EH
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GIT/CM/CS/O d- s:+ a C+++ UH++ P L++ E- w-- N+++ o-- K- w O- M--
V-- PS+ PE- Y++ PGP++ t+ 5- X-- R* tv b++ DI++ D++
G e* h--- r- y+++*
--END GEEK CODE BLOCK---
Is anyone aware of a method to scan your network for wireless devices using
the ethernet side of the device rather then the wireless? I have a remote
location that I need to scan for wireless deivces and am looking for a
method execute them remotely.
any ideas?
-Jeff
__
How often does McAfee try to run this file?
-Jeff Wilder
CISSP,CCE,C/EH
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GIT/CM/CS/O d- s:+ a C+++ UH++ P L++ E- w-- N+++ o-- K- w O- M--
V-- PS+ PE- Y++ PGP++ t+ 5- X-- R* tv b++ DI++ D++
G e* h--- r- y+++*
--END GEEK
All,
I have a Windows 2000 terminal server that is consistantly sending out
broadcasts to 255.255.255.255:111... below is a capture from a snort box I
have running. In the last 18 hours I have had about 2000 packets from this
box to this address about every 30 seconds. Snort reports the sign
WOOO HO! I'll second that
-Jeff Wilder
CISSP,CCE,C/EH
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GIT/CM/CS/O d- s:+ a C+++ UH++ P L++ E- w-- N+++ o-- K- w O- M--
V-- PS+ PE- Y++ PGP++ t+ 5- X-- R* tv b++ DI++ D++
G e* h--- r- y+++*
--END GEEK
Does anyone know of a location where the exploit code for the issues we
address on this list can be found?... Much of the time I see the e-mails
roll through wiht just a high level discription of the information.
I have the new and old copies of Metaspoit installed and running ... but
would li
OMG THAT IS JUST TOO FUNNY!!!
-Jeff Wilder
CISSP,CCE,C/EH
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GIT/CM/CS/O d- s:+ a C+++ UH++ P L++ E- w-- N+++ o-- K- w O- M--
V-- PS+ PE- Y++ PGP++ t+ 5- X-- R* tv b++ DI++ D++
G e* h--- r- y+++*
--END GEEK CODE BLOCK
I didnt know that they gave out scores?... have they started doing that?
-Jeff Wilder
CISSP,CCE,C/EH
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GIT/CM/CS/O d- s:+ a C+++ UH++ P L++ E- w-- N+++ o-- K- w O- M--
V-- PS+ PE- Y++ PGP++ t+ 5- X-- R* tv b++ DI++ D++
G e*
I'll second that
-Jeff Wilder
CISSP,CCE,C/EH
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GIT/CM/CS/O d- s:+ a C+++ UH++ P L++ E- w-- N+++ o-- K- w O- M--
V-- PS+ PE- Y++ PGP++ t+ 5- X-- R* tv b++ DI++ D++
G e* h--- r- y+++*
--END GEEK CODE BLOCK--
From
Not to validate the cissp... but try to get a good security job with out it.
I do not have to know how to forge the steel, machine the metal, build an
engine in order to drive a car. I understand the the inner workings of an
application how how it interacts with the differnent layes...
There
Can some please send me the actual regulation that states or validates the
comments of
http://www.nonprofitrisk.org/nwsltr/archive/employprac091005-p.htm ?
I am in this very situation right now.
-Jeff Wilder
CISSP,CCE,C/EH
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GIT/CM/CS/O
I wanted to chime in on all this SANS VS. any other certification VS.
training...
The only thing a certification does for anyone is validate to a prospective
employeer that you, at the time you took the test, knew enough to pass it.
Depending on how high that bar is set will determine if you r
I went to a " Hacking Class".. it was put on by the infosec institute... The
class was written and delivered by a Jack Koziol, one of the authors of The
Shellcoder's Handbook: Discovering and Exploiting Security Holes. The class
I took was Advanced Ethical Hacking... it was AWESOME!
It was a g
Speaking of script kiddie stuff... bbs's and the like...
anyone remember VCL?.. virus creation labratory?
-Jeff Wilder
CISSP,CCE,C/EH
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GIT/CM/CS/O d- s:+ a C+++ UH++ P L++ E- w-- N+++ o-- K- w O- M--
V-- PS+ PE- Y++ PGP++ t+ 5- X-
Does anyone know if MS EFS can be cracked if you do not have access to the
recovery agent?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
22 matches
Mail list logo