Re: [Full-disclosure] SANS on-duty 'cock handlers'

2006-06-12 Thread Dan B
Hi, n3td3v wrote: n3td3v: Sure my comments on FD on 666 were just hear-say, but theres loads of defacers out there. Morning wood is promoting the new 'zone-h.org http://zone-h.org' website via his Y messenger status the last two days, I feel sorry for the zone-h crew right now. Just

Re: [Full-disclosure] terrorists have invaded the united states

2006-06-12 Thread GroundZero Security
or you just put [EMAIL PROTECTED]ERROR:550 piss off in /etc/mail/access if you use sendmail - Original Message - From: Byron Sonne [EMAIL PROTECTED] Cc: full-disclosure@lists.grok.org.uk Sent: Sunday, June 11, 2006 6:16 PM Subject: Re: [Full-disclosure] terrorists have

Re: [Full-disclosure] scanning

2006-06-12 Thread schanulleke . 29172787
--- [EMAIL PROTECTED] wrote: What's this mean? It means that if you scan some lame-ass system and it crashes as a result, you might be in deep shit. And it shouldn't have crashed from a portscan does *not* hold up in court. Having done pen-testing in the past I have disabled (dos-ed) systems

[Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread David Loyall
Hello, all.I just received an email with an html attachment, on a yahoo account.When I opened the mail, yahoo automatically displayed the html, and executed the code within.What the hell. =)It forwarded the message to my contacts list, (or some other set of addresses, dunno,) and redirected my

Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread c0ntex
On 12/06/06, David Loyall [EMAIL PROTECTED] wrote: Oh, I've CC'd [EMAIL PROTECTED], but if someone else would give them a proper write-up, and encourage them to close the hole, that'd be wonderful. I know this guy who has over 7 years of direct security influence with Yahoo and Google security

Re: [Full-disclosure] scanning

2006-06-12 Thread GroundZero Security
When you say that by running a portscan you dossed a whole network then i would say either you are crazy or your portscanner is seriously broken lol I have been doing pen-tests since 1998 and never ever dossed a whole Network by accident, especially not with a simple portscan. -sk -

Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread nocfed
On 6/12/06, c0ntex [EMAIL PROTECTED] wrote: On 12/06/06, David Loyall [EMAIL PROTECTED] wrote: Oh, I've CC'd [EMAIL PROTECTED], but if someone else would give them a proper write-up, and encourage them to close the hole, that'd be wonderful. I know this guy who has over 7 years of direct

Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread Eric Chien
Check out: http://securityresponse.symantec.com/avcenter/venc/data/[EMAIL PROTECTED]...Eric ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] scanning

2006-06-12 Thread schanulleke . 29172787
Believe it or not, it was a Nokia running CheckPoint NG, but not well configured. Because the network was taking a lot of traffic during normal ops so no problems (yet). However it was taken down by a broadcast storm earlier. I was running multiple SYN-scan sessions of nmap with agressive

Re: [Full-disclosure] terrorists have invaded the united states

2006-06-12 Thread b . hines
You are correct, Terrorist have invaded the US... http://archives.cnn.com/2001/US/09/11/chronology.attack/index.html and now you see they must be mitigated, with extreme prejudice. ---BeginMessage--- ___ Full-Disclosure - We believe in it.

Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread pdp (architect)
They've got it quite quickly. 10x Since the source code is open to everyone now, it is just a matter of time for someone to redesign it and make it work Yahoo Beta as well. On 6/12/06, Eric Chien [EMAIL PROTECTED] wrote: Check out: http://securityresponse.symantec.com/avcenter/venc/data/[EMAIL

[Full-disclosure] exif thumbnails in FBI

2006-06-12 Thread Tonu Samuel
Hi all bad guys :P I can't resist, FBI rocks! http://no.spam.ee/~tonu/exif/?srcid=1847src=http://www.fbi.gov/wanted/seekinfo/erienote1.jpg Tõnu ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] McAfee VirusScan Enterprise 8.0.0 Misidentifies EICAR Test File

2006-06-12 Thread Marcos Agüero
TheGesus escribió: And you have an instant Elspy.worm flood and your Enterprise AntiVirus Administrator is shitting his pance. Run in circles, scream and shout and all THAT. Oh! That's really stupid! The logs will show 1 infection on the same PC within a few seconds. Easy to spot as a

[Full-disclosure] Is there a way to trace back Tor user

2006-06-12 Thread Jianqiang Xin
Regarding to recent debate about the use of Tor. Just wondering if it is practical to trace back the user if he is using Tor to hide his origin. As far as I know, there were several approaches using timing correlation to trace back TCP connections. It seems that the technique is there but the

[Full-disclosure] Secunia Research: MyBB domecode() PHP Code Execution Vulnerability

2006-06-12 Thread Secunia Research
== Secunia Research 12/06/2006 - MyBB domecode() PHP Code Execution Vulnerability - == Table of Contents Affected

RE: [Full-disclosure] Is there a way to trace back Tor user

2006-06-12 Thread CIRT.DK Mailinglists
Hey there There is a paper out trying to describe the different methods of tracking TOR user http://www.fortconsult.net/images/pdf/tpr_100506.pdf Best regards Dennis CIRT.DK From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jianqiang XinSent: Monday, June 12, 2006 4:49

Re: [Full-disclosure] Is there a way to trace back Tor user

2006-06-12 Thread poo
that paper is useless which isnt surprising when you see who wrote it On 6/12/06, CIRT.DK Mailinglists [EMAIL PROTECTED] wrote: Hey there There is a paper out trying to describe the different methods of tracking TOR user http://www.fortconsult.net/images/pdf/tpr_100506.pdf Best regards

Re: [Full-disclosure] file upload widgets in IE and Firefox have issues

2006-06-12 Thread Charles McAuley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Danny wrote: Hi , I read your article , but since I am not at all at home when scripting comes up,I still am wondering what this issue is exactly. My web-foo is not that strong either. Bart van Arnhem made a much better example in IE than I

[Full-disclosure] rPSA-2006-0100-1 freetype

2006-06-12 Thread Justin M. Forbes
rPath Security Advisory: 2006-0100-1 Published: 2006-06-12 Products: rPath Linux 1 Rating: Major Exposure Level Classification: User Non-deterministic Weakness Updated Versions: freetype=/[EMAIL PROTECTED]:devel//1/2.1.10-2.2-1 References:

Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread n3td3v
Yahoo is under the control of hackers. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDKSA-2006:099 ] - Updated freetype2 packages fixes multiple vulnerabilities.

2006-06-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:099 http://www.mandriva.com/security/

[Full-disclosure] [ GLSA 200606-14 ] GDM: Privilege escalation

2006-06-12 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200606-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-disclosure] PassMark?

2006-06-12 Thread Gary E. Miller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yo All! I thought I'd actually risk a real security question here. Any one seen the PassMark (www.passmarksecurity.com) security system in action? RGDS GARY - --- Gary E.

[Full-disclosure] repeated port 21 attempts

2006-06-12 Thread Jacob Wu
I'm getting port 21 connection attempts every 5 minutes from about half a dozen of my network users.  These attempts are repeating regularly with one computer sending out 1500+ attempts a day.  I have not seen this before and I'm wondering if anyone else here has seen a client behave this way

Re: [Full-disclosure] repeated port 21 attempts

2006-06-12 Thread Rodrigo Barbosa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Mon, Jun 12, 2006 at 04:30:40PM -0500, Jacob Wu wrote: I'm getting port 21 connection attempts every 5 minutes from about half a dozen of my network users.  These attempts are repeating regularly with one computer sending out 1500+ attempts a

Re: [Full-disclosure] repeated port 21 attempts

2006-06-12 Thread Matt Venzke
Try websnarf: http://www.unixwiz.net/tools/websnarf-1.04 Set the port to 21 log some of the data they're sending. You can have it log the session to a file, too, I think. Note that the one line it grabs may not amount to much of anything, but it might give you some idea what the machines are

[Full-disclosure] [EEYEB-20060524] Symantec Remote Management Stack Buffer Overflow

2006-06-12 Thread eEye Advisories
Symantec Remote Management Stack Buffer Overflow Release Date: June 12, 2006 Date Reported: May 24, 2006 Severity: High (Remote Code Execution) Systems Affected: Symantec AntiVirus 10.0.x for Windows (all versions) Symantec AntiVirus 10.1.x for Windows (all versions) Symantec Client Security

RE: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread Sean Crawford
-Original Message- On Behalf Of n3td3v Sent: Tuesday, June 13, 2006 4:05 AM To: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Vunerability in yahoo webmail. Yahoo is under the control of hackers. Good, Yahoo are a pathetic service anyway so it's no big deal, hey.

[Full-disclosure] Thanks for the feedback! GreenBorder License inside - with new options - valid to end of year

2006-06-12 Thread Bill Stout
Hello List, Thank you all for the feedback I've received so far. Some of the feedback I'm receiving is that it might also serve as a malware analysis tool if we improve logging messages. In thanks to the list, and in the hope more security experts will stress test the software, here's an

[Full-disclosure] Winword crashes

2006-06-12 Thread putosoft softputo
I have no time to check it so there are details about the crash: Open in a browser the following location: http://ofertas.muchoviaje.com/viajes/ofertas/ofertapaquete.aspx?codigo=8491 Next, Select all (Ctrl+E) and try pasting it in Microsoft Word. It will always crash with a failure in

[Full-disclosure] ZoneEdit.com Forcing Pop-Unders on WebForward-Configured Domains

2006-06-12 Thread Jason Coombs
Problem: DNS service ZoneEdit.com now owned by MyDomains.com has started forcing JavaScript pop-Unders onto users' browsers when the domain owner uses the ZoneEdit WebForward feature. References: www.zoneedit.com www.mydomains.com/support.php www.casalemedia.com/contact.html Details:

RE: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread php0t
Title: Message Oh, I've CC'd [EMAIL PROTECTED], but if someone else would give them a proper write-up, and encourage them to close the hole, that'd be wonderful. Since yahoo isn't known for fixing bugs fast unless it's serious (and even then), here's something i wrote up today. The

RE: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread php0t
Title: Message For the record: 30 minutes after I posted this, onLoad got changed to onfiltered - problem fixed by yahoo. :) -Original Message-From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of php0tSent: Tuesday, June 13, 2006 2:28 AMTo:

Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread Cardoso
Congratulations to the hackers running Yahoo!! On Tue, 13 Jun 2006 03:07:56 +0200 php0t [EMAIL PROTECTED] wrote: p Message p For the record: 30 minutes after I posted this, onLoad got changed to onfiltered - problem fixed by yahoo. :) p p p p -Original Message- p

Re: [Full-disclosure] Winword crashes

2006-06-12 Thread hypermodest
Hello putosoft, Tuesday, June 13, 2006, 12:56:56 AM, you wrote: I have no time to check it so there are details about the crash: Open in a browser the following location: http://ofertas.muchoviaje.com/viajes/ofertas/ofertapaquete.aspx?codigo=8491 Next, Select all (Ctrl+E) and try pasting

Re: [Full-disclosure] PassMark?

2006-06-12 Thread Randal T. Rioux
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Gary E. Miller wrote: Yo All! I thought I'd actually risk a real security question here. Any one seen the PassMark (www.passmarksecurity.com) security system in action? Yes. Bank of Bangalore^H^H^H^H^H^H^H^H^HAmerica uses it, as well

Re: [Full-disclosure] PassMark?

2006-06-12 Thread Q-Ball
I would agree as well, having recently reviewed them with others in the same field. Apart from relying on users to only enter their password if they saw an image, the solution heavily relied on cookie usage. This works fine for most people but a lot of corporate environments have persistant cookie

Re: FW: [Full-disclosure] PassMark?

2006-06-12 Thread Josh L. Perrymon
I am not impressed with the PassMark solution. It would be trivial to setup a script of rotating images that are used by the passmark widget.. then feed them back to the user and have a script post stating the image that was on the screen when the user clicked submit.. Also feeding in any 2nd

Re: [Full-disclosure] SSL VPNs and security

2006-06-12 Thread Q-Ball
SSL VPNs have their legitimate place as does IPSec. Personally, I'd rather that travelling exec's who need to log on from a public Internet terminal, dont have full IP connectivity into the network, but maybe that's just me. Q-BallOn 6/10/06, Tim [EMAIL PROTECTED] wrote: That depends on whether

[Full-disclosure] [SECURITY] [DSA 1096-1] New webcalendar packages fix arbitrary code execution

2006-06-12 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1096-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze June 13th, 2006