RE: [Full-Disclosure] Notepad popups in Internet Explorer and Outlook

2003-08-07 Thread Richard M. Smith
I fiddle a little bit with view-source: and WordPad but nothing seemed too interesting. WordPad always opened a large file as a plain text file. I was checking to see if it might open a file as Word .DOC file, but had no luck. Richard -Original Message- From: Georgi Guninski [mailto:[EM

RE: [Full-Disclosure] Incident response kit? Really OT, but need some help.

2003-08-07 Thread Rob Adams
Ed Skoudis did a really excellent job covering up-front costs in the Sans Track4 course I took recently. If you can get a copy of the SANS 4.1 book (by tomorrow :), it will fill in a lot of details for you. He used 30 slides covering preparedness in depth. In addition to a "Jump Bag", he also stres

Re: [Full-Disclosure] Vulnerability Disclosure Debate

2003-08-07 Thread Matthew Murphy
> Some good points.. HOWEVER, in todays world, we must balance the right > of users to know EVERY DETAIL about the exploits that could be used > against them, with the fact that the hackers generally ALREADY KNOW > these details. In some cases (MS03-007, for instance), that is correct. However, i

Re: [Full-Disclosure] Vulnerability Disclosure Debate

2003-08-07 Thread Geoincidents
> Nice stance, but complete off target. Currently, Microsoft releases > the most detailed advisories, in a consistent format, with extensive > information about possible workarounds etc. Microsoft's initial notification for the dcom exploit suggested blocking port 135 as a possible workaround ev

Re: [Full-Disclosure] Vulnerability Disclosure Debate

2003-08-07 Thread Jeremiah Cornelius
On Thursday 07 August 2003 09:53 am, gridrun wrote: > Vulnerability Disclosure Debate > by gridrun on 8/07/03 > In my humble, personal opinion, this step seeks to maximize income of > several large security firms, as they would release any detailed > information only to paying groups of subscrib

Re: [Full-Disclosure] Ankit Fadia bullshit?

2003-08-07 Thread Nick FitzGerald
The Wood-ster wrote: > http://www.newindpress.com/Newsitems.asp?ID=IEN20030712103432&Page=N&Title=Infotech&rLink=0 Oh good! All my experiences prior to this had suggested that Fadia and hangers-on were lame-arse wannabes cashing in on typical media ignorance of computer and networking technolo

Re: [Full-Disclosure] Red Bull Worm

2003-08-07 Thread KF
targets[] = { { "[Win2k-Universal]", 0x0018759F }, { "[WinXP-Universal]", 0x0100139d }, }, v; http://packetstorm.linuxsecurity.com/filedesc/oc192-dcom.c.html -KF Adam wrote: FYI - k-otik released a universal exploit that doesn't need 48 different offsets. It uses 2. One for win2k and one f

[Full-Disclosure] Call for discussion

2003-08-07 Thread Jason Coombs
A closed source database application offering known good hashes and forensic details of files published by vendors... These people are headed in a positive direction, but the closed source part bothers me for some reason. Have a look at one alternative: http://www.knowngoods.org/ I'd like to know

[Full-Disclosure] DCOM Worm/scanner/autorooter !!!

2003-08-07 Thread Stephen
Hello here, a new worm is on the wild, it uses the exploit released by k-otik (48 targets - http://www.k-otik.com/exploits/07.30.dcom48.c.php) look this shit : /* RPC DCOM WORM v 2.2 - * This code is in relation to a specific DDOS IRCD botnet project. * You may edit the code, and define wh

RE: [Full-Disclosure] Automating patch deployment

2003-08-07 Thread Johnson, Mark
Look at Microsoft Article 328010 for information on setting up Windows 2000, XP and 2003 to automatically update Microsoft's patches. I know this isn't the full solution, but maybe a start. Hope this helps. Mark J. -Original Message- From: George Peek [mailto:[EMAIL PROTECTED] Sent: Tue

[Full-Disclosure] Automating patch deployment

2003-08-07 Thread George Peek
We have two networks, one AD and one NT4.0. We can not use AD to deploy MSI patch packages to workstations that are not part of the AD (Active Directory), but are part of the NT domain. Not really interested in purchasing SMS as it seems too costly (why should we?). Considering HFNetChkPro 4 to aut

[Full-Disclosure] [sec-labs] Zone Alarm Device Driver vulnerability

2003-08-07 Thread sec-labs team
sec-labs team proudly presents: Local ZoneAlarm Firewall (probably all versions - tested on v3.1) Device Driver vulnerability. by Lord YuP 04/08/2003 I. BACKGROUND ZoneAlarm is a very powerful and very common nowadays firewall for Windows produced by Zone Labs.

[Full-Disclosure] Ankit Fadia bullshit?

2003-08-07 Thread Cutthroat Truth
http://www.misweb.com/newsarticle.asp?doc_id=22191&rgid=2   The doof claims to be Consultant to Federal Bureau of Investigation(FBI), Central Bureau of Investigation (CBI), I-Defense . (Googles benefit) see http://www.reachouthyderabad.com/ithyderabad/news/e2.htm   But found no official statements

[Full-Disclosure] defeating Lotus Sametime "encryption"

2003-08-07 Thread Mycelium
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 .-=( Short version )=-. Normal Lotus SameTime login credential encryption with 1.5 and 3.0 Windows clients use RC2 (very improperly) to encrypt the password, and even send the key along with the login packet allowing an attacker to decrypt th

Re: [Full-Disclosure] Automating patch deployment

2003-08-07 Thread Andy Cuff [talisker]
Hi George Not sure about free, but SecurityExpressions from Pedestal and LANGuard from GFI software are both cost effective fix deployment solutions, as always if you discover more please let me know and I'll update my host scanning pages accordingly. I've never included a field on the site for th

Re: [Full-Disclosure] Ankit Fadia bullshit?

2003-08-07 Thread morning_wood
http://www.newindpress.com/Newsitems.asp?ID=IEN20030712103432&Page=N&Title=Infotech&rLink=0   http://www.indiasoftware.com/news/c1407.html   its quite true, get informed.   Donnie Werner http://e2-labs.com     - Original Message - From: Cutthroat Truth To: [EMAIL PROTECTED]