[Full-Disclosure] Re: Increased port 135 activity

2003-09-22 Thread Richard Johnson
In article <[EMAIL PROTECTED]>, Paul Tinsley <[EMAIL PROTECTED]> wrote: > most if not all of the spikes on that graph can be mapped to a > worm/virus that was discovered around the same time. The current port 135 activity appears to be both heavy and more narrowly targeted than a recent (typi

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread David Hoelzer
Dude... Reading your inane posts helps me to better understand why you feel that sticking an "A+" cert in your signature will make us think you have a clue. On 9/22/03 10:04 AM, "security snot" <[EMAIL PROTECTED]> wrote: > I just finished reading Phrack 62's article on Sneeze, and some of th

[Full-Disclosure] ColdFusion cross-site scripting security vulnerability of an error page

2003-09-22 Thread sec
ColdFusion cross-site scripting security vulnerability of an error page >> The outline of vulnerability Macromedia's ColdFusion can display the various information about an error at the time of error occurred. There is information transmitted from a client machine like "Referer". ColdFusion disp

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Blue Boar
security snot wrote: The "code audit" that you guys did to make sure nothing was backdoored was quite thorough too, considering since then remote bugs in Snort have been published. If you can't even spot the vulnerable code you introduce into your source tree by accident, how can you definitively

Re: [Full-Disclosure] p63: Call for Articles!

2003-09-22 Thread Joshua Levitsky
On Sep 22, 2003, at 11:49 PM, Phrack Staff wrote: Phrack Magazine, the ONE AND ONLY REAL AND ACTIVE HACKER MAGAZINE is sending out a call for articles for p63!!! Guess you never heard of http://www.2600.org ? Last I checked Eric / Emmanuel was still in business. I'm all for a good hacker mag,

Re: [Full-Disclosure] New Hacking Zine: p62 (formatting corrected)

2003-09-22 Thread Valdis . Kletnieks
On Tue, 23 Sep 2003 07:46:20 +0545, npguy <[EMAIL PROTECTED]> said: > trust http://www.phrack.org! How do we know it hasn't been hacked and a bogus issue put up, or a real issue suppressed? (this is where everybody who's not familiar with it should go re-read Ken Thompson's "Reflections on Trus

[Full-Disclosure] p63: Call for Articles!

2003-09-22 Thread Phrack Staff
Phrack Magazine, the ONE AND ONLY REAL AND ACTIVE HACKER MAGAZINE is sending out a call for articles for p63!!! Acceptable are: all REAL HACKING articles! This also includes anarchy/destruction/phones/etc. No whitehat crap whatsoever! Also acceptable are funny irc logs, hacklogs (preferrably wi

Re: [Full-Disclosure] New Hacking Zine: p62 (formatting corrected)

2003-09-22 Thread Peter Bruderer
On Tuesday 23 September 2003 02:04, Phrack Staff wrote: > How the hell can people make the claim that p62 is "fake" or a "hoax"? > Exactly what part of the magazine is "fake" ? If you write Mercedes-Benz on your car it is no Benz. Maybe it is a real car but no Benz. brudy ___

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Ng Pheng Siong
On Mon, Sep 22, 2003 at 08:53:33PM -0400, Geoincidents wrote: > So bust them at it. Setup some email that is unguessable, send an email to > [EMAIL PROTECTED] and if your unguessble address gets spammed ^ [EMAIL PROTECTED] ;-) > you know they did it. If a number of folks here do that and

Re: [Full-Disclosure] New Hacking Zine: p62

2003-09-22 Thread Jonathan A. Zdziarski
Personally, I wouldn't trust _any_ pair of breasts to be a reliable source of security-related information. On Mon, 2003-09-22 at 21:16, Cael Abal wrote: > [EMAIL PROTECTED] wrote: > > How the hell can people make the claim that p62 is "fake" or a "hoax"? > > Exactly what part of the magazine is "

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Paul Schmehl
--On Monday, September 22, 2003 2:13 PM -0700 security snot <[EMAIL PROTECTED]> wrote: "Detect intrusions" - if you can set an IDS signature for something, then you shouldn't be vulnerable to it. So the functionality of IDS is to tell you when you've been compromised by six-month old public vuln

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Valdis . Kletnieks
On Mon, 22 Sep 2003 21:37:33 BST, Dan Rowles said: > But why they wait until the DATA command is a total mystery to me. It > seems much more logical to bounce the message after the RCPT TO: > command. The cynic in me notes that the RFC2822 From/To/CC can be different from the RFC2821 MAIL FROM/R

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Valdis . Kletnieks
On Mon, 22 Sep 2003 14:13:44 PDT, security snot said: > "Detect intrusions" - if you can set an IDS signature for something, then > you shouldn't be vulnerable to it. So the functionality of IDS is to tell > you when you've been compromised by six-month old public vulnerabilities > that dvdman has

Re: [Full-Disclosure] New Hacking Zine: p62 (formatting corrected)

2003-09-22 Thread npguy
trust http://www.phrack.org! ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Tom_Gordon/RISE/HIDOE
What about the "'Flexible Response' code, that allows you to cancel hostile connections on IP-level when a rule matches."? Say I want to not allow any packets on port 25 to have ".scr" in plain text. I write the rule and it gets prevented. Isn't this preventive? > Intrusion Detection syste

Re: [Full-Disclosure] Verisign abusing .COM/.NET monopoly, BIND releases new

2003-09-22 Thread David
Bassett, Mark wrote: And just to make the whole thing a little funnier, they've decided not to resolve verisignsucks.com anymore =) $ host verisignsucks.com Host verisignsucks.com not found: 2(SERVFAIL) Verisignsucks.com has been registered since 2000, so I doubt it'll be hitting the wildcard r

Re: [Full-Disclosure] Verisign "responds"

2003-09-22 Thread Gregory A. Gilliss
Feh indeed! Jesus! I can't believe I'm reading this ... fluff! I was in London and Rhythms and AmerNet were pulling the plugs on their DSL services in the US. Russell Lewis was the person that I spoke with who helped me get my domains in order (after I'd had the trans-oceanic run-around from vari

Re: [Full-Disclosure] New Hacking Zine: p62

2003-09-22 Thread Cael Abal
[EMAIL PROTECTED] wrote: How the hell can people make the claim that p62 is "fake" or a "hoax"? Exactly what part of the magazine is "fake" ? Exactly! Just like Britney Spears' breasts, p62 is "real". That is, not otherworldly. Yet, also like Britney Spears' breasts, I fear I would get in quit

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Geoincidents
- Original Message - > Right now they take in the address of who you are sending to and who is > sending. What a wonderful way to collect valid email addresses. First > the MAIL FROM will be a correct address most of the time. The RCPT TO > will be wrong 100% of the time, but they could e

Re: [Full-Disclosure] Verisign "responds"

2003-09-22 Thread Geoff Shively
Disappointing: "As to your call for us to suspend the service, I would respectfully suggest that it would be premature to decide on any course of action until we first have had an opportunity to collect and review the available data. " Cheers, Geoff Shively, CHO PivX LABS Office: 949.720.4628 M

[Full-Disclosure] New Hacking Zine: p62

2003-09-22 Thread [EMAIL PROTECTED]
How the hell can people make the claim that p62 is "fake" or a "hoax"?Exactly what part of the magazine is "fake" ? 1. All logged/sniffed AIM/IRC conversations are 100% real and unmodified.2. All logs of people's home dirs/w/who output, etc were 100% real and unmodified.3. REAL working code to prot

[Full-Disclosure] Verisign "responds"

2003-09-22 Thread J. Race
feh. http://www.icann.org/correspondence/lewis-to-twomey-21sep03.htm -jim ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] New Hacking Zine: p62 (formatting corrected)

2003-09-22 Thread Phrack Staff
How the hell can people make the claim that p62 is "fake" or a "hoax"? Exactly what part of the magazine is "fake" ? 1. All logged/sniffed AIM/IRC conversations are 100% real and unmodified. 2. All logs of people's home dirs/w/who output, etc were 100% real and unmodified (except for some dates e

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Joshua Levitsky
On Sep 22, 2003, at 6:45 PM, Jonathan A. Zdziarski wrote: Synchronize your watches, and tomorrow morning everyone send a 100MB attachment to someone at lkfjwlfkewjflwef.com. Almost as much fun as flushing all the toilets in the dorm at 2am :) Would be a fun experiment if everyone on the list did

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Joshua Levitsky
On Sep 22, 2003, at 7:50 PM, Richard M. Smith wrote: I don't think the Verisign SMTP server would suffer. Since it rejects incoming messages before the message body and attachments are sent. Darn it. Another approach might be to start selling CD's with 30 million email addresses for spaming that

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Nate Hill
On Mon September 22 2003 19:13, Richard M. Smith wrote: > Hello, > > Does anyone know why Verisign has set up a fake SMTP server at > their SiteFinder service to bounce email messages sent to > misspelled or expired domain names? The fake SiteFinder SMTP > server gives the impression that it is a

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Jeffrey . Stebelton
"if you can set an IDS signature for something, then you shouldn't be vulnerable to it. Useless." I don't know what kind of company you do security for, but mine has these prevalent security holes, also known as users. My IDS not only looks for the external attacks, the guy banging away at m

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Florin Andrei
On Mon, 2003-09-22 at 14:13, security snot wrote: > "Detect intrusions" - if you can set an IDS signature for something, then > you shouldn't be vulnerable to it. So the functionality of IDS is to tell > you when you've been compromised by six-month old public vulnerabilities > that dvdman has fin

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread pdt
So I hate to bring this up but this comment is borderline on the idiotic side... A quick google search on the meaning of IDS would have explained to you what IDS means. Incase that isn't something you are versed in I have done the hard work for you: http://www.sans.org/resources/idfaq/what_is_id.

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Jonathan A. Zdziarski
Synchronize your watches, and tomorrow morning everyone send a 100MB attachment to someone at lkfjwlfkewjflwef.com. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Joshua Levitsky
On Sep 22, 2003, at 6:02 PM, Joshua Thomas wrote: > But why they wait until the DATA command is a total mystery to me. It > seems much more logical to bounce the message after the RCPT TO: > command. To read our mail? They will read our mail when they accept the DATA command and all a

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Damian Gerow
On Mon, 22 Sep 2003, Pamela Patterson wrote: > If they had no mail server there at all, mail sent to non-existent > domains would sit in limbo as the upstream machine tried to deliver it > to the Verisign machine. How many times it would try and how long it > would wait would depend on the MTA con

[Full-Disclosure] Re: OpenSSH - is X-Force really behind this?

2003-09-22 Thread Steven M. Christey
Michal Zalewski said: >What I find perplexing is the fact ISS was not credited by any major >player reporting the vulnerability - OpenSSH team, CERT, CVE, Red Hat, >you name it. As I have discussed in previous posts, MITRE occasionally distributes "blank" candidates to Candidate Naming Authoriti

RE: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Brown, Rodrick
There are many situations where IDS's are your only audit trail long after your system has been compromised. Sort of like video surveillance for network security. .. Rodrick R. Brown - Systems Engineer.. .. Open Systems Group (718) 403-6760

RE: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Joshua Thomas
Title: RE: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder > But why they wait until the DATA command is a total mystery to me. It > seems much more logical to bounce the message after the RCPT TO: > command. To read our mail? By the way, looks like they switched to Po

RE: [Full-Disclosure] Verisign abusing .COM/.NET monopoly, BIND releases new

2003-09-22 Thread Bassett, Mark
And just to make the whole thing a little funnier, they've decided not to resolve verisignsucks.com anymore =) $ host verisignsucks.com Host verisignsucks.com not found: 2(SERVFAIL) $ host verisignsucksdonkeyballs.com verisignsucksdonkeyballs.com has address 64.94.110.11 verisignsucksdonkey

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Frank Knobbe
On Mon, 2003-09-22 at 14:23, Peter Busser wrote: > The problem with IDS systems is the same problem that currently available > virus scanners have: They work reactive and not proactive. > > Making machines harder to break into and improve ways to enforce a security > policy (e.g. by using Mandator

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread security snot
"Detect intrusions" - if you can set an IDS signature for something, then you shouldn't be vulnerable to it. So the functionality of IDS is to tell you when you've been compromised by six-month old public vulnerabilities that dvdman has finally gotten his hands on an exploit for, that you never bo

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Brent J. Nordquist
On Mon, 22 Sep 2003, Richard M. Smith <[EMAIL PROTECTED]> wrote: > Does anyone know why Verisign has set up a fake SMTP server at their > SiteFinder service to bounce email messages sent to misspelled or > expired domain names? Yeah; it's outlined in their "best practices" document. Here's the e

Re: [Snort-users] RE: [Full-Disclosure] Snort not backdoored, Sourcefire not compromised

2003-09-22 Thread Daniele Muscetta
On Mon, 2003-09-22 at 19:11, Matt Schillinger wrote: > On Mon, 2003-09-22 at 08:01, Daniele Muscetta wrote: [...] > > SNORT, which is actually the ONLY free thing available in the IDS > > landscape (and moreover IT IS such a GREAT product !). > Just so the facts are straight, Prelude-IDS is also Op

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Michal Zalewski
On Mon, 22 Sep 2003, Richard M. Smith wrote: > Does anyone know why Verisign has set up a fake SMTP server at their > SiteFinder service to bounce email messages sent to misspelled or > expired domain names? Because otherwise, all the mail traffic would sit in the queues for days before being bou

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread fulldisclosure
They put a bogus SMTP server in place since most MTA's are designed to fall back to an A record for the domain if no MX records can be found. So if they didn't put up the SMTP server then mail would sit in the MTA's queue waiting for delivery until it finally timed out as undeliverable (which on

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Damian Gerow
Thus spake Richard M. Smith ([EMAIL PROTECTED]) [22/09/03 16:24]: > Does anyone know why Verisign has set up a fake SMTP server at their > SiteFinder service to bounce email messages sent to misspelled or > expired domain names? The fake SiteFinder SMTP server gives the > impression that it is a r

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Pamela Patterson
On Mon, 2003-09-22 at 15:13, Richard M. Smith wrote: > I've attached an early email from Verisign that gives a bit more > information about how this fake SMTP server operates but not why it is > needed. If they had no mail server there at all, mail sent to non-existent domains would sit in limbo

Re: [Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Dan Rowles
I believe they're trying to save bandwidth and minimise (further) annoyance. If a mail server can't connect to a server to deliver mail, it will keep on retrying until some timeout (which is likely to be a few days). The effect of this would be that you wouldn't get DSN failure notifications until

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Peter Busser
Hi! > Intrusion Detection systems are designed to detect intrusions. Period. > No one AFAIK has yet developed the Intrusion Prediction system. If you > have an alpha version lying around, pls respond with a link. I'm sure > that you will quickly be deluged with download requests =;^) Systems with

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Gregory A. Gilliss
Peter: Intrusion Detection systems are designed to detect intrusions. Period. No one AFAIK has yet developed the Intrusion Prediction system. If you have an alpha version lying around, pls respond with a link. I'm sure that you will quickly be deluged with download requests =;^) Reactive is the n

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Shawn McMahon
On Mon, Sep 22, 2003 at 09:23:52PM +0200, Peter Busser said: > > The problem with IDS systems is the same problem that currently available > virus scanners have: They work reactive and not proactive. So does a hammer. -- Shawn McMahon | Let every nation know, whether it wishes us well or i

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread james
- Original Message - From: "security snot" <[EMAIL PROTECTED]> : You are a security expert, right? : All I can say is snot is in my kill fill now. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charte

Re: [Full-Disclosure] Fake Microsoft update e-mail

2003-09-22 Thread Todd T. Fries
Starting last Thursday evening, yes. Quite annoying, as they're usually around 150k in size. MailScanner makes short work of them though ;-) -- Todd Fries .. [EMAIL PROTECTED] Free Daemon Consulting, LLCLand: 405-748-4596 http://FreeDaemonConsulting.com Mobile:

[Full-Disclosure] VeriSign's fake SMTP server for SiteFinder

2003-09-22 Thread Richard M. Smith
Hello, Does anyone know why Verisign has set up a fake SMTP server at their SiteFinder service to bounce email messages sent to misspelled or expired domain names? The fake SiteFinder SMTP server gives the impression that it is a real SMTP server and happily accepts "To" and "From" email addresse

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Peter Busser
Hi! > > 3) Why the fuck do people still thing signature-based IDS is worthwhile? > Give us another solution. Are you saying anomoly based ids signatures are > _worthwhile_? The problem with IDS systems is the same problem that currently available virus scanners have: They work reactive and not pr

Re: [Full-Disclosure] Fake Microsoft update e-mail

2003-09-22 Thread Joshua Levitsky
On Sep 22, 2003, at 12:49 PM, Fabio Gomes de Souza wrote: Are you receiving lots of fake Microsoft fancy HTML e-mails claiming that the attached file is an urgent update? http://www.sarc.com/avcenter/venc/data/[EMAIL PROTECTED] -- Joshua Levitsky, CISSP, MCSE, EMTD System Engineer Time Warner

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread daniel uriah clemens
Dear security snot, > I just finished reading Phrack 62's article on Sneeze, and some of the > threads here concerning the matter, and I must admit that I am bothered by > some of the responses. There is nothing I hate quite as much as vendors > who lie to their customers, except perhaps vendors

Re: [Full-Disclosure] Fake Microsoft update e-mail

2003-09-22 Thread Fabio Gomes de Souza
Thank you all! I figured it out just before my message was effectively posted. Shame on me. :) Fabio Gomes de Souza escreveu: Guys, Are you receiving lots of fake Microsoft fancy HTML e-mails claiming that the attached file is an urgent update? Regards, Fabio ___

Re: [Full-Disclosure] OpenSSH - is X-Force really behind this?

2003-09-22 Thread Michal Zalewski
On Mon, 22 Sep 2003 [EMAIL PROTECTED] wrote: > Charles Darwin and Alfred Wallace independently came up with > the concept of natural selection. The cycle of a vulnerability from discovery to publication (or leak) is probably around two weeks to one month on average, which is a fairly short timefr

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread security snot
Marty, You failed to address the other points. If your shell server was compromised, and people were logging into sourcefire boxes from it (as the log shows, my friend!) then what prevented them from abusing the access to your shellbox to gain access to your corporate machines? The "code audit"

[Full-Disclosure] Fake Microsoft update e-mail

2003-09-22 Thread Fabio Gomes de Souza
Guys, Are you receiving lots of fake Microsoft fancy HTML e-mails claiming that the attached file is an urgent update? Regards, Fabio ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Snort not backdoored, Sourcefire not compromised

2003-09-22 Thread Andreas Marx
Hi! If someone on the list is still thinking that Snort is backdoored and Sourcefire compromised, please read this stuff if you can read German language: Gefälschtes Phrack-Magazin stiftet Verwirrung http://www.heise.de/newsticker/data/pab-22.09.03-000/ To make it short: This phrack issue is FAK

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Valdis . Kletnieks
On Mon, 22 Sep 2003 07:04:04 PDT, security snot <[EMAIL PROTECTED]> said: > 1) If the intrusion were limited to a single "shellbox" then why did they > need to audit the code in CVS to see if it was backdoored? Would you rather they just said "Oh, since we *KNOW* the intrusion was only on one sh

Re: [Full-Disclosure] Is Marty Lying?

2003-09-22 Thread Martin Roesch
I'm not going to engage in tit-for-tat on this stuff, so let me get right to it. stupid to think independantly to arrive to a conclusion to what most likely did happen with the Snort.org compromise. Snort.org wasn't compromised, a shell server was. Some good questions are: 1) If the intrusion we

Re: [Full-Disclosure] OpenSSH - is X-Force really behind this?

2003-09-22 Thread Valdis . Kletnieks
On Mon, 22 Sep 2003 12:06:03 +0200, Michal Zalewski said: > ...why would there be any exploits in the wild if they have > indeed discovered the flaw on their own? Though I'm trying > really hard, I can't read "we discovered a flaw" as "we have > overheard about a flaw" or "we are a

Re: [Full-Disclosure] Does anybody have any more information?

2003-09-22 Thread darkcube
On Sun, 21 Sep 2003 [EMAIL PROTECTED] wrote: > In my projects, I was hoping to find plan9 shellcode. The p62 article > (http://www.phrack.nl/phrack62/p62-0x09.txt) provides a good start, but > it is not quit enough for what I want to do (bind a port to execute rc). > Does anybody have any more

RE: [Full-Disclosure] Snort not backdoored, Sourcefire not compromised

2003-09-22 Thread Daniele Muscetta
> I knew it wasn't true :-) Yeah, me too, it smelled very fishy as from the beginning. What's even worse is that this kind of FAKE full-disclosure actually does not even target the security industry it SAYS it wants to target... These "supposedly dangerous" blackhat do not even behave the way

[Full-Disclosure] Is Marty Lying?

2003-09-22 Thread security snot
I just finished reading Phrack 62's article on Sneeze, and some of the threads here concerning the matter, and I must admit that I am bothered by some of the responses. There is nothing I hate quite as much as vendors who lie to their customers, except perhaps vendors that are too stupid to realiz

Re: [Full-Disclosure] Re: idea

2003-09-22 Thread Chris Anley
There isn't much, apart from obscurity. Reordering cyphertext blocks might help a little in crypto terms, since there's then a pretty large number of potential arrangements (the factorial of the number of blocks) but you'd have to work the arrangement you were using into a key somehow, and use som

[Full-Disclosure] OpenSSH - is X-Force really behind this?

2003-09-22 Thread Michal Zalewski
Now that the hype is over, I have a question. Would anyone happen to know what's the origin of the OpenSSH buffer allocation stuff? The reason I'm asking is a claim made by X-Force at ISS: http://xforce.iss.net/xforce/alerts/id/144 "ISS X-Force has discovered a flaw in the OpenSSH server devel

[Full-Disclosure] Re: Snort and SourceFire "Backdoored"

2003-09-22 Thread whatthefukever
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 You know whats ironic about this? Maybe snort.org wasnt owned (ha! for the sake of argument now) but we know that some affiliated machines where indeed 0wn3d. Wait a minute I said the plural of 'machine' now didnt I BMC? Chough cough. Oh, that wasn't

RE: [Full-Disclosure] Snort not backdoored, Sourcefire not compromised

2003-09-22 Thread Exibar
I knew it wasn't true :-) Although I did think the phrack 62 was real until I actually took the time to read some of it after getting some sleep. I even sent the sneeze article to my IDS guru, talk about having egg on my face for a bit, he'll rag on me for a few days due to this! Thanks for

[Full-Disclosure] Re: [Snort-users] Snort and SourceFire "Backdoored"

2003-09-22 Thread Richard DeYoung
Now for a somewhat different perspective on the whole thing I guess now that we have this incident validated as positively true from the main Snort/SourceFire IT person, it lends a lot of credibility to the Snort/SourceFire "backdoor" rumor. Hmmm. So, "guess"+"validated"+"positively true

Re: [Full-Disclosure] Symantec wants to criminalize security info sharing

2003-09-22 Thread Nate Hill
On Sat September 20 2003 23:55, Richard M. Smith wrote: > My understanding is that most of the spammers are selling pirated > versions of Norton. Symantec has every incentive to shut these > spammers down. What ship did they steal them from? ___ Full-D

[Full-Disclosure] [RHSA-2003:243-01] Updated Apache and mod_ssl packages fix security vulnerabilities

2003-09-22 Thread bugzilla
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Red Hat Security Advisory Synopsis: Updated Apache and mod_ssl packages fix security vulnerabilities Advisory ID: RHSA-2003:243-01 Issue date:

[Full-Disclosure] [RHSA-2003:256-01] Updated Perl packages fix security issues.

2003-09-22 Thread bugzilla
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Red Hat Security Advisory Synopsis: Updated Perl packages fix security issues. Advisory ID: RHSA-2003:256-01 Issue date:2003-09-22 Update

[Full-Disclosure] dtors sell out ( phrack#62 )

2003-09-22 Thread morning_wood
http://www.phrack.nl/phrack62/p62-0x06.txt Well, we are here to fully disclose, that indeed b0f did sell dtors warez to iDefense. b0f did receive 300 dollars in his paypal account ([EMAIL PROTECTED]) on March 4th, 2003. anyone want a copy of proof of payment to a dtors member?? or unrealsed explo

RE: [Full-Disclosure] Re: new openssh exploit in the wild! *isFAKE AS SH@!*

2003-09-22 Thread Adam Balogh
Adam wrote: > Probably a scriptkiddie or some random idiot. The fun part > was it came up totally different offsets then i mean TOTALLY > different each time you ran it and if you gave it a offset it > would "work" no matter what. For those people who ran it.. > change all your > passwords. :

Re: [Full-Disclosure] Does anybody have any more information?

2003-09-22 Thread morning_wood
> In my projects, I was hoping to find plan9 shellcode. The p62 article > (http://www.phrack.nl/phrack62/p62-0x09.txt) provides a good start, but > it is not quit enough for what I want to do (bind a port to execute rc). http://www.phrack.nl/phrack62/p62-0x02.txt - snip --- its l