RE: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Mike
I really wish people would stop comparing software agreements to car warrantees, cars verses software?? Cars will always win, it's a hardware thing. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Paul Tinsley Sent: Monday, October 13, 2003 2:26 PM To: Joshua

RE: [Full-Disclosure] RE: Re: Bad news on RPC DCOM vulnerability

2003-10-12 Thread Mike Gordon
Answered one of my own questions: (Thanks to http://www.ultrabac.com/kb/UltraBac_Help/UBQ_Articles_(FAQ_s)/UBQ000192.htm) WSAECONNRESET Error Number: 10054 Connection reset by peer. A existing connection was forcibly closed by the remote host. This normally results if the peer application on

RE: [Full-Disclosure] RE: Re: Bad news on RPC DCOM vulnerability

2003-10-12 Thread Mike Gordon
I had better luck compiling the cyberphreak version (have since managed to compile several flavors), but it still only seems to DoS patched and unpatched systems. The code gets stuck in a loop and always produces error 10054. Any idea what that means? if(ft) { int i=0;

Re: [Full-Disclosure] OT: An odd question that has arrisen within my household

2003-10-12 Thread Valdis . Kletnieks
On Sun, 12 Oct 2003 23:55:53 EDT, Robert W Vawter III <[EMAIL PROTECTED]> said: > Knoppix ( http://knopper.net/knoppix/ ), a bootable CD containing a live > Linux system, contains Nessus( http://www.nessus.org/ ), a security > analysis tool. Is the possession of a Knoppix CD at someone else's pla

Re: [Full-Disclosure] OT: An odd question that has arrisen within my household

2003-10-12 Thread Joel R. Helgeson
Common Hacker Stratifications: Tier I - The best of the best - Ability to find new vulnerabilities - Ability to write exploit code and tools Tier II - IT savvy - Ability to program or script - Understand wht the vulnerability is and how it works - Intelligent enough to use the exploit code and to

Re: [Full-Disclosure] RE: Re: Bad news on RPC DCOM vulnerability

2003-10-12 Thread Alex
Title: RE: Re: Bad news on RPC DCOM vulnerability This code doesn't work without shellcode. The simple version of a "battle" shellcode can be found here: http://www.SecurityLab.ru/_exploits/bshell2 (add user 'a' with pass 'a' in administrator group) You can change this shellcode as you need.

Re: [Full-Disclosure] OT: An odd question that has arrisen within my household

2003-10-12 Thread Robert W Vawter III
On Sun, 2003-10-12 at 22:40, Matt Carlson wrote: > 1. What exactly defines a "script kiddie"? See ESR's jargon file: http://catb.org/~esr/jargon/html/S/script-kiddies.html > 2. Does using a port scanner make you a "script kiddie" since you > yourself did not write the code? > > 3. Does it make

Re: [Full-Disclosure] OT: An odd question that has arrisen within my household

2003-10-12 Thread stefmit
On Sunday 12 October 2003 09:40 pm, Matt Carlson wrote: > These question is off topic, I realize this, but please bear with me. > > 1. What exactly defines a "script kiddie"? > > 2. Does using a port scanner make you a "script kiddie" since you > yourself did not write the code? > > 3. Does it make

Re: [Full-Disclosure] OT: An odd question that has arrisen within my household

2003-10-12 Thread Joshua Levitsky
On Oct 12, 2003, at 10:40 PM, Matt Carlson wrote: 1. What exactly defines a "script kiddie"? 2. Does using a port scanner make you a "script kiddie" since you yourself did not write the code? 3. Does it make you a script kiddie because it is a means of exploitation? script kiddies     pl.n.   

Re: [Full-Disclosure] OT: An odd question that has arrisen within my household

2003-10-12 Thread Valdis . Kletnieks
On Sun, 12 Oct 2003 21:40:51 CDT, Matt Carlson <[EMAIL PROTECTED]> said: > These question is off topic, I realize this, but please bear with me. > > 1. What exactly defines a "script kiddie"? > > 2. Does using a port scanner make you a "script kiddie" since you > yourself did not write the code

[Full-Disclosure] OT: I'd like to post a question to help settle an argument

2003-10-12 Thread Matt Carlson
These question is off topic, I realize this, but please bear with me. 1. What exactly defines a "script kiddie"? 2. Does using a port scanner make you a "script kiddie" since you yourself did not write the code? 3. Does it make you a script kiddie because it is a means of exploitation? Matt Ca

[Full-Disclosure] OT: An odd question that has arrisen within my household

2003-10-12 Thread Matt Carlson
These question is off topic, I realize this, but please bear with me. 1. What exactly defines a "script kiddie"? 2. Does using a port scanner make you a "script kiddie" since you yourself did not write the code? 3. Does it make you a script kiddie because it is a means of exploitation? Matt Ca

Re: [Full-Disclosure] RE: Re: Bad news on RPC DCOM vulnerability

2003-10-12 Thread Paul Tinsley
Just out of curiosity could you specify why you consider the other one "better code?" The only real differences between the two are that they both "fix" the 'cs+=buf;' line differently which is kind of silly to bother fixing in the first place, considering the function that line of code sits o

Re: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Paul Tinsley
Do you often buy cars directly from the manufacturer? I pretty much assumed you didn't have a car drop shipped to your house and would have a dealership in the loop... And I mean it's not like Microsoft doesn't send out critical patching information, hell I get about 20 notices a day, just cl

Re: [Full-Disclosure] I have fixes for the Geeklog vulnerabilities

2003-10-12 Thread Jouko Pynnonen
Hello, On Sun, Oct 05, 2003 at 09:00:30PM +0200, Lorenzo Hernandez Garcia-Hierro wrote: > - sql injections fix - > > // Geeklog SQL Injection prevention fix > // by Lorenzo Hernandez Garcia-Hierro > function DB_query($sql, $ignore_errors=1) > Thats all but if you want to have a strong sql i

[Full-Disclosure] RE: Re: Bad news on RPC DCOM vulnerability

2003-10-12 Thread Mike Gordon
Title: RE: Re: Bad news on RPC DCOM vulnerability A compiled version is found at http://www.SecurityLab.ru/_exploits/rpc3.zip But it seems to only crash systems. Does any one have a clean complile of the "better code" from http://www.cyberphreak.ch/sploitz/MS03-039.txt

Re: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Joshua Levitsky
On Oct 12, 2003, at 4:48 PM, Paul Tinsley wrote: I have a Honda Accord and a Mini Cooper, prior to that a Mazda and an Oldsmobile and I get/got reminders from all of those companies pretty regularly with coupons, suggested maintenance flyers and the like... I put car manufacturers right behind

Re: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Paul Tinsley
I have a Honda Accord and a Mini Cooper, prior to that a Mazda and an Oldsmobile and I get/got reminders from all of those companies pretty regularly with coupons, suggested maintenance flyers and the like... I put car manufacturers right behind my dentist in reminders, well lawn care is somewh

Re: [Full-Disclosure] babelpr0xy?

2003-10-12 Thread David M
- Original Message - From: "morning_wood" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Sunday, October 12, 2003 9:54 AM Subject: Re: [Full-Disclosure] babelpr0xy? now go away, and STFU Physician, heal thyself... ..Dave _

Re: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Joshua Levitsky
On Oct 12, 2003, at 2:36 PM, [EMAIL PROTECTED] wrote: The average car manufacturer doesn't try as hard as they possibly could to make sure you never visit the dealership for regularly scheduled maintenance I drive a Ford truck. The Ford dealer I bought it from never told me when to come in t

Re: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Valdis . Kletnieks
On Sun, 12 Oct 2003 13:47:08 EDT, Joshua Levitsky <[EMAIL PROTECTED]> said: > When you drive a car you have maintenance responsibilities. Somehow > with computers people don't come to the same conclusion. The average car manufacturer doesn't try as hard as they possibly could to make sure you n

RE: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Poof
Well... Tell me where honeypotting goes if that happens? *cry* > -Original Message- > From: [EMAIL PROTECTED] [mailto:full-disclosure- > [EMAIL PROTECTED] On Behalf Of Steve Wray > Sent: Sunday, October 12, 2003 02:15 > To: [EMAIL PROTECTED] > Subject: RE: [Full-Disclosure] Hacker suspect

Re: [Full-Disclosure] Local DoS in windows. [indeed it works... PROOF?]

2003-10-12 Thread bipin gautam
[... see full disclosure mailing list for discussion/details] so i have to share the credit... cauz you use a modulus of my trick to achive similar result!!! [ well... take all the credit if you want...] i just wanna say, see , i wasn't wrong... ps! trust me i knew that, many of such similar thi

Re: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Joshua Levitsky
On Oct 12, 2003, at 5:15 AM, Steve Wray wrote: Will "Knowingly allowing a computer under your control to remain in an exploitable state" become a crime? (if it isn't already...) If you never get your brakes inspected, and one day you crash in to someone and kill them because your brakes fail. Is

Re: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Michael Sierchio
Robert Brockway wrote: On Sun, 12 Oct 2003, Michael Sierchio wrote: Failure to adhere to the consensus best practice may mean you are implicitly stating that you've agreed to accept the liability for the result. If that is taken to its logical conclusion, everyone online better be arranging lia

[Full-Disclosure] FileDonkey.com Cross Site Scripting

2003-10-12 Thread Lorenzo Hernandez Garcia-Hierro
FileDonkey.com Cross Site Scripting -- WEBSITE: File Donkey DOMAIN: www.filedonkey.com RISK: 7 OWNERS STATUS: [EMAIL PROTECTED] [ warned same time as security lists ] - --- DESCRIPTION --- FileDonkey.com is the only one web search supported engine by P2P clients like eMule

Re: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Robert Brockway
On Sun, 12 Oct 2003, Michael Sierchio wrote: > Failure to adhere to the consensus best practice may mean you > are implicitly stating that you've agreed to accept the liability > for the result. If that is taken to its logical conclusion, everyone online better be arranging liability insurance, w

Re: [Full-Disclosure] Local DoS in windows.

2003-10-12 Thread bipin gautam
see guy's i wasn't wrong! NA, NONE OF THEM ARE USING THE HACKED VERSION OF SHELL32.DLL ANYWAY! i've tried it in fresh installed windows xp. well, as npguy says... the bug worked in his 128 ram PC! but surprisingly i have 256mb p3, and it worked there too... [ i can't still understand... what t

Re: [Full-Disclosure] babelpr0xy?

2003-10-12 Thread Valdis . Kletnieks
On Sun, 12 Oct 2003 19:24:15 +0530, morning_wood <[EMAIL PROTECTED]> said: > you certainly clicked JOHN SAGE > > now go away, and STFU OK, so you've proven that he apparently visited the page, and he feels the page is content-free. And so far in this whole thread, I've yet to see anything rese

Re: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Michael Sierchio
Steve Wray wrote: Will "Knowingly allowing a computer under your control to remain in an exploitable state" become a crime? (if it isn't already...) It may already be. Certainly it exposes one to civil liability -- if an incident or event was foreseeable, there's certainly negligence, or the com

[Full-Disclosure] buffer overflow in IRCD software

2003-10-12 Thread Piotr KUCHARSKI
A buffer overflow bug allowing to crash the server has been discovered. It is exploitable only by local users and affects all versions of IRCnet IRCD from 2.10 series, up to 2.10.3p3. New release has been made, irc2.10.3p4, and is available from ftp://ftp.irc.org/irc/server/irc2.10.3p4.tgz Alte

Re: [Full-Disclosure] babelpr0xy?

2003-10-12 Thread morning_wood
41.seattle-23-24rs.wa.dial-access.att.net 12.82.137.41 - - [12/Oct/2003:12:18:35 +0500] "GET /babelpr0x.html HTTP/1.1" 200 1455 12.82.137.41 - - [12/Oct/2003:12:18:35 +0500] "GET /favicon.ico HTTP/1.1" 200 4710 12.82.137.41 - - [12/Oct/2003:12:19:01 +0500] "GET / HTTP/1.1" 200 2430 you certainl

[Full-Disclosure] Who Cried Wolf???!? (or, Who's Shell32.exe?) [was: Local DoS in windows]

2003-10-12 Thread Arcturus
In reference to the alleged DoS in Windows... FIRST AND FOREMOST IF YOU DOWNLOAD AND INSTALL SOMEONE ELSE'S CORE WINDOWS FILES ONTO YOUR SYSTEM, YOU CANNOT EXPECT YOUR SYSTEM TO OPERATE IN THE FASHION THAT IT WAS ORIGINALLY PRODUCED. (see the definition of Stupidity, below) And as far as "bi

Re: [Full-Disclosure] babelpr0xy?

2003-10-12 Thread S G Masood
This page has some info about the issue - http://www.searchlores.org/anonyweb.htm. Also check out this page - http://www.searchlores.org/proxy.htm. Some of the links lead to pages that discuss the use of Language Translation services as proxies. -- Cheers, iNt27~ --- morning_wood <[EMAIL PROTE

RE: [Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Steve Wray
Will "Knowingly allowing a computer under your control to remain in an exploitable state" become a crime? (if it isn't already...) I am in two minds on whether it should or should not :( > [mailto:[EMAIL PROTECTED] On Behalf Of > Paul Tinsley > > http://www.cnn.com/2003/TECH/internet/10/10/hi

[Full-Disclosure] Hacker suspect says his PC was hijacked

2003-10-12 Thread Paul Tinsley
http://www.cnn.com/2003/TECH/internet/10/10/hijacked.hacker.reut/index.html "Caffrey is accused of triggering the paralyzing data blast on a vital computer server used to coordinate ship movements in the Houston port -- the sixth biggest shipping port in the world" Ok, so somebody explain to me

Re: [Full-Disclosure] babelpr0xy?

2003-10-12 Thread John Sage
On Sat, Oct 11, 2003 at 03:15:33PM -0700, S G Masood wrote: > Donnie, > > I am unable to view this page from here. What's this > link about? Nothing. - John -- "You are in a twisty maze of weblogs, all alike." - John Sage: InfoSec Groupie - ABCD, EFGH, IJKL, EmEnOh, Pplus+, Mminus- - ATTENTIO