Title: Message
I have this happen with a dll attached to
iexplore.exe.
The dll was placing pornography in anew
IEwindow everytime any action was done in IE, even opening the Internet
options opened a new IE window with Porn.
I had to boot up Windows Recovery command window to
delete the
Gregh wrote:
A simple spyware remover would have rid of that for you with no need
to go to a lot of trouble.
On the other hand - it is better for a techie to know *how* to do that
from first principles, just in case the automated method doesn't work.
...and on the other hand, spending time taking a computer out of the loop
and all that entails is much better than getting the job done without fuss?
Where? want to work there! Please tell me where! :)
In other words, learn off the job and apply sensible practice once there!
So what you're
CISSP/MCP
-Mark
Wlan-DoS.c
Description: Binary data
There is a new version of WFTPD on their website today which addresses the
exploits that were released the other day with no vendor warning.
Geo.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Title: Message
I would also suggest using something similar
to http://www.codeproject.com/dll/displayloadedmodules.asp (Code and binary available). This will list all of the loaded DLLs
(Hence the name) and each process they are in. Then you can find which processes have dlls loaded that
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Byron
Copeland
Sent: Saturday, February 28, 2004 10:24 AM
To: [EMAIL PROTECTED]
Cc: Scott Connors; [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] Need help in performing
aremotevulnerability scan
Gregh wrote:
...and on the other hand, spending time taking a computer out of the
loop and all that entails is much better than getting the job done
without fuss?
And indeed this is the principle usually applied to motor cars - you know
how to start and stop them and point them in vaguely the
On Tue, 2004-03-02 at 00:36, Schmehl, Paul L wrote:
Well, I usually use *sysinternals* Process Exporer, and have
yet to see it fail to list a process... how do you know the
process exists, if you can't list it?
Real simple. I have randomly named
Arne Vidstrom has something useful here:
http://ntsecurity.nu/toolbox/
ListModules http://ntsecurity.nu/toolbox/listmodules/
ListModules lists the modules (EXE's and DLL's) that are loaded into a
process. This can be useful in a forensic investigation.
OS: Windows NT 4.0 / 2000 /
First of all, I'd like to thank all the people who offered to help.
There were quite a few of them, and so I am not able to respond to all
of the emails personally. For future reference, you may assume that
when I post something like this, I've already gone through all the
standard
/**
**! XBoard 4.2.7 UNPUBLISHED VULNERABLITY , 0hDAY !
*
Oh yeah, xplo for non-suid prog is real oday.
I can show u one universal exploit code for ALL linux/x86 boxes! And u will
not need to exploit bofs in non-suid binaries in future!
This is real 0day! Do-not-distribute!#@(*)$#@
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 453-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 2nd, 2004
TITLE: 03-02-04 XSS Bug in NetScreen-SA 5000
Series of SSL VPN appliance
SUMMARY
Cross Site Scripting bug in the
'delhomepage.cgi'CGI binary in the
Netscreen NetScreen-SA 5000 Series SSL VPN appliance.
DETAILS
There exists a cross-site scripting bug in
'row' parameter of the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
__
SCO Security Advisory
Subject:OpenLinux: Integer overflow may allow local users to cause a
denial of service or possibly
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
The Cult of a Cardinal Number (Equal to the Sum of 1+1)
by Phantasmal Phantasmagoria
[EMAIL PROTECTED]
- Table of Contents -
1 - Introduction
2 - Technical Details
3 -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 454-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 2nd, 2004
FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability
iDEFENSE Security Advisory 03.02.04
www.idefense.com/application/poi/display?id=78type=vulnerabilities
March 02, 2004
I. BACKGROUND
Free BSD is a free, Open Source unix operating system. More information
is available at
Its for 2.0.6c and above.
You can fix it using their fix or the one
http://www.ghcif.de/adv/phpbb206_viewtopic.txt
There's an PHPBB Announcment how to fix the hole.
greets
Milan
David Vincent wrote:
On 02/28/04 Cheng Peng Su released the following Advisory:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
=
FreeBSD-SA-04:04.tcp Security Advisory
The FreeBSD Project
Topic:
Product: Web Wiz forum 7.0-7.7a www.webwizforum.com
Risk: Medium
Date: 02 March, 2004
Autor:Pig Killer and Michael ( www.SecurityLab.ru)
When user log on forum, for his cookies identification forum using User_code
value from tblAutor table from underlying database,
- Original Message -
From: Jos Osborne [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, March 03, 2004 1:09 AM
Subject: RE: [Full-Disclosure] Looking for a tool
...and on the other hand, spending time taking a computer out of the loop
and all that entails is much better than
On Tue, 02 Mar 2004 12:01:08 +0300, d4rk [EMAIL PROTECTED] said:
/* or if root is your friend, u can ask him to do it. */
Never underestimate the power of social engineering. I've seen systems
r00ted by getting the admin to 'cd' over to a directory to examine a 'failing'
program. Files like
Gregory A. Gilliss wrote:
http://www.theregister.co.uk/content/55/35938.html
Check out
http://mirror.hamakor.org.il/archives/linux-il/03-2004/8806.html for the
points I found interesting in the verdict, including (my own)
translation into English of choice paragraphs of the verdict (the
- Original Message -
From: Dave Howe [EMAIL PROTECTED]
To: Email List: Full Disclosure [EMAIL PROTECTED]
Sent: Wednesday, March 03, 2004 1:54 AM
Subject: Re: [Full-Disclosure] Looking for a tool
Gregh wrote:
...and on the other hand, spending time taking a computer out of the
loop
d4rk if u r too damn idiot to not understand the topic it is not my problem . am i
wrong ?. wait i also explain what the topic is :
Smashing Xboard for FUN look at thiz word . means this shit targets some
educational purposes for lames like u ..Then if u see the RISK section of thiz shit u
Shachar Shemesh wrote:
Gregory A. Gilliss wrote:
http://www.theregister.co.uk/content/55/35938.html
Check out
http://mirror.hamakor.org.il/archives/linux-il/03-2004/8806.html for
the points I found interesting in the verdict, including (my own)
translation into English of choice
The following credit section was unintentionally omitted from iDEFENSE
Security Advisory 03.02.04: FreeBSD Memory Buffer Exhaustion Denial of
Service Vulnerability. My apologies to Alexander.
IX. CREDIT
Alexander Cuttergo is credited with this discovery.
Michael Sutton
Director,
Hi all,
Ive just found the old SQL-slammer again in my
customer network and notice something that Ive never notice before:
The worm sends UDP packet using 1 static spoof source
IP and 1 static spoof dest IP, but the MAC address changes in every packet (mostly
the source mac). What is
Hi all again!
This bug works only when password changes using Forgotten your password?
future.
The user code is changed when changing the password using user profile.
Sorry for my mistake.
- Original Message -
From: Alexander [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: Bruce Corkhill
Yet again!! Alexander aka. Pig Killer and Michael have posted an incorrect
security bug report without first fully testing there findings first.
The security flaw reported below is incorrect as they state that the user
code stored in a cookie is not changed when the password for an account is
Yet again!! Alexander aka. Pig Killer and Michael have found there report
to be incorrect and have tried to retract it but not fully with another
incorrect bug report.
The Forgotten Password feature requires the user to enter details about
themselves including user name, email address, etc.
Hi all
can anybody explain me what the problem is when my
external DNS server supports recursive DNS queries?
People are telling me that a DNS server is prone to
cache poisoning when recursive DNS queries are
supported.
Can anyone give me a clue here?
thanks
Find local movie times and
33 matches
Mail list logo