Re: [Full-Disclosure] Looking for a tool

2004-03-02 Thread Lan Guy
Title: Message I have this happen with a dll attached to iexplore.exe. The dll was placing pornography in anew IEwindow everytime any action was done in IE, even opening the Internet options opened a new IE window with Porn. I had to boot up Windows Recovery command window to delete the

Re: [Full-Disclosure] Looking for a tool

2004-03-02 Thread Dave Howe
Gregh wrote: A simple spyware remover would have rid of that for you with no need to go to a lot of trouble. On the other hand - it is better for a techie to know *how* to do that from first principles, just in case the automated method doesn't work.

RE: [Full-Disclosure] Looking for a tool

2004-03-02 Thread Jos Osborne
...and on the other hand, spending time taking a computer out of the loop and all that entails is much better than getting the job done without fuss? Where? want to work there! Please tell me where! :) In other words, learn off the job and apply sensible practice once there! So what you're

[Full-Disclosure] Nortel Networks Wireless LAN Access Point 2200 DoS + PoC

2004-03-02 Thread mark-security
CISSP/MCP -Mark Wlan-DoS.c Description: Binary data

[Full-Disclosure] WFTPD patch

2004-03-02 Thread Geo.
There is a new version of WFTPD on their website today which addresses the exploits that were released the other day with no vendor warning. Geo. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] Looking for a tool

2004-03-02 Thread Tony
Title: Message I would also suggest using something similar to http://www.codeproject.com/dll/displayloadedmodules.asp (Code and binary available). This will list all of the loaded DLLs (Hence the name) and each process they are in. Then you can find which processes have dlls loaded that

RE: [Full-Disclosure] Need help in performing aremotevulnerability scan

2004-03-02 Thread Aditya, ALD [Aditya Lalit Deshmukh]
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Byron Copeland Sent: Saturday, February 28, 2004 10:24 AM To: [EMAIL PROTECTED] Cc: Scott Connors; [EMAIL PROTECTED] Subject: RE: [Full-Disclosure] Need help in performing aremotevulnerability scan

Re: [Full-Disclosure] Looking for a tool

2004-03-02 Thread Dave Howe
Gregh wrote: ...and on the other hand, spending time taking a computer out of the loop and all that entails is much better than getting the job done without fuss? And indeed this is the principle usually applied to motor cars - you know how to start and stop them and point them in vaguely the

RE: [Full-Disclosure] Looking for a tool

2004-03-02 Thread Nicob
On Tue, 2004-03-02 at 00:36, Schmehl, Paul L wrote: Well, I usually use *sysinternals* Process Exporer, and have yet to see it fail to list a process... how do you know the process exists, if you can't list it? Real simple. I have randomly named

RE: [Full-Disclosure] Looking for a tool

2004-03-02 Thread Jeremiah Cornelius
Arne Vidstrom has something useful here: http://ntsecurity.nu/toolbox/ ListModules http://ntsecurity.nu/toolbox/listmodules/ ListModules lists the modules (EXE's and DLL's) that are loaded into a process. This can be useful in a forensic investigation. OS: Windows NT 4.0 / 2000 /

[Full-Disclosure] Re: looking for a tool

2004-03-02 Thread Schmehl, Paul L
First of all, I'd like to thank all the people who offered to help. There were quite a few of them, and so I am not able to respond to all of the emails personally. For future reference, you may assume that when I post something like this, I've already gone through all the standard

Re: [Full-Disclosure] Smashing XBoard 4.2.7(All versions) For Fun Profit.*Unpublish ed Local Stack Overflow Vulnerablity!

2004-03-02 Thread d4rk
/** **! XBoard 4.2.7 UNPUBLISHED VULNERABLITY , 0hDAY ! * Oh yeah, xplo for non-suid prog is real oday. I can show u one universal exploit code for ALL linux/x86 boxes! And u will not need to exploit bofs in non-suid binaries in future! This is real 0day! Do-not-distribute!#@(*)$#@

[Full-Disclosure] [SECURITY] [DSA 453-1] New Linux 2.2.20 packages fix local root exploit (i386+m68k+powerpc)

2004-03-02 Thread debian-security-announce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 453-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze March 2nd, 2004

[Full-Disclosure] 03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN appliance

2004-03-02 Thread Lachniet, Mark
TITLE: 03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN appliance SUMMARY Cross Site Scripting bug in the 'delhomepage.cgi'CGI binary in the Netscreen NetScreen-SA 5000 Series SSL VPN appliance. DETAILS There exists a cross-site scripting bug in 'row' parameter of the

[Full-Disclosure] OpenLinux: Integer overflow may allow local users to cause a denial of service or possibly execute arbitrary code

2004-03-02 Thread please_reply_to_security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 __ SCO Security Advisory Subject:OpenLinux: Integer overflow may allow local users to cause a denial of service or possibly

[Full-Disclosure] The Cult of a Cardinal Number

2004-03-02 Thread Phantasmal Phantasmagoria
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - The Cult of a Cardinal Number (Equal to the Sum of 1+1) by Phantasmal Phantasmagoria [EMAIL PROTECTED] - Table of Contents - 1 - Introduction 2 - Technical Details 3 -

[Full-Disclosure] [SECURITY] [DSA 454-1] New Linux 2.2.22 packages fix local root exploit (alpha)

2004-03-02 Thread debian-security-announce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 454-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze March 2nd, 2004

[Full-Disclosure] iDEFENSE Security Advisory 03.02.04: FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability

2004-03-02 Thread idlabs-advisories
FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability iDEFENSE Security Advisory 03.02.04 www.idefense.com/application/poi/display?id=78type=vulnerabilities March 02, 2004 I. BACKGROUND Free BSD is a free, Open Source unix operating system. More information is available at

Re: [Full-Disclosure] New phpBB ViewTopic.php Cross Site Scriptin g Vulnerability (with fix)

2004-03-02 Thread t4c [Founder of GHCIF]
Its for 2.0.6c and above. You can fix it using their fix or the one http://www.ghcif.de/adv/phpbb206_viewtopic.txt There's an PHPBB Announcment how to fix the hole. greets Milan David Vincent wrote: On 02/28/04 Cheng Peng Su released the following Advisory:

[Full-Disclosure] FreeBSD Security Advisory FreeBSD-SA-04:04.tcp

2004-03-02 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-04:04.tcp Security Advisory The FreeBSD Project Topic:

[Full-Disclosure] Authentication flaw in Web Wiz forum

2004-03-02 Thread Alexander
Product: Web Wiz forum 7.0-7.7a www.webwizforum.com Risk: Medium Date: 02 March, 2004 Autor:Pig Killer and Michael ( www.SecurityLab.ru) When user log on forum, for his cookies identification forum using User_code value from tblAutor table from underlying database,

Re: [Full-Disclosure] Looking for a tool

2004-03-02 Thread Gregh
- Original Message - From: Jos Osborne [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, March 03, 2004 1:09 AM Subject: RE: [Full-Disclosure] Looking for a tool ...and on the other hand, spending time taking a computer out of the loop and all that entails is much better than

Re: [Full-Disclosure] Smashing XBoard 4.2.7(All versions) For Fun Profit.*Unpublish ed Local Stack Overflow Vulnerablity!

2004-03-02 Thread Valdis . Kletnieks
On Tue, 02 Mar 2004 12:01:08 +0300, d4rk [EMAIL PROTECTED] said: /* or if root is your friend, u can ask him to do it. */ Never underestimate the power of social engineering. I've seen systems r00ted by getting the admin to 'cd' over to a directory to examine a 'failing' program. Files like

Re: [Full-Disclosure] Israeli Judge has Enlighted Outlook on Hacking

2004-03-02 Thread Shachar Shemesh
Gregory A. Gilliss wrote: http://www.theregister.co.uk/content/55/35938.html Check out http://mirror.hamakor.org.il/archives/linux-il/03-2004/8806.html for the points I found interesting in the verdict, including (my own) translation into English of choice paragraphs of the verdict (the

Re: [Full-Disclosure] Looking for a tool

2004-03-02 Thread Gregh
- Original Message - From: Dave Howe [EMAIL PROTECTED] To: Email List: Full Disclosure [EMAIL PROTECTED] Sent: Wednesday, March 03, 2004 1:54 AM Subject: Re: [Full-Disclosure] Looking for a tool Gregh wrote: ...and on the other hand, spending time taking a computer out of the loop

Re: [Full-Disclosure] Smashing XBoard 4.2.7(All versions) For Fun Profit.*Unpublish ed Local Stack Overflow Vulnerablity!

2004-03-02 Thread narko tix
d4rk if u r too damn idiot to not understand the topic it is not my problem . am i wrong ?. wait i also explain what the topic is : Smashing Xboard for FUN look at thiz word . means this shit targets some educational purposes for lames like u ..Then if u see the RISK section of thiz shit u

Re: [Full-Disclosure] Israeli Judge has Enlighted Outlook on Hacking

2004-03-02 Thread Shachar Shemesh
Shachar Shemesh wrote: Gregory A. Gilliss wrote: http://www.theregister.co.uk/content/55/35938.html Check out http://mirror.hamakor.org.il/archives/linux-il/03-2004/8806.html for the points I found interesting in the verdict, including (my own) translation into English of choice

[Full-Disclosure] Re: iDEFENSE Security Advisory 03.02.04: FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability

2004-03-02 Thread iDefense Labs
The following credit section was unintentionally omitted from iDEFENSE Security Advisory 03.02.04: FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability. My apologies to Alexander. IX. CREDIT Alexander Cuttergo is credited with this discovery. Michael Sutton Director,

[Full-Disclosure] SQL-worm 1 IP multiple MAC???

2004-03-02 Thread Ariesto
Hi all, Ive just found the old SQL-slammer again in my customer network and notice something that Ive never notice before: The worm sends UDP packet using 1 static spoof source IP and 1 static spoof dest IP, but the MAC address changes in every packet (mostly the source mac). What is

[Full-Disclosure] Re: Authentication flaw in Web Wiz forum

2004-03-02 Thread Alexander
Hi all again! This bug works only when password changes using Forgotten your password? future. The user code is changed when changing the password using user profile. Sorry for my mistake. - Original Message - From: Alexander [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: Bruce Corkhill

[Full-Disclosure] Re: Authentication flaw in Web Wiz forum

2004-03-02 Thread Bruce Corkhill
Yet again!! Alexander aka. Pig Killer and Michael have posted an incorrect security bug report without first fully testing there findings first. The security flaw reported below is incorrect as they state that the user code stored in a cookie is not changed when the password for an account is

Re: [Full-Disclosure] Re: Authentication flaw in Web Wiz forum

2004-03-02 Thread Bruce Corkhill
Yet again!! Alexander aka. Pig Killer and Michael have found there report to be incorrect and have tried to retract it but not fully with another incorrect bug report. The Forgotten Password feature requires the user to enter details about themselves including user name, email address, etc.

[Full-Disclosure] recursive DNS issue

2004-03-02 Thread omifix omnifix
Hi all can anybody explain me what the problem is when my external DNS server supports recursive DNS queries? People are telling me that a DNS server is prone to cache poisoning when recursive DNS queries are supported. Can anyone give me a clue here? thanks Find local movie times and