-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 595-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
November 24th, 2004
On Tue, 23 Nov 2004, Danny wrote:
What a stupid article. The author has it all wrong! IRC is a bed of
roses with Celine Dion playing in the background.
IRC is like the streets. You can find bad and good people, but it is
stupid to say that anyone walking in the street or chatting on IRC is a
On Wed, 24 Nov 2004 01:04:27 + GMT, Jason Coombs [EMAIL PROTECTED] wrote:
As for source code or other security vulnerabilities in closed- or open-soure
vote tabulators, there is little point in rigging such schemes, and less
point in exploiting them. Good old fashion statistical
Paul,
In the case in point, even with the variables you mention, the entire technical
problem can be reduced to observing how the election officials in various
places have historically constructed ballots and influence just those that can
be influenced in just those states where it will
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200411-32
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200411-33
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
Doesn't auger well for all this offshoring though. :(
-Original Message-
From: Samir Kelekar [EMAIL PROTECTED]
Date: Wed, 24 Nov 2004 10:44:54
To:john morris [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Network Security in India
Hi John:
Thanks for that post. I am
Ooops.. i reframe my question. Is there a way to get the enable
password remotely . Brute force is not my option
(FROM LINKS TO LINKS WE ARE ALL LINKED)
cheers.
morris
___
Full-Disclosure - We believe in it.
Charter:
Version 2.91 is not vulnerable, does not include crappy CPU consuming useless
features and plays mp3's like any other version.
Cheers,
SkyLined
- Original Message -
From: Brett Moore [EMAIL PROTECTED]
To: [EMAIL PROTECTED] Netsys. Com [EMAIL PROTECTED]
Sent: Wednesday, November 24,
[EMAIL PROTECTED] writes:
On Tue, 23 Nov 2004 18:43:22 +0100, Antonio Javier G. M. said:
We need signatures for IDS/IDP for Oracle's alert 68.
Just a reminder for everybody an the archives - In fact the question was
very clear (see IDS/IDP -- Intrusion
FYI : I have had spyware that changed google search results to include
'webcrawler.com' results in the first 5 links or so.
So I would search for somethng, but the spyware would insert a piece of
html at the top of the page, it would look like google results but they
would ALL (all 5 of them)
John,
if you have an old config you may decode it with some available tools in
the web. A google search for cisco password recovery may help you.
If you use TACACS change it there... or force the TACACS to disappear to
use the local one... it really depends on the configs you have in the box.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 596-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
November 24th, 2004
Well an interesting idea is network based patching
systems. The solution to this problem is to have a
technology using which you can achieve the same effect
as patching a server but without actually patching the
server physically. Something like a network based
patching system.
The technology is
The amount of help you receive on this mailing list is going to depend
greatly on one question: Do you own the box? (or the router as it is
in your case). As it stands, and I mean this in the best way
possible, you look like a script kiddie looking to get some leetness
by doing something easy.
exploit and technical study of the Winamp flaw posted by k-otik
http://www.k-otik.com/exploits/20041124.winampm3u.c.php
"..the cdda library only reserves 20 bytes for names when files are .cda,so the stack will be overwritten and exception occurs when a name looks
And may I add that your other posts look more or less the same
I'm putting my money on you being a skiddie :)
l8r
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Michael
Rutledge
Sent: Wednesday, November 24, 2004 2:42 PM
To: [EMAIL PROTECTED]
Cc:
On Tue, Nov 23, 2004 at 11:48:37PM -0700, Thomas Sutpen wrote:
Any sort of impartiality and vested interest in the actual security of
the whole process that you might have claimed to had was pissed away
in your very first post on the subject. The one where you came out
waving the Kerry flag.
john morris wrote:
Ooops.. i reframe my question. Is there a way to get the enable
password remotely .
I should bloody well hope not!
Geez...
Jeff
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Correct me if I am wrong, but a LAN that is plagued by worms, DOS
attacks, people sniffing passwords and privacy issues..is called the
Internet. It is a untrusted network and you should protect your network
from it...defense in layers..firewalls..proxies..you know.
-Original Message-
Hi,
I am sure there would have been many lapses in security. And one such
trend I see here is a number of small cable internet providers that
have sprung up in my area (Delhi, NCR). All of them use RF links etc
from ISP like
Bharti, Primus etc and provide internet thru ethernet on a Cat5 cable.
Well logically, a person that owns a Cisco device could get help from
Cisco or at the very least their website. But he instead posted on a
grey security list, interesting...you know what they say, smells like a
kiddie, looks like a kiddie..you know the rest.
-Original Message-
From:
Hi,
what's rules in iptables against DoS in Apache 2.0.52 ?
--
Thank's
Silvio Cesar L. dos Santos
Divisão de Tecnologia da Informação
Universidade do Grande Rio - UNIGRANRIO - BRAZIL
(o_
//\- Software Livre -
V_/_ conhecimento ao alcance de todos
Do you seriously think there is a easy way to get the enable password
remotely? If you have the config, you can get it from there..if you have
the box you can do a password recovery by booting in rommon...otherwise
the box isn't yours..and you won't find a clear exact answer because
there isn't
maybe the original request should have gone to
[EMAIL PROTECTED] instead;)
Scot
- Original Message -
From: Michael Rutledge [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: john morris [EMAIL PROTECTED]
Sent: Wednesday, November 24, 2004 8:42 AM
Subject: Re: [Full-Disclosure] previledge
As for source code or other security vulnerabilities in closed- or
open-soure vote tabulators, there is little point in rigging such
schemes, and less point in exploiting them. Good old fashion
statistical abberations exploited for the benefit of the party that
finds them first will win every
Thomas Sutpen wrote:
Any sort of impartiality and vested interest in the actual security of
the whole process that you might have claimed to had was pissed away
in your very first post on the subject. The one where you came out
waving the Kerry flag. Remember?
It is my observation that your
Interesting point. I assumed a legit access therefore my suggestions, but
I guess you are right, a legit person would most probably not consider a
brute force attack on his own box. Although some times people do shoot
themselves in the foot doing something stupid that kicks them out of the
box
john morris wrote:
Is there a quick and decent way to obtain the previledge password of a
cisco router my version is as follows
cisco 3640 (R4700) processor
If you have physical access, there is a password recovery method that's
detailed in Cisco's documentation on the 3600 series. If it's your
Donato Ferrante
Application: Open Dc Hub
http://opendchub.sourceforge.net/
Version: 0.7.14
Bug: Buffer Overflow
Date: 24-Nov-2004
Author: Donato Ferrante
e-mail: [EMAIL PROTECTED]
web:
by k-otik
http://www.k-otik.com/exploits/20041124.winampm3u.c.php
..the cdda library only reserves 20 bytes for names when files are .cda, so
the stack will be overwritten and exception occurs when a name looks like
.cda
but still NO patch from
The only way to get it remotely is to get hold of and compromise a machine
on the network where the routers/switches resides. Then run a sniffer app
for just telnet and capture the individual keystrokes when someone logs into
the router and then enters the enable password. Remember inside the
Hi,
Did you try googleing at all??? Anyway...
what's rules in iptables against DoS in Apache 2.0.52 ?
You can try something along the lines of:
iptables -A INPUT p TCP --dport 80 --syn -m limit --limit 5/second -j ACCEPT
Or maybe install this mod and configure it:
--On Wednesday, November 24, 2004 05:39:31 AM + Jason Coombs
[EMAIL PROTECTED] wrote:
In the case in point, even with the variables you mention, the entire
technical problem can be reduced to observing how the election officials
in various places have historically constructed ballots and
On Tue, 23 Nov 2004 22:41:07 CST, Paul Schmehl said:
I'm no mathematician, but I suspect the probability of this is somewhere
slightly south of null. Do you have any concept of how elections are run?
In *many* states each *county* determines the ballot type and layout, the
voting machines
On Wed, 24 Nov 2004 12:54:31 +0100, Antonio Javier G. M. said:
We really know what are we talking about. Please, use google to search for
IDP or IPS technologies and snortinline.
And *I* know as well - if you *READ* what I said:
Just a reminder for everybody and the archives - unless
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Interesting tool to downsize rights when logged on as Administrator
(Link may wrap)
http://msdn.microsoft.com/security/securecode/columns/default.aspx?p
ull=/library/en-us/dncode/html/secure11152004.asp
-BEGIN PGP SIGNATURE-
Note: This
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 596-2 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
November 24th, 2004
--On Wednesday, November 24, 2004 01:28:07 PM -0500 [EMAIL PROTECTED]
wrote:
So when Jeb Bush, Governor of Florida, appoints a State Commissioner of
Elections, and drops a hint or two, there's NO way for said Commissioner
to make sure that things happen the way Jeb's brother wants them to
happen?
When did this list become a how-to of hacking for script kiddies?
Why don't you just do it for him too? Who in his right mind would ask
a question like he did, unless he's an idiot and has NO CLUE what that
question means. I would like to hear his excuse for the actual REASON
that he's doing
I forgot to make sure everybody else has a chance to view my remarks
to Barry's obviously short-sighted arguments.
-- Forwarded message --
From: Thomas Sutpen [EMAIL PROTECTED]
Date: Wed, 24 Nov 2004 14:31:49 -0700
Subject: Re: [Full-Disclosure] University Researchers Challenge
Another possibility is compromising a machine that runs some common
config archiver such as Rancid (http://www.shrubbery.net/rancid/). This
utility uses a .cloginrc in the Rancid user's home directory containing
the hostnames and passwords of Cisco devices. Network administrators who
manage a
Chris Umphress wrote:
Next time you make a printout from your color laser printer,
shine an LED flashlight beam on it and examine it closely
with a magnifying glass. You might be able to see the small,
scattered yellow dots printed there that could be used to
trace the document back to you.
Ask me in private and you might get some better answers. peanuter @
dalnet #routers . You would have to verify to me however that you do
have rights to enable. Which would involve me calling you at work
___
Full-Disclosure - We believe in it.
Give it up folks we are looking at the second quarter of a 16 year
republitard bush dynasty.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Paul Schmehl
Sent: Wednesday, November 24, 2004 2:07 PM
To: [EMAIL PROTECTED]
Cc: Gregory Gilliss; [EMAIL
On Wed, 24 Nov 2004 09:17:27 -0600, st3ng4h [EMAIL PROTECTED] wrote:
The point, though, is that the discussion is valid and worthwhile
and ought not be silenced. The presidential election is one of the
few official expressions of democracy left open to the populace,
and those who think that
On Tue, 23 Nov 2004 21:56:41 -0600, vord [EMAIL PROTECTED] wrote:
[flame]
n3td3v/malformed,
please think before you speak. ive already explained this to you more
than once. #hackphreak is no longer associated with a group and no
longer intends to be a channel dedicated primarily to matters
[EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Interesting tool to downsize rights when logged on as Administrator
(Link may wrap)
http://msdn.microsoft.com/security/securecode/columns/default.aspx?p
ull=/library/en-us/dncode/html/secure11152004.asp
Nice ...fresh from
To Whom it May Concern;
The Original Post is http://www.securityfocus.com/bid/11711
On Windows XP all releases, when you replace, or change the
screensaver displayed on the login screen with a specially crafted
version designed to execute programs, those programs are launched
under the SYSTEM
Title: Message
Do a whois on the
domain that the router belongs to and email the contact
with:
"i ar3 ty1ng to h4ck
yur b0x. pl33z3 h3lp."
That should take
care of everything.
-Original Message-From: john morris
[mailto:[EMAIL PROTECTED] Sent: Wednesday, November 24, 2004
http://www.k-otik.com/exploits/20041124.winampm3u.c.php
..the cdda library only reserves 20 bytes for names when files are
.cda, so the stack will be overwritten and exception occurs when a
name looks like .cda
but still NO patch from Winamp
FYI. This is just one of the many items currently in the oven that I was
alluding to previously. Of course some people will take this and complain
that people shouldn't be running as admins in the first place (to which I
agree) but prior to complaining about it, hold tight and watch for what else
Alen Capalik wrote:
When did this list become a how-to of hacking for script kiddies?
Why don't you just do it for him too?
Answer: always has been
Who in his right mind
would ask a question like he did, unless he's an idiot and
has NO CLUE what that question means.
Personally, I am
then there was this little diddy...
HYDERABAD: The hacker is on the prowl and the government can do little to
stop him in his tracks. At least, that's what the IT department - custodian
of the government web sites and servers ...
http://timesofindia.indiatimes.com/articleshow/320561.cms
cheers,
On Wed, 24 Nov 2004 13:07:06 CST, Paul Schmehl said:
Did you not watch the mess in 2000? The *counties* decided how their
ballot would be constructed and how the elections would be run. Now how is
Jeb Bush and/or his Commissioner going to influence *Democratic* counties
run by
Sorry but cisco can only be blamed for so much. If you allow telnet to
your router from the internet...then how is that Cisco's fault? Or even
if you allow SSH from the internet...network protection is the key.
Software will have holes and problems with be found. Only thru good
network design and
Excuse me, but i won't join and rejoice. Until, as i have posted on this
list elsewhere, this item makes it further than the obscure devel / kb
article but gets actually pulled as a critical security update and the
'linking/shortcut' procedure automatised for key components /
applications in
Did the charter say something about political messages?..please take it
off the list guys if possible...
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
Paul Schmehl
Sent: Wednesday, November 24, 2004 11:22 AM
To: Jason Coombs; Gregory Gilliss;
Hi all,
I have been getting a lot of questions about the encoded shellcode I used in
InternetExploiter. That's why I've decided to release the source to my encoder,
so you can all use it in your personal version of my exploit. (Remember that
the origional code was released under GPL! I'm still
this is quite possibly the most ridiculous thing ive ever read.
normally i would respond to it in more detail but i have received
literally dozens of responses from members of this list who either
sympathize with my position or have outright called you an
idiot/lamer. i therefore see no need to
Use IEXPLORE.EXE [PATH] to get a working copy of explorer using the
runas service.
eg.
runas /user:system\user %PROGRAMFILES%\Intern~1\iexplore.exe [path]
No bitching about the fact that its the IE exe we are loading, it
makes no difference, thats just a wrapper to load the libraries, you
can do
Hi all,
Same flaw works for Firefox as well as MSIE:
HTML
SCRIPT a = new Array(); while (1) { (a = new Array(a)).sort(); } /SCRIPT
SCRIPT a = new Array(); while (1) { (a = new Array(a)).sort(); } /SCRIPT
/HTML
Added to the list:
[EMAIL PROTECTED] wrote:
Interesting tool to downsize rights when logged on as Administrator
(Link may wrap)
http://msdn.microsoft.com/security/securecode/columns/default.aspx?p
ull=/library/en-us/dncode/html/secure11152004.asp
My favourite part is the sample directory used by Microsoft:
63 matches
Mail list logo