[Full-Disclosure] YA VISA fishing scam

2004-01-30 Thread Andrew Thomas
I have forwarded on the details of this to [EMAIL PROTECTED] (hosting the netblock that hosts the site that the URL decodes to (www.vbill.biz) ) From: Visa Service ([EMAIL PROTECTED]) Subject: Visa Security Update Dear Sir/Madam, We were informed that your credit card is used by another person

[Full-Disclosure] New virus

2003-11-25 Thread Andrew Thomas
Hi, Just to confirm receipt of another email containing the following text: --snip-- Hello my dear Mary, I have been thinking about you all night. I would like to apologize for the other night when we made beautiful love and did not use condoms. I know this was a mistake and I beg you to

[Full-Disclosure] New virus

2003-11-25 Thread Andrew Thomas
Hi, Just to confirm receipt of another email containing the following text: --snip-- Hello my dear Mary, I have been thinking about you all night. I would like to apologize for the other night when we made beautiful love and did not use condoms. I know this was a mistake and I beg you to

RE: [Full-Disclosure] Windows Dcom Worm planned DDoS

2003-08-14 Thread Andrew Thomas
From: Nick FitzGerald Sent: 12 August 2003 01:48 Subject: Re: [Full-Disclosure] Windows Dcom Worm planned DDoS Andrew Thomas [EMAIL PROTECTED] wrote: The examinations of the code so far indicate that the worm is coded to DoS the windowsupdate site from the 15th of August onwards

RE: [Full-Disclosure] aside: worm vs. worm?

2003-08-14 Thread Andrew Thomas
From: Darren Bennett [mailto:[EMAIL PROTECTED] Sent: 12 August 2003 08:07 To: Andrew Thomas Cc: 'Mike'; [EMAIL PROTECTED]; 'Darren Reed'; 'Andrew J Homan'; Full Disclosure Subject: RE: [Full-Disclosure] aside: worm vs. worm? I disagree.. MS would have been hit harder than other OS's

RE: [Full-Disclosure] Windows Dcom Worm planned DDoS

2003-08-14 Thread Andrew Thomas
From: Chris Eagle [mailto:[EMAIL PROTECTED] Sent: 12 August 2003 01:31 Subject: RE: [Full-Disclosure] Windows Dcom Worm planned DDoS The IP is not hard coded. It does a lookup on windowsupdate.com Allowing the option for corporates and/or isp's to dns poison that to resolve to

RE: [Full-Disclosure] Re: GUNINSKI THE SELF-PROMOTER

2003-07-16 Thread Andrew Thomas
From: Dan Stromberg Sent: 16 July 2003 04:27 Actually, that's *STILL* impossible. No, that used to be a popular misconception. It's always been theoretically possible for a plaintext mailreader to allow, EG, a buffer overflow. It's harder to get it wrong with a simpler mailreader,

[Full-Disclosure] Format string and other vulnerabilities on win32

2002-12-20 Thread Andrew Thomas
++ designed products use a standard library, would it not be possible to investigate closed source applications and find e.g. strcpy calls by setting breakpoints with SoftIce or some other debugger? Regards, Andrew Thomas. ___ Full-Disclosure - We believe

RE: [Full-Disclosure] Trustworthy Computing Mini-Poll

2002-12-18 Thread Andrew Thomas
Hi Simon, -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Simon Richter Sent: 18 December 2002 06:43 To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Trustworthy Computing Mini-Poll ...snip... This stuff has some interesting