Re: [Full-Disclosure] [Annonce][Contest] Call For Articles: MISC Magazine - CanSecWest/core05

2005-01-12 Thread Cedric Blancher
To those who went to http://www.miscmag.com/csw05-fd.php URL and got a 404, it's now online... Sorry for inconvenience... -- http://www.netexit.com/~sid/ PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE >> Hi! I'm your friendly neighbourhood signature virus. >> Copy me

[Full-Disclosure] [Annonce][Contest] Call For Articles: MISC Magazine - CanSecWest/core05

2005-01-10 Thread Cedric Blancher
For those who may be interested... (Details in French Below) Win a trip to attend CanSecWest/core05. Get published in MISC Magazine. Contest Details: You just have to write an original article (3500-4000 words) for publication in MISC Magazine on any topic related to computer sec

Re: [Full-Disclosure] wireless sniffing question

2004-12-04 Thread Cedric Blancher
Le samedi 04 décembre 2004 à 03:09 -0500, question question a écrit : > Lets say I have a Linksys (or whichever brand you like) wireless > router with a wireless host using 128 bit WEP encryption, and a wired > host connected to the same device. Obviously it is possible for the > wired box to do v

Re: [Full-Disclosure] Is www.sco.com hacked?

2004-11-29 Thread Cedric Blancher
Le lundi 29 novembre 2004 à 14:23 +0100, Vincent Archer a écrit : > If you looked carefully at the background, you could see "defaced by > realhack" written as a shadow, partially covered by some parts of the > hacked text. Not forgetting this : http://www.newsforge.com/blob.pl?id=5c8a047f9da401e

Re: [Full-Disclosure] Is www.sco.com hacked?

2004-11-29 Thread Cedric Blancher
Le lundi 29 novembre 2004 à 12:03 -0500, Jason Coombs a écrit : > Think not? > Then how do you explain the dramatic increase in the market value of SCOX? Speaking of market value, just read the fact. SCOX auction value is growing since thursday and had its peak today just before 12 (GMT+1), before

Re: [Full-Disclosure] Is www.sco.com hacked?

2004-11-29 Thread Cedric Blancher
Le lundi 29 novembre 2004 à 14:58 +0200, Rossen Naydenov a écrit : > I just noticed the banner on www.sco.com > If you don't saw it( because it is removed) this is what they say: > We own all your code > pay us all your money > Or is it some commercial trick? The "Hacked by " the girl in backgroun

Re: [Full-Disclosure] Linux problem, steal of IP and traffinc redirection could bypass a firewall

2004-11-07 Thread Cedric Blancher
Le samedi 06 novembre 2004 à 21:35 +0100, NetExpress a écrit : > Because of this, If I have a gateway, with IP IPA, and set a > desktop/server on the lan with the same ip IPA, when it start it will > be the new gateway for the all network. For this to work, you must assume gateway ARP entry (MAC/I

Re: [Full-Disclosure] RE: Full-Disclosure digest

2004-10-24 Thread Cedric Blancher
Le vendredi 03 septembre 2004 à 05:27 -0400, digitalchaos a écrit : > Why are there virus being transmitted through this newsgroup?? Because some worm are gathering email address within addressbook, emails or HTML contents, thoses can contain Full Disclosure email address. -- http://www.netexit

Re: [Full-Disclosure] Q: Linux Command Line Encryption

2004-10-22 Thread Cedric Blancher
Le vendredi 22 octobre 2004 à 13:46 -0400, Mike Tancsa a écrit : > This is only as strong as your passphrase. Using something like GPG has > other advantages since the private key can be kept in a separate location > from the encrypted file. GnuPG can be used for symetrical ciphering only. Exce

Re: [Full-Disclosure] ICMP (was: daily internet traffic report)

2004-10-18 Thread Cedric Blancher
Le lun 18/10/2004 à 17:12, james edwards a écrit : > > I don't see the reason why it would cause a problem, as firewall is able > > to spot ICMP related to server's IP connections as well... > New connections to the server must be implecitally allowed, as there > is no established state to refer to

Re: [Full-Disclosure] ICMP (was: daily internet traffic report)

2004-10-18 Thread Cedric Blancher
Le lun 18/10/2004 à 00:35, James Edwards a écrit : > That is great till you want to run a server behind that firewall. I don't see the reason why it would cause a problem, as firewall is able to spot ICMP related to server's IP connections as well... > The bigger picture, to me, is you gain littl

Re: [Full-Disclosure] ICMP (was: daily internet traffic report)

2004-10-17 Thread Cedric Blancher
Le dim 17/10/2004 à 22:21, James Edwards a écrit : > So, blocking ***all*** ICMP ***types*** is bad but you can block some > ***types*** without getting into trouble. Till you understand that all > the types do in relation to networking I would leave the alone. Nowadays, using a decent stateful fi

Re: [Full-Disclosure] unarj dir-transversal bug (../../../..)

2004-10-12 Thread Cedric Blancher
Le mar 12/10/2004 à 13:48, evilninja a écrit : > > arj != unarj! debian is stubido dist nd it pakage ''arj'' as ''unarj''! > um, actually i had to install a package called "unarj", obviously it's > from the same source package. i wonder why this is the case at all. when i > have "gzip", i don't _in

Re: [Full-Disclosure] Hacking into private files, my credit card purchases, personal correspondence or anything that is mine is trespassing and criminal.

2004-10-09 Thread Cedric Blancher
Le ven 08/10/2004 à 20:09, Harry Hoffman a écrit : > Umm, should the "Paladin of Security" have weak locks? ;-) His Holy Cyber-Blade of Justice should prevent them all through its 100 feet radius area of evil protection... -- http://www.netexit.com/~sid/ PGP KeyID: 157E98EE FingerPrint: FA622

RE: [Full-Disclosure] New Worm Discovery - Potential Korgo Variant

2004-06-24 Thread Cedric Blancher
Le jeu 24/06/2004 à 16:14, Michael Young a écrit : > The worm clearly exploits the LSASS overflow and is not spreading through > the FTP dameon left by Sasser. Oups... My mistake... I messed with Korgo and Dabber... -- http://www.netexit.com/~sid/ PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA

Re: [Full-Disclosure] New Worm Discovery - Potential Korgo Variant

2004-06-24 Thread Cedric Blancher
Le jeu 24/06/2004 Ã 14:57, Michael Young a Ãcrit : > Yesterday a large client of ours was taken down by what appears to be > a Korgo variant, but I have been unable to locate any information on > this worm. From what we have discovered, the main process is > âVDisp.exeâ. It is spreading through u

Re: [Full-Disclosure] watch guard

2004-06-03 Thread Cedric Blancher
Le jeu 03/06/2004 à 11:18, sudharsha a écrit : > Does any one know a vulnarability in Watch guard? http://www.cartel-securite.fr/pbiondi/adv/CARTSA-20030314-icmpleak.txt It applied to watchguard boxes, but is patched, and firewalls should now be shipped with non vulnerable firmwares. -- http://

Re: [Full-Disclosure] Pentesting an IDP-System

2004-05-29 Thread Cedric Blancher
Le sam 29/05/2004 à 22:47, Dave King a écrit : > You might try nessus (http://www.nessus.org) and turn on all the > dangerous plugins and turn safe checks off. It also has some detection > evasion stuff. Good luck. One can also try IDS testing stuff such as Snot or IDSWakeUp, that can generate

Re: [Full-Disclosure] Support the Sasser-author fund started

2004-05-13 Thread Cedric Blancher
Le jeu 13/05/2004 à 18:17, Aaron Gee-Clough a écrit : > Duquette, John wrote: > > Why not punish all the admins/users who failed to patch their systems in > > time as well. > Because they didn't break the law. It's really that simple. In France, there's a law that says you have to furnish avai

Re: [Full-Disclosure] Paper Release

2004-04-29 Thread Cedric Blancher
Le jeu 29/04/2004 à 21:07, IHC team a écrit : > We are pleased to teach you new things ! People would be far more pleased if you could teach us things using plain text (or, at least, correctly formatted email), as recommanded by list charter. Thx anyway for the doc... -- http://www.netexit.com/

Re: [Full-Disclosure] Exploit Identification Request

2004-04-29 Thread Cedric Blancher
Le jeu 29/04/2004 à 15:34, System Administrator a écrit : > One of our external systems (W2k, fully patched all components - > sp4, sql sp4, mdac sp3, post hotfixes, etc) is being hit by what > appears to be a buffer overflow of IIS : 4096 bytes cycling in > what appears to be an attempt to exec

Re: [Full-Disclosure] OT microsoft "feature"

2004-04-16 Thread Cedric Blancher
Le ven 16/04/2004 à 15:14, Davide Del Vecchio a écrit : > Anyone has a good explaination for this ? > Windows XP Professional SP1 [...] > C:\>ping 010.10.10.10 > Esecuzione di Ping 010.10.10.10 [8.10.10.10] con 32 byte di dati: Leading 0 means octal notation for numbers. > Obviously if you tr

Re: [Full-Disclosure] erase with magnet

2004-04-04 Thread Cedric Blancher
Le sam 03/04/2004 à 18:32, morning_wood a écrit : > > Is it possible to erase data on a hard disk drive > >with a powerful magnet, but then be able to use the drive and the PC again? > yes Afaik, for degauss erase drive structure, you can't use it unless you have a powerful low level format tool

Re: [Full-Disclosure] Re: pgp passphrase

2004-03-23 Thread Cedric Blancher
Le mar 23/03/2004 à 23:15, Sam Sharpe a écrit : > I figured I needed a new watch, so i might as well get one that was > useful. I realise that this doesn't provide the security of a > smartcard, however a USB flash key is a damn sight cheaper. (except > when it's built into a watch) Just to justif

Re: [Full-Disclosure] Re: pgp passphrase

2004-03-21 Thread Cedric Blancher
Le dim 21/03/2004 à 02:41, Max Valdez a écrit : > > Keylogger ? > Intelligent enoght to know wish keystrokes are passphrase ?? Good point, if we consider the worm to be autonomous. But a worm may be a wonderful information gathering tool for someone that is able to extract strings that could be

Re: [Full-Disclosure] Re: pgp passphrase

2004-03-21 Thread Cedric Blancher
Le dim 21/03/2004 à 02:04, Jim Richardson a écrit : > >Keylogger ? > Installed how? With the worm... -- http://www.netexit.com/~sid/ PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE >> Hi! I'm your friendly neighbourhood signature virus. >> Copy me to your signature fil

Re: [Full-Disclosure] Re: pgp passphrase

2004-03-20 Thread Cedric Blancher
Le dim 21/03/2004 à 00:33, Jim Richardson a écrit : > I would be interested to see how it would accomplish that. Keylogger ? -- http://www.netexit.com/~sid/ PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE >> Hi! I'm your friendly neighbourhood signature virus. >> Copy

Re: [Full-Disclosure] Another false Citibank e-mail...a new phishing?

2004-03-20 Thread Cedric Blancher
Le sam 20/03/2004 à 21:15, Christian a écrit : > someone has set up a 2nd Apache on :443 (!SSL), and created /citi to > phish credit card numbers?? It seems so. By the way, it seems quite reasonnable for a phisher to use a compromised server to host its bait if he has one within reach. -- http:

Re: [Full-Disclosure] Apache 1.3.29

2004-03-11 Thread Cedric Blancher
Le jeu 11/03/2004 à 21:38, VeNoMouS a écrit : > any one know if theres a new exploit for apache 1.3.29 in the wild one > of my mates boxes was breached this morning by ir4dex appears they > gained axx via apache then got root via mmap() Have you checked PHP and CGI stuff to see if there was a way

Re: [Full-Disclosure] RE: laptop security

2004-03-01 Thread Cedric Blancher
Le lun 01/03/2004 à 11:13, David Hajek a écrit : > Its a minute job to take out hdd from any laptop even it is protected > with GPS device. If we're talking about loss of information due to > laptop thefts and we want to prevent it we have > to assure that data on the disk are encrypted. An interm

Re: [Full-Disclosure] secure downloading of patches (Re: Knocking Microsoft)

2004-02-29 Thread Cedric Blancher
Le dim 29/02/2004 Ã 17:57, Martin MaÄok a Ãcrit : > You are true that PGP is a stronger protection from this point of view > but keep in mind that neither SSL nor PGP can protect us in the case > of the compromised end point -- the server or developper's workstation > in the case of SSL/TLS and the

Re: [Full-Disclosure] secure downloading of patches (Re: Knocking Microsoft)

2004-02-29 Thread Cedric Blancher
Le sam 28/02/2004 Ã 23:33, Martin MaÄok a Ãcrit : > Yes, that was my point. The main issue here is authentication and > integrity -- you can achieve both with proper use of either SSL or > PGP. Good point. SSL can provide a proper identification for download site. However, this is not sufficient a

Re: [OT] Re: [Full-Disclosure] Knocking Microsoft

2004-02-28 Thread Cedric Blancher
Le sam 28/02/2004 Ã 10:31, Martin MaÄok a Ãcrit : > > % apt-get update && apt-get upgrade > > % apt-get install apache-ssl > Will it transfer the data in a secure way? (SSL?) What's the point securing publicly available data transfer with SSL ? The only thing that is important regarding to securit

Re: [Full-Disclosure] RE: By passing surf control

2004-02-25 Thread Cedric Blancher
Le mer 25/02/2004 à 23:54, cdowns a écrit : > I do the ssh bypass everyday at work ;) works absolutely perfect hehehe. > ssh -C -L 8080:anon.proxyserver.com:3128 [EMAIL PROTECTED] > export -p http_proxy=http://127.0.0.1:8080 ; lynx www.google.com If you're stuck to an HTTP/HTTPS proxy, you can use

Re: [Full-Disclosure] Re: [Fwd: [TH-research] OT: Israeli Post Office break-in]

2004-01-14 Thread Cedric Blancher
Le mer 14/01/2004 à 06:46, Jimi Thompson a écrit : > Apparently the "backdoor" was a whopping 2 lines of code. If I remember well, it was a 2 characters inversion... -- http://www.netexit.com/~sid/ PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE >> Hi! I'm your friendly

Re: [Full-Disclosure] RE: FWD: Internet Explorer URL parsing vulnerability

2003-12-10 Thread Cedric Blancher
Le mer 10/12/2003 à 09:51, VeNoMouS a écrit : > and as for the why the %01 works, i can only assume as %01 is a non > printable character IE stops it there, its the same as if u would use %02 > and so on, or are you that moronic you dont understand character sets? I think I can only thank my moron

Re: [Full-Disclosure] [SECURITY] [DSA-403-1] userland can access Linux kernel memory

2003-12-02 Thread Cedric Blancher
Le lun 01/12/2003 à 23:58, Florian Weimer a écrit : > Does this mean that the vendor-sec concept has failed, or that there is > a leak on that list? Or is this just an issue which is very specific to > Linux and its maintainer situation? This just means that vendors are using network and systems

Re: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-11-02 Thread Cedric Blancher
Le dim 02/11/2003 à 14:17, William Warren a écrit : > > I believe every worm listed below could have been prevented had everyone > > patched their systems. > the blaster worm preceded the patch so this argument is DOA Wrong. Patch was available when Blaster went on. Patch has been released mid-ju

RE: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-11-01 Thread Cedric Blancher
Le sam 01/11/2003 à 00:50, Beaty, Bryan a écrit : > I believe every worm listed below could have been prevented had everyone > patched their systems. I would say it is even worse than that. If CodeRed and Nimda rely on vulnerabilities on open services (i.e. HTTP), Slammer and Blaster rely on vuln

RE: [Full-Disclosure] CyberInsecurity: The cost of Monopoly

2003-09-27 Thread Cedric Blancher
Le sam 27/09/2003 à 22:49, Jonathan A. Zdziarski a écrit : > There were just s many features from 95 to 98 to ME. > None of these constituted a new product. Nor any security enhancement, by the way... -- http://www.netexit.com/~sid/ PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA24000

RE: The usefullness of IDSes (Was: Re: [Full-Disclosure] Is Marty Lying?)

2003-09-23 Thread Cedric Blancher
Le mar 23/09/2003 à 10:01, Philippe Bogaerts a écrit : > I totally agree. An IDS for auditing firewall or other policies can be > usefull, if properly configured. Agree. In conjunction with a conventional audit or open pentest, a well configured IDS framework can point where security policy is br

RE: [Full-Disclosure] Re: Cisco IOS Denial of Service thataffects most Cisco IOS routers- requires power cycle to recover

2003-07-24 Thread Cedric Blancher
Le mer 23/07/2003 à 19:43, [EMAIL PROTECTED] a écrit : > So... has anyone been able to verify that the problem occurs when the TTL > expires without the packet being addressed to the router? Or is it a > requirement that the evil packet be addressed to the router? I checked this and it appears pa

RE: [Full-Disclosure] [OFFTOPIC] Zone Alarm

2003-06-05 Thread Cedric Blancher
Le jeu 05/06/2003 à 11:09, Lars Duesing a écrit : > ZoneAlarm has in my eyes a very interesting feature. As it runs on the > clients' system it can distinguish which (local) application is allowed > to send data to the net. In days of gator et al a very nice feature. This is to me the interest of

Re: [Full-Disclosure] Zone Alarm

2003-06-05 Thread Cedric Blancher
Le mer 04/06/2003 à 19:20, morning_wood a écrit : > buy a $40 hardware router. Software firewalls are not a security > solution IMHO. They're part of whole security process. One have to be aware of such tools limits and ways to circomvent them. Btw, hardware router runs software... Do you mean de

Re: [Full-Disclosure] RFC 3514 released

2003-04-01 Thread Cedric Blancher
Le mar 01/04/2003 à 17:44, Ron DuFresne a écrit : > From: Mikael Olsson <[EMAIL PROTECTED]> > Subject: [fw-wiz] Clavister Proudly Announces RFC3514 Compliance > Organization: Clavister AB > Date: Tue, 01 Apr 2003 13:23:30 +0200 > To: fw-wiz <[EMAIL PROTECTED]> > > > An innovative security initiat