Re: [Full-Disclosure] MS Windows Screensaver Privilege Escalation

2004-11-26 Thread David Vincent
MW To Whom it May Concern; MW The Original Post is http://www.securityfocus.com/bid/11711 MW On Windows XP all releases, when you replace, or change the MW screensaver displayed on the login screen with a specially crafted MW version designed to execute programs, those programs are launched MW

Re: [Full-Disclosure] Re: GWB.COM - Wassupwitdat?

2004-10-29 Thread David Vincent
Eric Scher wrote: Want to view www.georgewbush.com from outside the US? You can't: Access denied. This "security" measure (!?) can easily be avoided using a proxy in the US or any anonymous surfing website though. So, what is it he doesn't want anyone from outside the US to

Re: [Full-Disclosure] Automated ssh scanning

2004-08-25 Thread David Vincent
Richard Verwayen wrote: Hello list! A few weeks ago there was a discussion about automated ssh scanning with user/password combinations like guest/guest or admin/admin. I set up a debian woody fully patched with both accounts activated, and got rooted some days later... The attackers installed

Re: [Full-Disclosure] Windows Update

2004-08-23 Thread David Vincent
Darren Reed wrote: What I see Microsoft as doing is pretty much forcing everyone to turn on Automatic Windows Update. Why leave it as a control panel option, I've no clue. Same with BIT (Background Intelligent Transfers.) For the millions of users out there that are likely subject to viruses,

Re: [Full-Disclosure] Re-write with security in mind all ops.

2004-08-23 Thread David Vincent
Gregory A. Gilliss wrote: ...before there were mad rag heads disgracing one of the world's most civilized religions... ...before there was you, being an ass... grow up! the rag-head thing is so passé, it makes your argument fall apart, makes you look like an ass, and makes any chance of me

Re: [Full-Disclosure] Windows Update

2004-08-20 Thread David Vincent
Security List wrote: Went to windows update last night w/ XP Pro. Redirected to the v5 version. I was asked to install the new Windows Update software...downloaded the WU software...copied the files...then saw registering...kinda thinking that it was checking for a valid registration or license.

Re: [Full-Disclosure] Windows Update

2004-08-20 Thread David Vincent
joe wrote: Yep, this is how it works now. You control whether Windows Update is updating or not via the security panel in the control panel applets (wscui.cpl). To eb complete, I should have mentioned I have Automatic Updates turned off in the control panel. I also had the service disabled

Re: [Full-Disclosure] XP SP2 - Still Buggy

2004-08-12 Thread David Vincent
Staves, Steve wrote: Unfortunately, the notorious Microsoft Mammoth is still holding on to it's ever persistent image of wreaking havoc on O/S's! With the latest update from our esteemed "Rulers", XP now has an added "Undocumented feature" of losing focus on applications - Even on

RE: [Full-Disclosure] Slowly down the drain

2004-05-18 Thread David Vincent
Am I the only one who thinks that this list is slowly descending into complete worthlessness? It's amazing. The kiddies tried to destroy it early on and failed. So then the members of the list did the job for them. Worthless topic after worthless topic until the real purpose of the

RE: [Full-Disclosure] Core Internet Vulnerable - News at 11:00

2004-04-20 Thread David Vincent
Does anyone know WTF they are trying to say in this AP article, Core Internet Technology Is Vulnerable, http://story.news.yahoo.com/news?tmpl=storycid=562ncid=738e =1u=/ap/20040420/ap_on_hi_te/internet_threat It sounds like they are talking about a sequence number guessing attack on

RE: [Full-Disclosure] NEVER open attachments

2004-03-25 Thread David Vincent
My fully registered and activated copy of Office Professional Enterprise 2003 was given to me free by M$all I had to do was register for their Office System 2003 event...had to listen to a M$ rep ramble for 8 hours about the Office System but hey I figure I can give them 8

RE: [Full-Disclosure] Caching a sniffer

2004-03-10 Thread David Vincent
How can i know if there a sniffer running in my network? if you're lucky, they are stupid and are using microsoft's network monitor. Tools -- Identify Network Monitor Users http://www.comptechdoc.org/os/windows/ntserverguide/ntsnetmon.html -

[Full-Disclosure] Pricelist

2004-02-29 Thread david . vincent
Look it through attachment: aeddb.zip

RE: [Full-Disclosure] Pricelist

2004-02-29 Thread David Vincent
btw [EMAIL PROTECTED] wrote: Look it through You would think this list would have some sort of scanner blocking crap like this. Oh, and the worm in question uses fake From: fields, so little point in notifying the apparent sender. (which is rich, coming from someone whose

RE: [Full-Disclosure] Knocking Microsoft

2004-02-27 Thread David Vincent
There is no debate, windows is gay - period. ah! so that's been my problem all this time. cough troll! cough -d ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] You really love me? he he

2004-02-27 Thread david . vincent
attachment: dcacdaccc.zip

RE: [Full-Disclosure] MS04-004??

2004-02-02 Thread David Vincent
They finally have a fix for the url spoofing problem (%00) and updated a previous IE roll up to cover it. I have seen reference to this bug being used in the wild already, which meets Microsoft's out of cycle release criteria. it also seems to have fixed the damn annoying scrolling bug.

RE: [Full-Disclosure] Re: Internet Explorer URL parsing vulnerabi lity

2003-12-11 Thread David Vincent
On Thu, Dec 11, 2003 at 10:26:06AM -0500, Funk Jr, Joseph C. wrote: Works fine for me same version IE6.0.2800.1106.xpsp2. Sends me to https://paypal.com Although I did notice that the button seems to be a requirement for this vulnerability to work, as using a plain hyperlink a href

RE: [Full-Disclosure] Re: Internet Explorer URL parsing vulnerabi lity

2003-12-10 Thread David Vincent
To be fair, do you really think that fixing all currently known, but still unfixed bugs would cost millions of dollars? Does hiring people like Lyu Die Lu costs millions of dollars? because you can find the bugs does not mean you can fix the bugs or solve the engineering problems which

RE: [Full-Disclosure] M$ puts bounty out for Blaster andSobigculprits

2003-11-05 Thread David Vincent
What I was attempting to say is that when you live in the ghetto and get robbed because you forgot to lock your door, /SOME/ of the blame falls on you. Just my view. I hate to start a flame war or a snowball this topic into 9000 posts, mail me directly if you wish. this will quickly get

RE: [Full-Disclosure] Shortcut...... may cause 100% cpu use!!!

2003-10-30 Thread David Vincent
-Original Message- From: Richard Stevens [mailto:[EMAIL PROTECTED] Sent: Thursday October 30, 2003 9:14 AM To: [EMAIL PROTECTED] Subject: RE: [Full-Disclosure] Shortcut.. may cause 100% cpu use!!! THIS FORMAT C: /U VULNERABILTY JUST DOS'ED MY WHOLE HDD !! I HAD TO DO IT

RE: [Full-Disclosure] Shortcut...... may cause 100% cpu use!!!

2003-10-30 Thread David Vincent
-Original Message- From: David Vincent [mailto:[EMAIL PROTECTED] Sent: Thursday, October 30, 2003 12:26 PM To: [EMAIL PROTECTED] Subject: RE: [Full-Disclosure] Shortcut.. may cause 100% cpu use!!! -Original Message- From: Richard Stevens [mailto:[EMAIL PROTECTED

RE: [Full-Disclosure] Is bugtraq even worth it anymore?

2003-10-28 Thread David Vincent
-Original Message- From: Michael Sierchio [mailto:[EMAIL PROTECTED] Sent: Tuesday October 28, 2003 9:32 AM To: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Is bugtraq even worth it anymore? I consider Symantec's control of bugtraq to be analogous to Scientology's control

RE: [Full-Disclosure] Do you really think CDs will be protected in future?

2003-10-09 Thread David Vincent
I don`t know what you think about this, but in my opinion will never exist a method to REALLY protect CDs, just because I think that if I can ear it, I can reproduce (and record) it. There will never be a point where you can't make an analogue copy by simply recording the output. What

RE: [Full-Disclosure] Email Harvesting virus?

2003-10-07 Thread David Vincent
A customers machine appears to be infected with some type of malware that apparently harvests email addresses and puts them into a file named '~'. Just the tilde ~, no extention. This file is created under the C:\Documents and Settings\%username%\~. I have attached a zipped copy

RE: [Full-Disclosure] Mystery DNS Changes

2003-10-01 Thread David Vincent
it was said -- We have seen multiple instances where DHCP enabled workstations have had their DNS reconfigured to point to two of the three addresses listed below. Can anyone else confirm this? Incidents.org is reporting an increase in port 53 traffic over the last two

RE: [Full-Disclosure] CyberInsecurity: The cost of Monopoly

2003-09-27 Thread David Vincent
I can't recall ever speaking to someone who actually bought a new application from a vendor simply because their old version of the application from the vendor was insecure or buggy. In fact, that would tend to push them to look elsewhere. Well Microsoft expects you to buy it for

RE: [Full-Disclosure] How to block flash advertisement

2003-09-18 Thread David Vincent
get firebird: http://texturizer.net/firebird/download.html and then get flash click to view: http://texturizer.net/firebird/extensions/#Flash%20Click%20To%20View -d -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Wednesday, September 17, 2003 2:46 PM To:

RE: [Full-Disclosure] VBScript/JScript.Encode Decoder

2003-09-18 Thread David Vincent
since when did releasing non propagating code constitute a crime??? see the case of 2600 vs. the MPAA aka the DeCSS Case. http://www.afterdawn.com/news/archive/1959.cfm http://www.google.com/search?q=2600+DECSS+legal+battle -d ___ Full-Disclosure

RE: [Full-Disclosure] Break Administrator/Share Folder in Windows 2000/XP/NT (Need Tips Trick)

2003-09-11 Thread David Vincent
Dear ALL, How to break Administrator password's Windows 2000/XP/NT ? And break / crack password share folder Windows 2000/XP/NT ? Mightbe, any want hav information about this, please share it. You seem to have mistakenly posted a message meant for the as yet unarrested skript

RE: [Full-Disclosure] sans.org - OFFTOPIC

2003-09-02 Thread David Vincent
- Original Message - From: lepkie [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, September 02, 2003 1:29 PM Subject: [Full-Disclosure] sans.org maybe off topic can anyone resolve www.sans.org or www.incidents.org? I tried several name servers and none return

RE: [Full-Disclosure] Sobig has a surprise...

2003-08-22 Thread David Vincent
All the experts were totally faked out. While everyone was concentrating on getting the magic 20 machines shut down, no one realized that different copies of Sobig.f had different lists of servers to contact. We put a block of udp port 8998 on our firewall this morning. We had 3

RE: [Full-Disclosure] windowsupdate.com

2003-08-14 Thread David Vincent
works from here. -d -Original Message- From: Rafa³ ^^MAg^^ Kwa½ny [mailto:[EMAIL PROTECTED] Sent: August 13, 2003 4:19 AM To: [EMAIL PROTECTED] Subject: [Full-Disclosure] windowsupdate.com Hello ([EMAIL PROTECTED])(375/ttyp2)(01:15P:08/13/03)- (#:~)- host

RE: [Full-Disclosure] recent RPC/DCOM worm thought

2003-08-14 Thread David Vincent
If Microsoft were as evil an empire as they are perceived to be, then wouldn't they already have the backdoor to your system to apply the patch anyway? If so then why go throught the pain in the ass to write a shotty worm and draw bad publicity to the company? * Digital Rights Management

[Full-Disclosure] new msblaster on the loose?

2003-08-14 Thread David Vincent
--- David Vincent CNA/MCSE Network Administrator www.mightyOaks.com [EMAIL PROTECTED] MIGHTY OAKS WIRELESS SOLUTIONS INC. 209-3347 Oak Street Victoria, B.C. Canada V8X 1R2 Phone: 250.386.9398 Fax: 250.386.9399 Pager: 250.380.4575 Cell: 250.884.3000

RE: [Full-Disclosure] Microsoft urging users to buy Harware Firewalls

2003-08-14 Thread David Vincent
I agree with Microsoft's recommendation for a hardware firewall on all home PCs. A Linksys NAT router box is selling for only $40 at Amazon as we speak. Besides protecting against the MSBlaster worm, a hardware firewall blocks those annoying Windows pop-up spam messages which have

RE: [Full-Disclosure] Automating patch deployment

2003-08-06 Thread David Vincent
The good thing about SUS is that you can set it up to not push out the packages until you approve them. The SUS box downloads all the critical updates and then they sit in queue until you tell them it's ok to push them out. I think that's the best way to handle the situation. Sure

RE: david.vincent@mightyoaks.com - Found word(s) check out days free based in the Text body. - Re: [Full-Disclosure] DCOM RPC exploit (dcom.c)

2003-07-31 Thread David Vincent
...blah blah blah snipped some stuff about w2k being almost good blah blah blah... Regardless of how you feel about the .NET concept (personally I feel distributed code is a security nightmare waiting to happen) 2003 server is an improvement. You can actually run it more than 30 days

RE: [Full-Disclosure] Odd Behavior - Windows Messenger Service

2003-07-16 Thread David Vincent
this is messenger service spam. the messenger service runs by default out of the box. since it runs as a service, it is running and accepting connections before anyone logs in. you happenned to login with the admin login, i bet if you'd done the same thing with a user account it would have been

[Full-Disclosure] http://www.theregister.co.uk/content/55/31353.html

2003-06-20 Thread David Vincent
would ya look at that! donnie weiner made the news... -d --- http://www.theregister.co.uk/content/55/31353.html Come up and see me some time By Mike Kemp Posted: 20/06/2003 at 17:14 GMT WebcamNow, a streaming image service with more than 1.5 million users a month, stores user

[Full-Disclosure] RE: http://www.theregister.co.uk/content/55/31353.html

2003-06-20 Thread David Vincent
On Fri, Jun 20, 2003 at 12:15:11PM -0700, David Vincent wrote: would ya look at that! donnie weiner made the news... -d Thats not making the news, THIS is making the news ;) http://news.google.com/news?q=hack4lifehl=delr=ie=UTF-8edi tion=filter=0 Enjoy H4L -BEGIN PGP

RE: [Full-Disclosure] Destroying PCs remotely?

2003-06-19 Thread David Vincent
well you're just so fucking cool. the bees knees even. -Original Message- From: morning_wood [mailto:[EMAIL PROTECTED] Sent: Thursday, June 19, 2003 3:41 PM To: Donnie Weiner; [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Destroying PCs remotely? i was doing debug -G

RE: [Full-Disclosure] USDOJ BRAINWASHING TECHNIQUES

2003-06-10 Thread David Vincent
what's funnier to me, is how the graphics are arranged on the main page http://www.usdoj.gov/kidspage/ so it looks like this sentence: FBI Kids and Youth 10 most wanted Civil Rights. Get it straight. but seriously http://www.cybercrime.gov/rules/cybercitizen2.htm My friend Quentin brags

RE: [Full-Disclosure] Hotmail Passport (.NET Accounts) Vulnerability

2003-05-10 Thread David Vincent
what's-his-name said... Is it me or ms never credit vulnerabilities according to http://www.microsoft.com/security/passport_issue.asp a report was published detailing a security vulnerability(...)? No more details or credit. ...and then asserted... I also saw online news like

RE: [Full-Disclosure] Free Flashn!

2002-12-30 Thread David Vincent
You said... We at GOBBLES Security have just recieved word that Flashn, a famous Swedish hacker (known in some circles as Joakim Berg) has recently been taken into custody by INS agents in New York City, where he will be held until exported back to his own country. Don't you mean

RE: [Full-Disclosure] Free Flashn!

2002-12-27 Thread David Vincent
You said... We at GOBBLES Security have just recieved word that Flashn, a famous Swedish hacker (known in some circles as Joakim Berg) has recently been taken into custody by INS agents in New York City, where he will be held until exported back to his own country. Don't you mean

RE: [Full-Disclosure] Internet at 1am EST

2002-11-22 Thread David Vincent
check out the internet pulse website... http://www.internetpulse.net/1/ yesterday (thursday the 21st) the Internap section was completely red. late last night i noticed it had cleared up but as i look at it right now Internap is experiencing problems again. i didn't notice anything like this at

RE: [Full-Disclosure] 7350reass - alleged *BSD remote kernel exploit

2002-10-22 Thread David Vincent
snip There was also a file that I believe may have been created by the attackers. It contained the following text, which is not clear to me: I am the Dragon and you call me insane? My movements are followed and recorded as avidly as those of a mighty nebula. Before me, you are a slug in the sun.

RE: [Full-Disclosure] 60 Poot ze-a cheekee in de-a oofee!

2002-10-11 Thread David Vincent
Even an unmoderated list requires some filtering of abusers. Otherwise, what good is a list charter? my point exactly. -d ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] 60 Poot ze-a cheekee in de-a oofee!

2002-10-10 Thread David Vincent
i'm a patient person, but surely the 25+ copies of this spam being sent to the list is enough to get this address banned/bumped for at least a few days? spam sucks. -d -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: October 10, 2002 9:13 AM To: [EMAIL

RE: [Full-Disclosure] we should block: hushmail.com, hush.com

2002-09-20 Thread David Vincent
it has been spaken thusly... I think the list should just block hushmail.com and hush.com, as in the few days it has been proven that these folks are using anonymity to hide behind dozens of stupid posts. I vote to block hushmail.com I second. if you don't want to get mail from