Re: [Full-Disclosure] What A Drag II XP SP2

2004-08-18 Thread Michael Evanchik
Im sure glad Microsoft spent more on security and xp service pack 2 then the missle defense system.  This works on me using XP Pro SP2, malware[1].exe is in my startup folder!!!  It would be trivial and easy to trick users to drag something. I totally feel unsecure with Microsoft and  SP2 ye

[Full-Disclosure] email worms, spam etc etc

2003-09-25 Thread Michael Evanchik
If you were as annoyed as i was with your mailboxes being bombarded I looked up native email filtering for microsoft environments.  Attatched is a basic script to get u started.  This works on the Microsoft SMTP service on NT4,2000, and 2003     Michael Evanchik www.high-pow-er.com

[Full-Disclosure] Swen, Virii, Spam etc etc

2003-09-25 Thread Michael Evanchik
        Michael Evanchik www.high-pow-er.com   

RE: [Full-Disclosure] Re: Six Step IE Remote Compromise Cache Attack

2003-11-14 Thread Michael Evanchik
Title: RE: [Full-Disclosure] Re: Six Step IE Remote Compromise Cache Attack I would first like to commend microsoft on patching the exploit very quickly. Second I would like to like to say I totally give up on internet explorer an have moved on to Mozilla firebird.  Thank you open source! A

RE: [Full-Disclosure] Re: Six Step IE Remote Compromise Cache Attack

2003-11-14 Thread Michael Evanchik
/2003 10:56 AM To: Michael Evanchik Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Re: Six Step IE Remote Compromise Cache Attack   Michael Evanchik wrote:> 1) take out the function name and brackets and all code below> in default.htm and s

[Full-Disclosure] Aol Instant Messenger/Microsoft Internet Explorer remote code execution

2004-02-18 Thread Michael Evanchik
permanent    for any AOL user every time the icon is imported. 3. Now your ready to create your html page on a web server.    In the html webpage all that is needed is simply... This will not need to be changed ever again since your filename and location is permanent foreveryone on AOL. 4. Send

RE: [Full-Disclosure] Re: Aol IM /Microsoft IE remote code execution

2004-02-19 Thread Michael Evanchik
That is definately true.  But unfortunately I used known local exploit examples to give due credit to some people.  There are many different local exploits that norton does not pick up as well as ways to rewrite the known ones to trick norton so I have been told.   Mike From: Feher Tamas

RE: [Full-Disclosure] RE: Re: YES IT IS , is predicatable file location a vuln? (was RE: Aol Instant Messenger/Microsoft Internet Explorer remote code execution)

2004-02-23 Thread Michael Evanchik
  From: [EMAIL PROTECTED] Sent: Fri 2/20/2004 9:39 PM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: [Full-Disclosure] RE:  Re: is predicatable file location a vuln? (was RE: Aol Instant Messenger/Microsoft Internet Explorer remote code execution)   Why don't you release your exp

Re: [Full-Disclosure] MS04-011 Break SSL support in IE 6.0.3790.0 with Windows 2003

2004-04-16 Thread Michael Evanchik
I sure am, i do not want to uninstall the service pack.  I looked around for any encryption pack installs but nothing for IE6.  This sucks no https sites work.Mike - Original Message - From: Technoboy To: [EMAIL PROTECTED] Sent: Friday, April 16, 2004 2:04 PM Subje

Re: [Full-Disclosure] Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)

2004-06-08 Thread Michael Evanchik
ve no idea who you are Gadi to give such comments like that.   Michael Evanchik   www.MichaelEvanchik.com  - Original Message - From: Gadi Evron To: Jelmer Cc: [EMAIL PROTECTED] ; [EMAIL PROTECTED] ; [EMAIL PROTECTED] Sent: Monday, June 07, 2004 4:47 PM Subject:

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-12 Thread Michael Evanchik
I disagree Colin, A good administrator knows there is more then one way to skin a cat. Rafel, I belive was just briefly stating some solutions to the problem. I can tell you windows protection can be defeated with a few registry changes. Combine that with an active directory login script and I

RE: [Full-Disclosure] "You have sent the attached unsolicited e-mail to an otherwise GOOD security email list."

2004-11-17 Thread Michael Evanchik
I have no problem with this list. I use a tool to passively filter this list the same that I do for the spam problem that has taken over planet earth In your email client there is a button that will take care of this for you. Look for something in the respects of "DELETE" Anyone who can not

RE: [Full-Disclosure] Fwd: Security Watch: Source Code Dealer Arrested

2004-11-23 Thread Michael Evanchik
This crew has this entirely wrong. Have they read securityfocus.com lately? This was a setup. He does have prior convictions but if you notice they are the same date ever year. It seems they have this guy on their outlook calendar reminders. Also by no means should anyone feel safe now since the

RE: [Full-Disclosure] amazon security contact

2004-12-01 Thread Michael Evanchik
Too bad I cant add this too my cart and complain to customer service I am not receiving my item www.michaelevanchik.com -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Knarr, Joshua Sent: Wednesday, December 01, 2004 9:59 AM To: mikx; [EMAIL PROTECTED]

RE: [Full-Disclosure] I'm calling for LycosEU heads and team to resign or be sacked

2004-12-06 Thread Michael Evanchik
To all it my concern. Even though I sadly have to admit to ... being a former spammer (it was good extra cash especially if you can code) understand their side well ... understand 2 wrongs don't make a right and that this is technically DDoS I agree with this method to combat spammers who are

[Full-Disclosure] YEY AGAIN Automatic remote compromise of Internet Explorer Service Pack 2 XP SP2

2004-12-24 Thread Michael Evanchik
millions of dollars have been spent on securing SP2, perfection is impossible. Through the joint effort of Michael Evanchik (http://www.michaelevanchik.com) and Paul from Greyhats Security (http://greyhats.cjb.net), a very critical vulnerability has been developed that can compromise a user's s

RE: [Full-Disclosure] YEY AGAIN Automatic remote compromise ofInternetExplorer Service Pack 2 XP SP2

2004-12-25 Thread Michael Evanchik
try www.michaelevanchik.com/security/microsoft/ie/xss/index.html   might be a little more reliable PoC   1) new not known by AVP codes 2) uses all start up menue languages                 -Original Message-From: Michael Evanchik [mailto:[EMAIL PROTECTED]Sent: Saturday, December

RE: [Full-Disclosure] YEY AGAIN Automatic remotecompromiseofInternetExplorer Service Pack 2 XP SP2

2004-12-27 Thread Michael Evanchik
AVP codes 2) uses all start up menue languages                 -Original Message-From: Michael Evanchik [mailto:[EMAIL PROTECTED]Sent: Saturday, December 25, 2004 9:11 PMTo: Aviv Raff; full-disclosure

RE: [Full-Disclosure] YEY AGAIN Automatic remote compromise ofInternetExplorer Service Pack 2 XP SP2

2004-12-27 Thread Michael Evanchik
n error is shown, press OK. This is normal. - Notice in your startup menu a new file called Microsoft Office.hta. When run, this file will download and launch a harmless executable (which includes a pretty neat fire animation)   Michael Evanchik Relationship1 p: 914-9

[Full-Disclosure] (no subject)

2004-12-27 Thread Michael Evanchik
Had a mistake in my code o well. Works now PoC: http://www.michaelevanchik.com/security/microsoft/ie/xss/index.html http://www.michaelevanchik.com/security/microsoft/ie/xss/writehta.txt <-- avp's should add this Here is some new adodb code AVP's should add. No longer needed to connect to ext

[Full-Disclosure] BUG FIX Remote compromise of Internet Explorer Service Pack 2 XP SP2

2004-12-27 Thread Michael Evanchik
Had a mistake in my code o well.  Works now   PoC: http://www.michaelevanchik.com/security/microsoft/ie/xss/index.html   http://www.michaelevanchik.com/security/microsoft/ie/xss/writehta.txt <--  avp's should add this       Here is some new adodb code AVP's should add.  No longer needed to co

RE: [Full-Disclosure] YEY AGAIN Automatic remotecompromiseofInternetExplorer Service Pack 2 XP SP2

2004-12-27 Thread Michael Evanchik
ger needed to connect to external source.  Malicious recordset can be built locally.   www.michaelevanchik.com -Original Message-From: Michael Evanchik [mailto:[EMAIL PROTECTED]Sent: Monday, December 27, 2004 11:57 AMTo: Ron Jackson; full-disclosure@lists.netsys.comSubje

Re: [Full-Disclosure] And you're proud of this Mike Evanchick?

2004-12-29 Thread Michael Evanchik
Todd,   Listen, you are so wrong i cant belive you even have the guts to post this.  How stupid can you be?  Norton or any AVP can easily be fooled.  The active x object "ca"+n b"+ +e crea" +ted" like this. code changed around , or even different local code can be used and tada AVP is fooled

Re: [Full-Disclosure] And you're proud of this Mike Evanchick?

2005-01-02 Thread Michael Evanchik
Title: Re: [Full-Disclosure] And you're proud of this Mike Evanchick? Let me put this lighter,   WRONG   I created this code first using KNOWN virus strings.  It would be trivial to use different code that is not detected,   Mike www.michaelevanchik.com   - Original Message - Fro

[Full-Disclosure] Cheers Quick action by symantec on IE auto compromise

2005-01-05 Thread Michael Evanchik
http://securityresponse.symantec.com/avcenter/venc/data/trojan.phel.a.html mike www.michaelevanchik.com ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] YEY AGAIN Automatic remote compromise ofInternetExplorer Service Pack 2 XP SP2

2005-01-06 Thread Michael Evanchik
ger needed to connect to external source.  Malicious recordset can be built locally.   www.michaelevanchik.com -Original Message-From: Michael Evanchik [mailto:[EMAIL PROTECTED]Sent: Saturday, December 25, 2004 9:11 PMTo: Aviv Raff; full-disclosure@lists.netsys.comSubje

Re: [Full-Disclosure] And you're proud of this Mike Evanchick?

2005-01-06 Thread Michael Evanchik
erpix To: Todd Towles Cc: Michael Evanchik ; full-disclosure@lists.netsys.com Sent: Thursday, December 30, 2004 12:55 PM Subject: RE: [Full-Disclosure] And you're proud of this Mike Evanchick? I have to aggree with Todd on this one, the attack was extremelyunprofess