Re: [Full-Disclosure] Bios programming...

2005-03-04 Thread Paul Schmehl
intently. And another day passes without useful information exchange. What a great list this is. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu/ ___ Full

[Full-Disclosure] Re: Incorrect Classification of iDownload's Product as Spyware...

2005-02-23 Thread Paul Laudanski
nd couldn't agree more. ISearch gets it's > hooks so far into a system that it can only be classed as the garbage > spyware program that it is(IMHO). > > Goos job and good luck! > > Paul Laudanski wrote: > > In a letter received by CastleCops from a law firm re

[Full-Disclosure] RE: Incorrect Classification of iDownload's Product as Spyware...

2005-02-23 Thread Paul Kurczaba
Hi, Sometimes you can tell that there is a problem with a software product when you type the name of it in Google and it comes back with the "Sponsored Links" as "Remove [software name here]" :) Check it out: http://www.google.com/search?hl=en&q=isearch&btnG=Google+

[Full-Disclosure] Incorrect Classification of iDownload's Product as Spyware...

2005-02-23 Thread Paul Laudanski
/shownews/60608 http://www.revenews.com/wayneporter/archives/000429.html http://www.wilderssecurity.com/showthread.php?t=67648 -- Regards, Paul Laudanski - Computer Cops, LLC. CastleCops(SM) - http://castlecops.com http://cuddlesnkisses.com | http://justalittlepoke.com | http://zhen-xjell.com

RE: [Full-Disclosure] A parent's primer to computer slang

2005-02-17 Thread Paul Kurczaba
Seriously, doesn't Microsoft has anything better to do... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Berend-Jan Wever Sent: Thursday, February 17, 2005 10:14 AM To: full-disclosure@lists.netsys.com Subject: [Full-Disclosure] A parent's primer to comp

Re: [Full-Disclosure] Antivirus listing

2005-02-11 Thread Paul Schmehl
appropriate keys. That's how I do it - using KiXtart I can determine major and minor revs as well as dat versions by reading the registry keys. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIE

Re: [Full-Disclosure] Multiple AV Vendors ignoringtar.gz archives (fwd)

2005-02-08 Thread Paul Laudanski
Folks, here is a summary of a discussion with Mark at Eset for NOD32 about .tar.bz2. So what do you folks think, how many people would like to see this capability? -- Regards, Paul Laudanski - Computer Cops, LLC. CastleCops(SM) - http://castlecops.com http://cuddlesnkisses.com | http

Re: [Full-Disclosure] Multiple AV Vendors ignoring tar.gz archives

2005-02-05 Thread Paul Laudanski
ction vector, although probably not all that useful for viruses. I > don't believe many users will go googling for the tools needed. > Nonetheless at least a few of the vendors think it's necessary to go > beyond the common zip and rar. -- Regards, Paul Laudanski

Re: [Full-Disclosure] Multiple AV Vendors ignoring tar.gz archives

2005-02-05 Thread Paul Laudanski
ly other archive formats > that aren't very common on windows systems (but supported by the common > archive tools). > > Full write up here: > http://zeedo.blogspot.com/2005/02/multiple-av-vendors-ignoring-targz.html -- Regards, Paul Laudanski - Computer Cops, LLC. CastleC

[Full-Disclosure] Webroot Software Resigns from COAST

2005-02-04 Thread Paul Laudanski
ublic would like to know from Computer Associates who now own PestPatrol. Will they continue to remain partners with COAST? As Wayne put it, "Is COAST Toast"? trackbacks: http://alpha.revenews.com/MT/mt-tb.cgi/337 http://castlecops.com/trackback/News/5719 -- Regards, Paul Laud

RE: [Full-Disclosure] Re: Cain and Abel

2005-02-03 Thread Paul Melson
Under a default or "dumb" switched environment, both the switch and the victim hosts will digest the phony ARP broadcasts sent by tools like Cain or Ettercap. Static ARP entries on a server should be enough to prevent session hijacking, but in order to stop eavesdropping, both victims need static

[Full-Disclosure] Windows Security Checklists - 10 Parts

2005-01-31 Thread Paul Laudanski
, Paul Laudanski - Computer Cops, LLC. CastleCops(SM) - http://castlecops.com http://cuddlesnkisses.com | http://justalittlepoke.com | http://zhen-xjell.com ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Re: [ GLSA 200501-45 ] Gallery: Cross-site scripting vulnerability

2005-01-30 Thread Paul Laudanski
vulnerability > Date: January 30, 2005 > Bugs: #78522 > ID: 200501-45 > > - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - > -- Regards, Paul Laudanski - Computer Cops, LLC. CastleCops(

RE: [Full-Disclosure] Is there a 0day vuln in this phisher's site?

2005-01-29 Thread Paul Kurczaba
Interesting Site. When I went to the page, McAfee VirusScan notified me of an script it blocked on the page. The blocked script, a virus, was called "JS/Stealus.gen". After some research, I found the script "exploit(s) an Internet Explorer vulnerability resulting in Internet Explorer displaying one

RE: [Full-Disclosure] ICMP Covert channels question

2005-01-29 Thread Paul Schmehl
--On Saturday, January 29, 2005 12:37 AM -0800 [EMAIL PROTECTED] wrote: Paul Schmehl Said: No, because non-routeable addresses are...wellnon-routeable. But Paul, I route non-routable addresses all the time. It is only internet routers that are usually configured to not route certain

Re: [Full-Disclosure] ICMP Covert channels question

2005-01-28 Thread Paul Schmehl
for that session. Of course you have to know in advance all those variables, so, since you're sitting right there, just pound the dern thing with a hammer and be done with it. :-) Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN

RE: [Full-Disclosure] 2 vulnerabilities combine to auto execute received files in Nokia series 60 OS

2005-01-24 Thread Paul Kurczaba
Wouldn't the phone try to open the jpg file as a picture, and not execute it. Just like on desktop PCs: if you rename a .exe (application/program) to a jpg (picture file), and try to open the file, your image program will open the file, thinking it is a image file. The application code will not be

Re: [Full-Disclosure] Scan for IRC

2005-01-21 Thread Paul Schmehl
; any any (msg:"IRC communications"; content: JOIN; sid: 100; rev:1;) alert tcp $HOME_NET any -> any any (msg:"IRC communications"; content: PRIVMSG; sid: 101; rev:1;) Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texa

RE: [Full-Disclosure] Illegal mind control is coming to the USA, black helicopters

2005-01-17 Thread Paul Kurczaba
Mind control is also when Bush was given answers at the first debate; by a radio receiver hidden under his coat (http://www.washingtonpost.com/wp-dyn/articles/A18734-2004Oct8.html). But when the media questioned Bush, he just said it was a "poorly tailored" suit. Yeah right! -Paul ---

[Full-Disclosure] Multiple Vulnerabilities in Netgear FVS318 Router

2005-01-17 Thread Paul Kurczaba
Multiple Vulnerabilities in Netgear FVS318 Router http://www.securinews.com/vuln.htm?vulnid=103 - Overview: The Netgear FVS318 is an easy to use, firewall/router designed for home users and small businesses. SecuriNews Research has found 2 vulnerab

RE: [Full-Disclosure] Google.com down?

2005-01-15 Thread Paul Kurczaba
Sometimes :) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Joel Esler Sent: Friday, January 14, 2005 10:11 PM To: Danny Cc: Full-Disclosure (E-mail) Subject: Re: [Full-Disclosure] Google.com down? Wait a minute, "my Windows XP TCP/IP stack and DNS reso

[Full-Disclosure] linux or windows 2003 based wardialer

2005-01-15 Thread Paul Tinsley
Are there any good modern wardialers that will work in windows 2003 or RHES? I don't want to have to babysit a dos box running toneloc. My goal is to run and view the results of scans across the network. ___ Full-Disclosure - We believe in it. Charter:

RE: [Full-Disclosure] [MISC] SBC Blocks Port 25 - No Exceptions.

2005-01-14 Thread Paul Kurczaba
We've had nothing but problems with SBC. I would look at AT&T Business DSL. Pricy ($80-$100), but the speed is awesome (3.0 Mbps). They do not block port 25. Yeah! -Paul Kurczaba -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of J.A. Terranson Sen

RE: [Full-Disclosure] Amazon.com is down

2005-01-14 Thread Paul Kurczaba
It is up at 18:46 EST From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jianqiang XinSent: Friday, January 14, 2005 11:23 AMTo: Full-Disclosure (E-mail)Subject: [Full-Disclosure] Amazon.com is down It seems that Amazon.com is down. Is it related to any attack? __

RE: [Full-Disclosure] little crash in IE

2005-01-13 Thread Paul Kurczaba
Works perfectly! The crash dialog says the the error exists in user32.dll -Paul -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of sourvivor Sent: Thursday, January 13, 2005 6:09 PM To: full-disclosure@lists.netsys.com Subject: [Full-Disclosure] little

Re: [Full-Disclosure] Re: Linux kernel i386 SMP page fault handler privilege escalation

2005-01-13 Thread Paul Starzetz
y correct. Exploiting this race condition is very easy, however it is always difficult to exploit SMP race conditions if the load is high, since you must achieve parallel execution of two threads and the scheduler may prevent you from parallel execution in that case. -- Paul Starzetz iSEC

RE: [Full-Disclosure] MORE CRITICAL FLAWS IN MS WINDOWS EXPLORER

2005-01-12 Thread Paul Kurczaba
I feel bad for the poor folks that follow the "Workaround" :( -Paul -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Team Pwnge Sent: Tuesday, January 11, 2005 5:52 PM To: [EMAIL PROTECTED]; bugtraq@securityfocus.com; full-disclosure@lists.

RE: [Full-Disclosure] PoC to be released on 01/20/05

2005-01-12 Thread Paul Kurczaba
That is the same thing I found :) What a waste of bandwidth... He could have at least sent it from a hijacked box in the US :) O, well... -Paul -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eric Paynter Sent: Wednesday, January 12, 2005 4:32 PM To

[Full-Disclosure] Incorrect characters

2005-01-12 Thread Paul
Hi list, Firstly, I sent an email to a client quoting some prices on the server that we use for our own website and it arrived with the (correctly) typed £ sign as a capital 'L' .I then sent a test email to myself from my ISP account to my address on this same (questionable) server and it was perf

[Full-Disclosure] Linux kernel i386 SMP page fault handler privilege escalation

2005-01-12 Thread Paul Starzetz
://www.kernel.org/ URL: http://isec.pl/vulnerabilities/isec-0022-pagefault.txt CVE: CAN-2005-0001 Author:Paul Starzetz <[EMAIL PROTECTED]> Date: Jan 12, 2005 Issue: == Locally exploitable flaw has been found in the Linux page fault handler code that allows users to gain

RE: [Full-Disclosure] MORE CRITICAL FLAWS IN MS WINDOWS EXPLORER

2005-01-11 Thread Paul Kurczaba
Why not also delete KDE, Gnome and all the other desktops out there. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Team Pwnge Sent: Tuesday, January 11, 2005 5:52 PM To: [EMAIL PROTECTED]; bugtraq@securityfocus.com; full-disclosure@lists.netsys.com Subj

[Full-Disclosure] Linux kernel uselib() privilege elevation, corrected

2005-01-07 Thread Paul Starzetz
including 2.6.10 Vendor:http://www.kernel.org/ URL: http://isec.pl/vulnerabilities/isec-0021-uselib.txt CVE: CAN-2004-1235 Author:Paul Starzetz <[EMAIL PROTECTED]> Date: Jan 07, 2005 Issue: == Locally exploitable flaws have been found in the Linux binary

[Full-Disclosure] [iSEC] [Dailydave] Advisory 1/2005 - Linux Kernel arbitrary code execution (fwd)

2005-01-07 Thread Paul Starzetz
here the plagiate. -- Paul Starzetz iSEC Security Research http://isec.pl/ -- Forwarded message -- Date: Fri, 7 Jan 2005 09:39:18 +0100 (CET) From: Janusz Niewiadomski <[EMAIL PROTECTED]> Reply-To: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [iSEC] [Dailydave] Advi

[Full-Disclosure] Linux kernel sys_uselib local root vulnerability

2005-01-07 Thread Paul Starzetz
kernel Version: 2.4 up to and including 2.4.29-rc2, 2.6 up to and including 2.6.10 Vendor:http://www.kernel.org/ URL: http://isec.pl/vulnerabilities/isec-0021-uselib.txt CVE: CAN-2004-1235 Author:Paul Starzetz <[EMAIL PROTECTED]> Date: Jan 07, 2005 Issue: == L

Re: [Full-Disclosure] Microsoft AntiSpyware - First Impressions

2005-01-07 Thread Paul Laudanski
sion will be free and allow for centralized > domain management. It's the least that Microsoft can do. To expand on your tests, I know this doesn't include the Microsoft rebranded Giant, but this is worth a look: http://spywarewarrior.com/asw-test-guide.htm -- Regards, Paul Lauda

RE: [Full-Disclosure] Pattern matching search tool

2005-01-06 Thread Paul Schmehl
--On Thursday, January 06, 2005 08:07:13 AM +0530 "ALD, Aditya, Aditya Lalit Deshmukh" <[EMAIL PROTECTED]> wrote: Dear paul I think you answered your own question over here - its perl! Yeah, I'm beginning to think that's what I'm going to have to do. However there

Re: [Full-Disclosure] Re: new phpBB worm affects 2.0.11

2005-01-06 Thread Paul Laudanski
5%28%24%48%54%54%50%5F%47%45%54%5F%56%41%52%53%5B%72%75%73%68%5D%29.%2527 > > HTTP/1.1" -- Regards, Paul Laudanski - Computer Cops, LLC. CEO & Founder CastleCops(SM) - http://castlecops.com Promoting education and health in online security and privacy.

[Full-Disclosure] Re: New Santy-Worm attacks *all* PHP-skripts

2005-01-06 Thread Paul Laudanski
On Sat, 25 Dec 2004, Paul Laudanski wrote: > [code] > SecFilter "visualcoders\.net/spy\.gif\?\&cmd" > SecFilter ":/" > [/code] > > Just in case the URL changes, the latter should still get all sorts of: > > http:// > ftp:// > > Natu

[Full-Disclosure] Pattern matching search tool

2005-01-05 Thread Paul Schmehl
, for example, could tell me all the machines on our network that are running copies of phpBB (obvious reasons) so that we could quickly identify potential problem areas. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN

Re: [Full-Disclosure] Multiple Backdoors found in eEye Products (IRIS and Secure

2005-01-03 Thread Paul Schmehl
too sooper sekrit to share with us mere mortals. (Sort of like the alien corpses they have hidden out in Area 51.) Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu ___

RE: [Full-Disclosure] Multiple Backdoors found in eEye Products (IRISand SecureIIS)

2005-01-01 Thread Paul Schmehl
closure but that also requires you to notify the vendor (there were no @eeye.com's in your "to" list but there were a couple of press mailboxes). Your entire post could be classified as casting perls before swine. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer

Re: [Full-Disclosure] Re: New Santy-Worm attacks *all* PHP-skripts

2004-12-29 Thread Paul Laudanski
On Sun, 26 Dec 2004, Raistlin wrote: > Paul Laudanski wrote: > > > Certainly doing it to /tmp, /usr/tmp, /var/tmp > > could help, but it isn't 100% foolproof, and some don't even consider it > > security. > > Just a bit of hardening :) There are a cou

[Full-Disclosure] Suggested filters against PHP Attacking Worms

2004-12-27 Thread Paul Laudanski
positives are analyzed. http://castlecops.com/article5642.html Filter examples are provided for: - modsecurity - php - modrewrite A couple hardening suggestions are also included. -- Regards, Paul Laudanski - Computer Cops, LLC. CEO & Founder CastleCops(SM) - http://castlecops.com Promo

[Full-Disclosure] Re: New Santy-Worm attacks *all* PHP-skripts

2004-12-27 Thread Paul Laudanski
BILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NONINFRINGEMENT. http://castlecops.com/article1.html -- Regards, Paul Laudanski - Computer Cops, LLC. CEO & Founder CastleCops(SM) - http://castlecops.com Promoting education and health in online security and privacy. _

Re: [Full-Disclosure] Re: New Santy-Worm attacks *all* PHP-skripts

2004-12-26 Thread Paul Laudanski
Then again, you can always disable the functions in php.ini for exec and system for instance to help stave off other similar attacks. -- Regards, Paul Laudanski - Computer Cops, LLC. CEO & Founder CastleCops(SM) - http://castlecops.com Promoting educati

RE: [Full-Disclosure] RE: Worm hitting PHPbb2 Forums

2004-12-23 Thread Paul Laudanski
[/quote] It is making use of the highlight exploit in pre phpbb 2.0.11. Even though the 'worm' itself may be hindered, we can certainly expect script kiddies to attempt these manually. http://www.modsecurity.org/blog/archives/46.html Now that is catching the single quote in the h

Re: [Full-Disclosure] Security breach database

2004-12-23 Thread Paul Laudanski
ition to what others have stated: http://www.mynetwatchman.com/ http://www.zone-h.org/ -- Regards, Paul Laudanski - Computer Cops, LLC. CEO & Founder CastleCops(SM) - http://castlecops.com Promoting education and health in online security and privacy. [This message is for the designa

Re: [Full-Disclosure] Possible apache2/php 4.3.9 worm

2004-12-21 Thread Paul Schmehl
ve any of you encounted this before? php 4.3.9 has several serious security flaws in it. (See here for more info - <http://www.php.net/release_4_3_10.php>). You should have upgrade it ASAP. That's most likely how the script altered the files. Paul Schmehl ([EMAIL PROTECTED]) Ad

[Full-Disclosure] Linux kernel scm_send local DoS

2004-12-16 Thread Paul Starzetz
-2004-1016 Author:Paul Starzetz <[EMAIL PROTECTED]> Date: Dec 14, 2004 Issue: == A locally exploitable flaw has been found in the Linux socket layer, that allows a local user to hang a vulnerable machine. Details: The Linux kernel provides a powerful socket A

[Full-Disclosure] RE: Linux kernel scm_send local DoS

2004-12-15 Thread Paul Starzetz
On Tue, 14 Dec 2004, Leif Sawyer wrote: > Tested on UltraSparc 32-bit userland, Gentoo 2004.3 2.6.7-rc2 SMP > Excellent You dream... Maybe just the expl code is buggy, I never claimed it works for all vulnerable configurations. Just read your kernel source :-] -- Paul Starzet

[Full-Disclosure] phpBB Attachment Mod Directory Traversal HTTP POST Injection

2004-12-15 Thread Paul Laudanski
ND NONINFRINGEMENT. Comments Because security is everything, CastleCops encourages the pursuit of education and health in security, privacy, and computing via the continuous renewal of open discussions for the benefit of all.

[Full-Disclosure] Linux kernel IGMP vulnerabilities

2004-12-15 Thread Paul Starzetz
: CAN-2004-1137 Author:Paul Starzetz <[EMAIL PROTECTED]> Date: Dec 14, 2004 Issue: == Multiple locally as well as remotely exploitable bugs have been found in the Linux IGMP networking module and the corresponding user API. Details: The IGMP (or internet group mana

[Full-Disclosure] Re: Online Script Decoder

2004-12-07 Thread Paul Szabo
GreyMagic Security <[EMAIL PROTECTED]> kindly made an online decoder available at http://www.greymagic.com/security/tools/decoder/ On occasions it may be more useful to have a "local" decoder: I often use the following perl script. Cheers, Paul Szabo - [EMAIL

Re: [Full-Disclosure] What to do with bot networks

2004-12-03 Thread Paul Schmehl
;; some_time) OPTION=1 ;; lots_of_time) OPTION=2 ;; *) echo $"Usage: 0$ {no_time|some_time|lots_of_time}" exit 1 esac Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Fou

[Full-Disclosure] Lycos Ant-spma screensaver

2004-12-02 Thread Paul
Whether it be because of legal or other reasons it would seem the server Lycos used to distribute the list of spammer's servers has been taken off line. Now the screensaver simply displays a "Please Stand By" message and no get requests are sent. = The defaced iamge is attached. Catch

[Full-Disclosure] Re SCO hacking

2004-11-29 Thread Paul
The deface image is attached. one step at a time... Find local movie times and trailers on Yahoo! Movies.<>

Re: [Full-Disclosure] MS Windows Screensaver Privilege Escalation

2004-11-29 Thread Paul Schmehl
uot;automated updates" that she doesn't have to deal with. On a corporate network, that's doable, but at home??? I explained to her why trusting her computer's updates to someone else was a bad thing, but that only made her more knowledgeable, not more happy. :-) Paul

Re: [Full-Disclosure] University Researchers Challenge Bush Win In Florida

2004-11-24 Thread Paul Schmehl
ity in the hands of the county election board for *that very reason*. Might want to study up a bit - political machines from Boss Tweed to Richard Daley have had absolutely *no* problems in getting the ballot to go the way they wanted.... Yes, *before* electronic balloting. Paul Schmehl ([EMAIL

Re: [Full-Disclosure] University Researchers Challenge Bush Win In Florida

2004-11-24 Thread Paul Schmehl
ncing their behavior or outcome couldn't possibly be surmounted. Jason, I'm not making anything complicated. I'm observing the complication that already exists - the complication that you apparently refuse to acknowledge. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Secu

Re: [Full-Disclosure] University Researchers Challenge Bush Win In Florida

2004-11-23 Thread Paul Schmehl
- Original Message - From: "Gregory Gilliss" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Tuesday, November 23, 2004 5:27 PM Subject: Re: [Full-Disclosure] University Researchers Challenge Bush Win In Florida > > But, for heaven's sake, leave Paul

Re: [Full-Disclosure] University Researchers Challenge Bush Win In Florida

2004-11-23 Thread Paul Schmehl
ot;, "Bushie the bozo", etc., etc. Who knew. Jason, you really need to think before posting. You're beginning to look silly. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.ed

[Full-Disclosure] Certifications

2004-11-22 Thread Paul
My thanks to all who replied both on & off-list. Your various points have been noted. Regards = one step at a time... Find local movie times and trailers on Yahoo! Movies. http://au.movies.yahoo.com ___ Full-Disclosure - We believe in it. Chart

Re: [Full-Disclosure] University Researchers Challenge Bush Win InFlorida

2004-11-22 Thread Paul Schmehl
le to act in concert for extended periods of time. Given man's overwhelmingly selfish and greedy nature, it's impossible to think that every single participant in the conspiracy would maintain both their loyalty *and* their silence throughout. Paul Schmehl ([EMAIL PROTECTED]) Adju

RE: [Full-Disclosure] Windows user privileges

2004-11-22 Thread Paul Schmehl
--On Monday, November 22, 2004 07:56:14 PM +0530 Sandeep Singh Rawat <[EMAIL PROTECTED]> wrote: Are we able to run Explorer.exe using runas utility... Of course. You can run any binary using runas. You may have to use absolute paths, but that's a minor inconvenience. Paul Schm

RE: [Full-Disclosure] WiFi question

2004-11-22 Thread Paul Schmehl
ted by it, *if* thats possible. I'm still not convinced that, more than a few feet from a device, the interference would even be detectable. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Memb

[Full-Disclosure] Certificatrions

2004-11-22 Thread Paul
Thanks guys, and thanks for the welcome Benjamin. I figured CISSP would be what to aim for. Unfortunately Cisco cert is covered by the networking major at my college while I'm doing web-design/admin. I guess that means I'm in for plenty of reading beyond the course and plenty of prac pentesting

[Full-Disclosure] Certifications

2004-11-22 Thread Paul
While I gotta agree that experience is what counts, what (if any) specialist certs should a tertiary student, with a special interest in security, use to underpin their prac? P.S. If I'm too ignorant to warrant a civil answer, like being told to go to the movies, my apologies in advance so no flam

Re: [Full-Disclosure] University Researchers Challenge Bush Win In Florida

2004-11-20 Thread Paul Schmehl
--On Friday, November 19, 2004 2:30 PM -0800 Daniel Veditz <[EMAIL PROTECTED]> wrote: Paul Schmehl wrote: Even *if* they are correct (which is at least debateable) the 130,000 vote discrepancy they argue for won't overcome Bush's lead of 380,000, so this is, at best, an acade

Re: [Full-Disclosure] Windows user privileges

2004-11-20 Thread Paul Schmehl
a user who is actually just a "User". Not once, ever. And this is a flaw of the *OS*? Or of the *OEM*? Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu ___

Re: [Full-Disclosure] University Researchers Challenge Bush Win InFlorida

2004-11-20 Thread Paul Schmehl
--On Friday, November 19, 2004 1:15 PM -0600 [EMAIL PROTECTED] wrote: Paul, do you really feel that as long as the (potentially) fraudulent votes did not change the outcome (as far as we know...knowing absolutely nothing for certain at this point) it's perfectly ok that a method for fixing

RE: [in] Re: [Full-Disclosure] IE is just as safe as FireFox

2004-11-20 Thread Paul Schmehl
ubject before you claim expert status and presume to preach to others. While we're lecturing the unwashed, would you mind trimming your replies? Who needs six levels of FD disclaimers? Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at

[Full-Disclosure] Addendum, recent Linux <= 2.4.27 vulnerabilities

2004-11-19 Thread Paul Starzetz
trary location(s) in kernel space. The condition is not easy to exploit since an attacker must trick kmalloc() to sleep on allocation of a special chunk of memory and then convince the scheduler to execute another thread. But it is feasible. Conclusion: update as quick as possible to 2.4.28. - --

Re: [Full-Disclosure] University Researchers Challenge Bush Win In Florida

2004-11-19 Thread Paul Schmehl
Bush's lead of 380,000, so this is, at best, an academic exercise. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu ___ Full-Disclosure - We b

RE: [Full-Disclosure] WiFi question

2004-11-19 Thread Paul Schmehl
--On Thursday, November 18, 2004 09:32:27 AM -0600 Paul Schmehl <[EMAIL PROTECTED]> wrote: --On Wednesday, November 17, 2004 12:41:44 PM -0500 "Lachniet, Mark" <[EMAIL PROTECTED]> wrote: Could also be RF interference. One of my coworkers tracked down a particularly in

[Full-Disclosure] RE: For your pleasure

2004-11-18 Thread Paul Szabo
generated with the cracked version of Sound Forge 4.5. Cheers, Paul Szabo - [EMAIL PROTECTED] http://www.maths.usyd.edu.au:8000/u/psz/ School of Mathematics and Statistics University of Sydney 2006 Australia ___ Full-Disclosure - We believe in it

RE: [Full-Disclosure] WiFi question

2004-11-18 Thread Paul Schmehl
e the same could happen with other interference. Having a common SSID would seem to indicate this is not the problem, but just thought I'd mention it. Thanks for a particularly interesting and potentially useful bit of information, Mark. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information

Re: [Full-Disclosure] question regarding CAN-2004-0930

2004-11-17 Thread Paul Schmehl
When you do an "ls", you are making a call that the *os* has to respond to. The os is *not* vulnerable, so it (properly) rejects the request as malformed. Hopefully that makes more sense to you. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texa

Re: [Full-Disclosure] controversial shadowcrew site hacked by secret service?

2004-11-16 Thread Paul Bauer
http://www.securityfocus.com/news/9866 I have seen nothing stating that this is a spoof. On Tue, Nov 16, 2004 at 04:58:46PM +, n3td3v wrote: > The site which was hosting services, like bombs, fake ID and other > terrorist stuff is now showing a defacement or replacement page > showing wor

Re: [Full-Disclosure] OT: U.S. 2004 Election Fraud.

2004-11-16 Thread Paul Schmehl
erica? No, it was to avoid the dangers of democracy. Why stop the people from leraning? Because this is the wrong forum. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu __

Re: [Full-Disclosure] question regarding CAN-2004-0930

2004-11-16 Thread Paul Schmehl
e through the daemon. In the latter, you were attempting to access a file through a unix utility. The former (smbd) is vulnerable. The latter (ls) apparently is not. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Memb

Re: FW: [Full-Disclosure] OT: U.S. 2004 Election Fraud.

2004-11-16 Thread Paul Schmehl
ontest of interest on the canvass report. Absentee ballots cast totals appear separately at the end of each contest on the canvass report. If you have any questions, please contact the Board of Election\x{2019}s Ballot Department Manager at (216) 443-6454." Paul Schmehl ([EMAIL PROTE

RE: [Full-Disclosure] OT: U.S. 2004 Election Fraud.

2004-11-16 Thread Paul Schmehl
d rejected it. Now people who purport to be "smarter" than the men who founded our nation want to change that system and eliminate the safeguards that have held the nation together for so long. I *reject* that "wisdom". Paul Schmehl ([EMAIL PROTECTED]) Adjunct Informa

Re: [Full-Disclosure] OT: U.S. 2004 Election Fraud.

2004-11-15 Thread Paul Schmehl
;s your point? If you want to understand how the electoral system works, read. Just because you don't understand it doesn't mean it doesn't make sense. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas A

Re: [Full-Disclosure] OT: U.S. 2004 Election Fraud.

2004-11-15 Thread Paul Schmehl
ampaigns do not care a bit about states like Texas where a ten percent swing in one direction or the other simply has no net result. <http://www.sbe.state.va.us/Election/Electoral_College.htm> <http://www.usconstitution.net/consttop_elec.html> <http://www.spies.com/Forums/showthre

Re: [Full-Disclosure] OT: U.S. 2004 Election Fraud.

2004-11-15 Thread Paul Schmehl
s and why it's designed the way that it is. Again, this has nothing to do with security, so stop filling up the list with it. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu

[Full-Disclosure] XP vs 2K

2004-11-14 Thread Paul
Curt, as XP can have its bells & whistles shut down to perform as 2K can, your preference must be security related. Would you be spcefic, or should I just read every advisory again? This perplexes me as M$ at least eventually patch XP while 2K is entering its next life. = one step at a time

Re: [Full-Disclosure] OT: U.S. 2004 Election Fraud.

2004-11-13 Thread Paul Schmehl
me that I don't understand how the system works. The system was designed with "Majority rules" in mind, they just didn't have the resources to implement it properly. Read the Federalist Papers and then come back here with some knowledge. In the meantime, shut up and stop posti

Re: [Full-Disclosure] OT: U.S. 2004 Election Fraud.

2004-11-13 Thread Paul Schmehl
Every person's vote counts the same. Just because you don't comprehend the electoral college doesn't mean that a vote doesn't count. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Membe

[Full-Disclosure] Eudora 6.2 attachment spoof

2004-11-13 Thread Paul Szabo
) MIME parts. Some cases remain un-fixed, as Eudora developers know and admit privately. One such example below. Cheers, Paul Szabo - [EMAIL PROTECTED] http://www.maths.usyd.edu.au:8000/u/psz/ School of Mathematics and Statistics University of Sydney 2006 Australia #!/usr/bin/perl -- use

Re: [Full-Disclosure] Re: U.S. 2004 Election Fraud.

2004-11-12 Thread Paul Schmehl
may not like the results, but no vote counts any more or any less than any other vote. How does that feel? Knowing that someone elses vote is more important than yours? How does it make you feel that you can't even think logically? Can we remove this "discussion" from the list pleas

Re: [Full-Disclosure] Re: Evidence Mounts that the Vote Was Hacked

2004-11-12 Thread Paul Schmehl
tes, would they not? You're going to have to get more specific about what it is you think was possible. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu ___

[Full-Disclosure] Linux ELF loader vulnerabilities

2004-11-10 Thread Paul Starzetz
/isec-0017-binfmt_elf.txt CVE: not assigned Author:Paul Starzetz <[EMAIL PROTECTED]> Date: Nov 10, 2004 Issue: == Numerous bugs have been found in the Linux ELF binary loader while handling setuid binaries. Details: On Unix like systems the execve(2) syste

Re: [Full-Disclosure] MSIE src&name property disclosure

2004-11-08 Thread Paul Schmehl
hater, this pissed me off more than a bit. Never attribute to malice what can be explained by incompetence. Most likely what happened is the left hand (PR) didn't know what the right hand (secure@) was doing. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The Universi

[Full-Disclosure] re; Suslix.B

2004-11-06 Thread Paul
Thanks for the responses.  I wasn't able to take a copy of the malware to send for analysis/identification as I was dealing with the client by phone.  He found the file Jim Duggan named & deleted it in Safe Mode.  AVG now reports the machine as clean.   So, thanks Jim.   P.S.  I did ask the client

[Full-Disclosure] SuslixB

2004-11-05 Thread Paul
I have a client's machine running AVG 6.  AVG reports trojan SuslixB but says it can't deal with it.  I can't find any reference to such a trojan through Google or on any of the major AV sites.  Has anyone heard of it?  If so would you be kind enough to post a url or details?   Regards  one step at

[Full-Disclosure] Re: [ GLSA 200411-01 ] ppp: Remote denial of service vulnerability

2004-11-01 Thread Paul Mackerras
affect any other connection, or prevent new connections from being established. Given that, I don't think that this is even a DoS vulnerability. Paul. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Slightly off-topic: www.georgewbush.com

2004-11-01 Thread Paul Schmehl
m? How ungrateful - now I understand - not. Read OBL's latest proclamation. He dates his desire to take down the WTC towers to 1982. I was being generous by saying "fifteen years". Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN

Re: [Full-Disclosure] OT-POLITICAL: (Was: www.georgewbush.com)

2004-11-01 Thread Paul Schmehl
--On Sunday, October 31, 2004 09:59:55 PM -0600 "J.A. Terranson" <[EMAIL PROTECTED]> wrote: As Nader supporters continually point out, Kerry is a compromised, centrist Democrat, Calling Kerry a centrist Democrat is akin to calling pigs flamingos. You know the rest... Paul

Re: [Full-Disclosure] Slightly off-topic: www.georgewbush.com

2004-11-01 Thread Paul Schmehl
so involved in the corruption. If you can do that successfully, you get to call me stupid. Right now I'll just call you ignorant of the facts. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.

Re: [Full-Disclosure] Slightly off-topic: www.georgewbush.com

2004-10-30 Thread Paul Schmehl
lterated crap to be spewed on this list without responding. All replies to /dev/null. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu ___ Full-Disclosure -

  1   2   3   4   5   6   7   8   >