RE: [Full-Disclosure] makelovenotspam website defaced

2004-11-30 Thread Richard Stevens
Lycos dont seem to mention that many uk providers are moving towards pay per GB broadband.. Do you think they'll pick up the ISP bill for mis-informed end-users?... let alone pick up the legal bills. All seems a bit badly though out. -Original Message- From: [E

RE: [Full-Disclosure] Why is IRC still around?

2004-11-20 Thread Richard Stevens
In the last year or two of subscribing to FD, that is the single most idiotic statement I have ever read. -Original Message- From: [EMAIL PROTECTED] on behalf of Danny Sent: Fri 19/11/2004 17:40 To: Mailing List - Full-Disclosure

RE: [Full-Disclosure] interesting trojan found

2004-10-20 Thread Richard Stevens
Thanks to all that have mailed regarding this malware, I really wasnt expecting such a large response, and have made the file available from the web as it will probably be a day or two before I can reply to any more mails. Thanks for all the suggestions & advice regarding deleting the file. I'

[Full-Disclosure] interesting trojan found

2004-10-20 Thread Richard Stevens
A client had a problem home PC, after removal of all the usual spyware, adware and 6 month old viruses, there remained an unusual process in the process list, logon.exe, which Process Explorer pointed to it being from c:\windows\system32\logon.exe it tries to connect to a singnet ip address

[Full-Disclosure] interesting trojan found

2004-10-20 Thread Richard Stevens
A client had a problem home PC, after removal of all the usual spyware, adware and 6 month old viruses, there remained an unusual process in the process list, logon.exe, which Process Explorer pointed to it being from c:\windows\system32\logon.exe it tries to connect to a singnet ip address o

RE: [Full-Disclosure] Windows Time Synchronization - Best Practices

2004-10-19 Thread Richard Stevens
Why FD? What is the direct security implications of this?   I'm sure someone can construct a rather tenuous link, but really           -Original Message-From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]On Behalf Of Bernardo Santos WernesbackSent: 19 October 2004 16:05T

RE: [Full-Disclosure] (no subject) Why not?

2004-08-13 Thread Richard Stevens
If it is of interest, GFI (www.gfi.com) mail & download security packages offer multiple virus engine scanning (NAI, kaspersky, bitdefender and something else), within one product. Not really that expensive, and sems to work well enough. Regards Richard -Original Message

RE: [Full-Disclosure] Agobot author is a pacifist?

2004-05-18 Thread Richard Stevens
>What do other people think? Other people think things like "why the fuck am I reading this?, I thought I signed up to a computer security list?" Would anyone like a recipe for apple pie while I'm here? Maybe a transcript or a classic fawlty towers episode? yes, I know, and yes I'm going to s

RE: [Full-Disclosure] commerical rainbow crack?

2004-03-22 Thread Richard Stevens
point taken.. interesting site. Thanks Richard -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Mon 22/03/2004 21:56 To: Richard Stevens Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] commerical

RE: [Full-Disclosure] commerical rainbow crack?

2004-03-22 Thread Richard Stevens
thanks to all for the input., looks like john it is, with a little more patience :) out of interest, anyone think a distributed project using john would be useful? something like the SETI screen saver thing... ___ Full-Disclosure - We belie

[Full-Disclosure] commerical rainbow crack?

2004-03-22 Thread Richard Stevens
I have an md5 hash I need to crack, left john the ripper on it for a few days without success and gave up. Are there any commercial organisations that have a huge rainbow crack table (or similar) that anyone knows of?; I have a feeling this may be a very complex password. or even better, someo

RE: [Full-Disclosure] 13 NASA Servers Hacked

2003-12-19 Thread Richard Stevens
the first result on a search on google for '13 nasa servers' yields: http://www.fcw.com/fcw/articles/2003/1215/web-nasa-12-18-03.asp (sarcastic comment ommitted) ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-dis

RE: [Full-Disclosure] Shortcut...... may cause 100% cpu use!!!

2003-10-30 Thread Richard Stevens
THIS "FORMAT C: /U" VULNERABILTY JUST DOS'ED MY WHOLE HDD !! I HAD TO DO IT TWICE AND IT DOESNT WORK SOMETIMES ON ALL PC'S I AM REPORTING TO M$ AND THE FBI AND NASA WHY CANT MICROSOFT FIX THEIR BUGS ??? -Original Message- From: Ricky Blaikie [mailto:[EMAIL PROTECTED] Se

RE: [Full-Disclosure] sql injection question

2003-10-15 Thread Richard Stevens
(Request.Querystring("SOMETHING"), "'", "' '") Byeee ;-) P.S. Excuse me for my english :S -Messaggio originale- Da: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Per conto di Richard Steve

[Full-Disclosure] sql injection question

2003-10-15 Thread Richard Stevens
Quick question for the list, if I may, We have a third party application that we are piloting for using as web store front end. I have no idea on programming sql at all, but have read of some of the sql injection techniques on this list. In the search box on the app, by inserting ' followed b

RE: [Full-Disclosure] Automating patch deployment

2003-08-18 Thread Richard Stevens
I am having major problems with GFI patching.. just keeps crashing out half way through sending patches, dieing midway through scans etc. Having theis at every site I've tried.. anyone having more success with it? -Original Message- From: George Peek [mailto:[EMAIL PROTECTED] Sent: 17

RE: [Full-Disclosure] MS should point windowsupdate.com to 127.0.0.1

2003-08-15 Thread Richard Stevens
1.precisely what do you mean by "requires access to the internet"? 2.does the IIS have to be public..? do other machines need to intiate connections to this one? -Original Message- From: Schmehl, Paul L [mailto:[EMAIL PROTECTED] Sent: 15 August 2003 04:17 To: Jeroen Massar; Tobias

RE: [Full-Disclosure] ISS Security Brief: "MS Blast" MSRPC DCOM Worm Propagation (fwd)

2003-08-14 Thread Richard Stevens
I must be missing something here... xp home & pro both have a "click and forget" firewall? why arent people using it? -Original Message- From: Chris Garrett [mailto:[EMAIL PROTECTED] Sent: Tue 12/08/2003 05:59 To: [EMAIL PROTECTED] Cc:

RE: [Full-Disclosure] ISS Security Brief: "MS Blast" MSRPC DCOM Worm Propagation (fwd)

2003-08-14 Thread Richard Stevens
PROTECTED] Sent: Tue 12/08/2003 12:43 To: [EMAIL PROTECTED] Cc: Subject: Re: [Full-Disclosure] ISS Security Brief: "MS Blast" MSRPC DCOM Worm Propagation (fwd) Richard Stevens: > I must be missing something here... xp

RE: [Full-Disclosure] ISS Security Brief: "MS Blast" MSRPC DCOM Worm Propagation (fwd)

2003-08-14 Thread Richard Stevens
I think it would have had a huge impact.   regards   Richard -Original Message-From: Lan Guy [mailto:[EMAIL PROTECTED]Sent: 12 August 2003 16:21To: Richard Stevens; Chris Garrett; [EMAIL PROTECTED]Subject: Re: [Full-Disclosure] ISS Security Brief: "MS Blast&q

RE: [Full-Disclosure] Re: Reacting to a server compromise

2003-08-04 Thread Richard Stevens
I'd be interested to know if a ghost image (or even hardware systems like image-master) carrys over deleted files to the new image?.. as these can usually be undeleted easily enough. anyone know? I'd guess the safest way is just to keep the orignal drive.. but if it's a nice big expensive scsi ra

RE: [Full-Disclosure] DCOM RPC exploit failed

2003-07-28 Thread Richard Stevens
Has anyone got this working on NT4 systems? ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html