Re: [Full-Disclosure] [ GLSA 200501-46 ] ClamAV: Multiple issues

2005-02-02 Thread Darren Bounds
content, or flat out block it. There's certainly room for improvement, but it's a start. Here is the response from Trend, dated Jan 24th, 2005: Dear Darren, Here is the Official Statement from our Scan Engine Team. 1. Explanation of the vulnerability This vulnerability arise because our products

Re: [Full-Disclosure] ICMP Covert channels question

2005-01-29 Thread Darren Bounds
, be it a TCP SYN-ACK, an ICMP unreachable of some sort or just an ICMP echo reply, it will quite happily find it's way to the internal host whom you spoofed for review. Thanks, Darren Bounds Intrusense LLC. -- Intrusense - Securing Business As Usual On Jan 28, 2005, at 5:45 PM, cyberpixl wrote: I've been

Re: [Full-Disclosure] Multi-vendor AV gateway image inspection bypass vulnerability

2005-01-11 Thread Darren Bounds
imbedded in HTML in this manner. Thank you, Darren Bounds Intrusense, LLC. -- Intrusense - Securing Business As Usual On Jan 11, 2005, at 2:14 PM, Danny wrote: On Mon, 10 Jan 2005 14:08:11 -0500, Darren Bounds [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Multi-vendor AV

[Full-Disclosure] AV security contacts

2005-01-10 Thread Darren Bounds
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, I'm looking for security contact information for the following vendors: - Sophos - Trend - McAfee - Norman - Norton Any assistance would be greatly appreciated. Thank you, Darren Bounds Intrusense, LLc. -BEGIN PGP SIGNATURE

[Full-Disclosure] Multi-vendor AV gateway image inspection bypass vulnerability

2005-01-10 Thread Darren Bounds
. Contributions: Thanks to Scott Roeder and Jacinto Rodriquez their assistance in platform testing. Thank you, Darren Bounds Intrusense, LLC. http://www.intrusense.com - -- Intrusense - Securing Business As Usual -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.4 (Darwin

Re: [Full-Disclosure] Why is IRC still around?

2004-11-21 Thread Darren Reed
. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] Why is IRC still around?

2004-11-19 Thread Darren Wolfe
I have never replied to anything on this list (I read it to keep up to date on vulnerabilities, but im not really qualified to contribute anything) but this particular message has peaked my interest. 1. Agreed, by using flaws in IE they then go on to subvert mirc into spamming people. 2. They

Re: [Full-Disclosure] Re: getting administrator rights on win2003 machine?

2004-10-28 Thread darren windham
If you can't find the tool on your own that can reset the local admin account you need help. I carry it in floppy and cd form with me incase I ever have a server I'm working on that no one knows the passwords to. Learn to use search engines before you start making yourself look silly. On Thu,

Re: [Full-Disclosure] Virus/Trojan trying to connect external:445 and 212.175.149.149.6667

2004-10-22 Thread darren windham
Can you verify if you have any connections making it out to that 212.175.149.149 address? It appears to be a host located in Turkey. I may have already pulled the whois info on this host from ripe.net From looking at the contact info for the host is looks like possibly a broadband provider in

Re: [Full-Disclosure] IRC spying to increase

2004-10-15 Thread Darren Reed
a lot of sense. I don't know if this is the real scope of the research being done, but I'm pretty sure it's at a level deeper than the lets snoop/spy on traffic and see who's doing what. Darren ___ Full-Disclosure - We believe in it. Charter: http

Re: [Full-Disclosure] IRC spying to increase

2004-10-15 Thread Darren Reed
working. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Rootkit For Spyware? Hide your adware from

2004-09-23 Thread Darren Reed
news? One would think you wouldn't first hear about it through spam. It is quite possible to hide processes, reg keys and files, and is often done by various malware. Are they capable of hiding from ps when using the posix shell from Windows Services for Unix ? Darren

Re: [Full-Disclosure] SP2 is killing me. Help?

2004-08-12 Thread Darren Reed
a read of this: http://www.crn.com/sections/breakingnews/breakingnews.jhtml?articleId=23905071 Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Static ARP Replies?

2004-08-06 Thread Darren Bounds
the gateway including local subnet traffic. Easily subverted. Thanks, Darren Bounds, CISSP 443D 628D 0AC7 CACF 6085 C0E0 B2FC 534B 3D9E 69AF - -- Intrusense - Securing Business As Usual On Aug 5, 2004, at 11:15 PM, Dan Taylor, Jr. wrote: I have encountered a few 802.11b public access points (I

Re: [Full-Disclosure] telnet URL type used in exploit

2004-07-21 Thread Darren Reed
I put it on a web page, I got the usual half dozen alerts about do you want to run javascript, etc. that even if I said yes to it didn't work. Did you get that popup box when you tested your script below ? Darren In reply the discussion found at: http://seclists.org/lists/fulldisclosure

Re: [Full-Disclosure] Erasing a hard disk easily

2004-07-16 Thread Darren Reed
In some mail from Gary E. Miller, sie said: Hash: SHA1 Yo Darren! On Thu, 15 Jul 2004, Darren Reed wrote: Have you ever actually used format on Solaris to format a SCSI disk ? Yes, many times. ... If I have been simplifying things a bit much it is because I am not sure how many

Re: [Full-Disclosure] Erasing a hard disk easily

2004-07-15 Thread Darren Reed
In some mail from Gary E. Miller, sie said: On Wed, 14 Jul 2004, Darren Reed wrote: Too bad the pc Unixes don't have a format command like Sun has had for Solaris/SunOStells the hard drive to 'format' and then tests with a number of test patterns. You can not really force a low

Re: [Full-Disclosure] Erasing a hard disk easily

2004-07-14 Thread Darren Reed
Too bad the pc Unixes don't have a format command like Sun has had for Solaris/SunOStells the hard drive to 'format' and then tests with a number of test patterns. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com

Re: [Full-Disclosure] Microsoft hides certain types of files from your eyes + some filename parsing bug

2004-07-08 Thread Darren Reed
could see the CLSID. Maybe it is because I've disabled the Hide extensions for known file types in Explorer's View Folder Options ? Did you try this ? Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure

Re: [Full-Disclosure] shell:windows command question

2004-07-08 Thread Darren Reed
In some mail from Barry Fitzgerald, sie said: Darren Reed wrote: A simple solution would be to add the shell protocol to this list. Personally I think a secure blacklist is hard to maintain as new dangerous external protocols could be invented by third-parties leaving Mozilla vulnerable again

Re: [Full-Disclosure] shell:windows command question

2004-07-08 Thread Darren Reed
their new stuff inside the safe ones. Kind of like how http is declared safe (but is it really??) and so every man and their dog tunnels their proprietary stuff through that because it'll go through firewalls. Darren ___ Full-Disclosure - We believe

Re: [Full-Disclosure] The official Bugtraq Security Drew Copley is a prick poll

2004-07-01 Thread Darren Reed
to nominate them as potential candidates for this ignomious award. Cheers, Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Re: PIX vs CheckPoint; IMHO Netscreen is farsuperior

2004-07-01 Thread Darren Reed
In some mail from Gary E. Miller, sie said: From: Darren Reed [EMAIL PROTECTED] You gotta be more specific than FW-1. FW-1 can run over a large number of OS. You can get FW-1 for WinNT, Solaris, Linux, BSD . Each has the strengths and weaknesses of the underlying OS. Also FW-1 can

Re: [Full-Disclosure] server administration

2004-06-25 Thread Darren Spruell
Mohit Muthanna wrote: I'd suggest you read up on SNMP. And check out the following tools (google them): - net-snmp ( an SNMP agent ) - nagios ( very sophisticated network management tool ) - nmap ( good discovery tool ) - ntop ( traffic analysis, RMON agent, performance monitoring ) - sar ( system

[Full-Disclosure] seeking a security/vuln disclosure list

2004-06-21 Thread Darren Spruell
I'm looking for a mailing list where security-related topics are discussed, something filled with information on vulnerability threats and discussion of those threats and their defenses. Somebody said full-disclosure was such a list, but all I see is a lot of rambling, unrelated bullshit.

Re: [Full-Disclosure] Akamai

2004-06-17 Thread Darren Reed
In some mail from Paul Schmehl, sie said: --On Wednesday, June 16, 2004 11:53:23 AM +1000 Darren Reed [EMAIL PROTECTED] wrote: This is a whole new play ground for organised crime, mostly thanks to Microsoft. You've got millions of PC's around the world that are largely, in one way

Re: [Full-Disclosure] Akamai

2004-06-15 Thread Darren Reed
to be no offering of protection from attack by others. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Pentesting an IDP-System

2004-05-29 Thread Darren Bounds
, Darren Bounds, CISSP 443D 628D 0AC7 CACF 6085 C0E0 B2FC 534B 3D9E 69AF -- Intrusense - Securing Business As Usual On May 29, 2004, at 7:03 AM, ph03n1x wrote: Hello I'm kinda new to this list and this is my first post so be nice to me :) Well I got an Intrusion Detection and Prevention System from

[Full-Disclosure] Re: [0day] Heads up: Possible lsass worm in the wild

2004-04-29 Thread Darren Bounds
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I believe that's actually a new AGOBOT variant. As far as I know it actually exploits the MS PCT vulnerability. It also modifies the HOSTS file to redirect AV vendor addresses to localhost. Thanks, Darren Bounds, CISSP 443D 628D 0AC7 CACF 6085

[Full-Disclosure] IETF Draft - Fix for TCP vulnerability

2004-04-20 Thread Darren Bounds
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt Darren Bounds, CISSP 443D 628D 0AC7 CACF 6085 C0E0 B2FC 534B 3D9E 69AF - -- Intrusense - Securing Business As Usual -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.4 (Darwin

Re: [Full-Disclosure] Decrypting a kerberos master database

2004-03-24 Thread Darren Reed
. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] AIX 4.3.3 has make sgid 0?

2004-03-23 Thread Darren Tucker
... -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69 Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement. ___ Full-Disclosure - We believe

Re: [Full-Disclosure] And how long have buffer overflows been aro

2004-02-27 Thread Darren Reed
Maybe they're referring to Windows NT having a heritage of core design from people who worked on VMS (which does predate the Internet.) In some mail from Ng, Kenneth (US), sie said: What quantum universe is this guy coming from? I don't know the start of the internet, but the date on the

Re: [Full-Disclosure] Windows SP2 firewall: Famous for 3 seconds?

2004-02-25 Thread Darren Reed
bigger significance for IPv6 where ARP messages have been replaced with ICMPv6 messages. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Windows 2000 Source Code

2004-02-22 Thread Darren Reed
that, it would be a seriously naughty thing to do but I can't see that talking about doing it is O:-) Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Windows 2000 Source Code

2004-02-22 Thread Darren Reed
In some mail from Roy M. Silvernail, sie said: On Sun, 2004-02-22 at 09:53, Darren Reed wrote: Make sure there are no finger prints or hairs or dead body cells in/on those CD cases, of course, from those who made them. If you were evil you might try put evidence, in there, that points

RE: [Full-Disclosure] another product affected by recent MS IE '@' patch

2004-02-09 Thread Darren Bennett
RE: the signature on this email. ... additionally, GFI MailSecurity creates a huge spam attachment at the bottom of every message. :) -Darren On Mon, 2004-02-09 at 00:24, David Farinic wrote: martin f krafft [EMAIL PROTECTED] wrote: In Germany, and maybe in other parts of the world, some

Re: [Full-Disclosure] Re: Script Kiddies

2004-02-01 Thread darren
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I think Dan Morrill came pretty close to hitting it on the head. However, I don't believe passion is enough. I've known a number of security professionals who loved what they did but lacked the intelligence and therefore understanding to do anything

[Full-Disclosure] Re: Script Kiddies

2004-01-31 Thread darren
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The only difference between a 'script kiddie' and 90% of the 'security experts' out there are the tools they use. They're both clueless but at least the 'script kiddie' didn't spend $5000 on ISS Hackcamp to learn his techniques. -BEGIN PGP

[Full-Disclosure] ipfilter port to linux

2004-01-28 Thread Darren Reed
, it'd be supporting building a kernel module without requiring /usr/src/linux to be present...but I can hear the screams already telling me why that's such a bad idea :) Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full

Re: [Full-Disclosure] ipfilter port to linux

2004-01-28 Thread Darren Reed
In some mail from Jeremiah Cornelius, sie said: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wednesday 28 January 2004 17:59, Darren Reed wrote: Now if someone wanted a *real* 2.7 feature to add to linux, it'd be supporting building a kernel module without requiring /usr/src/linux

[Full-Disclosure] Re: Forgate

2004-01-26 Thread Darren Bounds
Jonathan- I will officially rename 'Forgate' to '4g8' later this evening. Good luck with Fortinet Inc. and 'Fortigate' for that matter. Regards, Darren Bounds, CISSP Intrusense LLC. http://www.intrusense.com -- Intrusense - Securing Business As Usual On Jan 26, 2004, at 4:02 PM, Jonathan

[Full-Disclosure] Forgate 0.9 Released!

2004-01-23 Thread Darren Bounds
on FreeBSD, and Linux. Regards, Darren Bounds, CISSP Intrusense LLC. http://www.intrusense.com - -- Intrusense - Securing Business As Usual -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.4 (Darwin) iD8DBQFAEW5LsvxTSz2eaa8RArOKAJ9hUaiwVdZkzpOsCd5KwIn3Z1QZ6wCfVN5u nwBDbw8lO9xixcK3H1J+0uc= =pfQ

Re: [Full-Disclosure] Forgate 0.9 Released!

2004-01-23 Thread Darren Bounds
Hi Max, This version offers no additional functionality (in fact it's quite lacking by comparison) but forth coming versions will... :) Darren Bounds, CISSP Intrusense LLC. http://www.intrusense.com -- Intrusense - Securing Business As Usual On Jan 23, 2004, at 4:32 PM, Max Valdez wrote: What

Re: [Full-Disclosure] Re: vulnerabilities of postscript printers

2004-01-23 Thread Darren Reed
To put my comments in perspective, I immersed myself in postscript at a time when level 2 was new and there it not really documented. In some mail from Michael Zimmermann, sie said: At Freitag, 23. Januar 2004 06:01 Darren Reed wrote: First, remember that postscript has been designed

[Full-Disclosure] NetGear VFS/VFM 318 ProSafe Firewall/VPN issue?

2004-01-15 Thread Darren Bennett
? Was is a misconfiguration on my part? -Darren -- --- Darren Bennett - CISSP Sr. Systems Administrator/Manager Science Applications International Corporation Advanced Systems Development and Integration

Re: [Full-Disclosure] Windows 2000 Logout events are not monitored!

2003-11-11 Thread Darren Bennett
Bill, In windows 2k pro it is even 538. Are you talking about win 2k server only? In either case, logout events in win2k pro are broken. If anyone has a fix, I'd be happy to hear about it. -Darren On Mon, 2003-11-10 at 16:44, Bill Royds wrote: The logout even is event number

[Full-Disclosure] Windows 2000 Logout events are not monitored!

2003-11-10 Thread Darren Bennett
Microsoft that is supposed to fix this and the patch didn't work. Anyone else seen this behavior? Any suggestions on how I could record logout events without relying on MS? -Thanks, Darren --- Darren Bennett - CISSP Sr. Systems

Re: [Full-Disclosure] Sniffing ICQ traffic

2003-11-10 Thread Darren Bennett
-- --- Darren Bennett - CISSP Sr. Systems Administrator/Manager Science Applications International Corporation Advanced Systems Development and Integration --- ___ Full-Disclosure - We

Re: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-11-02 Thread Darren Reed
as it is today and as such is at a considerable disadvantage in many ways to more modern mail software programs such as Exchange or postfix or qmail when compared in this manner. Darren ___ Full-Disclosure - We believe in it. Charter: http

[Full-Disclosure] Re: Full-Disclosure digest, Vol 1 #1232 - 32 msgs

2003-10-28 Thread Darren Bounds
Verified. I was successful in changing the password of current user (myself) with an open terminal in focus on the desktop. Darren Bounds Intrusense LLC. http://www.intrusense.com -- Intrusense - Securing Business As Usual Date: Tue, 28 Oct 2003 17:46:41 +0100 From: kang [EMAIL PROTECTED

Re: Linux (in)security (Was: Re: [Full-Disclosure] Re: No Subject)

2003-10-27 Thread Darren Reed
a personal attack. It's more general disbelief about what you said. If you take that as a person attack, then that's your problem. If you get them too often in your inbox directed at yourself, or feel like you do, maybe you should think about what that means. Darren -Original Message- From

Re: Linux (in)security (Was: Re: [Full-Disclosure] Re: No Subject)

2003-10-22 Thread Darren Reed
analogies and just exlpain whatever it is in 'native' terms. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] MS Security Bulletin MS03-043

2003-10-15 Thread Darren Bounds
2003 Microsoft Windows Server 2003 64-bit Edition Further details: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security /bulletin/MS03-043.asp -- Darren Bounds nformation Security Services Intrusense LLC. http://www.intrusense.com -- Intrusense - Securing Business

Re: [Full-Disclosure] Student faces suit over key to CD locks

2003-10-10 Thread Darren Bennett
copy-protection technology. -- --- Darren Bennett - CISSP Sr. Systems Administrator/Manager Science Applications International Corporation Advanced Systems Development and Integration

[Full-Disclosure] Re: [PAPER] Juggling with packets: floating data storage

2003-10-09 Thread Darren Reed
://www.rubberhose.org Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Packit 0.7 Released

2003-10-03 Thread Darren Bounds
, Darren Bounds ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] BugTraq Speed

2003-09-25 Thread Darren Reed
My advice to anyone who gets bounce backs from posting to bugtraq is to save and forward all bounces to the admin contact for the list. I usually get a thank you, they'll be promptly unsubscribed in response. Darren ___ Full-Disclosure - We believe

Re: [Full-Disclosure] openssh remote exploit

2003-09-16 Thread Darren Reed
- the world's most perfect software. And I'm sure this will manage to be another remote exploit that the OpenBSD team will find a way to not count on their front page. Cheers, Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com

Re: [Full-Disclosure] openssh remote exploit

2003-09-16 Thread Darren Reed
today. Others don't and I'm sure there are examples and counter examples to prove either side. My only advice is try not to take criticism of it personally. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure

Re: [Full-Disclosure] openssh remote exploit

2003-09-16 Thread Darren Reed
In some mail from petard, sie said: On Wed, Sep 17, 2003 at 02:41:16AM +1000, Darren Reed wrote: DR: In some mail from [EMAIL PROTECTED], sie said: [Offtopic] Really, must we politicise everything?! It is more informative and equally gender-neutral to state: On timestamp, sender's name

Re: [Full-Disclosure] iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting

2003-09-16 Thread Darren Reed
vulnerability such as this finally be made public. What's news here? I mean setting -S 2 for sadmind (if sadmind is required) has been on the tighten up list (for me at least) for just as long. Darren ___ Full-Disclosure - We believe in it. Charter: http

Re: [Full-Disclosure] new ssh exploit?

2003-09-15 Thread Darren Reed
, I like it :) My $0.02 worth :) Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] ID tags in rental / high-priced retail suits?

2003-09-15 Thread Darren Reed
of incorrect id tag'ing as it'll show up as more than 1 item as it goes through the checkout counter in the store. But unless ID tags can be fab'd on the spot by sales staff as they wrap up the half dozen pieces of fish you've just asked for, barcodes are going to be around for a while yet. Darren

Re: [Full-Disclosure] Symantec wants to criminalize security info sharing

2003-09-12 Thread Darren Reed
an angle for his argument about how this protects children and/or combats terrorism. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-30 Thread Darren Reed
In some mail from [EMAIL PROTECTED], sie said: [...] That's 30 hours I'm not spending helping do network performance tuning [...] You know, I read through that list and saw numerous things that you shouldn't have to do, besides clean up from worms and viruses. If you feel you are so short on

[Full-Disclosure] MS Blaster author / morning_wood misinformed

2003-08-30 Thread darren
$200. Go directly to jail (or at least pay some fines). Darren From: morning_wood [EMAIL PROTECTED] To: Charles Ballowe [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Authorities eye MSBlaster suspect Date: Fri, 29 Aug 2003 09:18:48 -0700 if the worm was active

Re: [Full-Disclosure] GOOD: A legal fix for software flaws?

2003-08-30 Thread Darren Reed
In some mail from Jeremiah Cornelius, sie said: Darren Reed wrote: I, for one, would not cry if the law made it impossible to sell or provide GPL'd software to people because it could not be provieded with a disclaimer. Sooner or later the software industry needs to grow up and take

Re: [Full-Disclosure] GOOD: A legal fix for software flaws?

2003-08-29 Thread Darren Reed
, that is. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] AV feature does more DDoS than Sobig

2003-08-29 Thread Darren Reed
week. How many do your customers get? A small fraction of it is from anti-virus products. I don't reply to any of it and nobody gets it from me. As soon as I've marked a couple of hundred for deletion, more have already arrived. Darren p.s. If you doubt the numbers I'll happily save a sample

Re: [Full-Disclosure] JAP back doored

2003-08-26 Thread Darren Bounds
of cases, they may have slightly less chance. Remember, it takes much less effort to turn a rowboat than it takes to turn an aircraft carrier. Thanks, Darren Bounds Security Consultant Information Security Services Intrusense LLC. -- Intrusense - Securing Business As Usual From

Re: [Full-Disclosure] The Grid, Blaster v. Poor Security Engineering

2003-08-16 Thread Darren Reed
properly isolate failures that cause further problems (overload.) Want to find a root cause? Probably one too many air conditioners being turned on to deal with the heat. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full

RE: [Full-Disclosure] east coast powergrid / SCADA [OT?]

2003-08-15 Thread Darren Bennett
Yes, the five 9's of reliability that MS talks about is more like .9 of the time than 99.999%. Another possibility is that some things WERE on MS and while not connected to the internet directly, were infected via a laptop or other internal system. -Darren On Fri, 2003-08-15 at 12:40

[Full-Disclosure] [0day] DCOM WORM - preface

2003-08-15 Thread darren
for was for you stop being so melodramatic and start posting with something other your usual tiresome blabberings about how RPC DCOM vulnerabilties or XSS cookie theft from ACME-Bed-n-Breakfast.com will be the end of us all. Have a nice weekend, Darren PS: I hope you enjoyed your summer vacation

[Full-Disclosure] ISS Security Brief: MS Blast MSRPC DCOM Worm Propagation (fwd)

2003-08-14 Thread Darren Reed
I don't know if this covers what's already been said about DCOM worms... Forwarded message: From [EMAIL PROTECTED] Tue Aug 12 08:42:31 2003 Message-Id: [EMAIL PROTECTED] To: [EMAIL PROTECTED] From: X-Force [EMAIL PROTECTED] Subject: ISS Security Brief: MS Blast MSRPC DCOM Worm Propagation

RE: [Full-Disclosure] aside: worm vs. worm?

2003-08-14 Thread Darren Bennett
guess we would all need to move to a better platform or a different job :) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Joey Sent: Tuesday, 12 August 2003 9:36 p.m. To: Darren Reed; Andrew J Homan Cc: [EMAIL PROTECTED] Subject: Re

RE: [Full-Disclosure] MS Blast Win2000 Patch Download

2003-08-14 Thread Darren Bennett
PROTECTED] and destroy all electronic and paper copies of this e-mail. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html -- --- Darren Bennett CISSP

Re: [Full-Disclosure] DDoS on the 16th - Fail if no DNS resolution?

2003-08-14 Thread Darren Reed
in Australia, it'll be 7:01am in Seattle on Friday the 15th... Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] MSBLASTER - aka LOVESAN/POZA ?

2003-08-14 Thread Darren Reed
I've seen some people referring to MSBLASTER as LOVESAN and POZA as all being the same thing. Does this make sense to anyone else ? Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] MSBLASTER - aka LOVESAN/POZA ?

2003-08-14 Thread Darren Reed
In some mail from cstone, sie said: On Wed, Aug 13, 2003 at 10:10:20AM +1000, Darren Reed wrote: I've seen some people referring to MSBLASTER as LOVESAN and POZA as all being the same thing. Does this make sense to anyone else ? yes. everyone picks their own name -- this happens

Re: [Full-Disclosure] aside: worm vs. worm?

2003-08-12 Thread Darren Reed
targetted by this worm. They're a large, rich, monopoly of a company. Do they really deserve any nice sympathy at all ? I suspect I'm not alone in these feelings. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full

Re: [Full-Disclosure] Re: Reacting to a server compromise

2003-08-04 Thread Darren Reed
. If you (or anyone else) wants to know more, go get some lessons from a 'big 5' auditing company or similar. Maybe you should give your modem to your mommy, go back to your room and ask your mommy to let you out when you can show the world you've got more to offer than just petty insults. Darren

Re: [Full-Disclosure] How to easily bypass a firewall...

2003-08-01 Thread Darren Reed
the requisite bootup files immutable to prevent trojan'ing and that can make things harder to administer than it is worth the effort. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Settle down there tiger (aka RPC IS DEVASTATING)

2003-07-30 Thread darren
for a little more detail. RPC IS DEVASTATING? That's the best I've heard yet. :) Have a nice day and I look forward to your next XSS vul, Darren PS. You speak English very well considering it's obviously not your native tongue. - - Original Message - From: [EMAIL PROTECTED] To: [EMAIL

[Full-Disclosure] OT but related.

2003-07-29 Thread Darren Reed
evaluation of the two lists is tending towards bugtraq being irrelevant, these days as it becomes more of a vendor-announce list (especially for Linux) than a useful forum to particpate in. Cheers, Darren ___ Full-Disclosure - We believe in it. Charter: http

Re: [Full-Disclosure] Avoiding being a good admin - was DCOMRPCexploit (dcom.c)

2003-07-29 Thread Darren Bennett
in comparison) Would it cost more? Maybe, but doubtful. The cost of DOS/Hacks/downtime coupled with cheaper but incompetent admins is very very high as well. -Darren On Tue, 2003-07-29 at 13:51, Ron DuFresne wrote: On Tue, 29 Jul 2003 [EMAIL PROTECTED] wrote: On Tue, 29 Jul 2003 13:14:49

[Full-Disclosure] NEW windows password encryption flaw..

2003-07-23 Thread Darren Bennett
... -- --- Darren Bennett CISSP, Certified Unix Admin., MCSE, MCSA, MCP +I Sr. Systems Administrator/Manager Science Applications International Corporation Advanced Systems Development and Integration --- ___ Full

[Full-Disclosure] Better Link about windows password flaws..

2003-07-23 Thread Darren Bennett
This link is to a more technical document on the windows password flaws... http://lasecwww.epfl.ch/pub/lasec/doc/Oech03.pdf -- --- Darren Bennett CISSP, Certified Unix Admin., MCSE, MCSA, MCP +I Sr. Systems Administrator/Manager Science Applications

Re: [Full-Disclosure] NEW windows password encryption flaw..

2003-07-23 Thread Darren Bennett
Here is a yahoo story on the same problem... Others seem to think that it is indeed a problem (and one that ONLY affects Windows). http://story.news.yahoo.com/news?tmpl=storycid=620ncid=620e=1u=/nf/20030723/bs_nf/21952On -Darren Wed, 2003-07-23 at 13:24, 3APA3A wrote: Dear

Re: [Full-Disclosure] IIS/Outlook Web Access..

2003-07-22 Thread Darren Bennett
no idea). As Dallas said in her response, while upgrading may seem like a good idea (to exchange 2k+), we too will be using outlook 2003 before upgrading exchange (exchange upgrades in large corporate environments are a nighmare..) -Darren On Mon, 2003-07-21 at 20:45, Jason wrote

[Full-Disclosure] IIS/Outlook Web Access..

2003-07-21 Thread Darren Bennett
. The only current workaround for this issue is to not use Outlook 2003. Anyone else seen this behavior? -- --- Darren Bennett CISSP, Certified Unix Admin., MCSE, MCSA, MCP +I Sr. Systems Administrator/Manager Science Applications International

[Full-Disclosure] Cisco IOS vul patch for packit 0.6.0c

2003-07-18 Thread Darren Bounds
the necessary traffic types: packit -t RAWIP -V 53 -d dst_ip -T ttl packit -t RAWIP -V 55 -d dst_ip -T ttl packit -t RAWIP -V 77 -d dst_ip -T ttl packit -t RAWIP -V 103 -d dst_ip -T ttl Please use it wisely. Thanks, -- Darren Bounds Security Consultant Information Security Services Intrusense Inc

Re: [Full-Disclosure] Odd Behavior - Windows Messenger Service

2003-07-16 Thread Darren Bennett
... donnie ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html -- --- Darren Bennett CISSP, Certified Unix Admin., MCSE, MCSA, MCP +I Sr. Systems

Re: [Full-Disclosure] Re: Java class obfuscation

2003-06-19 Thread Darren Reed
. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] hackers are evil?

2003-06-12 Thread Darren Reed
Why do people continue trying to argue the meaning of hacker ? That 'battle' was lost over 10 years ago. Get over it. A hacker, today, is someone who participates in acts relating to illegal activity with computers, be it phreaking or just cracking. The english language evolves and this is

Re: [Full-Disclosure] Re: USDOJ BRAINWASHING TECHNIQUES

2003-06-11 Thread Darren Reed
citizens. Get smart about what you're doing. Well, first I suppose you need to grow up and mature, then maybe, with time, you'll understand and be able to be smart rather than stupid about what you do to achieve the correct goals. oh and darren, no i wasn't joking about encouraging the young hacker

Re: [Full-Disclosure] USDOJ BRAINWASHING TECHNIQUES

2003-06-10 Thread Darren Reed
just anyone can do it or, rather, that just anyone is expected to do it (e.g Microsoft Windows 2000 and later for home.) Just to leave you with an end teaser, consider what it would mean if software sold could not disclaim fitness for purpose. Darren

Re: [Full-Disclosure] Re: IRCXpro 1.0 - Clear local and default remote admin passwords

2003-06-05 Thread Darren Reed
permission concepts beyond read-only/archive bits. NTFS (NT4, W2K, XP, ...) supports file ownership by users as well as read/write/execute bits. This is something that many *nix advocates are blissuflly unaware of. It's also not often used properly. Darren

Re: [Full-Disclosure] Re: IRCXpro 1.0 - Clear local and default remote admin passwords

2003-06-05 Thread Darren Reed
. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Re: IRCXpro 1.0 - Clear local and default remote admin passwords

2003-06-04 Thread Darren Reed
server passwords. Darren ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

  1   2   >