Re: [Full-disclosure] Hacking in Schools

2014-02-25 Thread Benji
Horse riding around schools won't be allowed, if they wouldn't let me bring a paintball gun in, they won't allow this. On 25 Feb 2014 18:19, Pete Herzog li...@isecom.org wrote: How to teach hacking in school and open up education:

Re: [Full-disclosure] Ektron CMS TakeOver Part (2) - PaylPal-Forward.com demonstration

2014-02-05 Thread Benji
s/with their Facebook or Twitter credentials//g On Tue, Feb 4, 2014 at 10:51 PM, security curmudgeon jeri...@attrition.orgwrote: : From: Mark Litchfield mark () securatary com : As previously stated, I would post an update for Ektron CMS bypassing : the security fix. : A full step by

Re: [Full-disclosure] Serious Yahoo bug discovered. Researchers rewarded with $12.50

2013-10-03 Thread Benji
(infosec) care about is money and not helping the world. On 3 Oct 2013 08:41, Benji m...@b3nji.com wrote: No-one is making you do anything. If you don't feel like helping for free, like in the old days (2 years ago..) then don't Jeeze, I remember when you guys used to moan that a company had

Re: [Full-disclosure] 0day Vulnerability in VLC (this is my first release of the vuln anywhere)

2013-04-23 Thread Benji
I look forward to see who wins in this argument over personal opinion. On Tue, Apr 23, 2013 at 4:12 PM, Gregory Boddin greg...@siwhine.net wrote: You have to think about end-users as well ... Those are impacted first, not the vendors. On 23 April 2013 16:51, Georgi Guninski

Re: [Full-disclosure] VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object Confusion (CVE-2013-2555)

2013-04-22 Thread Benji
, and that a 'QA' process of any type will not make up for developer mistakes. Sent from my iPhone. On 22 Apr 2013, at 07:39, Jeffrey Walton noloa...@gmail.com wrote: On Sat, Apr 20, 2013 at 7:37 PM, Benji m...@b3nji.com wrote: Because security engineers are different to a QA department you originally

Re: [Full-disclosure] VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object Confusion (CVE-2013-2555)

2013-04-20 Thread Benji
Yes, after the people that can make mistakes, we should have people that are incapable of making mistakes. I totally agree, what a good idea. On Sat, Apr 20, 2013 at 10:28 PM, Bryan br...@unhwildhats.com wrote: The code monkeys can make mistakes as long as there is a process to detect and

Re: [Full-disclosure] VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object Confusion (CVE-2013-2555)

2013-04-20 Thread Benji
Let me expand on that, otherwise I'm sure it's unclear. Is your suggestion, to remove the worry of developers making mistakes, to add another human process after it and rely on this to remove all mistakes? On Sat, Apr 20, 2013 at 10:54 PM, Benji m...@b3nji.com wrote: Yes, after the people

Re: [Full-disclosure] VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object Confusion (CVE-2013-2555)

2013-04-20 Thread Benji
their vulnerabilities, more responsible QA testing within the company will prevent many of these vulnerabilities from occurring in the first place. Or do you have a better idea? On Sat, Apr 20, 2013 at 11:06:33PM +0100, Benji wrote: Let me expand on that, otherwise I'm sure it's unclear

Re: [Full-disclosure] VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object Confusion (CVE-2013-2555)

2013-04-20 Thread Benji
(in my opinion) On Sat, Apr 20, 2013 at 11:42 PM, Benji m...@b3nji.com wrote: Yes, a better idea would be to educate and inform developers. At a business level atleast this will a) save extra expenditure on needless staff and extra departments b) result in faster turn arounds as there's

Re: [Full-disclosure] VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object Confusion (CVE-2013-2555)

2013-04-20 Thread Benji
, that involves hiring specialized staff. On Sat, Apr 20, 2013 at 11:49:22PM +0100, Benji wrote: (in my opinion) On Sat, Apr 20, 2013 at 11:42 PM, Benji m...@b3nji.com wrote: Yes, a better idea would be to educate and inform developers. At a business level atleast

Re: [Full-disclosure] VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object Confusion (CVE-2013-2555)

2013-04-20 Thread Benji
to think through each implication of each feature they implement Solution: Hire security engineers to think through each implication. Why are we disagreeing? On Sun, Apr 21, 2013 at 12:11:51AM +0100, Benji wrote: Your proposition was that developers will always make mistakes and introduce

Re: [Full-disclosure] VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object Confusion (CVE-2013-2555)

2013-04-20 Thread Benji
(For example, http://webcache.googleusercontent.com/search?q=cache:2cXGaaHnqyMJ:www.computerworld.com/s/article/9235954/Researchers_find_critical_vulnerabilities_in_Java_7_Update_11+cd=8hl=enct=clnkgl=uk) On Sun, Apr 21, 2013 at 12:37 AM, Benji m...@b3nji.com wrote: Because security engineers

Re: [Full-disclosure] VUPEN Security Research - Adobe Flash Player RTMP Data Processing Object Confusion (CVE-2013-2555)

2013-04-20 Thread Benji
Sorry, by flaws, I should have said, *has not prevent bad code/ineffective patches from being pushed out On Sun, Apr 21, 2013 at 12:41 AM, Benji m...@b3nji.com wrote: (For example, http://webcache.googleusercontent.com/search?q=cache:2cXGaaHnqyMJ:www.computerworld.com/s/article/9235954

Re: [Full-disclosure] Fw: (no subject)

2013-03-29 Thread Benji
LIke the one you just sent? On Fri, Mar 29, 2013 at 1:07 PM, Jerry dePriest jerr...@mc.net wrote: ** wow, another important fucking post that has NOTHING to do WHAT SO EVER with FD. farging hypocrites... I could spend HOURS pointing out the bullshit posts, at least mine has merit. FOAD

Re: [Full-disclosure] Fw: Fw: News Delivery Report (Failure)

2013-03-29 Thread Benji
of hacker script punks thinking FOAD hurhurhur On Fri, Mar 29, 2013 at 1:10 PM, Jerry dePriest jerr...@mc.net wrote: I'll could spend the whole day pointing out stuff that isn't pertinent to this list. at least I have a moral motive, not just a bunch of hacker script punks thinking

Re: [Full-disclosure] Fw: Fw: Fw: Justice for Molly (copskillingcivillians)

2013-03-29 Thread Benji
STOP STRESSING YOUR HEART JERRY, OR THAT OPERATION YOU HAD ON IT WONT SAVE YOU On Fri, Mar 29, 2013 at 4:00 PM, Gage Bystrom themadichi...@gmail.comwrote: Personal habit when it comes to posting on lists that has nothing to do with integrity. On Mar 29, 2013 8:55 AM, Jerry dePriest

Re: [Full-disclosure] Deutsche Post Security Cup 2013

2013-03-20 Thread Benji
I think its getting ridiculous, if you don't have a name in the industry you're getting sued for the vast majority of bugs you solve... And on the other hand, those same companies give away 3-15.000 for a single bug if the researcher happens to be known :| Examples please On Wed, Mar 20, 2013

Re: [Full-disclosure] SANS PHP Port Scanner Remote Code Execution

2013-03-06 Thread Benji
Actually, adding input sanitisation really wouldnt increase the code size that much. Are you just incompetent? On Wed, Mar 6, 2013 at 7:46 AM, Źmicier Januszkiewicz ga...@tut.by wrote: Dear list, Well, I suppose this had to be a proof-of-concept piece of code to demonstrate how port

Re: [Full-disclosure] SANS PHP Port Scanner Remote Code Execution

2013-03-06 Thread Benji
Replace you with they if you want. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Student expelled from Montreal college after finding vulnerability that compromised security of 250, 000

2013-01-27 Thread Benji
Arbitrary moral compass? Amazing. Please, explain the morals behind finding a bug, reporting it, getting a slap on the a wrist, and then running a vuln scanner against the site? If his true intent was to see if it was fixed, I would suggest that he checked it with the finesse, logic and

Re: [Full-disclosure] Student expelled from Montreal college after finding vulnerability that compromised security of 250, 000

2013-01-22 Thread Benji
Someone please explain to me why he had to run a vulnerability scanner to check one vulnerability, and again, how are we still arguing about this? Whether you think he had a 'right' to test this or not, he was either too dumb or too naive to know it was against the law. If anyone would like to

Re: [Full-disclosure] Student expelled from Montreal college after finding vulnerability that compromised security of 250, 000 students personal data

2013-01-21 Thread Benji
He found the vulnerability by running Acunetix against the system. He is what most be would describe as, a class A moron. On Mon, Jan 21, 2013 at 8:43 PM, Frank Bures lisfr...@chem.toronto.eduwrote: A student has been expelled from Montreal’s Dawson College after he discovered a flaw in the

Re: [Full-disclosure] Are software cracks also a form of security vulnerabilities?

2013-01-17 Thread Benji
On Thu, Jan 17, 2013 at 9:20 AM, COPiOUS copi...@hushmail.com wrote: In my opinion they are, since a software crack allows unauthorized use of software and the exposure of (possible) trade secrets How is this possible with a cracked app but not one that isnt cracked?

Re: [Full-disclosure] BF, CSRF, and IAA vulnerabilities in websecurity.com.ua

2013-01-01 Thread Benji
So you would say, that you find the things he posts of interest? Please expand on how and why anti automation bugs in unknown cms's are of interest? On Mon, Dec 31, 2012 at 11:58 PM, some one s3cret.squir...@gmail.comwrote: If you do not like or find of interest what the guy posts is it not

Re: [Full-disclosure] BF, CSRF, and IAA vulnerabilities in websecurity.com.ua

2013-01-01 Thread Benji
posts. Regards On Jan 1, 2013 3:04 PM, Benji m...@b3nji.com wrote: So you would say, that you find the things he posts of interest? Please expand on how and why anti automation bugs in unknown cms's are of interest? On Mon, Dec 31, 2012 at 11:58 PM, some one s3cret.squir...@gmail.comwrote

Re: [Full-disclosure] Selling Exploit on Deep Web

2012-12-21 Thread Benji
in other news, have you heard of the super cool site hacktalk.net where they almost have 1000 members? On Thu, Dec 20, 2012 at 3:13 PM, Luis Santana hackt...@hacktalk.net wrote: Not a single fucking exploit on the entire site. gg sir, gg On Dec 10, 2012, at 2:17 PM, tig3rh...@tormail.org

Re: [Full-disclosure] Selling Exploit on Deep Web

2012-12-21 Thread Benji
l33t', print it out, and then shit on it. Suck my dick. On Fri, Dec 21, 2012 at 10:12 AM, Benji m...@b3nji.com wrote: You say n00bz welcome, where is my assistance and the warm atmosphere to embrace me into the world of script kiddy-ism? Oh, and the obvious literary genius. On Fri, Dec 21

Re: [Full-disclosure] Selling Exploit on Deep Web

2012-12-21 Thread Benji
On Dec 21, 2012, at 3:22 AM, Benji m...@b3nji.com wrote: in other news, have you heard of the super cool site hacktalk.net where they almost have 1000 members? On Thu, Dec 20, 2012 at 3:13 PM, Luis Santana hackt...@hacktalk.netwrote: Not a single fucking exploit on the entire site. gg sir, gg

Re: [Full-disclosure] Selling Exploit on Deep Web

2012-12-21 Thread Benji
but uh, the main page runs SMF not WeBid so I'm not really too sure where you pulled that from. Good job though, maybe santa will give you some of his cookies for your effort. On Dec 21, 2012, at 5:26 AM, Benji m...@b3nji.com wrote: Also genius, I know you're quick to kick things down because you

Re: [Full-disclosure] Google's robots.txt handling

2012-12-11 Thread Benji
What we need is a robots2.txt that defines what users are allowed to access the robots.txt file. Problem solved. On Mon, Dec 10, 2012 at 11:33 PM, Gynvael Coldwind gynv...@coldwind.plwrote: Hey, Here is an example: An admin has a public webservice running with folders containing

Re: [Full-disclosure] linux rootkit in combination with nginx

2012-11-27 Thread Benji
Yup, this is most likely. Sent from my iPhone On 27 Nov 2012, at 15:41, Gregor S. rc4...@googlemail.com wrote: More interesting than the rootkit itself is how it found it's way into the box. Chances are that Squeeze has a non-disclosed 0day, and that's worring me a bit... On Mon,

Re: [Full-disclosure] Remote Command Execution on Cisco WAG120N

2012-11-26 Thread Benji
Command execution through Dynamic DNS setup is quite clearly not expected functionality. On Mon, Nov 26, 2012 at 11:28 AM, Gary Driggs gdri...@gmail.com wrote: On Nov 26, 2012, at 1:47 AM, Julius Kivimäki julius.kivim...@gmail.com wrote: Is a privilege escalation vulnerability in Linux not

Re: [Full-disclosure] phpmyadmin compromised?

2012-11-19 Thread Benji
.. coul On Mon, Nov 19, 2012 at 4:45 PM, Lucio Crusca lu...@sulweb.org wrote: Hello *, I've setup my browser to remember login password at my server phpmyadmin login page. It usually fills the two fields correctly, but today it showed this crap instead:

Re: [Full-disclosure] phpmyadmin compromised?

2012-11-19 Thread Benji
.. could you have provided any less information? why dont you look through your code instead of emailing a screenshot to a mailing list? really? On Mon, Nov 19, 2012 at 4:47 PM, Benji m...@b3nji.com wrote: .. coul On Mon, Nov 19, 2012 at 4:45 PM, Lucio Crusca lu...@sulweb.org wrote: Hello

Re: [Full-disclosure] Skype account + IM history hijack vulnerability

2012-11-15 Thread Benji
. Sorry for not knowing non-industry terms used by 1% of the populous you hipster. Sent from my iPhone On 15 Nov 2012, at 03:45, Nick FitzGerald n...@virus-l.demon.co.uk wrote: Benji wrote: Oracle attacks? See into the future? Padding oracle attacks? Oracle SQL injections? You noobs

Re: [Full-disclosure] Skype account + IM history hijack vulnerability

2012-11-15 Thread Benji
: Benji wrote: Oracle attacks? See into the future? Padding oracle attacks? Oracle SQL injections? You noobs... http://www.drdobbs.com/understanding-oracle-attacks-on-informat/184405917 (Don't get too tied up in the crypto stuff in that article.) klondike's point

Re: [Full-disclosure] Skype account + IM history hijack vulnerability

2012-11-15 Thread Benji
companies. Sent from my iPhone On 15 Nov 2012, at 18:59, klondike klond...@klondike.es wrote: El 15/11/12 09:47, Benji escribió: Sometimes when people argue over the definition of '0day', it is important to be clear. I never called my attack a 0-day, did I? Although the bash script made it clear

Re: [Full-disclosure] Skype account + IM history hijack vulnerability

2012-11-15 Thread Benji
, klondike klond...@klondike.es wrote: El 15/11/12 09:47, Benji escribió: Sometimes when people argue over the definition of '0day', it is important to be clear. I never called my attack a 0-day, did I? Although the bash script made it clear, I have never ever seen someone call 'user enumeration

Re: [Full-disclosure] Skype account + IM history hijack vulnerability

2012-11-14 Thread Benji
This has nothing to do with the client. The service is at fault. Also for the record, r/netsec is a huge circlejerk. On Wed, Nov 14, 2012 at 10:20 AM, Kirils Solovjovs kirils.solovj...@kirils.com wrote: The team has worked around this and are now trying to fix the bug/feature. :)

Re: [Full-disclosure] 0-day vulnerabilities in Call of Duty MW3 and CryEngine 3

2012-11-14 Thread Benji
0-day means it is being actively used in the wild. No it does not. On Wed, Nov 14, 2012 at 2:52 PM, Christian Sciberras uuf6...@gmail.comwrote: 0-day means it is being actively used in the wild. Is this the case? Chris. On Wed, Nov 14, 2012 at 10:52 AM, ReVuln i...@revuln.com wrote:

Re: [Full-disclosure] Skype account + IM history hijack vulnerability

2012-11-14 Thread Benji
Oracle attacks? See into the future? Padding oracle attacks? Oracle SQL injections? On Wed, Nov 14, 2012 at 3:44 PM, klondike klond...@klondike.es wrote: El 14/11/12 11:20, Kirils Solovjovs escribió: The team has worked around this and are now trying to fix the bug/feature. :)

Re: [Full-disclosure] TTY handling when executing code in lower-privileged context (su, virt containers)

2012-11-10 Thread Benji
This is why I find the standard security mantra of disable root logins and use su / sudo to be extremely silly. I think you've taken that far too literaly. My understanding of it is to protect against a) brute force retardation b) dumb attackers. Noone said it's supposed to completely protect

Re: [Full-disclosure] TTY handling when executing code in lower-privileged context (su, virt containers)

2012-11-10 Thread Benji
The advice weakens your system from a local perspective granted, but if an attacker has a local user on your box already, it's already game over. Yes, if you were a user with intelligence. I must've forgot that everyone that uses a computer does so with sense. On Sat, Nov 10, 2012 at 6:30 PM,

Re: [Full-disclosure] TTY handling when executing code in lower-privileged context (su, virt containers)

2012-11-10 Thread Benji
from the lowest denominator up, not top down. On Sat, Nov 10, 2012 at 6:49 PM, Benji m...@b3nji.com wrote: The advice weakens your system from a local perspective granted, but if an attacker has a local user on your box already, it's already game over. Yes, if you were a user with intelligence

Re: [Full-disclosure] vOlk Botnet Framework v4.0 - Multiple Web Vulnerabilities

2012-10-21 Thread Benji
also while we're at it can you please remove all references to common sense and logic in any emails that are in the full disclosure archive. wait... On Sun, Oct 21, 2012 at 2:09 PM, ZeroDay.JP unixfreaxj...@gmail.com wrote: Full Disclosure Maillist Admin, please kindly delete the posted email of

Re: [Full-disclosure] Paypal BugBounty #9 - Persistent Web Vulnerabilities

2012-10-02 Thread Benji
.. On Tue, Oct 2, 2012 at 6:40 AM, Vulnerability Lab resea...@vulnerability-lab.com wrote: Title: == Paypal BugBounty #9 - Persistent Web Vulnerabilities Date: = 2012-10-02 References: === http://www.vulnerability-lab.com/get_content.php?id=646

Re: [Full-disclosure] Cookie stealing and XSS vulnerable in Zenphoto version 1.4.3.2

2012-10-02 Thread Benji
Why did you report this to UKCERT? On Tue, Oct 2, 2012 at 7:16 AM, Scott Herbert scott.a.herb...@googlemail.com wrote: - Affected products: - Product : Zenphoto 1.4.3.2 (and maybe older) fixed in 1.4.3.3 Affected function:

Re: [Full-disclosure] samba exploit - remote root colonel 0day

2012-09-25 Thread Benji
Dear genius I believe the point was to not give credit lot of love, captain obvious On Mon, Sep 24, 2012 at 4:04 PM, Julius Kivimäki julius.kivim...@gmail.com wrote: {*} samba 3.x remote root by bla...@fail0verflow.com {*} Give some credit to the guy who actually made this. 2012/9/24

Re: [Full-disclosure] [HTTPCS] FreeWebshop 'Text' Remote SQL Injection Vulnerability

2012-09-17 Thread Benji
you seem surprised by the level of idiocy, are you new to this list? On Mon, Sep 17, 2012 at 2:42 PM, Julius Kivimäki julius.kivim...@gmail.com wrote: Did you guys seriously just send five different advisories on five different vulnerable parameters on one vulnerable script? 2012/9/17 HTTPCS

Re: [Full-disclosure] Adobe Flash UpdateInstalls Other Warez without Consent

2012-09-08 Thread Benji
Christian, are you suggesting the people from itsecuritypros.org are infact, idiots?! On Sat, Sep 8, 2012 at 12:02 PM, Christian Sciberras uuf6...@gmail.com wrote: His initial email doesn't make him look like a newb? Really? Quoting: It appears Adobe has become a whore to Google like Mozilla.

Re: [Full-disclosure] Adobe Flash Update Installs Other Warez without Consent

2012-09-08 Thread Benji
Explorer and IE vulnerabilities. Plus, I'm not trying to feed Google any more data through their back channels by using their browser. is that why you use gmail? On Sat, Sep 8, 2012 at 10:14 PM, Jeffrey Walton noloa...@gmail.com wrote: Hi Chrisitan, [Corrected Title] I'll feed you one

Re: [Full-disclosure] Adobe Flash Update Installs Other Warez without Consent

2012-09-08 Thread Benji
. On Sat, Sep 8, 2012 at 5:18 PM, Benji m...@b3nji.com wrote: Explorer and IE vulnerabilities. Plus, I'm not trying to feed Google any more data through their back channels by using their browser. is that why you use gmail? On Sat, Sep 8, 2012 at 10:14 PM, Jeffrey Walton noloa...@gmail.com

Re: [Full-disclosure] Splunk Vulnerability

2012-09-06 Thread Benji
well Im glad we got multiple emails saying you all agree,. On Thu, Sep 6, 2012 at 8:50 AM, Michael D. Wood m...@itsecuritypros.org wrote: I agree. Splunk *IS* doing what it was designed to do. -- Michael D. Wood ITSecurityPros.org www.itsecuritypros.org From: JxT

Re: [Full-disclosure] Printer in the DMZ

2012-08-27 Thread Benji
this list is and it's many failings, then I think I have succeeded. Stay classy, keep fighting whatever fight you're fighting. On Mon, Aug 27, 2012 at 5:45 PM, Igor Igor unclyi...@gmail.com wrote: Robots.txt not supported in any printer.. too bad, all listed in all major search engine Benji

Re: [Full-disclosure] ZDI-12-149 : Cisco AnyConnect VPN Client Verification Bypass Remote Code Execution Vulnerability

2012-08-22 Thread Benji
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. sorry, what? On Wed, Aug 22, 2012 at 4:48 PM, ZDI Disclosures zdi-disclosu...@tippingpoint.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ZDI-12-149

Re: [Full-disclosure] WTB: CIK and Fortezza card

2012-08-13 Thread Benji
but with bowling 4 crypto as email, natural and logical 2 assume u plan big crypto massacre, how many innocent bits will we lose this time? On Sat, Aug 11, 2012 at 8:07 PM, Hambone Turkey bowling4cry...@gmail.com wrote: So I know FD isn't Craigslist but I figured its my best bet. I am looking

Re: [Full-disclosure] The Android Superuser App

2012-08-13 Thread Benji
Ok. On Mon, Aug 13, 2012 at 2:28 PM, Jann Horn jannh...@googlemail.com wrote: On Sun, Aug 12, 2012 at 09:47:57PM +0200, Jann Horn wrote: And finally, I've found another vuln that essentially lets apps gain root rights without asking the user, and I will release all details about it in two

Re: [Full-disclosure] Hacker Highschool v2

2012-08-09 Thread Benji
ah fantastic, a lesson on trolling and bullying. what a valuable service you are providing. On Thu, Aug 9, 2012 at 8:19 PM, Pete Herzog p...@isecom.org wrote: Hi, Version 2 of Hacker Highschool (www.hackerhighschool.org) is wrapping up. We will begin publishing/replacing each lesson as we

Re: [Full-disclosure] AxMan ActiveX fuzzing == Memory Corruption PoC

2012-07-30 Thread Benji
wait, this was a serious email? not like this bro, not like this. On Sun, Jul 29, 2012 at 11:08 PM, kaveh ghaemmaghami kavehghaemmagh...@googlemail.com wrote: I think ur on vacation now aren't u Plus nobody ask u to read my post and i am not interested about ur opinion keep it for yourself

Re: [Full-disclosure] [Anonymous/iWot] Somaleaks !!!

2012-07-19 Thread Benji
LOL @ script kiddie == terrorist By that logic, public urination is an act of arson. Both acts are petty and at best deserve to face a firing squad at dawn. On Thu, Jul 19, 2012 at 2:53 PM, valdis.kletni...@vt.edu wrote: On Wed, 18 Jul 2012 09:16:29 -0400, Abdikarim Roble said: As some of

Re: [Full-disclosure] Linux - Indicators of compromise

2012-07-16 Thread Benji
All compromised systems talk to the Internet to dump data or route spam. yup, this is 1000% true and utterly foolproof. On Mon, Jul 16, 2012 at 2:48 PM, Gary Baribault g...@baribault.net wrote: I suggest one of the first answers was the good one, intercept the traffic routed to the internet

Re: [Full-disclosure] Linux - Indicators of compromise

2012-07-16 Thread Benji
SO you're talking about making a baseline? On Mon, Jul 16, 2012 at 7:52 PM, Ali Varshovi ali.varsh...@hotmail.com wrote: Hello everybody and thank you for your useful comments. Now I'm thinking that we need a comparison base or normal behavior profile to be able to detect any deviations or

Re: [Full-disclosure] Predefined Post Authentication Session ID Vulnerability

2012-07-13 Thread Benji
Yes, god Jann, you're such a moron. On Fri, Jul 13, 2012 at 9:46 AM, Gokhan Muharremoglu gokhan.muharremo...@iosec.org wrote: You can find an example page and combined vulnerabilities below URL. This example login page is affected by Predefined Post Authentication Session ID Vulnerability.

Re: [Full-disclosure] Predefined Post Authentication Session ID Vulnerability

2012-07-13 Thread Benji
x On Thu, Jul 12, 2012 at 2:15 PM, generic...@hushmail.com wrote: Benji, Do you write anything but scathing criticism? I've never seen you contribute anything of use to this list. You must be a real pleasure in person. Sent

Re: [Full-disclosure] Predefined Post Authentication Session ID Vulnerability

2012-07-13 Thread Benji
around. Come to Europe, we show you how to party@#! On Fri, Jul 13, 2012 at 3:10 PM, Григорий Братислава musntl...@gmail.com wrote: On Thu, Jul 12, 2012 at 9:15 AM, generic...@hushmail.com wrote: Benji, Do you write anything but scathing criticism? I've never seen you contribute anything

Re: [Full-disclosure] Predefined Post Authentication Session ID Vulnerability

2012-07-13 Thread Benji
Yes but you live in cave x On Fri, Jul 13, 2012 at 3:56 PM, Григорий Братислава musntl...@gmail.com wrote: On Fri, Jul 13, 2012 at 10:44 AM, Benji m...@b3nji.com wrote: Come to Europe, we show you how to party@#! Is that is what Greeks and Spaniards call this behaviour? Is funny, to me

Re: [Full-disclosure] Predefined Post Authentication Session ID Vulnerability

2012-07-12 Thread Benji
Ah, please send more emails explaining the faults of retarded programmers and serious vulnerabilities, and then link to an owasp page. Can you explain HTTPOnly cookies to me? I will only accept your explanation if you can justify an impact of Critical, a likelihood of High and a severity of High?

Re: [Full-disclosure] Predefined Post Authentication Session ID Vulnerability

2012-07-11 Thread Benji
I have no words, just shock. On Wed, Jul 11, 2012 at 9:34 AM, Gokhan Muharremoglu gokhan.muharremo...@iosec.org wrote: Vulnerability Name: Predefined Post Authentication Session ID Vulnerability Type: Improper Session Handling Impact: Session Hijacking Level: Medium Date: 10.07.2012 Vendor:

Re: [Full-disclosure] IOSEC HTTP Anti Flood/DoS Security Gateway Module (PHP Script)

2012-07-11 Thread Benji
Just read this crap due to your amazing emails. Crap code, easily bypassable. On Wed, Jul 11, 2012 at 9:37 AM, Gokhan Muharremoglu gokhan.muharremo...@iosec.org wrote: http://sourceforge.net/projects/iosec/ This module provides security enhancements against (HTTP) Flood Brute Force Attacks

Re: [Full-disclosure] Basilic RCE bug

2012-07-06 Thread Benji
Thank you for confirming that, and providing an even sup3r c00ler POC. I have always wondered how nc works, and combined with system, it seems it makes a super exciting vulnerability. On Fri, Jul 6, 2012 at 5:32 PM, larry Cashdollar lar...@me.com wrote: verified,

Re: [Full-disclosure] [oss-security] RE: GIMP FIT File Format DoS

2012-07-02 Thread Benji
hey! let them having something to add to CV! Stop be fun police! Everyone know security isnt actually about security, just make CV look super cool. On Fri, Jun 29, 2012 at 10:45 PM, Morris, Patrick patrick.mor...@hp.com wrote: -Original Message- From: Joseph Sheridan

Re: [Full-disclosure] WordPress Authenticated File Upload Authorisation Bypass

2012-06-21 Thread Benji
I hear Trustwave are reporting similar issues, like the fact you can specify remote mysql servers in new installations, amazing right? Do you work for them? Btw, with phpmyadmin you can injection sql commands !!! On Fri, Jun 22, 2012 at 12:00 AM, Denis Andzakovic

Re: [Full-disclosure] Obama Order Sped Up Wave of Cyberattacks Against Iran

2012-06-10 Thread Benji
Which antisec kids? Unfortunately due to some poeple being utterly delued, such as yourself, throwing that word around it's rather ambiguous now. On Sun, Jun 10, 2012 at 10:49 PM, Laurelai laure...@oneechan.org wrote: On 6/10/12 5:09 PM, Thor (Hammer of God) wrote: OK, I’ll bite this one

Re: [Full-disclosure] Obama Order Sped Up Wave of Cyberattacks Against Iran

2012-06-10 Thread Benji
You're the one that suggested a real suggestion would be to use an 'alternate os'. Live in a cave please? On Sun, Jun 10, 2012 at 10:56 PM, Laurelai laure...@oneechan.org wrote: On 6/10/12 5:54 PM, Benji wrote: Which antisec kids? Unfortunately due to some poeple being utterly delued

Re: [Full-disclosure] [OT] New online service to make XSSs easier

2012-05-07 Thread Benji
People using this service definitely wont be up to anything clever or interesting, so it's barely a concern. I mean really, this is useful? On Mon, May 7, 2012 at 4:17 PM, Gage Bystrom themadichi...@gmail.com wrote: Anyone visiting a compromised site can get the hash, meaning anyone who is

Re: [Full-disclosure] IAA, Redirector and XSS vulnerabilities in WordPress

2012-05-05 Thread Benji
Wow, yiou're like the jehovahs witnessess of the internet. Stop with the childish bitching and grow up. Last time I checked intern0t was also a script kid breeding ground. On Sat, May 5, 2012 at 2:54 PM, InterN0T Advisories advisor...@intern0t.net wrote: Hi List, To stop MustLive's desperate

Re: [Full-disclosure] Vulnerability in Gentoo hardened

2012-04-25 Thread Benji
: On 4/25/12 4:48 AM, Benji wrote: except it was rather obvious why. On Wed, Apr 25, 2012 at 10:27 AM, Laurelailaure...@oneechan.org  wrote: On 4/25/12 3:56 AM, Georgi Guninski wrote: On Tue, Apr 24, 2012 at 12:15:26PM -0400, valdis.kletni...@vt.edu wrote: On Tue, 24 Apr 2012 17:36:55 +0200

Re: [Full-disclosure] Vulnerability in Gentoo hardened

2012-04-25 Thread Benji
And choosing to believe any of the other reasons when you think you're an '1337 hacker' and are involved in that world, is a personality problem, end of. On Wed, Apr 25, 2012 at 10:58 AM, Laurelai laure...@oneechan.org wrote: On 4/25/12 4:54 AM, Benji wrote: No, with open eyes sight. If you

Re: [Full-disclosure] Vulnerability in Gentoo hardened

2012-04-25 Thread Benji
You should be paranoid if someone could construe what you're doing as illegal. On Wed, Apr 25, 2012 at 11:07 AM, Laurelai laure...@oneechan.org wrote: On 4/25/12 4:59 AM, Benji wrote: And choosing to believe any of the other reasons when you think you're an '1337 hacker' and are involved

Re: [Full-disclosure] Vulnerability in Gentoo hardened

2012-04-25 Thread Benji
except it was rather obvious why. On Wed, Apr 25, 2012 at 10:27 AM, Laurelai laure...@oneechan.org wrote: On 4/25/12 3:56 AM, Georgi Guninski wrote: On Tue, Apr 24, 2012 at 12:15:26PM -0400, valdis.kletni...@vt.edu wrote: On Tue, 24 Apr 2012 17:36:55 +0200, Milan Berger said: if you read his

Re: [Full-disclosure] Erronous post concerning Backtrack 5 R2 0day

2012-04-12 Thread Benji
in soviet russia, lesson teaches you. in west, no lesson learnt by anyone. On Thu, Apr 12, 2012 at 9:51 PM, Adam Behnke a...@infosecinstitute.com wrote: Yesterday I made a post concerning a 0day advisory in Backtrack 5 R2: http://seclists.org/fulldisclosure/2012/Apr/123 The posting was

Re: [Full-disclosure] Compromised VPN provider out there?

2012-04-10 Thread Benji
How came im not surprised that public proxies are being abused for brute force attacks? You're just that far ahead of the curve? On Tue, Apr 10, 2012 at 5:17 AM, n...@myproxylists.com wrote: Hi To any security-aware VPN providers out there reading this: More than 800 hosts (mostly from

Re: [Full-disclosure] Cookie based SQL Injection

2012-03-06 Thread Benji
Yes, because this is incredibly new. On Tue, Mar 6, 2012 at 8:54 PM, Zach C. fxc...@gmail.com wrote: Even so, watch all the advisories pour in now for cookie-based SQL injection. :/ On Mar 6, 2012 12:44 PM, valdis.kletni...@vt.edu wrote: On Tue, 06 Mar 2012 14:28:51 CST, Adam Behnke said:

Re: [Full-disclosure] PHP Gift Registry 1.5.5 SQL Injection

2012-02-24 Thread Benji
plz to tell me how long you left cluster fuzzer running to find this hole size of a pin? On Fri, Feb 24, 2012 at 3:08 PM, Thomas Richards g13...@gmail.com wrote: # Exploit Title: PHP Gift Registry 1.5.5 SQL Injection # Date: 02/22/12 # Author: G13 # Software Link:

Re: [Full-disclosure] Analysis of the r00t 4 LFI Toolkit

2012-02-20 Thread Benji
A priv8 php shell, funniest thing I've ever heard on this list. On Mon, Feb 20, 2012 at 1:37 PM, Gage Bystrom themadichi...@gmail.comwrote: Uhh no, you misread what he said. He's saying he's seen that code in a few php shells that were supposedly meant to be private but the authors were

Re: [Full-disclosure] TWSL2012-002: Multiple Vulnerabilities in WordPress

2012-01-25 Thread Benji
Dear full-disclosure I wrote to you to tell you about serious serious vulnerability in all Windows versions. If you turn machine on before system is configured, then you be able to set user password yourself, big gaping hole I make big large botnet to fully utilise this impressive

Re: [Full-disclosure] TWSL2012-002: Multiple Vulnerabilities in WordPress

2012-01-25 Thread Benji
:11 PM, Julius Kivimäki julius.kivim...@gmail.comwrote: Funny but no, this does not need a non-installed wordpress. 2012/1/25 Benji m...@b3nji.com Dear full-disclosure I wrote to you to tell you about serious serious vulnerability in all Windows versions. If you turn machine on before

Re: [Full-disclosure] Google open redirect

2011-12-08 Thread Benji
Sorry, you think people should be making a living off reporting open redirect disclosure? On Thu, Dec 8, 2011 at 2:53 PM, Charles Morris cmor...@cs.odu.edu wrote: Michal/Google, IMHO, 500$ is an incredibly minute amount to give even for a error message information disclosure/an open

Re: [Full-disclosure] Google open redirect

2011-12-08 Thread Benji
the money for issues that they claim to offer for issues is not only dishonest but it is discouraging to beginning researchers. I've personally seen it happen. On Thu, Dec 8, 2011 at 9:57 AM, Benji m...@b3nji.com wrote: Sorry, you think people should be making a living off reporting open

Re: [Full-disclosure] Large password list

2011-12-01 Thread Benji
Which country is UNIQPASS registered as a tm? On Fri, Dec 2, 2011 at 1:47 AM, adam a...@papsy.net wrote: - reduce abuse The concerning part is that you're serious. Tell me, how does someone paying for a list of STOLEN passwords reduce abuse? This email, your obsession with LulzSec and the

Re: [Full-disclosure] Ubuntu 11.10 now unsecure by default

2011-11-21 Thread Benji
Oh thank god, this thread has now become a case of 'look how big my penis will be in x amount of months'. On Mon, Nov 21, 2011 at 12:24 PM, Darren Martyn d.martyn.fulldisclos...@gmail.com wrote: Jason has a good point. Now to make a simple statement - I am not (nor was I) agreeing with the

Re: [Full-disclosure] vTiger CRM 5.2.x = Remote Code Execution Vulnerability

2011-10-06 Thread Benji
and where in vTiger is this manipulatable from? On Wed, Oct 5, 2011 at 11:02 AM, YGN Ethical Hacker Group li...@yehg.netwrote: vTiger CRM 5.2.x = Remote Code Execution Vulnerability 1. OVERVIEW The vTiger CRM 5.2.1 and lower versions are vulnerable to Remote Code Execution. No fixed

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-29 Thread Benji
Im sorry, why is it 'worrying' that a vpn provider that was a UK business and was located in the UK, is subject to UK law? On Thu, Sep 29, 2011 at 9:51 AM, Darren Martyn d.martyn.fulldisclos...@gmail.com wrote: Again, I hope this does not fail to send. The reasoning behind the Pure Elite

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-29 Thread Benji
, cheers, xd On 29 September 2011 22:45, Benji m...@b3nji.com wrote: Im sorry, why is it 'worrying' that a vpn provider that was a UK business and was located in the UK, is subject to UK law? On Thu, Sep 29, 2011 at 9:51 AM, Darren Martyn d.martyn.fulldisclos...@gmail.com wrote: Again, I

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-29 Thread Benji
methods, defeat simple plans benji. xd On 29 September 2011 22:53, Benji m...@b3nji.com wrote: Yes they do. If you buy a server in America for example, even if you are located in Russia, they are required by federal law to hand over your details wherever you may reside. I dont know where

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-29 Thread Benji
, Benji said: Just because something is advertised as 'anonymous' doesnt mean it's 'so anonymous you can break the law' and anyone using a EU/US-related country to do this is either stupid or naive. There's also those servers that advertise anonymous and likely to stay that way because

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-29 Thread Benji
not shat themself, then it would be a non story. On 29 September 2011 23:00, Benji m...@b3nji.com wrote: 'Abuse' emails and court orders are very different. On Thu, Sep 29, 2011 at 1:59 PM, xD 0x41 sec...@gmail.com wrote: err, you are limited in those countries dude... id really checkup

Re: [Full-disclosure] Twitter URL spoofing still exploitable

2011-09-27 Thread Benji
If you hover over the t.co links the alt= tag holds the real url. On Tue, Sep 27, 2011 at 4:11 PM, dave bl db.pub.m...@gmail.com wrote: On 28 September 2011 01:00, Mario Vilas mvi...@gmail.com wrote: On Tue, Sep 27, 2011 at 3:26 PM, Dan Kaminsky d...@doxpara.com wrote: Ok, now nobody can

Re: [Full-disclosure] INSECT Pro - Free tool for penetration security testing

2011-08-24 Thread Benji
How can a product on version 2.6.1 be described as 'new' ? On Wed, Aug 24, 2011 at 12:04 AM, Juan Sacco jsa...@insecurityresearch.comwrote: INSECT Pro is a new free tool for Penetration Testing and the ultimate resource to demonstrate the security or vulnerability of your network. INSECT Pro

Re: [Full-disclosure] [MOHSEP] Month Of Humorous Stefan Esser Photoshops - 0x06

2011-08-09 Thread Benji
Let's not be ridiculous Heck, at this point you even topped MustLive's stuff in uselessness On Tue, Aug 9, 2011 at 7:24 AM, Christian Sciberras uuf6...@gmail.comwrote: OK, let's take this in parts; 1. Here's a little secret. Life sucks no matter how you look at it. Now go cry in a corner,

  1   2   3   >