Re: [Full-disclosure] Obama Order Sped Up Wave of Cyberattacks

2012-06-09 Thread John Doe
On Fri, Jun 8, 2012 at 1:58 PM, Laurelai laure...@oneechan.org wrote: And that brings us back to what are we going to do about the US Gov laying down in the same mud as the bad guys Good and bad are just points of view, mostly of whether YOU benefit or not. Ian Hayes cthulhucall...@gmail.com

Re: [Full-disclosure] Obama Order Sped Up Wave of Cyberattacks Against Iran

2012-06-09 Thread John Doe
I'm glad you disclosed this. You are a security risk. On Sat, Jun 9, 2012 at 4:56 AM, Jason Hellenthal jhellent...@dataix.netwrote: Shit, Ill give the NSA a shell on any system... if it means achieving a greater goal. Whether its wrong or not... let the bots decide who is the better player as

Re: [Full-disclosure] Obama Order Sped Up Wave of Cyberattacks Against Iran

2012-06-09 Thread John Doe
I'm sure the Nazis were thinking alike. The jews kept whining, but then again, they were the arab terrorists of the time.. And now we have americans wondering why the arabs won't go into the ovens without whining. More to the topic, I'd hope USA would LEAVE THE CIVILIANS OUT OF THEIR FUCKING

Re: [Full-disclosure] Obama Order Sped Up Wave of Cyberattacks Against Iran

2012-06-09 Thread John Doe
By any chance, Jason Hellenthal, do you work for the NOVO medical group? Or is it just NOVO1? I'm asking, because you saying what you say there below, indicates that you may pose a security problem for some health related medical information on people that should be of no interest to NSA or

Re: [Full-disclosure] Apple IOS security issue pre-advisory record

2012-03-24 Thread john doe
Gentlemen, I must say that beyond the raw results the reactions are also very interesting because I think this actually IS what I called community behavior. Clics and votes are just one reaction type, and those clever and smart comments are another one. Maybe much more important to understand

Re: [Full-disclosure] Apple IOS security issue pre-advisory record

2012-03-23 Thread john doe
* ajax_arg[]=41941248ajax_arg[]=2223http://www.dailymotion.com/ajax/contest?ajax_function=voteajax_arg[]=41941248ajax_arg[]=2223 Response: +:{message:Thank you,status:1} On Fri, Mar 23, 2012 at 7:14 AM, john doe ninjaobses...@gmail.com wrote: Advisory Disclosure MD5: e29e5501dc2ca4d5fc06855762b14393

[Full-disclosure] 0day Full disclosure: American Express

2011-10-06 Thread John Doe
http://qnrq.se/full-disclosure-american-express/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] phpMyAdmin exploited in masses

2009-07-03 Thread John Doe
Hi. Disclosing out of boredom and for the crawlers to archive. Keywords: phpmyadmin, web, exploit, zavod, devitalia, mwstudio, szervernet, infotel, oodrive, iceman, romania, scriptkiddie. An example of the phpmyadmin exploit used in masses without thinking. IRC server: irc10.iceman.ro has

[Full-disclosure] Iceman.Ro - 'new' botnet to come

2009-07-03 Thread John Doe
18:13 -!- IceMan` [...@iceman.ro] has joined #root 18:13 pink_panther Hello, friend 18:13 IceMan` uh :) 18:13 pink_panther We were just talking about you 18:13 L hi there 18:13 IceMan` eh i must close this ircd 2 18:13 IceMan` uf uf uf 18:13 pink_panther a 18:13 IceMan` brb closing

[Full-disclosure] About Israel-Palestine affair

2009-01-06 Thread john doe
First of all, I apologiye for talking about this in a security mailing list, but seeing all controversz around, I would like to make clear some facts: 1) Israel is using a revenge politics for ages. Eye for 1000 eyes, I would call it, cancelling passes thru the borders to palestinian residents,

Re: [Full-disclosure] Hammers and nails

2008-03-03 Thread John Doe
On Sun, Mar 02, 2008 at 05:34:42AM -0800, Andrew A wrote: http://groups.google.com/group/alt.sex.stories/msg/6329ff9861c2c0b8?q=birth+of+a+gay+sluthl=enlr=ie=UTF-8oe=UTF-8rnum=1 i want more posts like this, dave That might really be appreciated.

RE: [Full-disclosure] [BL4CK] - BL4CK FR1D4Y 2006-07-21

2006-07-22 Thread John Doe
If I read your web page, I discover exploits for more or less unimportant software/vulnerabilites. Now Blackhat-Security published exploits (on full disclosure?!) for important software - which bugs werenot discovered on your own - with a leet bl4ck bla bla. For me it looks like, that also you

[Full-disclosure] McAfee VirusScan Enterprise 8.0.0 Buffer Overflow

2006-07-09 Thread John Doe
A local Buffer Overflow was discovered in McAfee VirusScan Enterprise 8.0.0.The overflow can be triggered within the "Buffer OverFlow Protection Properties" by creating a buffer overflow exclusion. Then fill each fieldwith data, and click ok, and applyProcess name: A..etcModule

Re: [Full-disclosure] Windows XP Home LSA secrets storesXP loginpassphrase in plain text

2006-05-06 Thread John Doe
You obiously didnt bother to read these part of my message: - You can, for example, decrypt all EFS encrypted files - You can, for example, try that same password in all kinds of places where that users is logging in (since chances are hes using the same password or variations of it elsewhere).

Re: [Full-disclosure] Windows XP Home LSA secrets stores XP loginpassphrase in plain text

2006-05-05 Thread John Doe
Markus, if a villain has physical access to your computer you have bigger issues than this.Regards,G.R ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia -

Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotaged hosts-file lookup

2006-04-13 Thread John Doe
I don't even get the same IP address for that. I have 64.4.52.189 . I tried to change it in the host files with the same results. Next I will block that IP in my firewall and see what happens. Ducki3 On 4/13/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: hi,...makes me wonder what happens

[Full-disclosure] Re: RSA HAVE CRACKED PHISHING, NO SERIOUSLY

2006-04-01 Thread John Doe
In any case, it's dclear that the person who posted that response has *no idea* how most bank's anti-fraud systems work. First off, the phishers *can't* just run through all the data they've gotten in just a few seconds, unless they distributed the work across a bunch of botnet zombies - hits

[Full-disclosure] Re: RSA HAVE CRACKED PHISHING, NO SERIOUSLY

2006-03-31 Thread John Doe
In any case, it's clear that the person who posted that response has *no idea* how most bank's anti-fraud systems work. First off, the phishers *can't* just run through all the data they've gotten in just a few seconds, unless they distributed the work across a bunch of botnet zombies - hits for