Re: [Full-disclosure] n3td3v drops handle, picks up InfoSecAlertNet. iProphet treks toward hyperborea

2009-08-27 Thread Sub
does anyone remember the great german hax0r Kim Schmitz (alias kimble)? ;-) this n3td3v-story reminds me of it, although kimble acted a lot more professional. D-vice schrieb: Fuck, I can't get enough of the lulz from this On Thu, Aug 27, 2009 at 1:32 PM, Joey Kilmore jkilmo...@yahoo.de

Re: [Full-disclosure] False statements made about security researcher n3td3v

2009-08-19 Thread Sub
n3td3v is neither black-, white-, purple- or anything -hat, just a troll. i follow this list since 4 years and everything i read about n3td3v was just a bunch of crap. just like the kids in school that have no friends and keep bugging others for their lost live. so stop trolling with your

Re: [Full-disclosure] False statements made about security researcher n3td3v

2009-08-18 Thread Sub
dont feed the troll ;) Andrew Kuriger schrieb: Dude really? Nice signature: Be Yourself @ mail.com! Choose From 200+ Email Addresses Get a Free Account at www.mail.com! Nobody cares. I just find it funny. On Tue, 18 Aug 2009 14:43:15 -0500, someone lawyer some...@lawyer.com wrote:

Re: [Full-disclosure] Nominate Dan Kaminsky for Most Overhyped Bug Pwnie Award

2008-07-12 Thread sub
On Fri, Jul 11, 2008 at 5:58 PM, n3td3v [EMAIL PROTECTED] wrote: I'm downplaying this vulnerability on purpose because I know its overhyped snip You've generated so much traffic on this list about it that you've actually hyped the issue up FOR them. Make sure you're collecting a commission,

Re: [Full-disclosure] Free Beer

2008-03-28 Thread sub
Free beer is the best kind of beer. P.S. - Whoops, sorry for that double-port, Larry. On Thu, Mar 27, 2008 at 9:36 PM, Larry Seltzer [EMAIL PROTECTED] wrote: Moving beyond the old partisan politics, a cause we can all get behind. Larry Seltzer eWEEK.com Security Center Editor

Re: [Full-disclosure] Exploring the UNKNOWN: Scanning the Internet via SNMP!

2008-03-05 Thread sub
That single UDP datagram is definitely faster. Compare the Code Red worm to Sapphire (SQL Slammer), for instance: Previous scanning worms, such as Code Red, spread via many threads, each invoking connect() to probe random addresses. Thus each thread's scanning rate was limited by network latency,

Re: [Full-disclosure] Exploring the UNKNOWN: Scanning the Internet via SNMP!

2008-03-05 Thread sub
No, but if you're querying the services for data you do. On 3/5/08, Dmitry [EMAIL PROTECTED] wrote: dude, you don't need the entire handshake for tcp scanning. ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] The Everything Development System - SQL Injection

2008-02-02 Thread sub
Application:The Everything Development System Version(s): = Pre-1.0 (current version at time of release) Author: sub [EMAIL PROTECTED] Released: 2/1/2008 There exists a vulnerability in The Everything Development Engine that allows a user to inject their own SQL to modify

[Full-disclosure] Sub_level attaq!

2005-08-17 Thread Miseo Sub Level
Sub_level mass-defacing! (by miseo and DEREK_X) put www. before: ACESCRITORES.COM. ACESCRITORES.NET. ACESCRITORES.ORG. AMIGOSMUSEOPRADO.ORG. APPICE.NET. APPICE.ORG. COMAETILICO.COM. CYRTEK.COM. DIGITALLOFTSTUDIO.COM.