Re: [Full-disclosure] stuxnet source code

2011-07-04 Thread Laurelai
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 7/4/2011 5:02 PM, the nlhcrew wrote: Thanks for the newsflash, it was posted 5-6 months ago https://github.com/Laurelai/decompile-dump Date: Mon, 4 Jul 2011 22:49:01 +0200 From: 0...@phocean.net To: Subject: [Full-disclosure] stuxnet

Re: [Full-disclosure] XerXes DoS tool Leak. not so 0day now!

2011-07-08 Thread Laurelai
On 7/8/2011 1:58 PM, anonymous-t...@hushmail.me wrote: Laurelai, nice of you to join us. How this tool seems to work is it just routes via a literal ton of TOR servers to open connections to the target... Reminds me of Anonoctopus.c except using TOR. It does seem to be just as effective

Re: [Full-disclosure] XerXes DoS tool Leak. not so 0day now!

2011-07-08 Thread Laurelai
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 7/8/2011 10:17 PM, Sanguinarious Rose wrote: Hi everyone again, As I said to various people I would release an updated version that works lacking the bugs. The leaked version being fairly bad and was never intended to be released.

[Full-disclosure] A bit shocked nobody has posted this yet - Security breach at kernel.org

2011-08-31 Thread Laurelai
https://pastebin.com/BKcmMd47 see also https://www.kernel.org/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] sshd logins without a source

2011-09-23 Thread Laurelai
On 9/23/2011 4:42 AM, paul.sz...@sydney.edu.au wrote: ... I can see in each servers sshd logs an entry like the following: Sep 22 12:57:14 test-vm sshd[25002]: pam_unix(sshd:session): session opened for user root by (uid=0) Sep 22 12:57:32 test-vm sshd[25002]: pam_unix(sshd:session): session

Re: [Full-disclosure] sshd logins without a source

2011-09-23 Thread Laurelai
On 9/23/2011 7:05 AM, paul.sz...@sydney.edu.au wrote: Dear Laurelai, I do not think that sshd normally logs its source. ... To produce the desired log, I added to /etc/hosts.allow the line sshd : all : spawn /usr/bin/logger -t%d[%p] Connection source %h port %r Don't most modern Linux

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-27 Thread Laurelai
and perfect privacy were the VPN's of choice for them it would appear, oh, and he was part of the #pure-elite channel on that IRC server, and hence, considered by LEO and others as Part of LulzSec. TL;DR, this is nothing new. On Tue, Sep 27, 2011 at 6:53 AM, Laurelai Storm laure

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-29 Thread Laurelai
. (Now don't go assuming that I hate you, I bear you bugger all ill-will, etc). Good day. On Wed, Sep 28, 2011 at 5:44 AM, Laurelai Storm laure...@oneechan.org mailto:laure...@oneechan.org wrote: Its all good dude. What really concerns me is that vpn providers might give over logs

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-30 Thread Laurelai
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/30/2011 10:45 AM, adam wrote: User location determines Judicial Jurisdiction - how is that irrelevant? Jurisdiction in the prosecution of such crimes, yes. In the investigation itself, no. Which seems to be where all the confusion is coming

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-30 Thread Laurelai
advocates as well as security researchers. On a more direct note, Laurelei, do not presume that you know all there is to know about them. Doing so would be foolish. (Now don't go assuming that I hate you, I bear you bugger all ill-will, etc). Good day. On Wed, Sep 28, 2011 at 5:44 AM, Laurelai

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-30 Thread Laurelai
On 9/30/2011 11:59 AM, adam wrote: Cause them to face punishment in what country? Wouldn't they have to extradite them? What if their extradition treaty didn't cover cybercrime, or they didn't have one with the US? I'm not sure you understood the example, and the mixing and matching you're

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-02 Thread Laurelai
On 10/2/2011 12:38 PM, Stefan Jon Silverman wrote: oy, list newbie meets n3td3v -- this should be fun --sjs On 10/1/2011 4:44 PM, xD 0x41 wrote: Hi n3td3v, I just decided to see, exactly who you are, calling me a kid. Now i run a site, crazycoders.com http://crazycoders.com , very

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-02 Thread Laurelai
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 10/2/2011 4:51 PM, valdis.kletni...@vt.edu wrote: On Sun, 02 Oct 2011 12:11:41 MDT, SanguineRose said: This is hot :) I rather enjoy a good epeen sizing contest And enough people will do a 'reply all' to n3td3v's postings that the fact he

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 4:56 AM, Darren Martyn wrote: True, I know some hackers who really apply the Ballmers Peak (http://xkcd.com/323/) principle... They simply need to dry up :) Yeah i know quite a few of those myself. ___ Full-Disclosure - We believe in

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Laurelai
On 10/3/2011 5:51 AM, SanguineRose wrote: That is awesome. I approve of this 90s HTML code and bring back the good old days! HTML 3.0 is the stuff but that might be HTML 2.0 I don't remember. On Mon, Oct 3, 2011 at 4:39 AM, Jacqui Caren-home jacqui.ca...@ntlworld.com wrote: On 02/10/2011

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
= bad. On Mon, Oct 3, 2011 at 3:36 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/3/2011 4:56 AM, Darren Martyn wrote: True, I know some hackers who really apply the Ballmers Peak (http://xkcd.com/323/) principle... They simply need to dry up

Re: [Full-disclosure] Is this for real.. http://n3td3v.org.uk/

2011-10-03 Thread Laurelai
On 10/3/2011 7:15 AM, doc mombasa wrote: it's on purpose! trust him! he's a security professional 2011/10/3 Laurelai laure...@oneechan.org mailto:laure...@oneechan.org On 10/3/2011 5:51 AM, SanguineRose wrote: That is awesome. I approve of this 90s HTML code and bring back

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Laurelai
On 10/3/2011 7:31 AM, Darren Martyn wrote: I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is legit or not.

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Laurelai
On 10/3/2011 7:31 AM, Darren Martyn wrote: I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is legit or not.

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Laurelai
On 10/3/2011 7:46 AM, Dan Dart wrote: I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Make an RSS feed to regex through everything for interesting stuff.. Maybe: /^[0-9a-f]{32}$/ Or: /nuclear weapons/ Or even:

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 7:57 AM, Christian Sciberras wrote: Here's a great idea that doesn't need LSD or being doped;*shut the fuck up*. On Mon, Oct 3, 2011 at 6:31 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/3/2011 7:30 AM, doc mombasa wrote: yeah ive

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 8:16 AM, Christian Sciberras wrote: I'm not sure who's the the one acting like a child, the guy spamming people with bullshit or the other one telling him to do everyone a favor and shut up. On Mon, Oct 3, 2011 at 7:13 PM, Laurelai laure...@oneechan.org mailto:laure

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 8:06 AM, Christian Sciberras wrote: Manners, on FD list? Are you trying to be funny? On Mon, Oct 3, 2011 at 7:04 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/3/2011 7:57 AM, Christian Sciberras wrote: Here's a great idea

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Laurelai
On 10/3/2011 8:02 AM, John Jacobs wrote: http://packetstormsecurity.org/files/25728/w000t-shell.c.html It's a trojan, based on the w00t-shell.c code; the shell code adds a passwordless root account under the name w000t. Date: Mon, 3 Oct 2011 15:31:29 +0100 From:

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 8:36 AM, valdis.kletni...@vt.edu wrote: On Mon, 03 Oct 2011 09:11:33 PDT, Laurelai said: I know a guy who codes perl on LSD, writes good code too. To be fair, it's hard to tell if perl code was written with or without the use of LSD. It's certainly a language that shows LSD

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 10:42 AM, Antony widmal wrote: Using an external VPN provider to cover your trace clearly shows your incompetency and your idiot assumption. Trying to blame the VPN provider rather than accepting your mistake and learning from it clearly show your 3 years old mentality. Also,

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 12:16 PM, Ferenc Kovacs wrote: On Mon, Oct 3, 2011 at 10:35 PM, Laurelailaure...@oneechan.org wrote: On 10/3/2011 10:42 AM, Antony widmal wrote: Using an external VPN provider to cover your trace clearly shows your incompetency and your idiot assumption. Trying to blame the VPN

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-03 Thread Laurelai
On 10/3/2011 12:21 PM, Antony widmal wrote: If you're stupid enough to trust a cloud vpn, then you deserve to get busted. Dry your tears and grow the fuck up. EOF. On Mon, Oct 3, 2011 at 4:35 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/3/2011 10:42 AM

Re: [Full-disclosure] Apache 2.2.17 exploit?

2011-10-03 Thread Laurelai
On 10/3/2011 4:29 PM, GloW - XD wrote: There's only 4 billion IP's to scan if he want to get all out of his trick. Synscan can do a subnet (class b) in ~3 minutes nowdays ;) I would think he would find it. i did a scan on a kit i found, root:barcelona123 , and, got like 100 boxes in 10minutes

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-04 Thread Laurelai
service. xd On 4 October 2011 06:16, Ferenc Kovacs tyr...@gmail.com mailto:tyr...@gmail.com wrote: On Mon, Oct 3, 2011 at 10:35 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/3/2011 10

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-04 Thread Laurelai
On 10/4/2011 6:35 PM, adam wrote: (Option 3 - the guy heads downtown on a contempt of court charge - happens so rarely that it's basically a hypothetical). You do realize that (at least in the US) - contempt is *not* a criminal offense, don't you? On Tue, Oct 4, 2011 at 8:05 PM,

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-04 Thread Laurelai
as due process. Not to mention, anything found would likely end up being inadmissible because it was obtained illegally. On Tue, Oct 4, 2011 at 10:39 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/4/2011 6:35 PM, adam wrote: (Option 3 - the guy heads downtown

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-04 Thread Laurelai
On 10/4/2011 7:50 PM, Jeffrey Walton wrote: On Tue, Oct 4, 2011 at 10:19 PM, xD 0x41sec...@gmail.com wrote: This is ONCE you are actually in front, of the judge...remember, it may take some breaking of civil liberty, for this to happen... or i maybe wrong. cheers Yep. Though some are

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-04 Thread Laurelai
On 10/4/2011 7:52 PM, adam wrote: Its frightening how much power judges have, and how poorly they are overseen. Definitely agree there. Some of the civil cases are disgustingly bad, due to there being no media attention and no real oversight. The civil case mentioned above is a good example,

Re: [Full-disclosure] VPN providers and any providers in general...

2011-10-06 Thread Laurelai
On 10/4/2011 10:10 PM, Jeffrey Walton wrote: On Tue, Oct 4, 2011 at 9:05 PM, valdis.kletni...@vt.edu wrote: On Tue, 04 Oct 2011 03:15:02 EDT, Jeffrey Walton said: On Tue, Oct 4, 2011 at 3:06 AM, Ferenc Kovacs tyr...@gmail.com wrote: As I mentioned before it is hard to expect that a VPN

Re: [Full-disclosure] LinkedIn_User Account Delete using Click jacking

2011-10-07 Thread Laurelai
On 10/7/2011 4:48 AM, asish agarwalla wrote: Hi, LinkedIn_User Account Delete using Click jacking. This Vulnerability is accepted by LinkedIn they are in a process to patched it but not yet patched. Please find the document describing the vulnerability. Regards Asish

Re: [Full-disclosure] LinkedIn_User Account Delete using Click jacking

2011-10-07 Thread Laurelai
On 10/7/2011 12:30 PM, xD 0x41 wrote: Hi, Another security expert... sheesh... and they cannot do simplest of tasks, makes me wonder really how do they get anything atall coded, but then again i doubt there is code... I bet theyre all some persistent xss etc... wich would req some fuzz

Re: [Full-disclosure] LinkedIn_User Account Delete using Click jacking

2011-10-07 Thread Laurelai
On 10/7/2011 12:30 PM, xD 0x41 wrote: Hi, Another security expert... sheesh... and they cannot do simplest of tasks, makes me wonder really how do they get anything atall coded, but then again i doubt there is code... I bet theyre all some persistent xss etc... wich would req some fuzz

Re: [Full-disclosure] LinkedIn_User Account Delete using Click jacking

2011-10-07 Thread Laurelai
On 10/7/2011 3:23 PM, Naresh Jha wrote: Guys - Correct me if I am wrong but wouldn't macro enabled document be like .docm as per Word 2007+??? I mean its a docx file right like zip file ... we can extract the contents after changing it into zip ...can't we ??? JT On Fri, Oct 7, 2011 at

Re: [Full-disclosure] LinkedIn_User Account Delete using Click jacking

2011-10-08 Thread Laurelai
On 10/7/2011 9:06 PM, hfux0r wrote: Yeah, because it is totally safe to open up anything behind a Shortened URL. The fact that the FBI is on your ass is the only reason I might find this safe :) On Oct 7, 2011, at 9:36 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote

[Full-disclosure] Facebook/google+ Cross-Site Content Forgery exploit

2011-10-08 Thread Laurelai
Blackhatacademy has asked me to post this to the mailing list as im one of the instructors there, I did not personally develop the exploit, please direct questions regarding it to hatter on irc.blackhatacademy.org Overview Over the years, facebook has been vulnerable to numerous web

Re: [Full-disclosure] Facebook/google+ Cross-Site Content Forgery exploit

2011-10-09 Thread Laurelai
On 10/8/2011 8:45 PM, Antony widmal wrote: Shit man, that's serious business (S-K trying to take over FD) Of course it's not your code dickwad. All ya know is talking posting shit on an IT Sec mailing list. On Sat, Oct 8, 2011 at 7:53 PM, Laurelai laure

Re: [Full-disclosure] Facebook/google+ Cross-Site Content Forgery exploit

2011-10-09 Thread Laurelai
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 10/9/2011 12:04 PM, valdis.kletni...@vt.edu wrote: On Sun, 09 Oct 2011 08:52:46 PDT, Laurelai said: You sir, are an idiot. s/an/a/ - FTFY. A goes before words that begin with consonants. An goes before words that begin with vowels

Re: [Full-disclosure] Facebook/google+ Cross-Site Content Forgery exploit

2011-10-09 Thread Laurelai
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 10/9/2011 2:18 PM, valdis.kletni...@vt.edu wrote: On Sun, 09 Oct 2011 13:38:41 CDT, Laurelai said: On 10/9/2011 12:04 PM, valdis.kletni...@vt.edu wrote: On Sun, 09 Oct 2011 08:52:46 PDT, Laurelai said: You sir, are an idiot. s/an/a/ - FTFY

Re: [Full-disclosure] [OT] the nigger said: American people understand that not everybody's been following the rules

2011-10-12 Thread Laurelai
On 10/12/2011 2:44 AM, Christian Sciberras wrote: Regarding who's doing the most damage to US economy, I'll just say I won't comment. I take issue with the 1%/99% idea; ie, the excuse that some people deserve more just because they are allowed to lie - even if it makes them hypocrites.

Re: [Full-disclosure] Search and Seizure of Email

2011-10-12 Thread Laurelai
On 10/12/2011 10:33 AM, Christian Sciberras wrote: Well said! On Wed, Oct 12, 2011 at 5:16 PM, Daniel Sichel dani...@ponderosatel.com mailto:dani...@ponderosatel.com wrote: In fact, law enforcement officials don?t even need a search warrant to access private emails. In

Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-12 Thread Laurelai
On 10/12/2011 12:20 PM, David Alanis wrote: Quoting Thor (Hammer of God)t...@hammerofgod.com: I saw this on FB and thought I would pass it along: http://99percentexif.tumblr.com/ It's the exif data from the photos the 99%'ers are posting - showing the $1000 systems, cameras, and software

Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-12 Thread Laurelai
On 10/12/2011 12:52 PM, Thor (Hammer of God) wrote: I know that if I was starving to death and couldn't afford medical care for my children that I wouldn't be sitting around with a $500 camera editing my photos with $700 software on a $1000 computer. Nor would I be sitting around in my

Re: [Full-disclosure] Snail mail vs. Email

2011-10-12 Thread Laurelai
On 10/12/2011 1:26 PM, Daniel Sichel wrote: Well there is no push to make snail-mail encrypted and lets face it most peoples mailboxes don't have any sort of locking mechanisms and is available to anyone with two hands and the malicious intent to steal someones mail however the US Gov needs

Re: [Full-disclosure] Snail mail vs. Email

2011-10-12 Thread Laurelai
On 10/12/2011 3:23 PM, Jeffrey Walton wrote: On Wed, Oct 12, 2011 at 4:09 PM, Laurelailaure...@oneechan.org wrote: On 10/12/2011 1:26 PM, Daniel Sichel wrote: Well there is no push to make snail-mail encrypted and lets face it most peoples mailboxes don't have any sort of locking mechanisms

Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-13 Thread Laurelai
On 10/13/2011 1:29 AM, Christian Sciberras wrote: So, if in practice the 99% enjoy privileges a notch less than the 1%, where did the 99% go to? On Wed, Oct 12, 2011 at 7:52 PM, Thor (Hammer of God) t...@hammerofgod.com mailto:t...@hammerofgod.com wrote: I know that if I was

Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-13 Thread Laurelai
On 10/13/2011 9:18 AM, Christian Sciberras wrote: I simply acknowledge the fact that some people work hard to get obscenely rich, but I just can't stand people that cause damage for the fun of it. So if they cause damage for profit that makes it ok? Yes, I stick for everyone that minds his

Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-13 Thread Laurelai
committed to change, it just can't right wrongs by pointing at jailed people. http://www.time.com/time/specials/packages/article/0,28804,1877351_1877350_1877339,00.html On Thu, Oct 13, 2011 at 11:35 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/13/2011 9

Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-14 Thread Laurelai
to change, it just can't right wrongs by pointing at jailed people. On Thu, Oct 13, 2011 at 11:35 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/13/2011 9:18 AM, Christian Sciberras wrote: I simply acknowledge

Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-14 Thread Laurelai
to keep goading, even AFTER the others, have completely stopped responding to you, simply because, Laurelai was right, why would anyone want to keep up a thread wich has now turned malign, as i forsaw a week ago, but, i did not think it would even make a week, People like you, keep inspiring

Re: [Full-disclosure] [OT] the nigger said: American people understand that not everybody's been following the rules

2011-10-14 Thread Laurelai
On 10/14/2011 4:04 PM, William Warren wrote: Crossed what line? Frankly if black folks can call each other nigger it's reverse discrimination for white folks to not be able to say it as well. If you don't want the word used..don't use it at all. If you want the racist card to stick to a

Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-14 Thread Laurelai
with numbers... On Sat, Oct 15, 2011 at 2:32 AM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 10/14/2011 6:32 PM, xD 0x41 wrote: Cristiano , per favor' mi dai dieci minuti scusa mi ma, e' essentiale .. You really dont realise how much, you attack others when

Re: [Full-disclosure] Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

2011-10-16 Thread Laurelai
On 10/16/2011 6:07 PM, Ryan Dewhurst wrote: http://www.linkedin.com/in/tommyryan On Mon, Oct 17, 2011 at 12:05 AM, Jeffrey Waltonnoloa...@gmail.com wrote: On Sun, Oct 16, 2011 at 6:56 PM, Ivan .ivan...@gmail.com wrote:

Re: [Full-disclosure] Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

2011-10-16 Thread Laurelai
On 10/16/2011 6:19 PM, Christian Sciberras wrote: Funny, Anonymous' tagline seems to be either with us, or you're corrupt. Happens that everyone I know well wouldn't touch Anonymous with a barge pole. I may arguably be naive, but I'm certainly not corrupt. So it seems they're yet another

Re: [Full-disclosure] Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

2011-10-16 Thread Laurelai
On 10/16/2011 6:55 PM, James Condron wrote: You realize most of the protesters arent a part of anonymous at all right? If not all of them; its hard work putting jeans and a tshirt on and leaving the house. Certainly without charging your motorised scooter and bringing a couple of hours

Re: [Full-disclosure] Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

2011-10-16 Thread Laurelai
http://www.godlikeproductions.com/forum1/message1674591/pg1 I wonder who else is being paid to try to stop the protesters, and i wonder where the money is coming from ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

2011-10-16 Thread Laurelai
On 10/16/2011 9:17 PM, Paul Schmehl wrote: --On October 16, 2011 8:36:05 PM -0500 Laurelai laure...@oneechan.org wrote: http://www.godlikeproductions.com/forum1/message1674591/pg1 I wonder who else is being paid to try to stop the protesters, and i wonder where the money is coming from

[Full-disclosure] Airvpn makes statement regarding hidemyass proxy

2011-10-18 Thread Laurelai
https://airvpn.org/index.php?option=com_kunenaItemid=55func=viewcatid=2id=891#891 https://airvpn.org/index.php?option=com_kunenaItemid=55func=viewcatid=2id=891#891 ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] [SECURITY][GNAA 1488-1] slimhttpd security-update

2011-10-20 Thread Laurelai
On 10/19/2011 06:47 PM, N Za wrote: -BEGIN HASH SIGNED MESSAGE- Hash: Bubble - - GNAA Security Advisory GNAA-1488-1 security () gnaa eu http://security.on.nimp.org/ N

Re: [Full-disclosure] Facebook Attach EXE Vulnerability

2011-10-28 Thread Laurelai
On 10/28/2011 6:17 PM, Ulises2k wrote: You know this? ;) https://www.facebook.com/whitehat/bounty/ On Fri, Oct 28, 2011 at 17:49, Nathan Powern...@securitypentest.com wrote: I would also like to note this vulnerability was reported responsibly in regards to full disclosure.

Re: [Full-disclosure] Facebook Attach EXE Vulnerability

2011-10-28 Thread Laurelai
On 10/28/2011 10:03 PM, valdis.kletni...@vt.edu wrote: On Fri, 28 Oct 2011 20:44:04 CDT, Laurelai said: On 10/28/2011 6:17 PM, Ulises2k wrote: You know this? ;) https://www.facebook.com/whitehat/bounty/ Facebook has a habit of ignoring issues So? That's their problem, not yours. The moral

[Full-disclosure] How not to deal with a vulnerability in your code

2011-11-03 Thread Laurelai
https://bugs.launchpad.net/calibre/+bug/885027 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] NEVER AGAIN

2011-11-23 Thread Laurelai
On 11/23/2011 8:08 AM, Kain, Rebecca (.) wrote: I ask myself that all the time when I see andrew's posts -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of valdis.kletni...@vt.edu Sent: Tuesday,

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-07 Thread Laurelai
On 1/7/12 8:51 AM, Ed Carp wrote: ROFL!!! -- Forwarded message -- From:george.fried...@stratfor.com Date: Sat, Jan 7, 2012 at 2:33 AM Subject: Rate Stratfor's Incident Response To: e...@pobox.com For the video announcement, please see

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-07 Thread Laurelai
On 1/7/12 2:48 PM, Ferenc Kovacs wrote: On Sat, Jan 7, 2012 at 8:10 PM, Jeffrey Walton noloa...@gmail.com mailto:noloa...@gmail.com wrote: http://bolt.thexfil.es/84e9h!t http://bolt.thexfil.es/84e9h%21t was an interesting link - it demonstrated the pwnage. It looks like

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-07 Thread Laurelai
On 1/7/12 3:50 PM, valdis.kletni...@vt.edu wrote: On Sat, 07 Jan 2012 16:25:35 EST, Shyaam Sundhar said: Although, once they have gained popularity and to a stage where a garage office becomes a shop floor and a @home biz becomes a rent-a-million$-building office, it is time to shift

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-07 Thread Laurelai
On 1/7/12 5:31 PM, Ferenc Kovacs wrote: On Sun, Jan 8, 2012 at 12:03 AM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 1/7/12 3:50 PM, valdis.kletni...@vt.edu mailto:valdis.kletni...@vt.edu wrote: On Sat, 07 Jan 2012 16:25:35 EST, Shyaam Sundhar said

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-07 Thread Laurelai
On 1/7/12 6:20 PM, valdis.kletni...@vt.edu wrote: On Sat, 07 Jan 2012 17:37:44 CST, Laurelai said: Because they pay the kids to own them in a safe manner to show that It's not as simple as all that. A good pen-tester needs more skills than just how to pwn a server. You need some business

[Full-disclosure] Fwd: Fw: Who is behind Stratfor hack?

2012-01-08 Thread Laurelai
:23 -0800 (PST) From: andrew.wallace andrew.wall...@rocketmail.com Reply-To: andrew.wallace andrew.wall...@rocketmail.com To: Laurelai laure...@oneechan.org - Forwarded Message - *From:* andrew.wallace andrew.wall...@rocketmail.com *To:* feedb...@stratfor.com feedb

Re: [Full-disclosure] Fwd: Fw: Who is behind Stratfor hack?

2012-01-08 Thread Laurelai
On 1/8/12 2:06 PM, valdis.kletni...@vt.edu wrote: On Sun, 08 Jan 2012 11:16:59 CST, Laurelai said: He sent a copy to you too? My condolences. He comes up with the most interesting conclusions sometimes. If this turns out to be the person who hacked your web site, I would like a cash

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Laurelai
On 1/10/12 10:18 PM, Byron Sonne wrote: Don't piss off a talented adolescent with computer skills. Amen! I love me some stylin' pwnage :) Whether they were skiddies or actual hackers, it's still amusing (and frightening to some) that companies who really should know better, in fact, don't.

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Laurelai
On 1/10/12 11:32 PM, James Smith wrote: Well I do agree with what you are stating. As I have seen incidents like this happen to many times. This mailing list is a big part of the IT Security community. -Original Message- From: Laurelai Sent: Wednesday, January 11, 2012 1:18 AM

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Laurelai
On 1/11/12 1:15 AM, Kyle Creyts wrote: How many of those engaged in these attacks _could_ actually fix the vulns they exploit? What is a good rough estimate in your opinion? On Jan 11, 2012 12:47 AM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 1/10/12 11:32

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-10 Thread Laurelai
On 1/11/12 1:21 AM, valdis.kletni...@vt.edu wrote: On Tue, 10 Jan 2012 23:18:40 CST, Laurelai said: real opportunities for a career and they are often right. Microsoft hired some kid who hacked their network, it is a safe bet he isn't going to be causing any trouble anymore. How safe a bet

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-11 Thread Laurelai
On 1/10/12 11:39 PM, Ian Hayes wrote: On Tue, Jan 10, 2012 at 9:18 PM, Laurelailaure...@oneechan.org wrote: On 1/10/12 10:18 PM, Byron Sonne wrote: Don't piss off a talented adolescent with computer skills. Amen! I love me some stylin' pwnage :) Whether they were skiddies or actual hackers,

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-11 Thread Laurelai
On 1/11/12 8:39 AM, Ferenc Kovacs wrote: Because the ones with the so called ethics either lack the technical chops or lack the enthusiasm to find simple vulnerabilities. Not very ethical to take a huge paycheck and not do your job if you ask me. If the only thing missing to

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-12 Thread Laurelai
they are angry at society plop ive been there.. they do it for the lulz Den 11. jan. 2012 06.18 skrev Laurelai laure...@oneechan.org mailto:laure...@oneechan.org: On 1/10/12 10:18 PM, Byron Sonne wrote: Don't piss off a talented adolescent with computer skills. Amen! I love me some stylin

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-12 Thread Laurelai
there was no profits in allocating resources to fix it and that webapp was the #1 money generator for that company Den 12. jan. 2012 10.29 skrev Laurelai laure...@oneechan.org mailto:laure...@oneechan.org: On 1/12/12 3:27 AM, doc mombasa wrote: just one question why should they hire

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-12 Thread Laurelai
not a good idea (if you want to keep your job so you can pay your bills that is..) Den 12. jan. 2012 10.41 skrev Laurelai laure...@oneechan.org mailto:laure...@oneechan.org: On 1/12/12 3:34 AM, doc mombasa wrote: i dont know if you ever worked for a big corporate entity? like kovacs wrote

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-12 Thread Laurelai
On 1/12/12 3:49 AM, Ferenc Kovacs wrote: Well that's what you get when you let profit margins dictate security policy. You guys act pretty tough when you argue with each other online but you can't stand up to some corporate idiots? Sounds like this industry could benefit from

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-12 Thread Laurelai
On 1/12/12 3:54 AM, doc mombasa wrote: and you are obviously blindly stuck on a point and has no idea how it actually works out there in the real world in small companies you have freedom and ability to execute in big companies not so much.. Den 12. jan. 2012 10.52 skrev Laurelai laure

Re: [Full-disclosure] Rate Stratfor's Incident Response

2012-01-12 Thread Laurelai
On 1/12/12 11:12 AM, valdis.kletni...@vt.edu wrote: On Wed, 11 Jan 2012 12:57:48 EST, Benjamin Kreuter said: The problem is that we have criminalized too much here. If some 14 year old comes to you and hands you supposedly secret documents, he is behaving very ethically -- he is telling you

Re: [Full-disclosure] Rate Stratfor's Incident Response

2012-01-12 Thread Laurelai
professionals, they would have made the houses completely fireproof a long time ago, or at the very least responded and put out the fire before any real damage was done. Plus, I have a Zippo, which makes me uber-leet. *Laurelai* I know its a strange spelling but it is spelled correctly in my

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-12 Thread Laurelai
are all very nice when you have nothing to lose, all to gain and no one depending on you... On Thursday, January 12, 2012 at 4:43 AM, Laurelai laure...@oneechan.org wrote: On 1/12/12 3:34 AM, doc mombasa wrote: i dont know if you ever worked for a big corporate entity

Re: [Full-disclosure] Rate Stratfor's Incident Response

2012-01-13 Thread Laurelai
On 1/13/12 1:24 PM, Paul Schmehl wrote: --On January 13, 2012 12:03:22 PM -0500 Benjamin Kreuter ben.kreu...@gmail.com wrote: On Fri, 13 Jan 2012 10:37:31 -0600 Paul Schmehlpschmehl_li...@tx.rr.com wrote: --On January 12, 2012 3:16:19 PM -0500 Benjamin Kreuter ben.kreu...@gmail.com

Re: [Full-disclosure] UFC.com

2012-01-23 Thread Laurelai
On 1/23/12 7:14 AM, Ian Hayes wrote: On Mon, Jan 23, 2012 at 4:37 AM, Julius Kivimäki julius.kivim...@gmail.com wrote: Wat 2012/1/23 RandallMranda...@fidmail.com Piracy retaliation taken on UFC.com Pinging ufc.com [50.116.87.24] with 32 bytes of data: Reply from 50.116.87.24: bytes=32

Re: [Full-disclosure] UFC.com

2012-01-23 Thread Laurelai
On 1/23/12 9:34 AM, Julius Kivimäki wrote: He is a god-tier hecker, like better than Chippy1337. ICMP remote root 0day imo. 2012/1/23 Laurelai laure...@oneechan.org mailto:laure...@oneechan.org On 1/23/12 7:14 AM, Ian Hayes wrote: On Mon, Jan 23, 2012 at 4:37 AM, Julius Kivimäki

Re: [Full-disclosure] UFC.com

2012-01-23 Thread Laurelai
On 1/23/12 9:43 AM, Julius Kivimäki wrote: Oh god, my linux server buried underground with five feet of concrete just got rooted. This box has no internet connection, coincidence? I think not. (Also I'm a derpcat and can't into mailinglists with gmail) 2012/1/23 Laurelai laure...@oneechan.org

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-27 Thread Laurelai
On 1/27/2012 2:24 AM, Jerry dePriest wrote: im going to the 'benz dealer in the morning to express my 1st amendment right... The Somalians are learning the hard way that it just isnt so... bma ___ Full-Disclosure - We believe in it.

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-27 Thread Laurelai
of entitlement... but oh well... I've just gotta tranform with the times i guess! On Fri, Jan 27, 2012 at 5:51 PM, Laurelai laure...@oneechan.org mailto:laure...@oneechan.org wrote: On 1/27/2012 2:24 AM, Jerry dePriest wrote: im going to the 'benz dealer in the morning to express my 1st

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-27 Thread Laurelai
On 1/27/2012 3:29 AM, Vipul Agarwal wrote: Let's keep FD and Reddit apart! Regards, Vipul Sent from my HTC - Reply message - From: Kai k...@rhynn.net To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] when did piracy/theft become expression of freedom Date: Fri,

Re: [Full-disclosure] Fw: when did piracy/theft become expression of freedom

2012-01-27 Thread Laurelai
On 1/27/12 4:12 AM, Jerry dePriest wrote: software piracy has been around for ever. I remember copying punch cards. It took forever and if you made one mistake hours of work was down the tubes. I had an apple II that we used Disk Pirate 1-11 to copy games, peach tree accounting software, etc.

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-27 Thread Laurelai
-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Laurelai *Sent:* Friday, January 27, 2012 12:51 AM *To:* full-disclosure@lists.grok.org.uk *Subject:* Re: [Full-disclosure] when did piracy/theft become expression of freedom On 1/27/2012 2:24 AM, Jerry dePriest wrote: im going to the 'benz

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-28 Thread Laurelai
On this topic i saw this https://thepiratebay.org/torrent/6960965/1970_Chevelle_Hot-Rod_3d_model , real question is would you download a car if you could? ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-28 Thread Laurelai
On 1/28/2012 3:13 PM, Julius Kivimäki wrote: Of course I wouldn't, downloading a car would be like stealing a car. Piracy is horrible and all the boats used by the pirate scum should be taken away. 2012/1/28 Laurelai laure...@oneechan.org mailto:laure...@oneechan.org On this topic i saw

  1   2   >