On Sun, 17 Oct 2004, [EMAIL PROTECTED] wrote:
On Sat, 16 Oct 2004 19:13:18 -0700, Etaoin Shrdlu [EMAIL PROTECTED] wrote:
Of course, anyone still using the term hax0r as though it were
meaningful might want to think further about what a security
professional might be
A security
Frank,
Question back at you sir; Does OS fingerprinting rely soley upon ICMP
leakage? I'd thought I saw a number of papers that related to OS
detection from the incentricities of TCP/IP stacks of the various OS',
like papers by Fydor, documented in phrack, etc.
Thanks,
Ron DuFresne
On
Le lun 18/10/2004 à 00:35, James Edwards a écrit :
That is great till you want to run a server behind that firewall.
I don't see the reason why it would cause a problem, as firewall is able
to spot ICMP related to server's IP connections as well...
The bigger picture, to me, is you gain little
On Mon, 18 Oct 2004 01:09:09 +0200, yossarian [EMAIL PROTECTED] wrote:
But Dear Backyard - have you applied for a job at yahoo as a security pro?
Apparantly you know what they should know and you are willing to tell
them If not - give it a try.
No sorry, i'm one of these underground nerd /
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 569-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
October 18th, 2004
On Mon, 18 Oct 2004 07:23:56 +0200 (CEST), Hugo van der Kooij
[EMAIL PROTECTED] wrote:
Companies do not care about security. The CEO only works with numbers. If
bad security losses 100k per month but tightening things up loses 105k per
month on productivity they take the 5k per month profit
In August, ISS reported a vulnerability in the Entrust LibKmp ISAKMP library.
http://xforce.iss.net/xforce/alerts/id/181
SANS reports the 30th of August that Cisco and Oracle may also be vulnerable to this
flaw.
http://www.sans.org/newsletters/risk/vol3_34.php
Now, I don't know about you but I
The Patch Integration Engine (PIE) is a system for the insertion of
patches into a runtime process, allowing for the immediate correction of
security vulnerabilities. This is an announcement of the public alpha
release of PIE, version 0.2, which currently supports i386 Linux.
PIE was created from
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Friday, 15.10.2004 at 17:53 -0400, Jay Libove wrote:
What are you doing/changing about your SSH configurations to reduce
the possibility of these attacks finding any kind of hole in the
OpenSSH software (that's what I run, so that's the only
Op Sunday 17 October 2004 16:17, Adam Jones sgreifde:
The majority of the list had nothing more than
alias $name $email
Only small parts had any more specific contact information. The emails
and you based that on absolutely nothing at all?:
[EMAIL PROTECTED] nasanames]$ for i in *; do echo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 556-2 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
X 8th, 2004
I am sorry, maybe I just don't get it, but the two forms you are
talking about could not happen in the scenario described.
Besides this fact, user data space still has to be violated and this
still requires either privileges (which means you have access anyway)
or requires an exploit to elevate
On Sun, 2004-10-17 at 16:35 -0600, James Edwards wrote:
That is great till you want to run a server behind that firewall.
snip
If the server is behind the firewall the firewall will be aware of the
connection passing through and will therefore regard the packets as
legitimate.
I agree with
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Name: cPanel
Vendor URL: http://www.cpanel.net
Author: Karol Wisek [EMAIL PROTECTED]
Date: September 30, 2004
Issue:
cPanel allows logged in users to change permission of any file to 755.
---
Fedora Legacy Update Advisory
Synopsis: Updated kernel resolves security vulnerabilities
Advisory ID: FLSA:1804
Issue date:2004-10-18
Product: Red Hat Linux
Keywords:
Title: 3com 3crwe754g72-a Information Disclosure
Class: Design Error
Affects:
3com 3crwe754g72-a
v 1.11
v 1.13
v 1.24
Id: cbsa-
Release Date: 2004 10 18
Author : Cyrille Barthelemy [EMAIL PROTECTED]
-- 1. Introduction
--
3Com 3crwe754g72-a is a bundle
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Name: cPanel
Vendor URL: http://www.cpanel.net
Author: Karol Wisek [EMAIL PROTECTED]
Date: July 19, 2004
Issue:
cPanel backup feature allows logged in users to read any file, including
On Mon, 18 Oct 2004, Dave Ewart wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Friday, 15.10.2004 at 17:53 -0400, Jay Libove wrote:
What are you doing/changing about your SSH configurations to reduce
the possibility of these attacks finding any kind of hole in the
OpenSSH
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200410-14
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
Well, I didn't take offense...alot of compaines are very lazy with
security...just wanted to throw in my 2 cents.
Just look at all the pen-testing compaines..that throw you a nessus
report with a logo on top of it. They have never tested the reported
hole with another method or even tried any
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Name: cPanel
Vendor URL: http://www.cpanel.net
Author: Karol Wisek [EMAIL PROTECTED]
Date: July 31, 2004
Issue:
cPanel allows logged in users to change ownership of any file to their
On Mon, 2004-10-18 at 06:41 -0500, Ron DuFresne wrote:
Why not just disallow root logins directly, and force someone with a valid
user account to su after getting a shell? It was my impression that was
more standard, and if one has to allow remote root directly, at least
restrict it to
Mutiple AntiVirus Reserved Device Name Handling Vulnerability
Author:Sowhat
Date:October,9th,2004
http://secway.org/Advisory/Ad20041009.txt
Vendor:
AntiVir
www.hbedv.com
Twister
www.filseclab.com
Protector plus 2000
www.pspl.com
Overview:
As many popular AV's Reserved Device Name Handling
I think Mr. Hensing was trying to tell people how to be more secure with
what they currently have. While I agree that added length doesn't
necessarily make a password theoretically stronger, a passphrase will tend
to be longer than 14 characters and push you past the storage of the lm hash
which
Title: 3COM 3crwe754g72-a Administration interface code injection
Class: Design error
Affects:
3com 3crwe754g72-a
v 1.11
v 1.13
v 1.24
Id: cbsa-0001
Release Date: 2004-10-18
Author : Cyrille Barthelemy [EMAIL PROTECTED]
-- 1. Introduction
--
3Com 3crwe754g72-a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Monday, 18.10.2004 at 06:41 -0500, Ron DuFresne wrote:
What are you doing/changing about your SSH configurations to
reduce the possibility of these attacks finding any kind of hole
in the OpenSSH software (that's what I run, so that's the
Agenda Security Services
Security Vulnerability Advisory
After looking through some of the dirs on this ftp site I'm wondering what
use it is at all.
Just about everything I could look at hailed from 1996 or earlier.
Either way I'll bet the logs on that server would make an interesting read
for someone now.
Sean.
---
--- Harry de Grote wrote:
---
---
Harry de Grote wrote:
i have to admit... it's pretty old and useless, but i think this may be a nice
place for spammers to try out some new adresses...
This is *NOT* the major issue that everyone is blowing it out to be.
Lists like this are available on many organization/company websites.
Forget about the spammers, how about social engineers. This is quite the
gold mine for that.
Hi this is Joe Schmoe from building 69 I need to have my password reset.
-KF
i have to admit... it's pretty old and useless, but i think this may be a nice
place for spammers to try out some new
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Barrie == Barrie Dempster [EMAIL PROTECTED] writes:
Barrie On Mon, 2004-10-18 at 06:41 -0500, Ron DuFresne wrote:
Why not just disallow root logins directly, and force someone
with a valid user account to su after getting a shell? It
On Mon, 2004-10-18 at 14:01 +0100, Dave Ewart wrote:
Well yes, that's fair enough - however, allowing direct root access does
make certain things more straightforward, automated use of 'scp' etc.
Yeh, but theres only a select few people crazy enough to scp files into
places that require root
Oh yeah and we can trust you bozos not to put in backdoors, sploits and other
great modes of entry yeah right. 8-, Hire the burgler to secure your home,
yeah right? Doh!
Sheessh what a stupid idea?
The whole point of hiring people who don't know much is that they follow
a policy procedure and
Le lun 18/10/2004 à 17:12, james edwards a écrit :
I don't see the reason why it would cause a problem, as firewall is able
to spot ICMP related to server's IP connections as well...
New connections to the server must be implecitally allowed, as there
is no established state to refer to.
I
Le lun 18/10/2004 à 00:35, James Edwards a écrit :
That is great till you want to run a server behind that firewall.
I don't see the reason why it would cause a problem, as firewall is able
to spot ICMP related to server's IP connections as well...
New connections to the server must be
Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability
iDEFENSE Security Advisory 10.18.04
www.idefense.com/application/poi/display?id=153type=vulnerabilities
October 18, 2004
I. BACKGROUND
This vulnerability affects multiple anti-virus vendors including McAfee,
Computer
Hi,
I was wondering whether there's a newsgroup version
of the mails sent to this group?
Cheers,
Mark
Exactly as I stated eariler...this is just information leakage...old as
it might be, it helps...the people on the list are just doing their
jobs...getting paid and giving information to a employee that knows
their name (and is higher in the company) seems harmless. Spam isn't the
issue with this
On Thursday, October 14, 2004 3:13 PM, Deigo Dude wrote:
ftp://ftp.hq.nasa.gov/pub/nickname/
The list contains the full name, email, phone, fax, position,
building, room, and employer. When will they learn.
OMG OMG OMG!! I just opened up the phone book and it lists the names,
addresses,
please don't call me sir, that makes me old ;-)
the answer is 'no'
do I win a price now?
Ron DuFresne wrote:
Frank,
Question back at you sir; Does OS fingerprinting rely soley upon ICMP
leakage? I'd thought I saw a number of papers that related to OS
detection from the incentricities of TCP/IP
On Sat, October 16, 2004 5:25 pm, Tim said:
The reason for my post was to point out that Mr. Hensing doesn't appear
to be a reliable source of information on the topic of passwords and
hash security.
I think that much became apparent when Mr. Hensing took sarcastic shots at
Linux security
You actually CAN criticize bad decisions, but for that you have to be:
A) an expensive consultant from a major firm (e.g. good avice = expensive,
i.e. expensive advice = good!)
B) adressing the right audience in the organisation. Rule of thumb: the
higher your audience is in the hierarchy, the
Today Iran (Terhan), India (Bangalore) and Samoa are dragging
the Asian index down.
how you determine if its' DoS on these routers, or not? Is there a
Public Darknet
Monitoring Site out there tracking backscatter, or other such focused
traffic?
Andreas-
Cedric Blancher wrote:
Le lun
On Mon, 2004-10-18 at 20:43 +0530, Raj Mathur wrote:
Using su forces the use of passwords, which are difficult to manage in
a multi-admin scenario. For instance, you may have to give the root
password to 3 different people (1 in each 8-hour shift).
I didn't say su, I said _sudo_, theres a
Hello Eric,
2004. október 18., 19:02:37, wrote:
On Thursday, October 14, 2004 3:13 PM, Deigo Dude wrote:
ftp://ftp.hq.nasa.gov/pub/nickname/
The list contains the full name, email, phone, fax, position,
building, room, and employer. When will they learn.
EP OMG OMG OMG!! I just opened up
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200410-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
hoseix is [EMAIL PROTECTED] * I hack
hoseix on #HBX #skopesix #rosecurity #hackphreak
hoseix using *.undernet.org The Undernet Underworld
Don't tell me what to post on full-disclosure, k thanx.
___
Full-Disclosure - We believe in it.
Charter:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200410-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
On Mon, 18 Oct 2004 15:43:39 -0500, Todd Towles
[EMAIL PROTECTED] wrote:
Hey xploitable, who was telling you what to post and not to post?
Some dude who came on an IRC channel telling me not to speak out against Yahoo!
He told me not to disclosure vulnerabilities/ exploits/ bugs on
On Mon, 18 Oct 2004 10:28:39 -0400, Clairmont, Jan M
[EMAIL PROTECTED] wrote:
Oh yeah and we can trust you bozos not to put in backdoors, sploits and other
great modes of entry yeah right. 8-, Hire the burgler to secure your home,
yeah right? Doh!
Just because J.Random Hacker starts out as an
Yea, but the l0pht was never an exploit group. They were the most
true hackers I have ever personally known.
But it should also be considered that way back then, the youngest
member was in his teens, while the rest were significantly older than
him. Now, that youngest member (Kingpin) should be
On Mon, 18 Oct 2004 19:25:16 -0400, Micheal Espinola Jr
[EMAIL PROTECTED] wrote:
Yea, but the l0pht was never an exploit group. They were the most
true hackers I have ever personally known.
But it should also be considered that way back then, the youngest
member was in his teens, while the
52 matches
Mail list logo