Re: [Full-disclosure] iKAT - The Interactive Kiosk Attack Tool v2.0 Released - http://ikat.ha.cked.net

2009-05-27 Thread Sebastian Krahmer
On Wed, May 27, 2009 at 09:01:33PM +1200, Paul Craig wrote: [...] > On a final note, the 'iKAT Girl' as some people call her ( the iKAT logo) , > is a common point of contention people like to email me about. > Apparently a "half naked girl plucking a thong out of her ass" is not > acceptable w

Re: [Full-disclosure] Exploitation of unused IPv6-capabilities

2009-01-20 Thread Sebastian Krahmer
Hi, The papers pointed to by the others are basically straight forward and not really new issues if you know how ARP poisoning works. The thing that makes me wonder and adds some new points is 'As soon as the "victim" has an IPv6 address issued by your radvd it will prefer -entries over A-e

Re: [Full-disclosure] Exploring the UNKNOWN: Scanning the Internet via SNMP!

2008-03-05 Thread Sebastian Krahmer
Hi dude, On Wed, Mar 05, 2008 at 04:54:16AM -0800, Andrew A wrote: > hey dude, how is merely sending a single datagram not going to be faster > than doing an entire handshake? First, to know whether a TCP port is open you do not need a complete handshake. A single TCP packet is enough. I doubt th

Re: [Full-disclosure] Exploring the UNKNOWN: Scanning the Internet via SNMP!

2008-03-04 Thread Sebastian Krahmer
On Tue, Mar 04, 2008 at 12:02:25AM +, Adrian P wrote: > * Exploring the UNKNOWN: Scanning the Internet via SNMP! * > http://www.gnucitizen.org/blog/exploring-the-unknown-scanning-the-internet-via-snmp/ > > Hacking is not only about coming up with interesting solutions to > problems, but also

Re: [Full-disclosure] Am I missing anything ?

2007-07-24 Thread Sebastian Krahmer
On Tue, 24 Jul 2007, Deeþàn Chakravarthÿ wrote: Hi, Yes. Do not forget to mention that Security 2.0 is only half of the truth. Folks tends to buy protections against any kind of Cross Brain Smashing (CBS) or Anti-Anti-Anti Think Pinning (AAATP) and used to let their X and telnet servers open.

Re: [Full-disclosure] Month of Random Hashes: DAY FOUR

2007-06-15 Thread Sebastian Krahmer
On Thu, 14 Jun 2007, Month of Random Hashes wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > [ITEM #1] > md5: c6cab3a9af2ec1d281a6bf46ff61b3a8 > sha1: eb4fdace21518071d68a72d37b395a609305b42f > sha256: > b11cb917eac32ac0c1f7d733eee8513e47e9681cbef25e2625f4a410b11d This one is o

Re: [Full-disclosure] hiding routers

2007-04-18 Thread Sebastian Krahmer
On Wed, 18 Apr 2007, Kristian Hermansen wrote: Hi, All better firewalling equipment offers a "stealth-routing" feature; patches also exist for the Linux kernel. They can be detected using DF-bit and certain other fields within the IP hdr, depending on implementation and setup. Not decrementing TT

Re: [Full-disclosure] Newest hacks

2007-03-21 Thread Sebastian Krahmer
On Wed, 21 Mar 2007, Saeed Abu Nimeh wrote: Hi, This is not very different from the common session riding attacks happening since ages, except the part after the "vulnerability" (changing DNS or whatever). Internal 192.168.x.y tags have been used since years to trigger intranet CGI's and configu

[Full-disclosure] Open Source call graph paper announcement

2006-06-19 Thread Sebastian Krahmer
Hi, For those who are interested in: http://www.suse.de/~krahmer/instrumental/instrumental.pdf and http://www.suse.de/~krahmer/bbpaint/bbpaint.pdf The first one describes how to use certain GCC features to generate call graphs from a running program. The second one describes how ptrace() might

[Full-disclosure] Advisory * +Thu Mar 16 21:05:17 EST 2006+ * Directory Transversal in ISC INN

2006-03-16 Thread Sebastian Krahmer
Advisory * +Thu Mar 16 21:05:17 EST 2006+ * Directory Transversal in ISC INN +++ I. Description Remote exploitation of a directory traversal vulnerability in ISC INN could allow attackers to overwrite or view arbitrary files with user-supplied conten

Re: [Full-disclosure] BSD Securelevels: Circumventing protection of files flagged immutable

2006-01-10 Thread Sebastian Krahmer
On Mon, 9 Jan 2006, RedTeam Pentesting wrote: Hi, Such an attack has been described in my DIMVA 2004 submission: http://www-rnks.informatik.tu-cottbus.de/~mm/sidar/dimva2004/materials/KrahmerSlides.pdf http://www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/dimva2004/materials/KrahmerPaper.pd

[Full-disclosure] SUSE Security Announcement: OpenWBEM (SUSE-SA:2005:060)

2005-10-17 Thread Sebastian Krahmer
-BEGIN PGP SIGNED MESSAGE- __ SUSE Security Announcement Package:OpenWBEM Announcement ID:SUSE-SA:2005:060 Date: Mon, 17 O

[Full-disclosure] no-NX paper announcement

2005-10-04 Thread Sebastian Krahmer
Hi, A new paper describing NX technology and its limitations can be found at http://www.suse.de/~krahmer/no-nx.pdf It contains in depth discussion and sample code for the Hammer/Linux platform, analyzes the weaknesses and discusses countermeasures. regards, Sebastian -- ~ ~ perl self.pl ~ $_

[Full-disclosure] SUSE Security Announcement: cvs (SUSE-SA:2005:024)

2005-04-18 Thread Sebastian Krahmer
-BEGIN PGP SIGNED MESSAGE- __ SUSE Security Announcement Package:cvs Announcement-ID:SUSE-SA:2005:024 Date: Monday, Apr 18

[Full-disclosure] SUSE Security Announcement: openslp (SUSE-SA:2005:015)

2005-03-14 Thread Sebastian Krahmer
-BEGIN PGP SIGNED MESSAGE- __ SUSE Security Announcement Package:openslp Announcement-ID:SUSE-SA:2005:015 Date: Mon, March