Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Mike Hale
No, you're saying something's a vulnerability without showing any
indication of how it can be abused.

On Fri, Mar 14, 2014 at 11:00 AM, Nicholas Lemonias.
lem.niko...@googlemail.com wrote:
 The full-disclosure mailing list has really changed. It's full of lamers
 nowdays aiming high.





 On Fri, Mar 14, 2014 at 5:58 PM, Nicholas Lemonias.
 lem.niko...@googlemail.com wrote:

 Says the script kiddie... Beg for some publicity. My customers are FTSE
 100.

 -- Forwarded message --
 From: Nicholas Lemonias. lem.niko...@googlemail.com
 Date: Fri, Mar 14, 2014 at 5:58 PM
 Subject: Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC
 To: antisnatchor antisnatc...@gmail.com


 Says the script kiddie... Beg for some publicity. My customers are FTSE
 100.




 On Fri, Mar 14, 2014 at 5:55 PM, antisnatchor antisnatc...@gmail.com
 wrote:

 LOL you're hopeless.
 Good luck with your business. Brave customers!

 Cheers
 antisnatchor

 Nicholas Lemonias. wrote:


 People can read the report if they like. Can't you even do basic things
 like reading a vulnerability report?

 Can't you see that the advisory is about writing arbitrary files. If I
 was your boss I would fire you.
 -- Forwarded message --
 From: Nicholas Lemonias. lem.niko...@googlemail.com
 Date: Fri, Mar 14, 2014 at 5:43 PM
 Subject: Re: [Full-disclosure] Google vulnerabilities with PoC
 To: Mario Vilas mvi...@gmail.com


 People can read the report if they like. Can't you even do basic things
 like reading a vulnerability report?

 Can't you see that the advisory is about writing arbitrary files. If I
 was your boss I would fire you, with a good kick outta the door.






 On Fri, Mar 14, 2014 at 3:55 PM, Mario Vilas mvi...@gmail.com wrote:

 On Fri, Mar 14, 2014 at 12:38 PM, Nicholas Lemonias.
 lem.niko...@googlemail.com wrote:

 Jerome of Mcafee has made a very valid point on revisiting  separation
 of duties in this security instance.

 Happy to see more professionals with some skills.  Some others have
 also mentioned the feasibility for Denial of Service attacks. Remote code
 execution by Social Engineering is also a prominent scenario.


 Actually, people have been pointing out exactly the opposite. But if you
 insist on believing you can DoS an EC2 by uploading files, good luck to you
 then...



 If you can't tell that that is a vulnerability (probably coming from a
 bunch of CEH's), I feel sorry for those consultants.


 You're the only one throwing around certifications here. I can no longer
 tell if you're being serious or this is a massive prank.



 Nicholas.


 On Fri, Mar 14, 2014 at 10:45 AM, Nicholas Lemonias.
 lem.niko...@googlemail.com wrote:

 We are on a different level perhaps. We do certainly disagree on those
 points.
 I wouldn't hire you as a consultant, if you can't tell if that is a
 valid vulnerability..


 Best Regards,
 Nicholas Lemonias.

 On Fri, Mar 14, 2014 at 10:10 AM, Mario Vilas mvi...@gmail.com
 wrote:

 But do you have all the required EH certifications? Try this one from
 the Institute for
 Certified Application Security Specialists: http://www.asscert.com/


 On Fri, Mar 14, 2014 at 7:41 AM, Nicholas Lemonias.
 lem.niko...@googlemail.com wrote:

 Thanks Michal,

 We are just trying to improve Google's security and contribute to
 the research community after all. If you are still on EFNet give me a 
 shout
 some time.

  We have done so and consulted to hundreds of clients including
 Microsoft, Nokia, Adobe and some of the world's biggest corporations. 
 We are
 also strict supporters of the ACM code of conduct.

 Regards,
 Nicholas Lemonias.
 AISec


 On Fri, Mar 14, 2014 at 6:29 AM, Nicholas Lemonias.
 lem.niko...@googlemail.com wrote:

 Hi Jerome,

 Thank you for agreeing on access control, and separation of duties.

 However successful exploitation permits arbitrary write() of any
 file of choice.

 I could release an exploit code in C Sharp or Python that permits
 multiple file uploads of any file/types, if the Google security team 
 feels
 that this would be necessary. This is unpaid work, so we are not so 
 keen on
 that job.



 On Fri, Mar 14, 2014 at 6:04 AM, Jerome Athias
 athiasjer...@gmail.com wrote:

 Hi

 I concur that we are mainly discussing a terminology problem.

 In the context of a Penetration Test or WAPT, this is a Finding.
 Reporting this finding makes sense in this context.

 As a professional, you would have to explain if/how this finding
 is a
 Weakness*, a Violation (/Regulations, Compliance, Policies or
 Requirements[1])
 * I would say Weakness + Exposure = Vulnerability. Vulnerability +
 Exploitability (PoC) = Confirmed Vulnerability that needs Business
 Impact and Risk Analysis

 So I would probably have reported this Finding as a Weakness (and
 not
 Vulnerability. See: OWASP, WASC-TC, CWE), explaining that it is
 not
 Best Practice (your OWASP link and Cheat Sheets), and even if
 mitigative/compensative security controls (Ref Orange Book),
 

Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-30 Thread Mike Hale
Not necessarily.

Look at the effects of people posting DeCSS and the HDDVD keys a while back.

The industry ended up giving in precisely because people said, en
masse, fuck off.

On Mon, Jan 30, 2012 at 12:05 AM, Christian Sciberras uuf6...@gmail.com wrote:
 No, it follows the fact that vengeance (the fuck you Byron mentioned)
 isn't fruitful to remedy the situation.







 On Mon, Jan 30, 2012 at 8:54 AM, Mike Hale eyeronic.des...@gmail.com
 wrote:

 What you said doesn't follow.

 Making a digital copy isn't burning down a business.  The analogy
 linking 'piracy' with theft is ludicrous.

 On Sun, Jan 29, 2012 at 11:50 PM, Christian Sciberras uuf6...@gmail.com
 wrote:
  Byron, you don't protest to the government by burning down 100-year-old
  business, if you know what I mean...
 
 
 
 
 
  On Mon, Jan 30, 2012 at 12:12 AM, Byron L. Sonne byron.so...@gmail.com
  wrote:
 
  The thing that makes me laugh about all of this, and one of the key
  things I learned from reading Gibbon's Decline  Fall is this:
 
  The number and frequency of laws passed regarding things directly
  relates to how widespread these things are, and how they much the laws
  are ignored and ineffective. Laws can't prevent a damn thing, they can
  only specify remedies. As it is said, it's only illegal if you get
  caught.
 
  The cat is out of the bag and will never be put back in. There's no way
  to stop people from 'illegally' copying copyrighted material.
 
  If they somehow managed to require and implement tech so that perfect
  digital copies can't be made (unlikely) then people will simply use a
  camera to record the video as it plays on the screen. Hey, wait a
  minute, that sounds just like that screener I downloaded someone taped
  in Russia! ;)
 
  If they manage to require and implement tech so that you can't trade it
  over the internet (unlikely) then people will simply trade it on
  private
  networks or, like we used to do in the old days, via sneakernet.
 
  The problem is that in an attempt to control the dissemination of
  copyrighted material (and people are right, artists do have a right to
  reap the benefits of their effort) the powers-that-be are stepping over
  the line and into territory that impacts our ability to communicate in
  the fashion we choose.
 
  It might be fine to try and prevent piracy but in the process of doing
  so you are trashing the other desires of people that have nothing to do
  with piracy.
 
  I'm sure if the copyright lobby had their way, they'd require us to
  wear
  special glasses in order to see our laptop screens, on the assumption
  that anything not explicitly licensed was assumed to be unlicensed, and
  thus pirated, which we would be blocked from our field of view... and
  as
  a result, some girl/guy who wants to write a simple freeware text
  editor
  now has to jump through regulatory hoops and spend money to obtain a
  special registration that allows their text editor to display to the
  screen. This is a cheesy example, but I think it makes the point.
 
  In the guise of 'protecting artists and businesses' what is happening
  is
  that the powers-that-be are requesting (and too often getting) powers
  that allow them to trample on the general idea of freedom of
  communications and other things people cherish.
 
  As a result, people are inclined to engage in the very behaviours that
  elicited the laws and crackdowns, quite simply, as a way to raise their
  middle finger and say Fuck You.
 
  This is when piracy and theft becomes freedom of expression - when it's
  done in protest.
 
  --
  http://www.freebyron.org
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/



 --
 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0





-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-29 Thread Mike Hale
What you said doesn't follow.

Making a digital copy isn't burning down a business.  The analogy
linking 'piracy' with theft is ludicrous.

On Sun, Jan 29, 2012 at 11:50 PM, Christian Sciberras uuf6...@gmail.com wrote:
 Byron, you don't protest to the government by burning down 100-year-old
 business, if you know what I mean...





 On Mon, Jan 30, 2012 at 12:12 AM, Byron L. Sonne byron.so...@gmail.com
 wrote:

 The thing that makes me laugh about all of this, and one of the key
 things I learned from reading Gibbon's Decline  Fall is this:

 The number and frequency of laws passed regarding things directly
 relates to how widespread these things are, and how they much the laws
 are ignored and ineffective. Laws can't prevent a damn thing, they can
 only specify remedies. As it is said, it's only illegal if you get
 caught.

 The cat is out of the bag and will never be put back in. There's no way
 to stop people from 'illegally' copying copyrighted material.

 If they somehow managed to require and implement tech so that perfect
 digital copies can't be made (unlikely) then people will simply use a
 camera to record the video as it plays on the screen. Hey, wait a
 minute, that sounds just like that screener I downloaded someone taped
 in Russia! ;)

 If they manage to require and implement tech so that you can't trade it
 over the internet (unlikely) then people will simply trade it on private
 networks or, like we used to do in the old days, via sneakernet.

 The problem is that in an attempt to control the dissemination of
 copyrighted material (and people are right, artists do have a right to
 reap the benefits of their effort) the powers-that-be are stepping over
 the line and into territory that impacts our ability to communicate in
 the fashion we choose.

 It might be fine to try and prevent piracy but in the process of doing
 so you are trashing the other desires of people that have nothing to do
 with piracy.

 I'm sure if the copyright lobby had their way, they'd require us to wear
 special glasses in order to see our laptop screens, on the assumption
 that anything not explicitly licensed was assumed to be unlicensed, and
 thus pirated, which we would be blocked from our field of view... and as
 a result, some girl/guy who wants to write a simple freeware text editor
 now has to jump through regulatory hoops and spend money to obtain a
 special registration that allows their text editor to display to the
 screen. This is a cheesy example, but I think it makes the point.

 In the guise of 'protecting artists and businesses' what is happening is
 that the powers-that-be are requesting (and too often getting) powers
 that allow them to trample on the general idea of freedom of
 communications and other things people cherish.

 As a result, people are inclined to engage in the very behaviours that
 elicited the laws and crackdowns, quite simply, as a way to raise their
 middle finger and say Fuck You.

 This is when piracy and theft becomes freedom of expression - when it's
 done in protest.

 --
 http://www.freebyron.org

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] I know its old, but what the heck does this do... (exposing a tool...)

2011-10-25 Thread Mike Hale
Exploits this, maybe?

http://www.us-cert.gov/cas/bulletins/SB05-040.html#smb

On Tue, Oct 25, 2011 at 6:50 PM, xD 0x41 sec...@gmail.com wrote:
 Hello List,
 Id like people to also, like this thread asks, to pls give some opinion,
 other than mine.. wich, i am yet to make;

 http://www.hackerthreads.org/Topic-5973

 Please look at this .c code on here, if you wish, and tell me, why
 A. It is still in circulation, seeminlgly, on MANY MANY boxes
 B. people still seem to try keep it private :s

 This morning, a friend from webhostingtalk.com ,asked me to take a look.
 I have and, i can only sofar say, once i decrypt the shellcode, ill  know
 abit more..
 altho , i rmember this thing, and, somany people were after it, people were
 paying for it, this is first time i have seen it actually disclosed tho,
 admittedly only looked today.
 If skiddies are using it to ddos things, I want to makesure i can expose it,
 and kill the threats.
 thankyou.
 xd .// exposing bullshit as i ride!


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-14 Thread Mike Hale
Obviously not.

Again.  They looked like they had weapons.  The pilots weren't
wondering...they were sure they saw weapons.

They then engaged what appeared to be a clear threat to other US
forces nearby.

The pilots acted exactly as they should have, given the information
presented to them.  This was a war zone, not a country club.

On Thu, Oct 13, 2011 at 11:23 PM, Jeffrey Walton noloa...@gmail.com wrote:
 On Fri, Oct 14, 2011 at 2:19 AM, Mike Hale eyeronic.des...@gmail.com wrote:
 Except that they weren't obviously unarmed.

 Not only where they not obviously unarmed, they appeared to be armed.

 Look at the 4 minute mark.

 That sure as shit looks like an RPG.

 The crew thought the group was armed.  Ergo, they were cleared to engage.

 This wasn't a war crime...and the allegation that it was just makes
 people look ridiculous.
 Listen to yourself: we weren't sure if they were armed, so we killed
 them. Put yourself and your family in the shoes of the dead folks. Its
 not a comfortable place to be, is it?

 Jeff

 On Thu, Oct 13, 2011 at 11:05 PM,  valdis.kletni...@vt.edu wrote:
 On Thu, 13 Oct 2011 22:44:44 PDT, Mike Hale said:
 Seriously!  Think about the injustice of having American helicopters
 engage armed individuals shadowing American soldiers.

 Shooting at armed individuals is one thing.  If it's civilians and 
 Reuters
 employees who *aren't* obviously armed, it's something else.





 --
 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0





-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-14 Thread Mike Hale
Of all the wars, crimes and massacres that happen in the world, you're
gonna sit here and tell me it's the US that the security council
should have stopped?

If that's truly your attitude, your worldview is completely FUBAR.

On Fri, Oct 14, 2011 at 4:29 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Fri, Oct 14, 2011 at 7:26 AM, Darren Martyn
 d.martyn.fulldisclos...@gmail.com wrote:
 ...And what, exactly, gave the US the right to be there in the first place?
 Non existant WMD? Human rights? The US has to stop seeing themselves as
 international police.
 The US can't police itself; and it has no business trying to police
 others. The UN Security Council is a joke - it should have stopped the
 US a long time ago (an impossibility under its current structure).

 Jeff

 On Fri, Oct 14, 2011 at 7:28 AM, Mike Hale eyeronic.des...@gmail.com
 wrote:

 Obviously not.

 Again.  They looked like they had weapons.  The pilots weren't
 wondering...they were sure they saw weapons.

 They then engaged what appeared to be a clear threat to other US
 forces nearby.

 The pilots acted exactly as they should have, given the information
 presented to them.  This was a war zone, not a country club.

 On Thu, Oct 13, 2011 at 11:23 PM, Jeffrey Walton noloa...@gmail.com
 wrote:
  On Fri, Oct 14, 2011 at 2:19 AM, Mike Hale eyeronic.des...@gmail.com
  wrote:
  Except that they weren't obviously unarmed.
 
  Not only where they not obviously unarmed, they appeared to be armed.
 
  Look at the 4 minute mark.
 
  That sure as shit looks like an RPG.
 
  The crew thought the group was armed.  Ergo, they were cleared to
  engage.
 
  This wasn't a war crime...and the allegation that it was just makes
  people look ridiculous.
  Listen to yourself: we weren't sure if they were armed, so we killed
  them. Put yourself and your family in the shoes of the dead folks. Its
  not a comfortable place to be, is it?
 
  Jeff
 
  On Thu, Oct 13, 2011 at 11:05 PM,  valdis.kletni...@vt.edu wrote:
  On Thu, 13 Oct 2011 22:44:44 PDT, Mike Hale said:
  Seriously!  Think about the injustice of having American helicopters
  engage armed individuals shadowing American soldiers.
 
  Shooting at armed individuals is one thing.  If it's civilians and
  Reuters
  employees who *aren't* obviously armed, it's something else.
 
 
 
 
 
  --
  09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0
 
 



 --
 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/






-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-14 Thread Mike Hale
Except that they weren't obviously unarmed.

Not only where they not obviously unarmed, they appeared to be armed.

Look at the 4 minute mark.

That sure as shit looks like an RPG.

The crew thought the group was armed.  Ergo, they were cleared to engage.

This wasn't a war crime...and the allegation that it was just makes
people look ridiculous.

On Thu, Oct 13, 2011 at 11:05 PM,  valdis.kletni...@vt.edu wrote:
 On Thu, 13 Oct 2011 22:44:44 PDT, Mike Hale said:
 Seriously!  Think about the injustice of having American helicopters
 engage armed individuals shadowing American soldiers.

 Shooting at armed individuals is one thing.  If it's civilians and Reuters
 employees who *aren't* obviously armed, it's something else.





-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-13 Thread Mike Hale
Seriously!  Think about the injustice of having American helicopters
engage armed individuals shadowing American soldiers.

The inhumanity is heart breaking.

Go troll somewhere else.

On Thu, Oct 13, 2011 at 9:53 PM, Jeffrey Walton noloa...@gmail.com wrote:
 On Fri, Oct 14, 2011 at 12:22 AM, Jeffrey Walton noloa...@gmail.com wrote:
 On Thu, Oct 13, 2011 at 11:59 PM, Ivan . ivan...@gmail.com wrote:
 don't feed the trolls

 http://whatreallyhappened.com/
 Don't forget http://www.collateralmurder.com/.

 Its appalling the US pilots of the helicopter make a joke and laugh
 when they shoot the children (they shouldn't have brought their kids
 to work, IIRC).
 My bad. The Apache pilot joked, It's their fault for bringing their
 kids into a battle (at 15:28), with 'their' meaning the civilians and
 Reuters employees killed by the US military in an unprovoked attack.

 Jeff

 On Fri, Oct 14, 2011 at 2:53 PM, Laurelai laure...@oneechan.org wrote:

 On 10/13/2011 7:11 PM, Christian Sciberras wrote:

  So if they cause damage for profit that makes it ok?
 No. But it's certainly better than doing damage without profit. Making
 profit means that at the end of the day, the money's going to go somewhere
 further in the chain.
 Flattening a tower, for instance, or attacking the local bank that refused
 to give you a loan because of the time you spent in a cell, isn't as
 productive.
 Neither is it making a company loose clients/profit just because they
 decided they don't want you to use their services (as if you did have a
 right in the first place...).

 So by your logic the civil disobedience that helped sparked the
 revolutionary war is worse than if someone had done the same acts just to
 drive up tea prices? Again I also remind you the trickle down theory 
 doesn't
 work

  And yes I acknowledge the American public has a measure of
  responsibility in the situation too, human beings are by nature 
  imperfect,
  but the largest share of responsibility lies with the names listed below.
 The largest share? I can see Ex-president Bush trying to sell you a bottle
 of beer for $10 dollars ($7 profit). Wait, I can't.

 But we did see him increase deregulation and allow this to happen, we also
 saw him provoke a war with another country based on a known lie for the 
 sole
 purpose of gaining resources and more control in the middle east. We saw 
 him
 legalize torture and saw him strip away a good chunk of our civil liberties
 so the anti terror industry could make a buck. But like you said its ok
 since someone is making money off of it. Who needs civil liberties anyways
 right?

  That sort of thing has happened to me and I paid back every dime of it,
  most people are decent human beings and would do the same.
 Most people? I could have sworn 90% of the people in the NYC subway would
 thank $deity if you suddenly dropped dead so they could get things off you.
 Call me cynical, but I wouldn't trust anyone else in such cases, other
 than myself.

 Frankly 90% of people on this list would just thank $deity i suddenly
 dropped dead regardless of how much stuff i had :)

 Regarding that list of yours, great! Now we just need a little more
 effort. For each of those persons, please enlighten us as to what they did
 legally wrong.
 Of course, the people that landed in jail shouldn't be counted. The 99%
 protest is a modern one committed to change, it just can't right wrongs by
 pointing at jailed people.

 [SNIP]


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Other recommended lists?

2011-02-21 Thread Mike Hale
Probably becuase you've been the biggest troll on this list for the
last few weeks?

On Mon, Feb 21, 2011 at 11:04 AM, Cal Leeming [Simplicity Media Ltd]
cal.leem...@simplicitymedialtd.co.uk wrote:
 And why is that, Paul?

 On Mon, Feb 21, 2011 at 7:03 PM, Paul Schmehl pschmehl_li...@tx.rr.com
 wrote:

 --On February 21, 2011 6:15:07 PM + Cal Leeming [Simplicity Media
 Ltd] cal.leem...@simplicitymedialtd.co.uk wrote:

 Can anyone recommend any decent lists, preferably that are moderated
 against douchebaggery and trolls (but allow swearing and insults etc),
 and allows for general security/tech related discussion?

 Seriously?  I think it's safe to assume you don't understand irony.

 --
 Paul Schmehl, Senior Infosec Analyst
 As if it wasn't already obvious, my opinions
 are my own and not those of my employer.
 ***
 It is as useless to argue with those who have
 renounced the use of reason as to administer
 medication to the dead. Thomas Jefferson
 There are some ideas so wrong that only a very
 intelligent person could believe in them. George Orwell



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Other recommended lists?

2011-02-21 Thread Mike Hale
Your porn thread among others?  Is this is a serious question?

On Mon, Feb 21, 2011 at 11:07 AM, Cal Leeming [Simplicity Media Ltd]
cal.leem...@simplicitymedialtd.co.uk wrote:
 How so?

 On Mon, Feb 21, 2011 at 7:06 PM, Mike Hale eyeronic.des...@gmail.com
 wrote:

 Probably becuase you've been the biggest troll on this list for the
 last few weeks?

 On Mon, Feb 21, 2011 at 11:04 AM, Cal Leeming [Simplicity Media Ltd]
 cal.leem...@simplicitymedialtd.co.uk wrote:
  And why is that, Paul?
 
  On Mon, Feb 21, 2011 at 7:03 PM, Paul Schmehl pschmehl_li...@tx.rr.com
  wrote:
 
  --On February 21, 2011 6:15:07 PM + Cal Leeming [Simplicity Media
  Ltd] cal.leem...@simplicitymedialtd.co.uk wrote:
 
  Can anyone recommend any decent lists, preferably that are moderated
  against douchebaggery and trolls (but allow swearing and insults etc),
  and allows for general security/tech related discussion?
 
  Seriously?  I think it's safe to assume you don't understand irony.
 
  --
  Paul Schmehl, Senior Infosec Analyst
  As if it wasn't already obvious, my opinions
  are my own and not those of my employer.
  ***
  It is as useless to argue with those who have
  renounced the use of reason as to administer
  medication to the dead. Thomas Jefferson
  There are some ideas so wrong that only a very
  intelligent person could believe in them. George Orwell
 
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 



 --
 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0





-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IBM DeveloperWorks Pwned and Defaced

2011-01-08 Thread Mike Hale
http://ploader.net/files/ad1da891a1cef64466a7562879291c30.jpg

On Sat, Jan 8, 2011 at 11:23 PM, Cal Leeming [Simplicity Media Ltd] 
cal.leem...@simplicitymedialtd.co.uk wrote:

 Got a screenshot? I only see:

Our apologies

 The IBM developerWorks Web site is currently under maintenance.
 Please try again later.

 Thank you.


 On Sun, Jan 9, 2011 at 7:04 AM, Shinnok rayde...@yahoo.com wrote:

 http://www.ibm.com/developerworks/linux/library/l-proc.html  \^^

 Br,

 Shinnok

 http://twitter.com/raydenxy





 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Andrew Auernheimer (aka weev) wants his victim's to masturbate for him

2011-01-07 Thread Mike Hale
Jesus, you are such a troll.

On Fri, Jan 7, 2011 at 7:46 AM, Victor Rigo victor_r...@yahoo.com wrote:
same old useless crap


 Victor Rigo, CISSP
 Independent Computer Security Consultant
 Buenos Aires, AR
 +5411-4316-1901




 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Flaw in Microsoft Domain Account Caching Allows Local Workstation Admins to Temporarily Escalate Privileges and Login as Cached Domain Admin Accounts (2010-M$-002)

2010-12-10 Thread Mike Hale
In fact, I can just make the Domain Admin a guest on my workstation
if I want to and there is nothing they can do about it.
With the caveat that they can readd themselves using GP anytime they
want...but you know.  I just wanted to throw that out there.

I think the key vulnerability in this is the non-repudiation one the
OP mentioned.  Being able to run stuff under the domain admin's
account is something a rogue user could potential abuse.

I don't think this issue is particularly critical, but something a
good admin should be aware of, IMO.

On Thu, Dec 9, 2010 at 7:07 PM, Thor (Hammer of God)
t...@hammerofgod.com wrote:
 What do you mean by regular local administrator?  You're a local admin, or 
 you're not.  There are not degrees of local admin.  Why are you under the 
 impression that there are things on a local system that the local admin 
 should not have access to?  They can do anything they want to by design.  Are 
 you under the impression that the Domain Administrator has different 
 permissions on a local machine than the local administrator does?   The only 
 reason a Domain Admin has admin rights by default on a domain workstation is 
 because they simply belong to the local Administrators group.  If I, as a 
 local admin, remove the domain admin account from my local Administrators 
 group, then they will not be local admins.  In fact, I can just make the 
 Domain Admin a guest on my workstation if I want to and there is nothing 
 they can do about it.

 Sorry to be the bearer of bad news for you, but the local admin can do what 
 they want to by design, and there is nothing that was not intended by the 
 software developer here.  This is, of course, why the people at MSFT 
 dismissed it as noted.

 t

 -Original Message-
 From: StenoPlasma @ ExploitDevelopment 
 [mailto:stenopla...@exploitdevelopment.com]
 Sent: Thursday, December 09, 2010 6:13 PM
 To: Thor (Hammer of God); full-disclosure@lists.grok.org.uk
 Subject: RE: [Full-disclosure] Flaw in Microsoft Domain Account Caching 
 Allows Local Workstation Admins to Temporarily Escalate Privileges and Login 
 as Cached Domain Admin Accounts (2010-M$-002)

 T,

 My article describes how to use the SECURITY registry hive to trick the 
 Microsoft operating system in to performing an action that has a result that 
 is not intended by the software developer.  This action is performed on the 
 Active Directory logon account cache that regular local administrators should 
 not have access to.  There are always other ways of doing things when it 
 comes to this type of work.


 Thank you,

 -
 StenoPlasma at ExploitDevelopment.com
 www.ExploitDevelopment.com
 -

  Original Message 
 From: Thor (Hammer of God) t...@hammerofgod.com
 Sent: Thursday, December 09, 2010 6:07 PM
 To: stenopla...@exploitdevelopment.com
 stenopla...@exploitdevelopment.com, full-disclosure@lists.grok.org.uk
 full-disclosure@lists.grok.org.uk
 Subject: RE: [Full-disclosure] Flaw in Microsoft Domain Account
 Caching
 Allows Local Workstation Admins to Temporarily Escalate Privileges and Login 
 as Cached Domain Admin Accounts (2010-M$-002)

 Why all the trouble?  Just change the log files directly when logged
 in
 as the local admin.  It's a whole lot simpler, and you don't even need the 
 domain administrator to have interactively logged into your workstation.
 Or is your point that local administrators are, um, local administrators?

 t

 -Original Message-
 From: full-disclosure-boun...@lists.grok.org.uk
 [mailto:full-disclosure-
 boun...@lists.grok.org.uk] On Behalf Of StenoPlasma @
 www.ExploitDevelopment.com
 Sent: Thursday, December 09, 2010 5:07 PM
 To: bugt...@securityfocus.com; full-disclosure@lists.grok.org.uk
 Cc: stenopla...@exploitdevelopment.com
 Subject: [Full-disclosure] Flaw in Microsoft Domain Account Caching
 Allows
 Local Workstation Admins to Temporarily Escalate Privileges and Login
 as
 Cached Domain Admin Accounts (2010-M$-002)
 

---
---


 www.ExploitDevelopment.com 2010-M$-002

---
---


 
 TITLE:
 Flaw in Microsoft Domain Account Caching Allows Local Workstation
 Admins
 to
 Temporarily Escalate Privileges and Login as Cached Domain Admin
 Accounts
 
 SUMMARY AND IMPACT:
 All versions of Microsoft Windows operating systems allow real-time
 modifications to the Active Directory cached accounts listing stored
 on
 all
 Active Directory domain workstations and servers. This allows domain
 users
 that have local administrator privileges on domain assets to modify
 their
 cached accounts to masquerade as other domain users that have logged
 in
 to
 those domain assets. This will allow local administrators to
 temporarily
 escalate their domain privileges on domain workstations or 

Re: [Full-disclosure] Congratulations Andrew

2010-06-25 Thread Mike Hale
That is too fucking funny.

Sometimes schadenfreude comes back to bite you in the ass.

On Thu, Jun 24, 2010 at 1:10 PM, Cody Robertson c...@hawkhost.com wrote:
 On 6/24/10 3:54 PM, T Biehn wrote:
 Ouch dude:
 http://www.cbc.ca/canada/toronto/story/2010/06/23/tor-g20-arrest.html

 Guess you ate a dick too.

 On Wed, Jun 16, 2010 at 7:05 PM, Byron Sonne blso...@halvdan.com wrote:

 Looks like Andrew/weev/n3td3v finally gets to do what he likes the most
 Performing fellatio on his fellow inmates
 http://www.theregister.co.uk/2010/06/16/auernheimer_arrested/

 Oh man, pretty sweet! I've been waiting years to see weev eat a dick,
 and the time has come at last.

 Maybe there is a god.

 --
     Byron L. Sonne :: blso...@halvdan.com :: www.halvdan.com
 gpg: 0x69D9EAA6, C651 EF07 1298 58B3 615D 4019 E196 BAE1 69D9 EAA6

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/






 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

 Oh wow, June 23rd?!

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] A lot of people have labelled me a snitch, Mr Lamo told BBC News.

2010-06-07 Thread Mike Hale
Yeah, Lamo is a complete fucking douche.

That said...Manning is a complete and total moron.

*shakes head*

-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Mike Hale
Looks like he rewrote it and clarified what he meant to say.

I think this is a lesson on why you really should proofread stuff and
ask someone else to go over your writings before you publish
something.

On Mon, May 3, 2010 at 5:44 PM, Sec News secn...@gmail.com wrote:
 Did anyone else see this?

 http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
 
 Penetration Tools Can Be Weapons in the Wrong Hands
 Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security,
 Vulnerability Management

 After a lifetime in the vulnerability assessment field, I’ve come to look at
 penetration testing almost as a kind of crime, or at least a misdemeanor.

 We enjoy freedom of speech, even if it breaks the law or license agreements.
 Websites cover techniques for jailbreaking iPhones even though it clearly
 violates the EULA for Apples devices. Penetration tools clearly allow the
 breaking and entering of systems to prove that vulnerabilities are real, but
 clearly could be used maliciously to break the law.

 Making these tools readily available is like encouraging people to play with
 fireworks. Too bold of a statement? I think not. Fireworks can make a
 spectacular show, but they can also be abused and cause serious damage. In
 most states, only people licensed and trained are permitted to set off
 fireworks.

 Now consider a pen test tool. In its open form, on the Internet, everyone
 and anyone can use it to test their systems, but in the wrong hands, for
 free, it can be used to break into systems and cause disruption, steal
 information, or cause even more permanent types of harm.

 How many people remember the 80’s TV show Max Headroom? Next to murder, the
 most severe crime was if users illegally used information technology systems
 to steal information or make money. There was tons of security around these
 systems and even possession of tools to penetrate a system was a crime too.
 So what’s the difference?

 Yes, it is just a TV show but in reality today we are in effect putting
 weapons in people’s hands, not tracking them, and allowing them to use them
 near anonymously to perform crimes or learn how to perform more
 sophisticated attacks. It all comes back to the first amendment and Freedom
 of Speech. I can write a blog of this nature, state my opinion about how I
 feel about free penetration testing tools, and assure everyone that they
 need defenses to protect their systems, since free weapons are available
 that can break into your systems – easily.
 
 WOW - am i the only one to go WTF to this?  Talk about alienating your
 customers and shitting where you eat.
 And to think i used to be a fan...
 - Some anonymous ex-eEye fan
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-27 Thread Mike Hale
Your comparison doesn't work.

It's not A versus B, it's A versus C, with C being Company does
nothing because it can't afford a thorough security program.

On Mon, Apr 26, 2010 at 2:07 PM, Michel Messerschmidt
li...@michel-messerschmidt.de wrote:
 On Mon, Apr 26, 2010 at 06:02:48AM -0700, Shaqe Wan wrote:
 I am not stating that PCI is good in no way, but I am saying that its a MUST 
 for companies dealing with CC. And in a windows environment, an AV is 
 important.

 Did you consider that an anti-virus may actually be the worst security
 solution for certain threats because it allows companies not to think
 about security while providing insufficient protection?

 What's your choice:
 Company A installs an anti-virus and updates it regularly (BTW regularly
 includes once a year).
 Company B has a recovery concept, incident response team, vulnerability
 monitoring, patch management, NIDS, security training but no anti-virus.

 He probably thought that I am with the rules of PCI, or that I don't have 
 any idea that the world is not just WINDOWS !!!

 No, I don't think so.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-27 Thread Mike Hale
-they are arguing for the fun of it without any real arguments (why else
prove me right on my arguments and later on deny it?)

So you fall into this category?
On Tue, Apr 27, 2010 at 1:22 AM, Christian Sciberras uuf6...@gmail.comwrote:

 In short, you just said that PCI compliance _is_ a waste of time and money.

 Why else would you protect something which is bound to fail anyway?!

 This is a lost battle, as I said no one cares about the arguments because
 these people fall into three categories:
 -they believe the illusion that PCI by itself enhances security
 -they do there job and don't give a f*ck about it
 -they are arguing for the fun of it without any real arguments (why else
 prove me right on my arguments and later on deny it?)






 On Tue, Apr 27, 2010 at 10:03 AM, Shaqe Wan sh...@yahoo.com wrote:

  You won't know not now, not ever. Maybe they do get a commission for
 your AV installation, who knows ! But maybe they think it is something that
 everybody needs so the force it. To get to know the true answer, we need to
 sit down with the guys who wrote the requirements and brainstorm with them
 those issues. We shall keep just running around and around in a circle here,
 because no one here if no CC company guy is around can give a definite
 answer. Just our simple argues !

 As I said before, I have to use it on a windows box, because its a
 requirement, its not my opinion at all.

 I 100% agree with you about most of the companies seek the paper work and
 get PCI certified and don't really bother about true security measures, but
 in the end if a breach is discovered they are the ones who shall get the
 penalty in the face, not us :)

 NB: I don't use an AV, never did, and never will :p

 Regards,

  --
 *From:* Christian Sciberras uuf6...@gmail.com
 *To:* Shaqe Wan sh...@yahoo.com
 *Cc:* full-disclosure@lists.grok.org.uk
 *Sent:* Tue, April 27, 2010 10:37:24 AM

 *Subject:* Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

 Surely being forced to install an anti-virus only brings in a monopoly?
 How do I know that PCI Standards writers are getting a nice commission off
 me installing the anti-virus? (I know they don't, I'm just hypothesizing).

 You stated it yourself, an anti-virus may not do any difference, it is
 there as per PCI standard.so what is it's use? Why the heck do I have to
 install something useless?

 Lastly, that is where you are wrong, there is no base starting point
 companies don't give a shit about proper security measures, they get
 PCI-certified and all security ends there.
 That is the freaken problem.

 NB: I do use anti-virus software, what I specified above is not in any way
 my opinion about anti-virus vendors, etc.







 On Tue, Apr 27, 2010 at 9:25 AM, Shaqe Wan sh...@yahoo.com wrote:

  Hi,

 I don't actually beleive there is a democratic society. No such thing
 exists. If it does? Then ask the organizations who made the compliance
 requirements drop them and make audits based on some other measure that you
 believe is more secure and has less flaws in it. Finally, regarding the AV
 issue that I wish I end here, is that I don't believe that an AV shall make
 your box secure, but its a requirement to be done - Added by PCI

 And yes I have noticed that FD is for such security measures discussion,
 but never thought of joining it and discussing with others until a couple of
 days ago when I saw this topic.

 Finally, the compliance can be taken of as a base starting point, and
 then moving further, like that it shall not be a waste of money !

 Regards,


  --
 *From:* Christian Sciberras uuf6...@gmail.com
 *To:* Shaqe Wan sh...@yahoo.com
 *Cc:* full-disclosure@lists.grok.org.uk
 *Sent:* Tue, April 27, 2010 9:59:59 AM

 *Subject:* Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

 Perhaps you haven't noticed, this is Full-Disclosure, which at least, is
 used to discuss security measures.
 As such, it is only natural to argue with PCI's possible security flaws.

 Besides, in a democratic society (where CC do operate as well), you can't
 force someone to install an anti-virus just because _you_ think it is
 secure.

 The argument were compliance is wasted money still holds.

 Cheers.




 On Tue, Apr 27, 2010 at 7:36 AM, Shaqe Wan sh...@yahoo.com wrote:

  Hola,

 The problem is not weather they are educated against other standards or
 policies or not, the problem is that without this compliance you can't work
 with CC !!! Its something that is enforced on you !

 BTW: why don't people discuss what is the points missing in the PCI
 Compliance better than this argue ?

 Regards,


  --
 *From:* Christian Sciberras uuf6...@gmail.com
 *To:* Shaqe Wan sh...@yahoo.com
 *Cc:* full-disclosure@lists.grok.org.uk
 *Sent:* Mon, April 26, 2010 4:19:27 PM

 *Subject:* Re: [Full-disclosure] Compliance Is Wasted Money, Study
 Finds

 OK.

 All those in favour of 

Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-27 Thread Mike Hale
Point is, you're arguing for the sake of arguing, as you have no
understanding what PCI is, based on your own admission.

On Tue, Apr 27, 2010 at 7:51 AM, Christian Sciberras uuf6...@gmail.comwrote:

 Nice way of reading whatever feels right to you. Perhaps you'd have better
 read what I wrote a few lines before that?






 On Tue, Apr 27, 2010 at 4:43 PM, Mike Hale eyeronic.des...@gmail.comwrote:

  -they are arguing for the fun of it without any real arguments (why
 else prove me right on my arguments and later on deny it?)

 So you fall into this category?
   On Tue, Apr 27, 2010 at 1:22 AM, Christian Sciberras uuf6...@gmail.com
  wrote:

 In short, you just said that PCI compliance _is_ a waste of time and
 money.

 Why else would you protect something which is bound to fail anyway?!

 This is a lost battle, as I said no one cares about the arguments because
 these people fall into three categories:
 -they believe the illusion that PCI by itself enhances security
 -they do there job and don't give a f*ck about it
 -they are arguing for the fun of it without any real arguments (why else
 prove me right on my arguments and later on deny it?)






 On Tue, Apr 27, 2010 at 10:03 AM, Shaqe Wan sh...@yahoo.com wrote:

  You won't know not now, not ever. Maybe they do get a commission for
 your AV installation, who knows ! But maybe they think it is something that
 everybody needs so the force it. To get to know the true answer, we need to
 sit down with the guys who wrote the requirements and brainstorm with them
 those issues. We shall keep just running around and around in a circle 
 here,
 because no one here if no CC company guy is around can give a definite
 answer. Just our simple argues !

 As I said before, I have to use it on a windows box, because its a
 requirement, its not my opinion at all.

 I 100% agree with you about most of the companies seek the paper work
 and get PCI certified and don't really bother about true security measures,
 but in the end if a breach is discovered they are the ones who shall get 
 the
 penalty in the face, not us :)

 NB: I don't use an AV, never did, and never will :p

 Regards,

  --
 *From:* Christian Sciberras uuf6...@gmail.com
 *To:* Shaqe Wan sh...@yahoo.com
 *Cc:* full-disclosure@lists.grok.org.uk
 *Sent:* Tue, April 27, 2010 10:37:24 AM

 *Subject:* Re: [Full-disclosure] Compliance Is Wasted Money, Study
 Finds

 Surely being forced to install an anti-virus only brings in a monopoly?
 How do I know that PCI Standards writers are getting a nice commission off
 me installing the anti-virus? (I know they don't, I'm just hypothesizing).

 You stated it yourself, an anti-virus may not do any difference, it is
 there as per PCI standard.so what is it's use? Why the heck do I have 
 to
 install something useless?

 Lastly, that is where you are wrong, there is no base starting point
 companies don't give a shit about proper security measures, they get
 PCI-certified and all security ends there.
 That is the freaken problem.

 NB: I do use anti-virus software, what I specified above is not in any
 way my opinion about anti-virus vendors, etc.







 On Tue, Apr 27, 2010 at 9:25 AM, Shaqe Wan sh...@yahoo.com wrote:

  Hi,

 I don't actually beleive there is a democratic society. No such thing
 exists. If it does? Then ask the organizations who made the compliance
 requirements drop them and make audits based on some other measure that 
 you
 believe is more secure and has less flaws in it. Finally, regarding the AV
 issue that I wish I end here, is that I don't believe that an AV shall 
 make
 your box secure, but its a requirement to be done - Added by PCI

 And yes I have noticed that FD is for such security measures
 discussion, but never thought of joining it and discussing with others 
 until
 a couple of days ago when I saw this topic.

 Finally, the compliance can be taken of as a base starting point, and
 then moving further, like that it shall not be a waste of money !

 Regards,


  --
 *From:* Christian Sciberras uuf6...@gmail.com
 *To:* Shaqe Wan sh...@yahoo.com
 *Cc:* full-disclosure@lists.grok.org.uk
 *Sent:* Tue, April 27, 2010 9:59:59 AM

 *Subject:* Re: [Full-disclosure] Compliance Is Wasted Money, Study
 Finds

 Perhaps you haven't noticed, this is Full-Disclosure, which at least,
 is used to discuss security measures.
 As such, it is only natural to argue with PCI's possible security
 flaws.

 Besides, in a democratic society (where CC do operate as well), you
 can't force someone to install an anti-virus just because _you_ think it
 is secure.

 The argument were compliance is wasted money still holds.

 Cheers.




 On Tue, Apr 27, 2010 at 7:36 AM, Shaqe Wan sh...@yahoo.com wrote:

  Hola,

 The problem is not weather they are educated against other standards
 or policies or not, the problem is that without this compliance you can't
 work with CC !!! Its something that is enforced

Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-27 Thread Mike Hale
Actually, you're right.  You're not the one who said that, I apologize.

But I maintain that you're arguing over something that you don't
understand.  You took one section (the anti-virus one) and got your panties
in a bunch over a security standard that says you *should* run anti-virus.
You completely ignored that PCI allows you to have compensating controls in
place for virtually any requirement.

On Tue, Apr 27, 2010 at 8:07 AM, Christian Sciberras uuf6...@gmail.comwrote:

 based on your own admission

 On who's admission? Perhaps you should bother to cite sources next time?
 And, how is quoting me in a different argument your point?






 On Tue, Apr 27, 2010 at 4:55 PM, Mike Hale eyeronic.des...@gmail.comwrote:

 Point is, you're arguing for the sake of arguing, as you have no
 understanding what PCI is, based on your own admission.

 On Tue, Apr 27, 2010 at 7:51 AM, Christian Sciberras 
 uuf6...@gmail.comwrote:

 Nice way of reading whatever feels right to you. Perhaps you'd have
 better read what I wrote a few lines before that?






 On Tue, Apr 27, 2010 at 4:43 PM, Mike Hale eyeronic.des...@gmail.comwrote:

  -they are arguing for the fun of it without any real arguments (why
 else prove me right on my arguments and later on deny it?)

 So you fall into this category?
   On Tue, Apr 27, 2010 at 1:22 AM, Christian Sciberras 
 uuf6...@gmail.com wrote:

 In short, you just said that PCI compliance _is_ a waste of time and
 money.

 Why else would you protect something which is bound to fail anyway?!

 This is a lost battle, as I said no one cares about the arguments
 because these people fall into three categories:
 -they believe the illusion that PCI by itself enhances security
 -they do there job and don't give a f*ck about it
 -they are arguing for the fun of it without any real arguments (why
 else prove me right on my arguments and later on deny it?)






 On Tue, Apr 27, 2010 at 10:03 AM, Shaqe Wan sh...@yahoo.com wrote:

  You won't know not now, not ever. Maybe they do get a commission for
 your AV installation, who knows ! But maybe they think it is something 
 that
 everybody needs so the force it. To get to know the true answer, we need 
 to
 sit down with the guys who wrote the requirements and brainstorm with 
 them
 those issues. We shall keep just running around and around in a circle 
 here,
 because no one here if no CC company guy is around can give a definite
 answer. Just our simple argues !

 As I said before, I have to use it on a windows box, because its a
 requirement, its not my opinion at all.

 I 100% agree with you about most of the companies seek the paper work
 and get PCI certified and don't really bother about true security 
 measures,
 but in the end if a breach is discovered they are the ones who shall get 
 the
 penalty in the face, not us :)

 NB: I don't use an AV, never did, and never will :p

 Regards,

  --
 *From:* Christian Sciberras uuf6...@gmail.com
 *To:* Shaqe Wan sh...@yahoo.com
 *Cc:* full-disclosure@lists.grok.org.uk
 *Sent:* Tue, April 27, 2010 10:37:24 AM

 *Subject:* Re: [Full-disclosure] Compliance Is Wasted Money, Study
 Finds

 Surely being forced to install an anti-virus only brings in a
 monopoly? How do I know that PCI Standards writers are getting a nice
 commission off me installing the anti-virus? (I know they don't, I'm just
 hypothesizing).

 You stated it yourself, an anti-virus may not do any difference, it is
 there as per PCI standard.so what is it's use? Why the heck do I 
 have to
 install something useless?

 Lastly, that is where you are wrong, there is no base starting point
 companies don't give a shit about proper security measures, they get
 PCI-certified and all security ends there.
 That is the freaken problem.

 NB: I do use anti-virus software, what I specified above is not in any
 way my opinion about anti-virus vendors, etc.







 On Tue, Apr 27, 2010 at 9:25 AM, Shaqe Wan sh...@yahoo.com wrote:

  Hi,

 I don't actually beleive there is a democratic society. No such
 thing exists. If it does? Then ask the organizations who made the 
 compliance
 requirements drop them and make audits based on some other measure that 
 you
 believe is more secure and has less flaws in it. Finally, regarding the 
 AV
 issue that I wish I end here, is that I don't believe that an AV shall 
 make
 your box secure, but its a requirement to be done - Added by PCI

 And yes I have noticed that FD is for such security measures
 discussion, but never thought of joining it and discussing with others 
 until
 a couple of days ago when I saw this topic.

 Finally, the compliance can be taken of as a base starting point, and
 then moving further, like that it shall not be a waste of money !

 Regards,


  --
 *From:* Christian Sciberras uuf6...@gmail.com
 *To:* Shaqe Wan sh...@yahoo.com
 *Cc:* full-disclosure@lists.grok.org.uk
 *Sent:* Tue, April 27, 2010 9:59:59 AM

 *Subject:* Re

Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-27 Thread Mike Hale
The point is, what s PCI aiming at?
It's aiming for a basic level of security among companies that process
credit cards.  Nothing more.  You have to remember that PCI didn't come
about in a vacuum.  It was created to solve a specific problem that the
major credit cards faced in regards to the security posture of their
processors.

The two alternatives for the Payment Card Industry are:
1)  The base level of security specified by PCI
2)  No base level of security, with most companies not implementing any
security whatsoever.

PCI does not stop a company from enacting stricter and better security
controls.  If your internal security is better than what PCI specifies, but
you do not meet one of the requirements, you use the compensating control
mechanism to justify it.

For the record, I apologize for the 'panties in a bunch' comment.  I lost
track of who said what, and you did not bring up the AV stuff.  Haven't had
my coffee yet...  ;)

On Tue, Apr 27, 2010 at 8:33 AM, Christian Sciberras uuf6...@gmail.comwrote:

 My point isn't about a particular section, nor whether the amount of
 experience I have in PCI DSS compliance (which is next to novice).
 The point is, what s PCI aiming at?
 Real security, or just a way companies can excuse their incompetence by
 citing full PCI compliance?
 Which reminds me, it wasn't I that brought anti-viruses to the discussion.

 Cheers.





 On Tue, Apr 27, 2010 at 5:16 PM, Mike Hale eyeronic.des...@gmail.comwrote:

 Actually, you're right.  You're not the one who said that, I apologize.

 But I maintain that you're arguing over something that you don't
 understand.  You took one section (the anti-virus one) and got your panties
 in a bunch over a security standard that says you *should* run anti-virus.
 You completely ignored that PCI allows you to have compensating controls in
 place for virtually any requirement.

   On Tue, Apr 27, 2010 at 8:07 AM, Christian Sciberras uuf6...@gmail.com
  wrote:

 based on your own admission

 On who's admission? Perhaps you should bother to cite sources next time?
 And, how is quoting me in a different argument your point?






 On Tue, Apr 27, 2010 at 4:55 PM, Mike Hale eyeronic.des...@gmail.comwrote:

 Point is, you're arguing for the sake of arguing, as you have no
 understanding what PCI is, based on your own admission.

 On Tue, Apr 27, 2010 at 7:51 AM, Christian Sciberras uuf6...@gmail.com
  wrote:

 Nice way of reading whatever feels right to you. Perhaps you'd have
 better read what I wrote a few lines before that?






 On Tue, Apr 27, 2010 at 4:43 PM, Mike Hale 
 eyeronic.des...@gmail.comwrote:

  -they are arguing for the fun of it without any real arguments (why
 else prove me right on my arguments and later on deny it?)

 So you fall into this category?
   On Tue, Apr 27, 2010 at 1:22 AM, Christian Sciberras 
 uuf6...@gmail.com wrote:

 In short, you just said that PCI compliance _is_ a waste of time and
 money.

 Why else would you protect something which is bound to fail anyway?!

 This is a lost battle, as I said no one cares about the arguments
 because these people fall into three categories:
 -they believe the illusion that PCI by itself enhances security
 -they do there job and don't give a f*ck about it
 -they are arguing for the fun of it without any real arguments (why
 else prove me right on my arguments and later on deny it?)






 On Tue, Apr 27, 2010 at 10:03 AM, Shaqe Wan sh...@yahoo.com wrote:

  You won't know not now, not ever. Maybe they do get a commission
 for your AV installation, who knows ! But maybe they think it is 
 something
 that everybody needs so the force it. To get to know the true answer, 
 we
 need to sit down with the guys who wrote the requirements and 
 brainstorm
 with them those issues. We shall keep just running around and around 
 in a
 circle here, because no one here if no CC company guy is around can 
 give a
 definite answer. Just our simple argues !

 As I said before, I have to use it on a windows box, because its a
 requirement, its not my opinion at all.

 I 100% agree with you about most of the companies seek the paper
 work and get PCI certified and don't really bother about true security
 measures, but in the end if a breach is discovered they are the ones 
 who
 shall get the penalty in the face, not us :)

 NB: I don't use an AV, never did, and never will :p

 Regards,

  --
 *From:* Christian Sciberras uuf6...@gmail.com
 *To:* Shaqe Wan sh...@yahoo.com
 *Cc:* full-disclosure@lists.grok.org.uk
 *Sent:* Tue, April 27, 2010 10:37:24 AM

 *Subject:* Re: [Full-disclosure] Compliance Is Wasted Money, Study
 Finds

 Surely being forced to install an anti-virus only brings in a
 monopoly? How do I know that PCI Standards writers are getting a nice
 commission off me installing the anti-virus? (I know they don't, I'm 
 just
 hypothesizing).

 You stated it yourself, an anti-virus may not do any difference, it
 is there as per PCI standard.so

Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-26 Thread Mike Hale
Then, as I said, the PCI requirements are total nonsense...
You say this based on absolutely zero understanding of what the
requirements are, by your own admission?

On Sun, Apr 25, 2010 at 8:40 PM, Nick FitzGerald
n...@virus-l.demon.co.uk wrote:
 Tracy Reed to me:

  Anyone authoritatively stating that antivirus software is a necessary
  component of a reasonably secure system is a fool.

 No, they just think all the world is Windows.

 My comments were, and still are, OS agnostic.

 It matters not what the OS -- anyone authoritatively stating that
 antivirus software is a necessary component of a reasonably secure
 system is a fool.

 Ditto my second comment...

  So _if_, as you and another recent poster strongly imply, the PCI
  standards include a specific _requirement_ for antivirus software, then
  the standards themselves are total nonsense...

 PCI only requires antivirus for systems commonly affected by
 viruses.  ...

 Then, as I said, the PCI requirements are total nonsense...

 ...  This means Windows. PCI security council has said that UN*X
 OSs etc. are not required to have antivirus.

 So what system and application integrity requirements do they require
 for those OSes (presumably instead of antivirus)?

 Your response strengthens my belief that PCI is dangerous because it
 enshrines small-minded ignorance as best practice (or, at least, as
 minimally acceptable practice) without recognizing the possibility
 that there may be better options that have not been so, ummm over
 sold as to become perceived as necessary.



 Regards,

 Nick FitzGerald


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-24 Thread Mike Hale
Uhm.. No
Uhm, yes?

It's a 'hassle' if:
You don't have a firewall.
You use default passwords.
You don't protect stored data.
You don't encrypt that data in transit.
You don't use antivirus.
You don't restrict data access.
You don't use unique logins.
You don't log stuff.
You don't test your security regularly.
You don't have an information security policy.

Seriously dude?  It's a hassle?

If you run a secure network, it's cake.  If you don't, it's a very
necessary hassle.

On Fri, Apr 23, 2010 at 3:01 PM, Christian Sciberras uuf6...@gmail.com wrote:
..
-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-23 Thread Mike Hale
Their conclusions are based, IMO, on a flawed methodology.

With some conservative assumptions, the paper indicates that companies
actually spend 50% of their budget protecting secrets versus 20% on
complying with external regulations.

I wrote up a more thorough response which I'll post in a few days when
I've proof-read it some more.

On Thu, Apr 22, 2010 at 4:48 PM, Christopher Gilbert mot...@gmail.com wrote:
 The paper concludes that companies are underinvesting in--or improperly
 prioritizing--the protection of their secrets. Nowhere does it state that
 the money spent on compliance is money wasted.

 On Wed, Apr 21, 2010 at 5:44 PM, Mike Hale eyeronic.des...@gmail.com
 wrote:

 I find the findings completely flawed.  Am I missing something?





-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-23 Thread Mike Hale
Look at the PCI requirements.

What's unreasonable about them?  Which portions are *NOT* part of
having a secure network?

If you strive for security, and weave that into your network,
complying with PCI should be cake.

On Fri, Apr 23, 2010 at 10:40 AM, Stephen Mullins
steve.mullins.w...@gmail.com wrote:
I don't see what the hubbub is

 Some people in the information security industry actually care about
 securing systems and the information they contain rather than filling
 in check boxes.  Compliance may ensure a minimum standard is met, but
 it does not ensure or imply that real security is being maintained at
 an organization.

 As you say, PCI has become a cost of doing business whereas having a
 secure network is apparently not a cost of doing business.  This is a
 problem.

 Crazy notion, I know.

 On Fri, Apr 23, 2010 at 1:18 PM, Thor (Hammer of God)
 t...@hammerofgod.com wrote:
 How can you say it is “wasted”? It doesn’t matter if you are a “fan” of it
 or not, in the same way that it doesn’t matter if you are a “fan” of the 4%
 surcharge retail establishments pay to accept the credit card as payment.
 Using your logic, you would way it is “wasted money,” and might bring into
 question the “value” of the surcharge, etc.  It is simply a cost of doing
 business.



 If you choose to offload processing to a payment gateway, then that will
 also incur a cost.  Depending on your volume, that cost may or may not be
 higher than you processing them yourself while complying to standards.  The
 implementation of actual security measures will be different.  But you can’t
 “handle” credit cards in the classic sense of the word without complying
 with PCI.  If you pass along the transaction to a gateway, you are not
 handling it.  If you DO handle it, then you have to comply with PCI.  If you
 process less than 1 million transactions a year, you can “self audit.”  If
 you process more, you have to be audit by a PCI auditor.



 None of this MEANS you are secure, it means you comply.  If you don’t like
 PCI, then don’t process credit cards, or come up with your own.  I still
 don’t really see what all the hubbub is about here.



 t



 From: Christian Sciberras [mailto:uuf6...@gmail.com]
 Sent: Friday, April 23, 2010 9:29 AM
 To: Thor (Hammer of God)
 Cc: Christopher Gilbert; Mike Hale; full-disclosure;
 security-bas...@securityfocus.com
 Subject: Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds



 it is simply part of the cost of doing business in that market.
 A.k.a. wasted money. Truth be told, I'm no fan of PCI.
 Other companies get the same functionality (accept the storage of credit
 cards) without worrying about PCI/DSS (e.g. through Payment Gateways).
 In the end, as a service, what do I want, an inventory of credit cards, or a
 stable payment system? The later I guess.
 As to security, it totally depends on implementation; one can handle credit
 cards without the need of standards compliance.

 My two cents.

 Regards,
 Christian Sciberras.


 On Fri, Apr 23, 2010 at 6:07 PM, Thor (Hammer of God) t...@hammerofgod.com
 wrote:

 Another thing that I think people fail to keep in mind is that when it comes
 to PCI, it is part of a contractual agreement between the entity and card
 facility they are working with.   If a business wants to accept credit cards
 as a means of payment (based on volume) then part of their agreement is that
 they must undergo compliance to a standard implemented by the industry.  I
 don’t know why people get all emotional about it and throw up their hands
 with all the “this is wasted money” positioning – it’s not wasted at all; it
 is simply part of the cost of doing business in that market.



 t



 From: full-disclosure-boun...@lists.grok.org.uk
 [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Christopher
 Gilbert
 Sent: Thursday, April 22, 2010 4:48 PM
 To: Mike Hale
 Cc: full-disclosure; security-bas...@securityfocus.com
 Subject: Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds



 The paper concludes that companies are underinvesting in--or improperly
 prioritizing--the protection of their secrets. Nowhere does it state that
 the money spent on compliance is money wasted.

 On Wed, Apr 21, 2010 at 5:44 PM, Mike Hale eyeronic.des...@gmail.com
 wrote:

 I find the findings completely flawed.  Am I missing something?



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com

Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-22 Thread Mike Hale
I actually disagree with the conclusions presented by this paper.  I'm
in the process of writing up a more thorough explanation, but my main
issue lies with their key finding on compliance spending.

According to the paper, roughly 40% is spend on directly securing
secrets, and another 40% is spent on compliance of some type.  They
further suggest that half of this compliance spending is spent on
internal compliance, and half on regulatory/external compliance.

Internal security policies are designed to protect the network and the
companys data.  Therefore, reason would dictate that spending on
internal compliance is money spent on securing your secrets (a
fraction of that spending, anyway).  Is it unreasonable to assume that
half of money spent on compliance with internal policies postively
affects security of your data?

I find the findings completely flawed.  Am I missing something?

-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/