Re: SSH host key fingerprint - through HTTPS

2014-09-02 Thread Jamie Riden
connection is being MITMed. If key reported by your ssh client is different than key reported by this website, then you shouldn't bother server admin with it, as the issue is in your network. -- Ɓukasz Biegaj -- Jamie Riden / ja...@honeynet.org / jamie.ri...@gmail.com http://uk.linkedin.com

IBM Maximo: Cross-site Scripting Vulnerability Addressed in Asset and Service Management (CVE-2014-0914 and -0915)

2014-08-12 Thread Jamie Riden
conceivably provide privilege escalation routes for medium privilege users. Depends on what you're doing and how much you trust your users. cheers, Jamie -- Jamie Riden / ja...@honeynet.org / jamie.ri...@gmail.com http://uk.linkedin.com/in/jamieriden

Re: Erronous post concerning Backtrack 5 R2 0day

2012-04-13 Thread Jamie Riden
. It's not an uninteresting issue, but let's follow process a bit better next please? Better for everyone involved. cheers, Jamie -- Jamie Riden / ja...@honeynet.org / jamie.ri...@gmail.com http://uk.linkedin.com/in/jamieriden

Re: Vulnerabilities in some SCADA server softwares

2011-03-24 Thread Jamie Riden
no choice BUT to run the code. -- Jamie Riden / ja...@honeynet.org / jamie.ri...@gmail.com http://uk.linkedin.com/in/jamieriden

Re: Moodle 1.9.3 Remote Code Execution

2008-12-15 Thread Jamie Riden
a couple of minutes to turn it into readable source. (Just need to change ;eval($t) ? at the end to ;echo($t) ? and run it from the CLI. Then add line breaks and formatting as required.) cheers, Jamie -- Jamie Riden / jam...@europe.com / ja...@honeynet.org.uk http://www.ukhoneynet.org/members/jamie/

Re: what is this?

2008-01-15 Thread Jamie Riden
' :) cheers, Jamie -- Jamie Riden / [EMAIL PROTECTED] / [EMAIL PROTECTED] UK Honeynet Project: http://www.ukhoneynet.org/

Re: BIND 9 DNS Cache Poisoning by Amit Klein (Trusteer)

2007-07-27 Thread Jamie Riden
before. cheers, Jamie -- Jamie Riden / [EMAIL PROTECTED] / [EMAIL PROTECTED] UK Honeynet Project: http://www.ukhoneynet.org/

Re: GHH Portal 1.1 (passwd.txt) Remote Password Disclosure Vulnerability

2007-05-01 Thread Jamie Riden
, and it is meant to expose this information. The file passwd.txt is actually a PHP script which generates a random password. http://ghh.sourceforge.net/introduction.php describes briefly how GHH works. cheers, Jamie -- Jamie Riden, CISSP / [EMAIL PROTECTED] / [EMAIL PROTECTED] UK Honeynet Project

Re: [Full-disclosure] A Botted Fortune 500 a Day

2007-04-17 Thread Jamie Riden
that mail has been relayed from within your organisation, then you have a serious problem, and it's better to learn of it by checking for outgoing spam than when someone notices something worse six months down the line. cheers, Jamie -- Jamie Riden / [EMAIL PROTECTED] / [EMAIL PROTECTED] UK Honeynet

Re: [Full-disclosure] A Botted Fortune 500 a Day

2007-04-17 Thread Jamie Riden
-- Jamie Riden, CISSP / [EMAIL PROTECTED] / [EMAIL PROTECTED] UK Honeynet Project: http://www.ukhoneynet.org/

Re: Critical phpwiki c99shell exploit

2007-04-12 Thread Jamie Riden
'. -- Jamie Riden / [EMAIL PROTECTED] / [EMAIL PROTECTED] UK Honeynet Project: http://www.ukhoneynet.org/

Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotaged hosts-file lookup

2006-04-19 Thread Jamie Riden
interesting. If it was a feature, I'd expect there to be ways to add to the list of pass-through domains, or ways to disable it. cheers, Jamie -- Jamie Riden / [EMAIL PROTECTED] / [EMAIL PROTECTED] Microsoft: Bringing the world to your desktop - and your desktop to the world. -- Peter Gutmann

Re: Remote overflow in MSIE script action handlers (mshtml.dll)

2006-03-17 Thread Jamie Riden
Confirmed on XP SP2, latest greatest, etc. Unhandled exception at 0x7dcfa61d in iexplore.exe: 0xC005: Access violation writing location 0x002911d8. I had to shut all (Windows) explorer and Internet Explorer windows first though. cheers, Jamie On 17/03/06, Michal Zalewski [EMAIL PROTECTED]

Re: PHP as a secure language? PHP worms? [was: Re: new linux malware]

2006-02-26 Thread Jamie Riden
' of PHP and other scripting languages. cheers, Jamie -- Jamie Riden / [EMAIL PROTECTED] / [EMAIL PROTECTED]

Re: new linux malware

2006-02-23 Thread Jamie Riden
On 21/02/06, Gadi Evron [EMAIL PROTECTED] wrote: Indeed, it has become an annoying trend everybody talks about but nobody writes about. Trojan horses, worms, etc. exploiting PHP bugs. Either vulnerabilities in know applications such as WordPress, PHPBB, Drupal, etc. or actually trying