[Full-disclosure] thctest

2005-07-20 Thread netsniper
I had some fun with The Hacker's Choice website and thought some of you may want to learn from their lack of proper security. THC.org hosts project files, source code, and many other things. It also includes pictures of members and CCC friends, some that seem to request anonymity from public.

[Full-disclosure] PatchAdvisor Vulnerability Alert - Cisco CallManager Remote Denial of Service Vulnerability

2005-07-20 Thread Vicky Ames
PatchAdvisor, Inc. www.patchadvisor.com = PATCHADVISOR VULNERABILITY ALERT = = Cisco CallManager CTI Manager Remote Denial Of Service Vulnerability =

[Full-disclosure] [ GLSA 200507-18 ] MediaWiki: Cross-site scripting vulnerability

2005-07-20 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200507-18 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Re: [Full-disclosure] thctest

2005-07-20 Thread Joxean Koret
This is also phrack.org box (and teso and hert etc etc...), seems some articles for the next phrack release, have been stolen: regards On 7/20/05, netsniper [EMAIL PROTECTED] wrote: I had some fun with The Hacker's Choice website and thought some of you may want to learn from their lack of

Re: [Full-disclosure] thctest

2005-07-20 Thread Joxean Koret
Sorry i forgot another one On 7/20/05, Joxean Koret [EMAIL PROTECTED] wrote: This is also phrack.org box (and teso and hert etc etc...), seems some articles for the next phrack release, have been stolen: regards On 7/20/05, netsniper [EMAIL PROTECTED] wrote: I had some fun with The

Re: [Full-disclosure] thctest

2005-07-20 Thread Crg
http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-03/0269.html lol staff_rs_at_phrack.org Date: 03/09/05 a.. Oh my god, he almost got a root shell ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] PeanutHull Local Privilege Escalation Vulnerability

2005-07-20 Thread Sowhat .
PeanutHull Local Privilege Escalation Vulnerability by Sowhat EN: http://secway.org/advisory/AD20050720EN.txt CN: http://secway.org/advisory/AD20050720CN.txt Product Affected: PeanutHull = 3.0 Beta 5 Overview: Oray Inc. is the world's biggest DDNS (Dynamic Domain Name Service) Provider

[Full-disclosure] Trivial BGP attacks (ICMP-based blind throughput-reduction attack)

2005-07-20 Thread Fernando Gont
Folks, It seems worthless to try to explain over and over again how trivial it is to perform ICMP-based attacks against TCP. So I have posted on my web site (http://www.gont.com.ar/tools/icmp-attacks) the same tools that vendors were supposed to use to audit their systems, and test their

[Full-disclosure] ICMP-based blind performance-degrading attack

2005-07-20 Thread Fernando Gont
Folks, Another trivial ICMP-based attack. We'll use the tool icmp-mtu, available at http://www.gont.com.ar/tools/icmp-attacks We'll perform the blind performance-degrading attack described in http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html as the Attack against the Path-MTU

[Full-disclosure] Popup spam attempts on port 2???

2005-07-20 Thread James Lay
Here it is...what the heck over? Something new or did someone out there make a boo boo ;) 06:56:58 homebox kernel: New,invalid UDP: IN=eth0 OUT= MAC=00:04:75:80:dc:08:00:0f:90:27:ef:34:08:00 SRC=61.235.154.92 DST=24.116.x.x LEN=506 TOS=0x00 PREC=0x00 TTL=39 ID=0 DF PROTO=UDP SPT=53591 DPT=1027

[Full-disclosure] Yahoo telnet scans?

2005-07-20 Thread James Lay
Here's a snippet of what I have...in total I have 95 of these starting from April 14th. Only thing I am connected to is: http://tv.yahoo.com/grid?.force=psetlineupcookie=true Jul 14 06:19:05 homebox kernel: New,invalid TCP: IN=eth0 OUT= MAC=00:04:75:80:dc:08:00:0f:90:27:ef:34:08:00

[Full-disclosure] Snatching IP on LAN, how to DoS/block such machines?

2005-07-20 Thread Niklas
Consider the following scenario: Your are running a decent network (say a couple of c-net) with a non anonymous DHCP. It is not possible to have smart switches to each endpoint. In the last stage the clients are connected to dumb switches. Everything is fine until a user shutdown a (DHCP:ed)

RE: [Full-disclosure] Snatching IP on LAN, how to DoS/block such machines?

2005-07-20 Thread Madison, Marc
Physical security. ;) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Niklas Sent: Wednesday, July 20, 2005 2:25 PM To: FD-mailing Subject: [Full-disclosure] Snatching IP on LAN, how to DoS/block such machines? Consider the following scenario:

[Full-disclosure] Re: (ICMP attacks against TCP) (was Re: HPSBUX01137 SSRT5954 rev.4

2005-07-20 Thread Fernando Gont
At 07:25 p.m. 20/07/2005, Darren Reed wrote: In some mail from Fernando Gont, sie said: The IPv4 minimum MTU is 68, and not 576. If you blindly send packets larger than 68 with the DF bit set, in the case there's an intermmediate with an MTU lower that 576, the connection will stall. And

[Full-disclosure] Re: ICMP-based blind performance-degrading attack

2005-07-20 Thread Fernando Gont
At 07:42 p.m. 20/07/2005, Darren Reed wrote: Go look in the bugtraq archives for 8 July 2001 and you might find an email like the one below. THere was a thread on this topic then. It would be nice if you included a referral or something in your IETF draft to my original work on this, 4 years

[Full-disclosure] Re: ICMP-based blind performance-degrading attack

2005-07-20 Thread Darren Reed
Ok, so you really think this is new... Go look in the bugtraq archives for 8 July 2001 and you might find an email like the one below. THere was a thread on this topic then. It would be nice if you included a referral or something in your IETF draft to my original work on this, 4 years ago.

[Full-disclosure] [SECURITY] [DSA 763-1] New zlib packages fix buffer overflow

2005-07-20 Thread Michael Stone
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA 763-1 [EMAIL PROTECTED] http://www.debian.org/security/Michael Stone July 20, 2005

Re: [Full-disclosure] [TOOLS] CIRT.DK WebRoot Version v.1.7

2005-07-20 Thread Anders Breindahl
On Tuesday 19 July 2005 21:09, [EMAIL PROTECTED] wrote: On Mon, 18 Jul 2005 22:05:49 +0200, CIRT.DK Advisory said: Name: CIRT.DK WebRoot - Bruteforcing tool Version: 1.7 Author/Developer: Dennis Rand - CIRT.DK Website: http://www.cirt.dk Copyright:

[Full-disclosure] [SECURITY] [DSA 764-1] New cacti packages fix several vulnerabilities

2005-07-20 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 764-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze July 21st, 2005