[Full-disclosure] Worm phone home site question

2005-09-27 Thread odinanne
210.240.39.40 tcp 2255, 5522, 9009 This is the phone home site for a worm found on the network. Any idea what service they are running on these ports or how to loggin or register? This is the worm. http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM%5FSDBOT%2ECGYVSect=P

[Full-disclosure] Announce: RSBAC v1.2.5 released

2005-09-27 Thread Amon Ott
Rule Set Based Access Control (RSBAC) v1.2.5 has been released! Full information and downloads are available at http://www.rsbac.org RSBAC Key Features: * Free Open Source (GPL) Linux kernel security extension * Independent of governments and big companies * Several well-known and

Re: [Full-disclosure] Worm phone home site question

2005-09-27 Thread ggfirst
On 9/27/05, odinanne [EMAIL PROTECTED] wrote: 210.240.39.40 tcp 2255, 5522, 9009 This is the phone home site for a worm found on the network. Any idea what service they are running on these ports or how to loggin or register? This is the worm.

Re: [Full-disclosure] Worm phone home site question

2005-09-27 Thread Michael Holstein
This is the phone home site for a worm found on the network. Any idea what service they are running on these ports or how to loggin or register? Standard [AGO|SD|RX] bot stuff .. it's just an IRCd .. use mIRC, xCHAT, whatever ... The channels are always invisible and password protected.

[Full-disclosure] Re: Re: in-line coax monitoring device

2005-09-27 Thread Dave Korn
Original Message From: Volker Tanger Message-Id: [EMAIL PROTECTED] Greetings! Dave Korn [EMAIL PROTECTED] wrote: From: Alex Krycek Äîáðûé âå÷åð...looking for an in-line coax monitoring device that will give me the ability to monitor/capture and decode all traffic The device you

Re: [Full-disclosure] CORE-Impact license bypass

2005-09-27 Thread Exibar
- Original Message - From: Marc Maiffret [EMAIL PROTECTED] To: Exibar [EMAIL PROTECTED]; c0ntex [EMAIL PROTECTED]; Josh Perrymon [EMAIL PROTECTED]; full-d[EMAIL PROTECTED] Sent: Monday, September 26, 2005 4:49 PM Subject: RE: [Full-disclosure] CORE-Impact license bypass snip As far

Re: [Full-disclosure] CORE-Impact license bypass

2005-09-27 Thread Bernhard Mueller
Exibar wrote: I didn't mean to imply that the consultants create their own exploits, not many I know could even begin to do that, only a couple are talented enough to do just that. Even for those very few, it's just not feasable from a time perspective. Much quick and cost effective to

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Joxean Koret
Well im agree with you, Zone-H really sucks! but why the fuck u think that U.S Security Services are able to act around all the world? Or u dont know any other country than .us ? EOO the rest of the world exists!!! zone-h is located in estonia and astaroth live in italia ... so call the

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Richard Horsman
n3td3v, I would compare zone-h more to a newspaper than a terrorists site. Newspapers report what is happening in the world whether it's good news or bad news. Zone-h brings news about defacements and other security related issues, it does not encourage defacements. Richh -Original

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Joxean Koret
Yeah but zone-h defacement area its used to make defacing contest... One thing is to report that a interesting site have been defaced ... and other shit its support defacing groups breaking into in no-one-is-interested website On 9/27/05, Richard Horsman [EMAIL PROTECTED] wrote: n3td3v,I

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread n3td3v
On 9/27/05, J. Oquendo [EMAIL PROTECTED] wrote: On Tue, 27 Sep 2005, n3td3v wrote: Do newspaper sites ask suicide bombers to submit videos? They do so in subliminal ways. See the problem with most people is they don't want to see the darker sides of life. Out of site out of mind. Forget

Re: [Full-disclosure] CORE-Impact license bypass

2005-09-27 Thread Martin Mkrtchian
I think automated tools should be used for penentration testing when it is possible. Why shouldthe penetration tester usemanual means and waste time? After all your average script kiddie will be using CORE like applications such as Metasploittoexploit a system.I do understand thatfor the techies

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread KF (lists)
Joxean Koret wrote: Yeah but zone-h defacement area its used to make defacing contest... So what... so was attrition and safemode... if its not them someone else will archive... -KF ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread n3td3v
On 9/27/05, Bart Lansing [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUICIDE bombers...typically DEAD. Tough to solicit videos from them, and rather pointless to keep a top ten list as they...well...can't exactly do it again. Suicide bombers typically aren't

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread str0ke
KF is right on the dot. There will always be a defacement site. /str0ke On 9/27/05, KF (lists) [EMAIL PROTECTED] wrote: Joxean Koret wrote: Yeah but zone-h defacement area its used to make defacing contest... So what... so was attrition and safemode... if its not them someone else

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread n3td3v
Not if the U.S security services decide to have a war on cyber terror sites. On 9/27/05, str0ke [EMAIL PROTECTED] wrote: KF is right on the dot. There will always be a defacement site. /str0ke ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Andre Ludwig
l33t UpZ 2 M4 P33PZ 1N #L33tHAX4lif3 S3Rv0R AdM1Nz!!! YUO N3#D 2 PaTcH Yu0z C0mPuT0rZ 4 D4 M4D H4x! M1cr0SoFt 1s D4 SuXz! I H4X 4 P00R P33pz C4Uz3 D3y B P00r 4nD K4Ntz HaX G00d!!!1!11!!!one!!shift+one!!!11!! 1 Iz T3H Ph34R MaKhin3! Sh00tz 2: n3td3v 4 acc3pt1ng m3z MySp4c3 Fr13nd

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Ken Pfeil
Since when does a website defacement classify as cyber terrorism? Name one person that has ever lost their life as a result of a website defacement. One would suggest you buy a fckin clue before letting fly with garbage like this. Ooohh... That's right. I'm sorry. Numbers *and* letters in

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Andre Ludwig
I think the security services are more concerned with the real deal then some douchebag who grabbed the latest mass defacer script from some .br. Again.. i would be more worried about the internal threat then some kiddy trying to swap my index.html with his l33t version. Dre On 9/27/05, n3td3v

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread str0ke
Terrorism doesn't always mean death my friend, here is the definition of terrorism. ter·ror·ism Audio pronunciation of terrorism ( P ) Pronunciation Key (tr-rzm) n. The unlawful use or threatened use of force or violence by a person or an organized group against people or property with

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Andre Ludwig
I prefer this definition cyber terrorism - Using electronic means to execute premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience. Note the use of the word violence.. taken

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread bkfsec
n3td3v wrote: Not if the U.S security services decide to have a war on cyber terror sites. Why are you on the Full Disclosure mailing list again? You do realize that the concept of Full Disclosure includes analyzing defacement sites and that there is, in fact, a legitimate reason to have

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread n3td3v
While politics of security -is- important. I also have a close relationship with research and engineering within communities. Your comments are less-than-researched in full, with respect of who I am and what my common values are. You probably judge people on this list alot. n3td3v = 7 years of

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread eric williams
On 9/27/05, Ken Pfeil [EMAIL PROTECTED] wrote: Since when does a website defacement classify as cyber terrorism? Name one person that has ever lost their life as a result of a website defacement. I am not sure that we can know that. A site may be defaced in a way that is not advertised - as

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Todd Towles
N3td3v worte: I'm sure the feds have ways of detecting cyber terrorism, without the help of public sites like Zone-H. And if they don't, why? Agreed, so what are you complaining about again? You first post was about how it was evil and how the government needs to do something about it. Then you

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Todd Towles
24 - 7 equals 17. I don't think owning a computer equals security experience, do you? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of n3td3v Sent: Tuesday, September 27, 2005 1:24 PM To: full-disclosure@lists.grok.org.uk Subject: Re:

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread security curmudgeon
: Not if the U.S security services decide to have a war on cyber terror : sites. You aren't from the US are you? The idea that U.S security services can arbitrarily shut down a site outside the US, and that the FBI or anyone else *would* shut down a site, even in the US is a bit silly. Almost

[Full-disclosure] [ISR] - Novell GroupWise Client Integer Overflow

2005-09-27 Thread famato
|| || [ISR] || Infobyte Security Research || www.infobyte.com.ar || 09.27.2005 || .:: SUMMARY Novell GroupWise Client Integer Overflow Version: GroupWise 6.5.3, It is suspected that all previous versions of Groupwise Client are vulnerable. .:: BACKGROUND GroupWise Client is Novell's

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread bkfsec
J. Oquendo wrote: To offer single sided right winged Hitlerish views of his personal Nirvana of what security should be knowing little about it. Hahahaha... too true. I recall when Attrition was in their Heyday and some issues they ran into archiving defaced sites. I also take note of the

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread n3td3v
Zone-H is not a mirror. A mirror doesn't ask for its reflection. Zone-H is reflecting its self, and nothing else. On 9/27/05, security curmudgeon [EMAIL PROTECTED] wrote: As KF and str0ke said, there will always be a defacement mirror. ___

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Andre Ludwig
I figured it out.. N3td3v is trying to throw the SVR/GRU off his trail by acting like a whitehat(e) while he concocts his diabolical plan for world domination by releasing a multi vector aim/yahoo/msn 0day worm. n3t don't worry your secret is safe with me! Opps i did it again

[Full-disclosure] O-O-O

2005-09-27 Thread Frank de Wit
it's always amusing, out-of-office, attending a security conference hahaha, he has probably 7 years of experience too :-) ring ring ring this is the http://www.citco.com/ Amsterdam office speaking, can I help you? yes, my name is Kevin Burtch, i am your security administrator at the ICT-dept

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Andre Ludwig
1 pt for the red corner... (or do you fancy another color n3t?) While this has been a rather amusing thread i am afraid this will be my last pointless post in it. I know, i know my legions of adoring fans will now roam the streets with a complete lack of direction and general hatred for mankind.

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread n3td3v
Hey, you know too much about me. ;-) On 9/27/05, Andre Ludwig [EMAIL PROTECTED] wrote: I figured it out.. N3td3v is trying to throw the SVR/GRU off his trail by acting like a whitehat(e) while he concocts his diabolical plan for world domination by releasing a multi vector aim/yahoo/msn 0day

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Andre Ludwig
I know all because my real name is John Titor, and i was sent from the future. Timetravel_0 On 9/27/05, n3td3v [EMAIL PROTECTED] wrote: Hey, you know too much about me. ;-) On 9/27/05, Andre Ludwig [EMAIL PROTECTED] wrote: I figured it out.. N3td3v is trying to throw the SVR/GRU off

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread security curmudgeon
: Nahh if it comes to world domination my money is on Jericho Forget the : defacement archive that's easy..Anyone who runs the site that has : managed to keep a fairly complete record of who has been sleeping with : who since 1996 includeing feds and a bunch of privacy freaks like : hackers

Re: [Full-disclosure] O-O-O

2005-09-27 Thread KF (lists)
Oh I see what you mean so logically n3td3v == d0uch3b4g Thanks for the math lesson! -KF n3td3v wrote: A math doesn't always consist of numbers. Logic and numbers out and in of math is important. The orignal math with numbers you learn at school is just an example of how to use that

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Dominique Davis
Noted :) of all the intel networks and weird radars I have been on over the years that ones the only one with accurate intel and has come the closest to getting me killed :) *Many props* p.s didn't you used to maintain the chart? I must be getting old Dominique Davis aka Mister Mojo PivX

Re: [Full-disclosure] CORE-Impact license bypass

2005-09-27 Thread Andrew Simmons
Bernhard Mueller wrote: Exibar wrote: I didn't mean to imply that the consultants create their own exploits, not many I know could even begin to do that, only a couple are talented enough to do just that. Even for those very few, it's just not feasable from a time perspective. Much

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Dominique Davis
Seven years huh ok that's pretty impressive.. What exactly constitutes corporate intelligence I have always been interested in the topic but never seem to be abel to find anyone who can properly explain the concept and how the shadowy world of corporate intelligence works as it applies to Large

[Full-disclosure] Re: [ISR] - Novell GroupWise Client Integer Overflow

2005-09-27 Thread Crist J. Clark
On Tue, Sep 27, 2005 at 10:57:57AM -0300, Francisco Amato wrote: [snip] .:: DESCRIPTION This issue is due to a failure of the application to securely parse the saved port number of the last authentication store in windows register. To reproduce this, we have to modify the default

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Andre Ludwig
http://www.unitedmedia.com/comics/dilbert/archive/index.html All you need to know about the corporate world. Dre On 9/27/05, Dominique Davis [EMAIL PROTECTED] wrote: Seven years huh ok that's pretty impressive.. What exactly constitutes corporate intelligence I have always been interested in

Re: [Full-disclosure] O-O-O

2005-09-27 Thread Frank de Wit
who says i'm a l33t h4cker like you? wise ass :-*, i never was and never will be one now keep quiet netdeffie, you have mailed enough for one day and so have I n3td3v wrote: If you were a hacker, you wouldn't be looking at the attending a security conference but asking yourself, which

Re: [Full-disclosure] CORE-Impact license bypass

2005-09-27 Thread Valdis . Kletnieks
On Tue, 27 Sep 2005 17:53:58 +0200, Bernhard Mueller said: so what use is a pentest if the consultant isn't even talented enough to find / create exploits for unknown vulnerabilities? Quite a bit, actually. Consider every pen test ever done by a consultant who wasn't that talented, but who

Re: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Valdis . Kletnieks
On Tue, 27 Sep 2005 15:36:22 EDT, security curmudgeon said: http://attrition.org/hosted/sexchart/ Puts a whole new meaning to UUCP bang-paths. :) pgpWRVQA9oTYP.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter:

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Todd Towles
Do you think they still do the pizza thing? I bet that all those starbucks in downtown D.C. are the new intel meter. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Tuesday, September 27, 2005 5:25 PM To: Dominique Davis

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Dominique Davis
That will do nicely Dominique Davis aka Mister Mojo PivX Solutions, Inc. #23 Corporate Plaza Suite 280 Newport Beach, CA. 92660 (949) 999-1635 Office (949) 903-6523 Cell www.pivx.com Ticker Symbol: pivx -Original Message- From: Todd Towles [mailto:[EMAIL PROTECTED] Sent: Tuesday,

Re: [Full-disclosure] Re: Re: in-line coax monitoring device

2005-09-27 Thread fd
On Tue, 27 Sep 2005, Dave Korn wrote: Dave Korn [EMAIL PROTECTED] wrote: From: Alex Krycek ?? ?...looking for an in-line coax monitoring device that will give me the ability to monitor/capture and decode all traffic The device you are looking for does exist. It's called a

Re: [Full-disclosure] CORE-Impact license bypass

2005-09-27 Thread fd
On Tue, 27 Sep 2005, Bernhard Mueller wrote: Exibar wrote: I didn't mean to imply that the consultants create their own exploits, not many I know could even begin to do that, only a couple are talented enough to do just that. Even for those very few, it's just not feasable from a

RE: [Full-disclosure] Third issue of the Zone-H Comics

2005-09-27 Thread Aditya Deshmukh
SUICIDE bombers...typically DEAD. Tough to solicit videos from them, and rather pointless to keep a top ten list as they...well...can't exactly do it again. Now the real entertainment begins Delivered using the Free