> Jay is not employable, for
> multiple reasons.
You're right, of course. Jay is probably the kind of person who employers view
as a threat because he can't be owned and he has too much raw talent, the
development of which by an employer will only result in helping the competition
when Jay star
I know I'm gonna kick myself in the morning for this but...
N3td3v,
http://dictionary.reference.com/search?q=Sarcasm
Oh, I also hold an MCP and I am the winner of the coveted LSMFT - 3 years
running!
-j
-Original Message-
From: n3td3v [mailto:[EMAIL PROTECTED]
Sent: Wednesday, Decem
For those of you (and there seem to be a ton hitting the market, and
this list) who want to break in on the scene. If you want a job and
don't have experience cuz you are:
-fresh out of school
-just turning the legal age to work
-Switching from a different career
-Learned IS on the side while IT'i
Gah. All this top posting and immaturity makes it difficult to reply,
and normally I'd be prone to ignore this, but I'm hoping that someone
else will be able to learn from the errors made here. Jay is not
employable, for multiple reasons. He's already gone out of his way to
publicly humiliate h
Or maybe volunteer work for the local LAPD Computer forensics, great place to
keep your mind active. It is good to have something current to talk about when
and if you get an interview, credibility counts.
Bob
-- Original message --
From: Harry Hoffman <[EMAIL
Joel Jose said:
> well agreed but then we cant get experience without a job. and to get a
> job
> you need qualifications ..so certificates are supposed to give that to
> you..
> good ones like cissp demand that you have working experience as a pre
> requisite. so is there any good certs for starti
depends on the OS...
You find a random floppy during a search of an office, and start doing
forensics on it, there's a 95% chance it's from a Windows box. And if it's
from a Mac or Linux box, there's *still* a very good chance that it's FAT,
simply because the floppy was used for sneakernet tra
What version of SecureClient did you use?
From: Viktor Steinmann <[EMAIL PROTECTED]>
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Checkpoint SecureClient NGX Security Policy
caneasily be disabled
Date: Wed, 7 Dec 2005 12:54:02 +0100
Situation: Employees should be allowed
here is the n3td3v quote list:
"XSS the planet !" -n3td3v (thisone is fake but i like it)
"I don't feel the urgency to explain the complexed reasoning behind my postings"
- n3td3v (i love thisone)
"you complete wanna be loser who has never disclosed any vulnerabilities."
-n3td3v
"have I
LOL if you would be so big as you pretend to be, then you wouldnt need to brag
about it
like a 12 year old. noone takes you serious here and we have yet to see actual
code from you.
so until we see some remote exploit written in ansi C that is not for some
script injection bug,
you better shut t
On Wed, Dec 07, 2005 at 11:54:08PM +, n3td3v wrote:
> Go study internet security for 7 years, do CS at college, learn
> computer programming in C++ and PHP, find hacks for Google/ Yahoo,
> setup your own security group, be friends with hundreds of people in
> multiple scenes, have IM and E-mail
On Wed, Dec 07, 2005 at 10:19:36PM +, Nigel Horne wrote:
> Joel Jose wrote:
>
> >i am a undergraduate student. will get a btech ie BS in computer
> >science degree in 2007. to start a path in security is ccsp good
> >enough? i plan to settle abroad.. may be usa or eu
>
>
> I don't see w
On Wed, 7 Dec 2005, Joel Jose wrote:
> good ones like cissp demand that you have working experience as a pre
> requisite.
My guess is that the vast majority of cissp's do NOT have the prerequisite
when they get their cert - and the certifying authority KNOWS THIS WHEN
THEY ISSUE !
So, do what ev
-Exploiting Freelist[0] On Windows XP Service Pack 2-
Windows XP Service pack 2 introduced some new security measures in an
attempt to prevent the use of overwritten heap headers to do arbitrary
byte writing. This method of exploiting heap overflows, and the protection
offered by service pack 2, i
well agreed but then we cant get experience without a job. and to get a job you need qualifications ..so certificates are supposed to give that to you.. good ones like cissp demand that you have working experience as a pre requisite. so is there any good certs for starting as a security professiona
If you are seriously looking for a job and don't have a lot of
experience you may do well to look around at various community colleges.
Provided you can act somewhat professionally you may wind up getting a
job that will foster an atmosphere of learning without to many boundaries.
If you don't ha
On 12/7/05, Day Jay <[EMAIL PROTECTED]> wrote:
> ... nor do I
> dress up as a woman and read this list.
reading this list dressed as a woman is my favorite infosecx fetish...
> As for the rest of the people, I'm not "begging" or
> bragging, I think their may be someone out on the
> internet with
On Wed, 7 Dec 2005, InfoSecBOFH wrote:
> Wow, so setting up a blogspot, geocities, and google groups accounts
> because you can't afford your own domain or know how to host your own
> shit makes you 1337.
Looks like somebody parked "his domain" in anticipation of some fun :-)
http://www.n3td3v.
Nah, its more fun to publically humiliate the kiddie. Don't worry
I'll toss him a quarter when I step over him as he sleeps in the
streets.
On 12/7/05, Murray, Mike <[EMAIL PROTECTED]> wrote:
> Maybe you two should take this offline, eh?
>
> -Original Message-
> From: [EMAIL PROTECTED]
>
I agree and also extend this suggestion to InfoSecBOFH and n3td3v.
Paul
Greyhats Security
http://greyhatsecurity.org
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Murray, Mike
Sent: Wednesday, December 07, 2005 7:41 PM
To: full-disclosure@lists.grok.or
Maybe you two should take this offline, eh?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
InfoSecBOFH
Sent: Wednesday, December 07, 2005 3:55 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Looking for a job in OrangeCounty
Calif
Wow, so setting up a blogspot, geocities, and google groups accounts
because you can't afford your own domain or know how to host your own
shit makes you 1337.
On 12/7/05, n3td3v <[EMAIL PROTECTED]> wrote:
> http://n3td3v.blogspot.com
> http://www.geocities.com/n3td3v
> http://groups.google.com/
http://n3td3v.blogspot.com
http://www.geocities.com/n3td3v
http://groups.google.com/group/n3td3v
Exiting thread now through the stupidity of your comments.
On 12/8/05, InfoSecBOFH <[EMAIL PROTECTED]> wrote:
>You have proven to know nothing. You have proven to have zero
> contacts. I have alread
Hit a sore spot did I?
You have proven to know nothing. You have proven to have zero
contacts. I have already verfied your Yahoo claims as false and
having people on your IM list does not make you 1337.
I will repeat myself because it is obvious that you are fucking
retarded and cannot comprehe
On 12/7/05, Day Jay <[EMAIL PROTECTED]> wrote:
> I tried burger king and they racially discrimintated
> against me cuz I am white so sorry.
Burger King in New Orleans. They are begging for people, even the white ones.
> Although working fast food has been a goal of mine
> since they keep denyin
On 12/7/05, Day Jay <[EMAIL PROTECTED]> wrote:
> Well not really, I'm seeing what people need. Trying
> to find out whats needed and wanted out there.
>
> I'm employable and enjoyable!
>
> Do you need help or not?
Dude, I already told you. BURGER KING - New Orleans.
Do I need help? Sure, I nee
Go study internet security for 7 years, do CS at college, learn
computer programming in C++ and PHP, find hacks for Google/ Yahoo,
setup your own security group, be friends with hundreds of people in
multiple scenes, have IM and E-mail contact with some of Yahoo's top
security advisors and security
I tried burger king and they racially discrimintated
against me cuz I am white so sorry.
Although working fast food has been a goal of mine
since they keep denying my applications, its too
smelly.
I would engage a flame war with you on this pubic list
but I'm not gay and don't like having gay sex
I hacked www.comcast.net about 3 months ago (file content
disclosure/directory transversal). No-one heard about it because after I
reported the problem and it was patched, I had no evidence to back up my
claim, so what would have been the point of telling everyone? However, I
knew that I was doing
I think the real issue here is that you need to be employable in order
to secure employment.
On 12/7/05, Michael Ligh <[EMAIL PROTECTED]> wrote:
> Regardless of the peculiars of this post and it's follow ups, the Security
> Focus Jobs mailing list puts out a high volume of IT-related notices - so
Regardless of the peculiars of this post and it's follow ups, the Security Focus Jobs mailing list puts out a high volume of IT-related notices - so maybe that would be a good place to look.
http://www.securityfocus.com/jobsOn 12/7/05, Day Jay <[EMAIL PROTECTED]> wrote:
Being unemployed is a lot h
And thank you for proving that you are truly a kiddie.
You just don't get it do you.
On 12/7/05, n3td3v <[EMAIL PROTECTED]> wrote:
> My point exactly. Thank you for confirming you have no reason to be on
> this list.
>
> On 12/7/05, InfoSecBOFH <[EMAIL PROTECTED]> wrote:
> > Yes kiddie, no one ha
I'm doing some research about performing federal level work.
What federal government are you talking about? The world's a big place.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and spons
My point exactly. Thank you for confirming you have no reason to be on
this list.
On 12/7/05, InfoSecBOFH <[EMAIL PROTECTED]> wrote:
> Yes kiddie, no one has seen any vulnerabilities by me posted to this
> list or posted anywhere with this email address.
___
Yes kiddie, no one has seen any vulnerabilities by me posted to this
list or posted anywhere with this email address.
Think about it for a second cluebag.
On 12/7/05, n3td3v <[EMAIL PROTECTED]> wrote:
> No one has seen any vulnerabilities by you. You have no justification
> to even being 100 mile
No one has seen any vulnerabilities by you. You have no justification
to even being 100 miles near this list, let alone comment on other
people and their postings.
On 12/7/05, InfoSecBOFH <[EMAIL PROTECTED]> wrote:
> Way to blow it out of perportion kiddie
_
Dell TrueMobile 2300 Wireless Broadband Router Authentication Bypass
Vulnerability
iDefense Security Advisory 12.07.05
www.idefense.com/application/poi/display?id=348&type=vulnerabilities
December 7, 2005
I. BACKGROUND
The Dell TrueMobile 2300 Wireless Broadband Router is an 802.11b/g
wireless
Way to blow it out of perportion kiddie
On 12/7/05, n3td3v <[EMAIL PROTECTED]> wrote:
> Hackers own Google while vulnerabilities remain unpatched. Once they
> patch a vulnerability, they can own me again! Until then... Google is
> in the hands of hackers.
>
> Since you're having a stab at me.
Now now Jason just because you got screwed by a company that sells
registry hacks and offers no real value doesn't mean everyone is bad.
OK, maybe it does.
Day Jay. You are looking for employment and so far this has been your
way of doing so;
1.) You sent a stupid email with a WORD attachement
Excuse me, I clicked send too soon
As I was saying You found a bug, and thats great, well done,
congratulations.
However, at the end of the day that is all it is. A bug, write it off
and end the thread, you have not found the holy grail, you have not
discovered the akashic records on this
Joel Jose wrote:
i am a undergraduate student. will get a btech ie BS in computer
science degree in 2007. to start a path in security is ccsp good
enough? i plan to settle abroad.. may be usa or eu
I don't see why - all the IT jobs are in India (well may be not all,
some are in China
For what it is worth, it would be trivial right now to name 10 very
large online presences that have some form of vulnerability, whether
that is XXS, SQL Injection or some other form of web application
quirkiness, it's not really a big deal.
I do how ever have to agree with ad, it takes far more s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
where is your heap overflow ?? (XSS easy targets) ;>
n3td3v wrote:
> Hackers own Google while vulnerabilities remain unpatched. Once they
> patch a vulnerability, they can own me again! Until then... Google is
> in the hands of hackers.
>
> Since you
If you're looking for honest work then Orange County may not be the right place
to live.
Regards,
Jason Coombs
[EMAIL PROTECTED]
Sent from my BlackBerry wireless handheld.
-Original Message-
From: Day Jay <[EMAIL PROTECTED]>
Date: Wed, 7 Dec 2005 10:20:19
To:full-disclosure@lists.grok
Hackers own Google while vulnerabilities remain unpatched. Once they
patch a vulnerability, they can own me again! Until then... Google is
in the hands of hackers.
Since you're having a stab at me. Wheres your Google and Yahoo
vulnerabilities? Naw, you don't have any. You prefer to go looking for
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200512-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200512-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
The
ISC2.org has a certificate program for students, you pass the CISSP exam, you
then have five years to get the experience. Info can be found at https://www.isc2.org/cgi-bin/content.cgi?category=1330
Hummer
Hummer Marchand,GCIH,CISSP,CompTIA
Security+[EMAIL PROTECTED]
-Original
Here, I looked this up for you. http://www.0x90.org/contact.php
HTH!
From: cranium pain [mailto:[EMAIL PROTECTED]
Sent: Wednesday, December 07, 2005 12:57 PMTo:
full-disclosure@lists.grok.org.ukSubject: [Full-disclosure] 0x90.org
again
>From 0x90.org's password page, you
now receive"Oh no
>As a owner of a Google Group, I would personally like this patched for
>the security of my group and that of my personal computer and web
>browser.
hmm... did you "pay" for this group? did'nt think so
read the eula? bet not
who owns you? hint: Google ( they own the world )
___
On 12/7/05, Geof <[EMAIL PROTECTED]> wrote:
> I'm trying to restrict remote access to the Service Control Manager on a
> Windows box in order to forbid a local admin to remotely manage the
> services. Indeed, with such an access, it's possible to restart services
> that where disabled for security
Being unemployed is a lot harder than I thought. I
have too much time on my hands and that coupled with
misc. side jobs, I really would like to find someone
to work for that needs some helop. I'm looking to
hopefully work on site and not remotely unless
sometimes needed and hopefully have some sort
>From 0x90.org's password page, you now receive
"Oh noes indeed! Coardump found an XSS on a POST only site with no cookies! Phjeer!"
Righ fuckers, your the idiots that develop web auditing tools and can't
even build your own site properly. I feel confident that you ran your
lame code / scripts /
On 12/7/05, jpierini <[EMAIL PROTECTED]> wrote:
"I'm just a CISSP, and as discussed numerous times I'm without the elite mad
skills of a hacker (XSS wasn't even on our test!)"
You're not a professional then in my eyes and don't have a right to be
even in this thread let alone go around wtih your
N3td3v,
I'm just a CISSP, and as discussed numerous times I'm without the elite mad
skills of a hacker (XSS wasn't even on our test!), so it's my guess you must
have found something so amazing insidious, so heavily integrated into the
very bowels of their system, that they're beside themselves wit
CCSP
is a decent place to start, you could take some of the courses and not just the
exams, that will get you nowhere I think (technically), other than just getting
the certification, try and get your hands dirty first, I personally spent 4 or
5 years in the industry doing security related
On Wed, Dec 07, 2005 at 12:54:02PM +0100, Viktor Steinmann wrote:
> (...) Checkpoint SecureClient enforces a policy on the VPN Client,
> which you can define on the VPN Endpoint you log on to (the firewall).
> Furthermore SecureClient includes a personal firewall, which protects
> the VPN Client fr
> Hah. That's a weird script anyways. Who's crazy enough to punch in
> their password into some guys' "analyzer" knowing good and well it
> could be used against them or at least wind up in someone's private
> wordlist?
> On 12/7/05, cranium pain <[EMAIL PROTECTED]> wrote:
>>
>> -
/*
*
$ An open security advisory #14 - Appfluent Database IDS Environment
Variable Overflow
**
Four days on and Google has yet to implement a patch. I guess groups
getting deleted, harvesting of e-mail addresses, and theft of Google /
Gmail accounts isn't that important. :-(
On 12/5/05, Joseph Pierini <[EMAIL PROTECTED]> wrote:
>
> N3td3v,
>
> Thanks for the info. Wow, it must have been an
Hah. That's a weird script anyways. Who's crazy enough to punch in
their password into some guys' "analyzer" knowing good and well it
could be used against them or at least wind up in someone's private
wordlist?
On 12/7/05, cranium pain <[EMAIL PROTECTED]> wrote:
>
> ---
---
!!!0-Day Alert 0-Day Alert!!!
---
Who Is Vulnerable: 0x90.org
Who Are They: Developers of Web Based security tools
Impact:
Red Faces For l33t Haxxors
Time Line: Today
---
Situation: Employees should be allowed to access your company network from
remote by VPN. You want to make sure, that only the hardware of your own
company is allowed to access the network on the VPN. This because your company
hardware uses a hardened operating system (personal firewall, virusscann
Hello,I'm
trying to restrict remote access to the Service Control Manager on a
Windows box in order to forbid a local admin to remotely manage the
services. Indeed, with such an access, it's possible to restart
services that where disabled for security reasons, like remote registry
access, or to in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hardened-PHP Project
www.hardened-php.net
-= Security Advisory =-
Advisory: phpMyAdmin Variable Overwrite Vulnerability
Release Date: 2005/12/07
Last Modified: 2005/12/07
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 916-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
December 7th, 2005
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hardened-PHP Project
www.hardened-php.net
-= Security Advisory =-
Advisory: libcurl URL Parsing Vulnerability
Release Date: 2005/12/07
Last Modified: 2005/12/07
Aut
On Tue, Dec 06, 2005 at 01:09:04PM -0700, Christopher Carpenter wrote:
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of wilder_jeff
> Wilder
>
> I didnt know that they gave out scores?... have they started doing that?
...
> Ditto. As of April 2004, they weren't publishing scores.
68 matches
Mail list logo