n3td3v wrote:
On 5/22/06, Michael Silk [EMAIL PROTECTED] wrote:
yep, fd definately needs it's own tv show.
i'd watch it ...
You think this is a joke? n3td3v was never a joke, but everyone on fd
treated it like one. We're the biggest group around of rogue employees
at major internet
womber wrote:
Every time I read his posts I picture Napoleon Dynamite.
Cause I bet he's got nun chuck skillz to go with his hacking skillz.
Oh, I'm sorry. He's not a hacker, but a security researcher.
___
Full-Disclosure - We believe in it.
Hello
Security speakers are often very good book writers. So we made a quick
selection of some of the best books (from our point of view) .
Go to http://www.security-briefings.com to see the selection.
regards
___
Full-Disclosure - We believe in
On Thu, 25 May 2006, [EMAIL PROTECTED] wrote:
Security speakers are often very good book writers.
Another little known fact is that many excellent books were written by
people who own a dog and do not regularly consume excessive amounts of
lettuce.
/mz
[EMAIL PROTECTED] escribió:
Hello
Security speakers are often very good book writers. So we made a quick
selection of some of the best books (from our point of view) .
Go to http://www.security-briefings.com to see the selection.
And very good spammers, also :)
-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
__ NOD32 1.1557 (20060525) Information __
This message was checked by NOD32 antivirus system.
http://www.eset.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.1 (MingW32)
iD8DBQFEdahLFJS99fNfR
My question would be why the previous IT staff didn't put the customer
access on a different leg than the actual business network? A simple
VLAN or something to keep the two separate so something like that
wouldn't happen.
Scott Forrest
IT Manager
Hobbs, Straus, Dean Walker, LLP
2120 L St. NW
- We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
__ NOD32 1.1557 (20060525) Information __
This message was checked by NOD32 antivirus system.
http://www.eset.com
-BEGIN PGP
My question then is - if you have done the utmost to lock down your
customer
but someone connects an infected machine and somehow it gets in, is the
customer right in suing you?
Doesn't matter. In the U.S. you can sue anybody for anything .. no
matter how stupid or frivolous it might be.
In The Name Of GodGroup:HackeranShiraz Discoverer:SaiedHacker*/### This problem causes errors in ASP service This Problem is because of not checking the input data Well in uploading image files section When the user choosing an image file in uploading section Its possible to
I guess I should have been more constructive. I apologize. This is a
quite a bit off-topic.
I would think it would be a matter of negligence if the previous IT
Consultant setup wireless access for Hotel Customers to use that also
had direct access to the Hotel's network in some way that a virus
On Thu, 25 May 2006 12:27:07 EDT, Scott Forrest said:
I would think it would be a matter of negligence if the previous IT
Consultant setup wireless access for Hotel Customers to use that also
had direct access to the Hotel's network in some way that a virus could
jump to their business
On Thu, 25 May 2006 01:39:56 PDT, saied hackeriran said:
This problem causes errors in ASP service
Usually, *FULL* disclosure includes the concept of actually identifying
the buggy software, rather than some generic ASP service that exists
somewhere on some server
pgp61rLNRteDj.pgp
Hi all,
We needed to do this a new years back and it works. Hope it's
useful. I'm pasting a document that was written a while back so didn't
try with SP2. Does not know if it still works or not. Registry disable
as announce might not even be needed but just added in case.
Cheers,
-Alan
On Thu, 25 May 2006, [EMAIL PROTECTED] wrote:
On Thu, 25 May 2006 12:27:07 EDT, Scott Forrest said:
I would think it would be a matter of negligence if the previous IT
Consultant setup wireless access for Hotel Customers to use that also
had direct access to the Hotel's network in some way
Twat.
- Original Message -
From: saied hackeriran
To: full-disclosure@lists.grok.org.uk
Sent: Thursday, May 25, 2006 9:39 AM
Subject: [Full-disclosure] New problem in Upload section in ASP service
In The Name Of God
Group:HackeranShiraz
Discoverer:SaiedHacker
*/###
This
rPath Security Advisory: 2006-0082-1
Published: 2006-05-25
Products: rPath Linux 1
Rating: Critical
Exposure Level Classification:
Local Root Deterministic Privilege Escalation
Updated Versions:
vixie-cron=/[EMAIL PROTECTED]:devel//1/4.1-5.2-1
References:
rPath Security Advisory: 2006-0082-2
Published: 2006-05-25
Updated:
2006-05-25 Reference the assigned CVE number
Products: rPath Linux 1
Rating: Critical
Exposure Level Classification:
Local Root Deterministic Privilege Escalation
Updated Versions:
vixie-cron=/[EMAIL
Hi Molinetti,
You can use dumpbin ..also you can automate this with script
dumpbin /imports dll name | grep -i fun name
On 5/22/06, Andres Molinetti [EMAIL PROTECTED] wrote:
Hi,
I want to find if a specific function is defined in a given set of dll's
IAT (Import Address
Due to the sucess of my IE vuln sale I have decided to sell a
Windows Vista exploit I discovered. This one work remote and will
run code.
Concerned about your privacy? Instantly send FREE secure email, no account
required
http://www.hushmail.com/send?l=480
Get the best prices on SSL
Utilities from platform sdk, I think.
depends.exe and dumpbin.exe probably might help
r.v
- Original Message
From: Andres Molinetti [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk; secprog@securityfocus.com
Sent: Monday, May 22, 2006 9:01:19 AM
Subject:
TITUS is a large german mailorder for skateboards and extreme sports
related stuff. On the TITUS Homepage you can find a damn huge community
(about 20.000 registered user).
Inside the community a registred member can send IMs to other users, send
eMails via web interface and drop orders to the
Emopunk.de is a large german community for emo punks and hardcore kids.
If you enter the following code instead of a username in the user search form,
you've successfully executed a custom script on the page:
-
script type=text/javascriptalert(document.cookie);/script
-
Greetings,
Bacthwork
If you post a bulltin with the following content, a Box will appear above the
bulletin for the reading users. Easy to blurb something about a MySpace
Security Center and lead the user to a fake site where they need to input
email adresses and passwords:
-
This is a bulletin, and it looks pretty
Address Space Layout Randomization is now part of Vista as of beta 2 [1] . I
wrote about ASLR on the Windows platform back in September last year [2] and
noted that unless you rebase the image exe then little (not none!) is added.
ASLR in Vista solves this so remote exploitation of overflows
open the DLL in IDA and you can view all its imports in Imports tabOn 5/22/06, Andres Molinetti [EMAIL PROTECTED]
wrote:Hi, I want to find if a specific function is defined in a given set of dll's
IAT (Import Address Table). Does anyone know a tool to perform this check?
26 matches
Mail list logo