RE: [Full-disclosure] LOL HY

2006-08-15 Thread y0himba
You have got to be kidding me. Is that site for real? I mean he really makes money off animal based cartoon characters doing porn? WTF has this world come to. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Burnett Sent: Tuesday, August 15, 2006

Re: [Full-disclosure] LOL HY

2006-08-15 Thread Matt Burnett
Have you paid attention to the internet for the past 15 years? People pay plenty of money to watch people fuck real animals and insert champagne bottles in to their orifices. Anyways i guess I have to question why anybody pays for pron, of any type. On Aug 15, 2006, at 1:04 AM, y0himba

Re: [Full-disclosure] Yahoo/Geocities possible exploit/vulnerability

2006-08-15 Thread Schanulleke
Jain, Siddhartha wrote: The phishing apart, how can a userid be spoofed on Yahoo Messenger? Is this something trivial? I thought Yahoo fixed the issue with Y!Messenger 5.0. If I have your Yahoo ID and password it is indeed trivial to spoof you. Schanulleke

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-15 Thread Peter Besenbruch
Dude VanWinkle wrote: What? you can dish it but you cant take it? No, I just filter. I suspect a lot fewer people will be reading your e-mails, Dude. -- Hawaiian Astronomical Society: http://www.hawastsoc.org HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

Re: [Full-disclosure] LOL HY

2006-08-15 Thread mikeiscool
you just can't grasp the idea of fd can you matt. it is _so_ easy not to read these messages. what the fuck is your problem? don't you remember the simpsons? *just don't look, just don't look* -- mic ___ Full-Disclosure - We believe in it. Charter:

RE: [Full-disclosure] Yahoo/Geocities possible exploit/vulnerability

2006-08-15 Thread Nick FitzGerald
Jain, Siddhartha wrote: The phishing apart, how can a userid be spoofed on Yahoo Messenger? Is this something trivial? I thought Yahoo fixed the issue with Y!Messenger 5.0. U -- unless I'm missing something here (and as I've already said I'm NOT a YIM expert), in any system (like YIM)

Re: [Full-disclosure] LOL HY

2006-08-15 Thread mikeiscool
On 8/15/06, Matt Burnett [EMAIL PROTECTED] wrote: What the fuck is my problem? I had to dl ~1MB of shitty porn, which prevents me from having 1.5 seconds more of decent high quality porn. Thats my fucking problem. Now the real question is what the fuck is your problem? If its so easy to not

Re: [Full-disclosure] LOL HY

2006-08-15 Thread Matt Burnett
What the fuck is my problem? I had to dl ~1MB of shitty porn, which prevents me from having 1.5 seconds more of decent high quality porn. Thats my fucking problem. Now the real question is what the fuck is your problem? If its so easy to not read these messages they why the fuck do you

[Full-disclosure] [SECURITY] [DSA 1151-1] New heartbeat packages fix denial of service

2006-08-15 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1151-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 15th, 2006

Re: [Full-disclosure] LOL HY

2006-08-15 Thread Charles Majola
l4m3rs!!! Matt Burnett wrote: What the fuck is my problem? I had to dl ~1MB of shitty porn, which prevents me from having 1.5 seconds more of decent high quality porn. Thats my fucking problem. Now the real question is what the fuck is your problem? If its so easy to not read these messages

Re: [Full-disclosure] Yahoo/Geocities possible exploit/vulnerability

2006-08-15 Thread crazy frog crazy frog
yeah, if some one has ur friends id and password he can send you such message then u will enter ur password and it goes to ur friends and continue -CF - http://www.secgeeks.com - On 8/15/06, Nick FitzGerald

Re: [Full-disclosure] LOL HELLO

2006-08-15 Thread Vlad Hackula
This list is full of little punk ass kids who think they are blackhat l33t h4x0rs but are nothing but script kiddyz with no skillz. That is what the problem is with this list. On 8/14/06, Time 4 [EMAIL PROTECTED] wrote: LOL THIS IS PORN FOR BERNAL AND THE WHITEHATSBERNAL CANNOT STOP FULL

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-15 Thread Dude VanWinkle
On 8/15/06, Peter Besenbruch [EMAIL PROTECTED] wrote: Dude VanWinkle wrote: What? you can dish it but you cant take it?No, I just filter. I suspect a lot fewer people will be reading youre-mails, Dude.You do know I didnt send out the pr0n right? Just trying to make light of the situation

RE: [Full-disclosure] LOL HY

2006-08-15 Thread Edward Pearson
I'm glad somebody said it. I'm fed up of the whole if you don't like them, don't read them crap. It is a security list, last week I got 1200 e-mails from FD. I think I found around 90-100 that weren't spam/n3td3v/pr0n/assorted bullshit. These people take the piss and generally fuck things up for

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-15 Thread ...
yeah, that's a good one. first: spam a security list of some disgusting and sick porno shit second: pretend you did not third: pretend we believe you - Original Message - From: Dude VanWinkle To: Peter Besenbruch Cc: full-disclosure Sent: Tuesday,

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-15 Thread cardoso
Back in the old BBS days it was an old trick already. Oh, it wasn´t me. My friend/cousing/dog/pel llama used my computer and sent those lucky charm chain mails and all the get rich fast schemes, please do not ban me from your BBS On Tue, 15 Aug 2006 14:30:07 +0200 ... [EMAIL PROTECTED] wrote:

[Full-disclosure] full dis explicit content no good full dis important reason

2006-08-15 Thread vodka hooch
full dis emergency exploits no porno acceptableemergency exploits only full disgovernment and business need full dis important reason-gs Stay in the know. Pulse on the new Yahoo.com. Check it out. ___ Full-Disclosure - We believe in

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-15 Thread Dude VanWinkle
On 8/15/06, ... [EMAIL PROTECTED] wrote: yeah, that's a good one. first: spam a security list of some disgusting and sick porno shit Ok, what makes you think Bea Arthur is Porno? second: pretend you did not I sent out Pictures of Bea Arthur, not the Animal Porno you stupid idiot

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-15 Thread Dude VanWinkle
On 8/15/06, cardoso [EMAIL PROTECTED] wrote: Back in the old BBS days it was an old trick already.Oh, it wasn´t me. My friend/cousing/dog/pel llama used my computer andsent those lucky charm chain mails and all the get rich fast schemes,please do not ban me from your BBS Damn you busted me, I am

Re: [Full-disclosure] full dis explicit content no good full dis important reason

2006-08-15 Thread Aaron Gray
Please learn English ! vodka hooch wrote: full dis emergency exploits no porno acceptable emergency exploits only full dis government and business need full dis important reason -gs Stay in the know. Pulse on

Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN

2006-08-15 Thread Jonathan Glass (gm)
What's truly impressive is that they know about your llama... I wonder if you're under surveillance? ;) Dude VanWinkle wrote: On 8/15/06, *cardoso* [EMAIL PROTECTED] mailto:[EMAIL PROTECTED] wrote: Back in the old BBS days it was an old trick already. Oh, it wasn´t me. My

[Full-disclosure] Gaim crashing on getting MSN cookie

2006-08-15 Thread crazy frog crazy frog
hi, i have gaim 1.5.0 installed.previously it was working fine but today its crashing when it is getting the msn cookie on startup. is anyone else is facing this problem? -- ting ding ting ding ting ding ting ding ting ding ding i m crazy frog :) oh yeah oh yeah... another wannabe, in

Re: [Full-disclosure] full dis explicit content no good full dis important reason

2006-08-15 Thread vodka hooch
Aaron Gray [EMAIL PROTECTED] wrote:Please learn English !sir full disbecome trolltraq no sense subjectmust stop pornoporno no good-gs Do you Yahoo!? Get on board. You're invited to try the new Yahoo! Mail Beta.___

Re: [Full-disclosure] RE: when will AV vendors fix this???

2006-08-15 Thread Bipin Gautam
I'd still argue... If the malicious code is a known variant and recides in the computer exploiting the stated flaw, here are ppl. argueing the AV will catch it during execution anyways. BUT there are many scenerios when ADVANCE HERCULES SCAN, suspecious activity scans etc are only (mostly)

[Full-disclosure] ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Adriel T. Desautels
Hi List, I've been receiving this traffic for a while from the same IP address. Does anyone have any idea what type of traffic this might be. Neither the source IP or the target IP have any ports associated with them in this event. Any ideas would be appreciated. I haven't looked into

Re: [Full-disclosure] WEP key in a sec ;)

2006-08-15 Thread Tonu Samuel
On Monday 14 August 2006 09:23, Antoine SANTO wrote: http://www.cs.ucl.ac.uk/staff/M.Handley/papers/fragmentation.pdf Have seen it before but cannot make code work. Had no time to rewrite or make it work. Anyone else? Tõnu ___ Full-Disclosure - We

Re: [Full-disclosure] ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Richard Bejtlich
Adriel T. Desautels wrote: Hi List, I've been receiving this traffic for a while from the same IP address. Does anyone \ have any idea what type of traffic this might be. Neither the source IP or the target \ IP have any ports associated with them in this event. Any ideas would be

Re: [Full-disclosure] ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Peter Dawson
for an instance, I thought it wasa ping sweep varitionin occurance..snort logs s/have some more info .. were thesrc and dst IP'srandom or static.. ? On 8/15/06, Richard Bejtlich [EMAIL PROTECTED] wrote: Adriel T. Desautels wrote: Hi List, I've been receiving this traffic for a while from the same

[Full-disclosure] Re: Concurrency-related vulnerabilities in browsers - expect problems

2006-08-15 Thread Michal Zalewski
Here's another separate issue that typically causes fault on memory access to website-influenced memory access: http://lcamtuf.coredump.cx/ffoxdie3.html This is separate from the previously presented example (which, remarkably, also had a tendency to trigger an unrelated call stack overflow due

[Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Julio Cesar Fort
Dude VanWinkle, snip - Looks to me like they are using port 0. http://www.grc.com/port_0.htm -JP *NEVER TRUST* Steve Gibson. I bet he smokes crack. See http://attrition.org/errata/charlatan.html#gibson for more details. Best regards, Julio Cesar Fort Recife, PE,

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Dude VanWinkle
On 8/15/06, Julio Cesar Fort [EMAIL PROTECTED] wrote: Dude VanWinkle, snip - Looks to me like they are using port 0. http://www.grc.com/port_0.htm -JP *NEVER TRUST* Steve Gibson. I bet he smokes crack. See http://attrition.org/errata/charlatan.html#gibson for

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Adriel T. Desautels
Well, There's something to the traffic that I am seeing. The payloads are always changing and contain significantly different data. One of the payloads was packed full of X'es, the other was packed full of |'s. Check it out. Event: ICMP Destination Unreachable Port Unreachable Category:

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Darren Bounds
Dude, In case you've failed to notice, this is an ICMP port unreachable message. It's sent in response to a UDP packet destined for an unavailable UDP port. The port '0' referenced in the event source/destination is meaningless as ICMP doesn't use source and destination ports (it is always '0').

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Adriel T. Desautels
Darren, I did notice what type of packet it was and I also know what the packet signifies. The issue that I am having is that there has never been any outbound UDP activity to the host that is replying to this network. The payloads of the ICMP packets are a bit weird too, containing either

[Full-disclosure] Gaim crash issue with apparent changes in msn protocol

2006-08-15 Thread naveed
Hi, Today i tried to run the Gaim version 1.5.0 win32 port and it crashed while getting the cookie after authentication , if there is any change done with MSN protocol ?? because i tried it on two seperate machines with two different versions of gaim and result was a crash. I cannot remember the

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Darren Bounds
Adriel, I was replying to Dude VanWinkle, who's been chasing down the src/dst port 0 unnecessarily. On 8/15/06, Adriel T. Desautels [EMAIL PROTECTED] wrote: Darren, I did notice what type of packet it was and I also know what thepacket signifies. The issue that I am having is that there has never

[Full-disclosure] JavaScript Lazy Authorization Forcer and Visited Link Scaner

2006-08-15 Thread pdp (architect)
Lazy Authorization Forcer http://www.gnucitizen.org/projects/javascript-authorization-forcer/ This is an idea I am still developing but here you go POC is available and it works. The malicious JavaScript presented here will try to guess URLs that contain credentials. It is sort of Basic

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Scott Renna
common mistakeOn Aug 15, 2006, at 7:24 PM, Darren Bounds wrote:I'm confused about a couple things:   1) You say you knew the nature of the packet yet in your original message you stated "Neither the source IP or the target IP have any ports associated with them in this event. Any ideas would be

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Adriel T. Desautels
Darren, my apologies. ;] Darren Bounds wrote: Adriel, I was replying to Dude VanWinkle, who's been chasing down the src/dst port 0 unnecessarily. On 8/15/06, Adriel T. Desautels [EMAIL PROTECTED] wrote: Darren, I did notice what type of packet it was and I also know what the packet

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Adriel T. Desautels
Darren, My responses are below: Darren Bounds wrote: I'm confused about a couple things: 1) You say you knew the nature of the packet yet in your original message you stated Neither the source IP or the target IP have any ports associated with them in this event. Any ideas would be

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Adriel T. Desautels
starting to think that, there's an awful lot of traffic tho. [EMAIL PROTECTED] wrote: On Tue, 15 Aug 2006 18:53:09 EDT, Adriel T. Desautels said: Darren, I did notice what type of packet it was and I also know what the packet signifies. The issue that I am having is that there has

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Dude VanWinkle
On 8/15/06, Darren Bounds [EMAIL PROTECTED] wrote: Adriel, I was replying to Dude VanWinkle, who's been chasing down the src/dst port 0 unnecessarily. Nah, I realized after the 4th post it was an ICMP packet and was just curious about port 0 Only TCP/UDP have ports, I know that :-) -JPone

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Valdis . Kletnieks
On Tue, 15 Aug 2006 20:23:30 EDT, Adriel T. Desautels said: starting to think that, there's an awful lot of traffic tho. [EMAIL PROTECTED] wrote: Backscatter reply to a spoofed packet source address? You think *you* got a lot of traffic, think about the site that sent you the ICMP - if

Re: [Full-disclosure] Re: ICMP Destination Unreachable Port Unreachable

2006-08-15 Thread Valdis . Kletnieks
On Tue, 15 Aug 2006 18:53:09 EDT, Adriel T. Desautels said: Darren, I did notice what type of packet it was and I also know what the packet signifies. The issue that I am having is that there has never been any outbound UDP activity to the host that is replying to this network.

[Full-disclosure] ASSP “get?file” Travers al Vulnerability

2006-08-15 Thread Micheal Espinola Jr
Anti-Spam SMTP Proxy (ASSP) get?file Traversal Vulnerability Release Date: August 15, 2006 Notice: This is a known flaw, and has been since the implementation of an enhanced web interface for ASSP, since at least 2003. I do not normally test for security vulnerabilities or address them

[Full-disclosure] Gaim crash issue with apparent changes in msn protocol

2006-08-15 Thread Garth Stone
I've seen an identical issue, and I've tested it on a number of machines and Gaim versions. You aren't alone. Garth On 8/16/06, naveed [EMAIL PROTECTED] wrote:Hi,Today i tried to run the Gaim version 1.5.0 win32 port and it crashedwhile getting the cookie after authentication , if there is any

Re: [Full-disclosure] LOL HY

2006-08-15 Thread Matt Burnett
You really think this would be hard to design. Think about how most spam solutions work, if you get 25 posts in hour with 100k attachments from a new user, do you think they are talking about security or are they posting porn. Anything a spam filter would consider suspicous could be flaged

Re: [Full-disclosure] LOL HY

2006-08-15 Thread darren kirby
quoth the Matt Burnett: You really think this would be hard to design. Think about how most spam solutions work, if you get 25 posts in hour with 100k attachments from a new user, do you think they are talking about security or are they posting porn. Anything a spam filter would consider

Re: [Full-disclosure] LOL HY

2006-08-15 Thread Jason
Matt Burnett wrote: You really think this would be hard to design. Think about how most spam solutions work, if you get 25 posts in hour with 100k attachments from a new user, do you think they are talking about security or are they posting porn. Anything a spam filter would consider

[Full-disclosure] Re: JavaScript Lazy Authorization Forcer and Visited Link Scaner

2006-08-15 Thread mikeiscool
i discovered this first! well, maybe. but the site where i talked about it is now gone :) anyway, it really doesn't need to be so complicated with creating a new 'style' section; just use the a:visited selector. style a { margin-left: 1px; } a:visited { margin-left: 2px; } /style then check