Re: [Full-disclosure] kill -9 coz it's my time to shine

2007-03-21 Thread scott
This ,to me is a Security Research's life,if you will :http://www.youtube.com/watch?v=GhZeYjpSXCQ&NR Listen to the words ,if you don't already know them. : > ) ie. long-face intended! LOL! Anyways,back to the grind, Regards, Scott > Lots more here

Re: [Full-disclosure] Sexy, spankable 22 year old girl looking for a wild time

2007-03-21 Thread Michael Silk
nah we just need john to post the full disclosure guidelines again. that'll keep everyone in line. On 3/22/07, scott <[EMAIL PROTECTED]> wrote: OK,I think this FULL-DISCLOSURE needs to be closed!ROFLR!!!E! > If you look at the pictures on livejournal you can see a tampon string hangin

[Full-disclosure] FLEA-2007-0001-1: firefox

2007-03-21 Thread Foresight Linux Essential Announcement Service
Foresight Linux Essential Advisory: 2007-0001-1 Published: 2007-03-22 Rating: Minor Updated Versions: firefox=/[EMAIL PROTECTED]:1-devel//1/2.0.0.3-1-1 group-dist=/[EMAIL PROTECTED]:1-devel//1/1.1-0.8-2 References: http://www.mozilla.org/security/announce/2007/mfsa2007-11.html De

Re: [Full-disclosure] kill -9 coz it's my time to shine

2007-03-21 Thread scott
> This ,to me is a Security Research's life,if you will > :http://www.youtube.com/watch?v=GhZeYjpSXCQ&NR > Listen to the words ,if you don't already know them. : > ) ie. long-face > intended! > > LOL! Anyways,back to the grind, > Regards, > Scott S

Re: [Full-disclosure] Sexy, spankable 22 year old girl looking for a wild time

2007-03-21 Thread scott
OK,I think this FULL-DISCLOSURE needs to be closed!ROFLR!!!E! > If you look at the pictures on livejournal you can see a tampon string > hanging out of her vag... O_o > It's the 3rd picture down. ___ Full-Disclosure - We believe in it. Charter

Re: [Full-disclosure] Sexy, spankable 22 year old girl looking for a wild time

2007-03-21 Thread evilrabbi
If you look at the pictures on livejournal you can see a tampon string hanging out of her vag... O_o It's the 3rd picture down. On 3/21/07, Nick FitzGerald <[EMAIL PROTECTED]> wrote: [EMAIL PROTECTED] wrote: > > where are the mods? > > The Mods were a mid-60's movement in Great Britain. I susp

Re: [Full-disclosure] Newest hacks

2007-03-21 Thread scott
It seems to me pdp(architect) wrote about this about a year ago.He also wrote a simple javascript scanner.You can check it out at http://www.gnucitizen.org/projects/javascript-port-scanner/. Regards, Scott ___ Full-Disclosure -

Re: [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread Valdis . Kletnieks
On Wed, 21 Mar 2007 12:24:35 EDT, Tim said: > As for US courts... which case are you referring to (as I'd be > interested to read the results)? The only one I know of involving MD5 > was an Australian case[2]. In the US, the "must be this tall to be considered crypto" standard is ROT-13, as this

[Full-disclosure] Secunia Research: XMMS Integer Overflow and Underflow Vulnerabilities

2007-03-21 Thread Secunia Research
== Secunia Research 21/03/2007 - XMMS Integer Overflow and Underflow Vulnerabilities - = Table of Contents Affected Software

[Full-disclosure] Secunia Research: Evolution Shared Memo Categories Format String Vulnerability

2007-03-21 Thread Secunia Research
== Secunia Research 21/03/2007 - Evolution Shared Memo Categories Format String Vulnerability - == Table of Contents Affected Softwar

[Full-disclosure] Secunia Research: InterActual Player / CinePlayer IASystemInfo.dll ActiveX Control Buffer Overflow

2007-03-21 Thread Secunia Research
== Secunia Research 21/03/2007 - InterActual Player / CinePlayer - - IASystemInfo.dll ActiveX Control Buffer Overflow - ==

[Full-disclosure] [SECURITY] [DSA 1271-1] New openafs packages fix remote privilege escalation bug

2007-03-21 Thread Noah Meyerhans
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1271-1[EMAIL PROTECTED] http://www.debian.org/security/ Noah Meyerhans March 20, 2007 -

[Full-disclosure] [USN-439-1] file vulnerability

2007-03-21 Thread Kees Cook
=== Ubuntu Security Notice USN-439-1 March 21, 2007 file vulnerability CVE-2007-1536 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS

[Full-disclosure] [USN-440-1] MySQL vulnerability

2007-03-21 Thread Kees Cook
=== Ubuntu Security Notice USN-440-1 March 21, 2007 mysql-dfsg-5.0 vulnerability CVE-2007-1420 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS U

Re: [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread 3APA3A
Dear Tim, --Wednesday, March 21, 2007, 7:24:35 PM, you wrote to full-disclosure@lists.grok.org.uk: T> Secondly, 3APA3A, birthday attacks against the collision-resistance T> property of a hash take approximately 2^(b/2) time, where b is the T> number of bits. That is, brute-force birthday attac

Re: [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread Blue Boar
My understanding that the kind of birthday attack under discussion would start at 80-bits if SHA-1 (at 160-bits) were 100% secure. The attack under discussion is reported to reduce that to the neighborhood of 60-something bits. I am not a mathematician though, so I would be perfectly willing to be

Re: [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread 3APA3A
Dear Blue Boar, To be more precise, theoretically, if compare bruteforce with birthday, 160 bit birthday is equivalent to 81-bit bruteforce by calculation complexity (number of arithmetic operations). I do not compare birthday vs bruteforce, I compare bruteforce vs bruteforce and b

Re: [Full-disclosure] Newest hacks

2007-03-21 Thread Jason Miller
someone has too much free time. On 3/21/07, Stauf von Stauf <[EMAIL PROTECTED]> wrote: > Jason Miller wrote: > > this is old and i find it personally useless/retarded. complete waste > > if a wardrivers time. if you can give me 5 cases of something like > > this actually happening, with PROOF, ple

Re: [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread 3APA3A
Dear Blue Boar, It's not clear if this 'crack' cam be applied to birthday attack. My in-mind computations were: because birthday attack requires ~square root of N computations where bruteforce requires ~N/2, impact of 2000 times N decrease for birthday is ~64 times faster. 64 = 2^6. Because c

Re: [Full-disclosure] Sexy, spankable 22 year old girl looking for a wild time

2007-03-21 Thread Nick FitzGerald
[EMAIL PROTECTED] wrote: > > where are the mods? > > The Mods were a mid-60's movement in Great Britain. I suspect most of the > members have long since retired. Though some of their best-known music is used as the themes for some currently popular TV crime drama series... Regards, Nick Fitz

Re: [Full-disclosure] Newest hacks

2007-03-21 Thread Jason Miller
this is old and i find it personally useless/retarded. complete waste if a wardrivers time. if you can give me 5 cases of something like this actually happening, with PROOF, please do. i will then change my mind. On 3/21/07, Nick Eoannidis <[EMAIL PROTECTED]> wrote: > For those who haven't read ab

Re: [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread Blue Boar
3APA3A wrote: > I know meaning of 'hash function' term, I wrote few articles on > challenge-response authentication and I did few hash functions > implementations for hashtables and authentication in FreeRADIUS and > 3proxy. Can I claim my right for sarcasm after call

Re: [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread 3APA3A
Dear Blue Boar, I know meaning of 'hash function' term, I wrote few articles on challenge-response authentication and I did few hash functions implementations for hashtables and authentication in FreeRADIUS and 3proxy. Can I claim my right for sarcasm after calling a

Re: [Full-disclosure] Sexy, spankable 22 year old girl looking for a wild time

2007-03-21 Thread Valdis . Kletnieks
On Wed, 21 Mar 2007 23:20:20 +0530, crazy frog crazy frog said: > where are the mods? The Mods were a mid-60's movement in Great Britain. I suspect most of the members have long since retired. http://en.wikipedia.org/wiki/Mod_%28lifestyle%29 (If you're looking for the moderators of *this* list,

Re: [Full-disclosure] Sexy, spankable 22 year old girl looking for a wild time

2007-03-21 Thread crazy frog crazy frog
where are the mods? On 3/20/07, Michael Silk <[EMAIL PROTECTED]> wrote: > On 3/20/07, Ken Swain <[EMAIL PROTECTED]> wrote: > > > > On Mar 19, 2007, at 11:37 PM, Miss Aveline wrote: > > > > > hey sexys, > > > 22/f/st. catherines bi girl looking for a casual thing no strings > > > attached. love the

Re: [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread Blue Boar
3APA3A wrote: > First, by reading 'crack' I thought lady can recover full message by > it's signature. After careful reading she can bruteforce collisions 2000 > times faster. Cracking a hash would never mean recovering the full original message, except for possibly messages that were smaller

Re: [Full-disclosure] kill -9 coz it's my time to shine

2007-03-21 Thread Tremaine Lea
Lots more here - http://www.youtube.com/profile?user=NerdcoreForLife Cheers, Tremaine Lea Network Security Consultant Be in pursuit of equality, but not at the expense of excellence. On 20-Mar-07, at 1:59 PM, Gadi Evron wrote: > "It's like I'm running Thunderbird and you're still stuck with

Re: [Full-disclosure] Newest hacks

2007-03-21 Thread Nick Eoannidis
For those who haven't read about what Ken was saying. The technique is called drive by Pharming. It involves crafting a page hosting malicious JavaScript that takes advantage of default configurations in home broadband modem/routers. (dlink, Linksys, netcomm etc.) The basis of this attack is trick

Re: [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread Tim
Hello, On Wed, Mar 21, 2007 at 06:45:19PM +0300, 3APA3A wrote: > Dear Michael Silk, > > First, by reading 'crack' I thought lady can recover full message by > it's signature. After careful reading she can bruteforce collisions 2000 > times faster. Both of you guys are confused. First off Mi

Re: [Full-disclosure] Sexy, spankable 22 year old girl looking for a wild time

2007-03-21 Thread Michael Silk
On 3/20/07, Ken Swain <[EMAIL PROTECTED]> wrote: On Mar 19, 2007, at 11:37 PM, Miss Aveline wrote: > hey sexys, > 22/f/st. catherines bi girl looking for a casual thing no strings > attached. love the cock, but will eat pussy too. into BDSM, > roleplay, ageplay, and watersports and spankings e

Re: [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread 3APA3A
Dear Michael Silk, First, by reading 'crack' I thought lady can recover full message by it's signature. After careful reading she can bruteforce collisions 2000 times faster. SHA-1 is 160 bit hash. Bruteforced 2000 times faster, it retains the strength of 149-bit hash for bruteforce co

[Full-disclosure] Grandstream Budge Tone-200 denial of service vulnerability

2007-03-21 Thread Radu State
MADYNES Security Advisory http://madynes.loria.fr Title: Grandstream Budge Tone-200 denial of service vulnerability Release Date: 21/03/2007 Severity: High - Denial of Service Advisory ID:KIPH3 Hardware: Grandstream Budge Tone

[Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1)

2007-03-21 Thread Michael Silk
Awesome. --- The Epoch Times Home > Science & Technology Chinese Professor Cracks Fifth Data Security Algorithm SHA-1 added to list of "accomplishments" Central News Agency Jan 11, 2007 Associate professor Wan

Re: [Full-disclosure] Newest hacks

2007-03-21 Thread Sebastian Krahmer
On Wed, 21 Mar 2007, Saeed Abu Nimeh wrote: Hi, This is not very different from the common session riding attacks happening since ages, except the part after the "vulnerability" (changing DNS or whatever). Internal 192.168.x.y tags have been used since years to trigger intranet CGI's and configu