On Fri, 21 Dec 2007 13:11:22 GMT, worried security said:
> In 5 to 10 years n3td3v should be an elite force of people from
> corporate,government,military,intelligence,law and freelance ethical
> hackers that is way bigger than any other group on the internet.
The only problem is that the talent
On Dec 21, 2007 5:36 PM, Ben <[EMAIL PROTECTED]> wrote:
> All,
>
> I read a paper last night titled "The Geometry of Innocent Flesh on the Bone"
> (http://www.cse.ucsd.edu/~hovav/). It described a technique similar to
> return-into-libc.
yes, this is fun stuff :)
'''
Our thesis: In any suļ¬cien
It would help if I attached the file wouldn't it?
- Ben
> All,
>
> I read a paper last night titled "The Geometry of Innocent Flesh on the Bone"
> (http://www.cse.ucsd.edu/~hovav/).
> It described a technique similar to return-into-libc. The utility I'm
> attaching (hikaru) implements an au
All,
I read a paper last night titled "The Geometry of Innocent Flesh on the Bone"
(http://www.cse.ucsd.edu/~hovav/). It described a technique similar to
return-into-libc. The utility I'm attaching (hikaru) implements an automated
binary analysis to determine possible instructions (gadgets, p
Sorry for the brief post but Im still able to bypass filters that aol has
put in place. So again with frustration I come to FD to imply pressure on a
company to patch correct. From reading feedback from AOL they feel the
vulnerability is put to bed and requires no more attention.
I am not postin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Title: [CAID 35970]: CA Products That Embed Ingres Authentication
Vulnerability
CA Vuln ID (CAID): 35970
CA Advisory Date: 2007-12-19
Reported By: Ingres Corporation
Impact: Attacker can gain elevated privileges.
Summary: A potential vulnerabilit
###
Luigi Auriemma
Application: WinUAE
http://www.winuae.net
Versions: <= 1.4.4
Platforms:Windows
Bug: buffer-overflow
Exploitation: local
Date: 21 Dec 2007
Au
On Dec 21, 2007 1:11 PM, worried security
<[EMAIL PROTECTED]> wrote:
> On Dec 21, 2007 11:05 AM, php0t <[EMAIL PROTECTED]> wrote:
> > > We're made up of: "online news
> > > journalists, corporate security, government security, military
> > > defense, intelligence service, law inforcement and freela
Absolute Poker recently had an incident over the summer where an insider had
access to a "super-user" account and was able to see the cards of every
player at the table. That whole incident played out like a B Movie. Lots of
details about the incident have been posted over various sites; here are a
I agree with Nate. It's odd how you dismiss any critics as 'trolls,' and
only believe that people who compliment your efforts are 'legitimate
readers.' As an author and public speaker I know that I get the most value
from people who critique my work because they help me to improve. Sure,
being slap
I believe your answers are definitely more trollish and kiddie-like
than the legitimate responses, despite the aggressive or tactless
comments, as Nate mentioned.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosur
Unless I missed something, these seemed like legitimate responses. They may
not have all been delivered with tact, but I mean, you are on FD, what did
you expect?
I think some valid points are brought up about your credentials and your
process.
Nate
On 12/21/07, SecReview <[EMAIL PROTECTED]> w
I believe the BackTrack guys get some of it and put the rest back
into Offensive Security. See http://www.remote-
exploit.org/news.html, June 07.
Elazar
On Thu, 20 Dec 2007 20:02:03 -0500 Matthew Hall <[EMAIL PROTECTED]>
wrote:
>gmaggro wrote:
>> ..it would be a nice touch if everyone sent a fe
PaulM:
You'd be right only if you weren't wrong. That being said, we're
not going to talk to the trolls any more. While it might be amusing
it's a waste of our time, and our readers time.
We will continue to write reviews and will continue to be as honest
and truthful as possible during our re
> Yes we are an easy
> target for php0t etc right now, but in the future we will be the
> biggest on the internet in the long term.
I didn't know 'being targetted' means somebody replies to one of your mails
(OFF LIST!) to express an opinion. What is going to change about this in the
long term
On Dec 21, 2007 11:05 AM, php0t <[EMAIL PROTECTED]> wrote:
> > We're made up of: "online news
> > journalists, corporate security, government security, military
> > defense, intelligence service, law inforcement and freelance ethical
> > hackers.
>
> You are one of the most delusional people I have
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
So, because I disagree strongly with your actions I must be the
subject of your review?
Clearly, your progenitors were swimming in the shallow end of the
gene pool when they set about screwing your sorry excuse for a
brain into existence.
You obvious
On Dec 20, 2007 7:19 PM, SecReview <[EMAIL PROTECTED]> wrote:
> > 1.) What are your qualifications for reviewing these companies?
>
> We are a team of security professionals that have been performing a
> wide array of penetration tests, vulnerability assessments, web
> application security services
-- Forwarded message --
From: worried security <[EMAIL PROTECTED]>
Date: Dec 21, 2007 9:40 AM
Subject: Re: Chat with Dude VanWinkle
To: Dude VanWinkle <[EMAIL PROTECTED]>
On Dec 20, 2007 4:43 AM, Dude VanWinkle <[EMAIL PROTECTED]> wrote:
>
> These messages were sent while you were
19 matches
Mail list logo