Re: [Full-disclosure] Associate professor from Pakistan National University - spammer

2012-08-15 Thread Tonu Samuel
On 2012/08/16, at 12:49, valdis.kletni...@vt.edu wrote: > On Tue, 14 Aug 2012 14:55:41 +0900, Tonu Samuel said: > >> I found that person who is spamming >> OpenCV list with "Plz visit my e-gaming site at http://."; is PhD > > So... did you establish that the person doing the spamming actually *

Re: [Full-disclosure] Nishang: PowerShell for Penetration Testing

2012-08-15 Thread Nikhil Mittal
Thanks Harry and sorry for this, I have removed the creds and edited the code to accept user input. pd, Relax, that is a demo pastebin account and I use this for demonstration/test. Though I never left it intentionally there and it is my fault. For your surprise many ppl still hire me :P >

Re: [Full-disclosure] Full-Disclosure Digest, Vol 90, Issue 21

2012-08-15 Thread Nikhil Mittal
Thanks Harry and sorry for this, I have removed the creds and edited the code to accept user input. pd, Relax, that is a demo pastebin account and I use this for demonstration/test. Though I never left it intentionally there and it is my fault. For your surprise many ppl still hire me :P >>

Re: [Full-disclosure] Associate professor from Pakistan National University - spammer

2012-08-15 Thread valdis . kletnieks
On Tue, 14 Aug 2012 14:55:41 +0900, Tonu Samuel said: > I found that person who is spamming > OpenCV list with "Plz visit my e-gaming site at http://."; is PhD So... did you establish that the person doing the spamming actually *is* that professor, or merely somebody who managed to phish the pro

Re: [Full-disclosure] Nishang: PowerShell for Penetration Testing

2012-08-15 Thread Peter Dawson
and this is coming from person who is "has many years experience in Penetration Testing of many Government Organizations of India and other global corporate giants. Who the friggin hell hires such peeps who give away key /userid/pwd eh ? /pd On Wed, Aug 15, 2012 at 2:52 PM, Harry Hoffman wr

[Full-disclosure] [Security-news] SA-CONTRIB-2012-127 - Custom Publishing Options - Cross Site Scripting (XSS) Vulnerability

2012-08-15 Thread security-news
View online: http://drupal.org/node/1732980 * Advisory ID: DRUPAL-SA-CONTRIB-2012-127 * Project: Custom Publishing Options [1] (third-party module) * Version: 6.x * Date: 2012-August-15 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Sc

[Full-disclosure] [SECURITY] [DSA 2530-1] rssh security update

2012-08-15 Thread Florian Weimer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2530-1 secur...@debian.org http://www.debian.org/security/Florian Weimer August 15, 2012

[Full-disclosure] [Security-news] SA-CONTRIB-2012-128 - Elegant Theme - Cross Site Scripting (XSS)

2012-08-15 Thread security-news
View online: http://drupal.org/node/1733056 * Advisory ID: DRUPAL-SA-CONTRIB-2012-128 * Project: Elegant Theme [1] (third-party module) * Version: 7.x * Date: 2012-August-15 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting ---

Re: [Full-disclosure] Nishang: PowerShell for Penetration Testing

2012-08-15 Thread Harry Hoffman
Probably at the least want to change your pastebin password and api key: >From Credentials.ps1: Post_http "http://pastebin.com/api/api_login.php"; "api_dev_key=8e5dbe7c4288c87f41b1e3e2ffce6c25&api_user_name=koshish&api_user_password=nikhilpastebin" Post_http "http://pastebin.com/api/api_post.php

[Full-disclosure] Drupal Custom Publishing Options Module XSS

2012-08-15 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Vulnerability Report Reported: January 3, 2012 Author: Justin C. Klein Keane Description of Vulnerability: - - Drupal (http://drupal.org) is a robust content management system (CMS) written in PHP and MySQL. The Drupal

[Full-disclosure] [Security-news] SA-CONTRIB-2012-126 - Hotblocks - Cross Site Scripting (XSS) and Denial of Service (DoS)

2012-08-15 Thread security-news
View online: http://drupal.org/node/1732946 * Advisory ID: DRUPAL-SA-CONTRIB-2012-126 * Project: HotBlocks [1] (third-party module) * Version: 6.x * Date: 2012-August-15 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting, Multipl

[Full-disclosure] [ MDVSA-2012:132 ] glpi

2012-08-15 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:132 http://www.mandriva.com/security/ _

Re: [Full-disclosure] debugfs exploit for a number of Android devices

2012-08-15 Thread Alexander Pruss
On Wed, Aug 15, 2012 at 8:10 AM, Dan Rosenberg wrote: > This also can't be used by malicious apps, since you need user/group "shell" > to replace /data/local/tmp with a symbolic link, and normal applications > cannot be granted this user/group. You're right: my apologies. I didn't really look at

Re: [Full-disclosure] debugfs exploit for a number of Android devices

2012-08-15 Thread Dan Rosenberg
> I haven't seen a reference to this in the archives, so for the sake of > completeness here it is: > http://forum.xda-developers.com/showthread.php?t=1790104 > > Looks like on a number of devices you can symlink the block device > that gets mounted on /system to something like /data/local/tmp, and

[Full-disclosure] [2.0 Update] Cisco Security Advisory: Cisco IOS XR Software Route Processor Denial of Service Vulnerability

2012-08-15 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS XR Software Route Processor Denial of Service Vulnerability Advisory ID: cisco-sa-20120530-iosxr Revision 2.0 For Public Release 2012 August 15 16:00 UTC (GMT) +- Su

[Full-disclosure] New Adobe Reader fixes some, but not all known bugs

2012-08-15 Thread Mateusz Jurczyk
Hey, We’ve been recently working on PDF fuzzing, and consequently found around 60 unique crashes in Adobe Reader (40 of which looked potentially exploitable), which we reported to Adobe. Today Adobe has released an update for Adobe Reader Windows and OS X (no Linux update available yet) with most

[Full-disclosure] Associate professor from Pakistan National University - spammer

2012-08-15 Thread Tonu Samuel
Hi! I hope this is within reasonable limits of self promoting. I keep blog about local spammers but today bit different fish was captured. I found that person who is spamming OpenCV list with "Plz visit my e-gaming site at http://."; is PhD and associate professor of National University of Scie

[Full-disclosure] Powershell for Penetration Testing - Nishang tool

2012-08-15 Thread John Cage
Hi List, Saw this on /r/netsec. It is a tool to use PowerShell for Pen Tests. http://labofapenetrationtester.blogspot.com/2012/08/introducing-nishang-powereshell-for.html Looks cool to me could be useful for post exploitation. Thoughts? Cheers, /J

[Full-disclosure] DivX Plus Player plugin 2.2.0.52 Buffer Overflow PoC

2012-08-15 Thread kaveh ghaemmaghami
Exploit Title: DivX Plus Player plugin 2.2.0.52 Buffer Overflow PoC Crash:http://img507.imageshack.us/img507/40/divx.png Class: Boundary Condition Error Date: 2012-08-14 Author: coolkaveh coolka...@rocketmail.com Https://twitter.com/coolkaveh Vendor Homepage: http://www.divx.com/ Version: 2.2.0.52

[Full-disclosure] [SECURITY] [DSA 2529-1] python-django security update

2012-08-15 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2529-1 secur...@debian.org http://www.debian.org/security/ Thijs Kinkhorst August 14, 2012

[Full-disclosure] debugfs exploit for a number of Android devices

2012-08-15 Thread Alexander Pruss
I haven't seen a reference to this in the archives, so for the sake of completeness here it is: http://forum.xda-developers.com/showthread.php?t=1790104 Looks like on a number of devices you can symlink the block device that gets mounted on /system to something like /data/local/tmp, and then use d

Re: [Full-disclosure] The Android Superuser App

2012-08-15 Thread Alexander Pruss
There is also SuperSU from XDA's Chainfire: http://forum.xda-developers.com/showthread.php?t=1538053 I think it's closed source, right? -- Alexander R. Pruss arpr...@gmail.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/f

[Full-disclosure] Nishang: PowerShell for Penetration Testing

2012-08-15 Thread Nikhil Mittal
Hi List, I have written a tool in PowerShell which helps in usage of PowerShell for post exploitation activity. The tool, called, Nishang. is a framework and collection of PowerShell scripts. Details about it could be found on my blog at http://labofapenetrationtester.blogspot.com/2012/08/intr