You've got to be fucking kidding me
You spam reddit with your retarded, provoking OMFG THE INTERNET IS
GOING TO IMPLODE posts, and now full disclosure?
You've deleted my comments off of your blog posts before, and you
seriously need to stop posting about the same crap over and over
again...
Same thing?
Sent from my iPhone
On 25 Jun 2010, at 08:34, Ed Carp wrote:
> Auernheimer was also arrested in March for giving a false name to law
> enforcement officers responding to a parking complaint.
>
> Idiot.
>
> Sent from my iPad, probably mobile
>
> On Jun 25, 2010, at 12:06 AM, Chri
packetstorm goes down and leading internet research gets owned?
coincidence? i think not
On Tue, Jun 22, 2010 at 4:53 PM, Stack Smasher wrote:
>
> Dude you just got P0wn3D!!!
>
>
> For the low low price of just $19.95 I can scan your site with a free
> version of Acunetix and hand you a
What?
Think about what you said.
Anyone. else. seeing. a. targetted. attack.
Why would anyone else see a TARGETTED attack?
anyway, no, you're not special, distributed SSH bruteforce is normal.
On Thu, Jun 17, 2010 at 1:44 PM, Gary Baribault wrote:
> I just knew that people would say that, an
rabble rabble rabble rabble rabble rabble rabble rabble rabble rabble
rabble rabble rabble rabble rabble rabble rabble rabble rabble rabble
rabble rabble rabble rabble rabble rabble rabble rabble rabble
On Wed, Jun 16, 2010 at 9:05 PM, Harry Balls wrote:
> This is pretty much because I want to em
Sup bro
I waz checkin owt ur javascriptz skriptz and waz wonderin if u cud
explain how diz shiz werks.
Peaze.
Sent from my iPhone
On 15 Jun 2010, at 09:18, pratul agrawal wrote:
Its working Bro. I think u had done some mistakes so u try it again
with check that javascript execution fea
or zimbabwe $?
On Mon, Jun 14, 2010 at 6:47 PM, wrote:
> On Mon, 14 Jun 2010 13:39:16 EDT, musnt live said:
>
>> Since this no is free bugs. Opening bid for multipurpose remote server
>> PoC affecting: I no SHARE right now -- only to serious bidder who no
>> blink at 5 digits before decimal.
>
>
, was given your reference.
Thanks & Regards,
Srinivas Naik
On Sun, Jun 13, 2010 at 2:35 PM, Benji wrote:
> It sounds like you've been the victim of a hacker, probably chinese.
> Sounds like 0day, talk to mubix.
>
>
>
> On Sun, Jun 13, 2010 at 2:34 PM, Srinivas N
It sounds like you've been the victim of a hacker, probably chinese.
Sounds like 0day, talk to mubix.
On Sun, Jun 13, 2010 at 2:34 PM, Srinivas Naik wrote:
> Hi,
>
> My friends Gmail got deleted very recently; I dono if there is some
> problem with Google or any other vulnerabilities in it
And then gets his identity stolen?
Sent from my iPhone
On 12 Jun 2010, at 12:12, Larry Seltzer wrote:
Oh cool, this is like those TV ads where the guy parades his social
security # around, right?
From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-
disclosure-boun...@lists.grok
You're just jealous I had the intuition to protect myself.
Sent from my iPhone
On 11 Jun 2010, at 17:03, T Biehn wrote:
It's a good thing I ran that anti-hacker script!!!
On Fri, Jun 11, 2010 at 11:28 AM, Benji wrote:
because when she gets 0wn3d she can be all like 'ruh roh,
because when she gets 0wn3d she can be all like 'ruh roh, well, 0day
can happen to anyone'
On Fri, Jun 11, 2010 at 4:01 PM, Benjamin Franz wrote:
> On 06/11/2010 02:40 AM, Christian Sciberras wrote:
>> In my humble opinion, he could have waited a couple more days just in
>> case Microsoft decided
thats the best you could come up with? you sir, need to browse the internet
some moar.
On Thu, Jun 10, 2010 at 12:15 AM, Larry Seltzer wrote:
> Click here to retrieve your free beer.
>
>
>
> http://bit.ly/4a8VOA
>
>
>
> *From:* Benji [mailto:m...@b3nji.com]
> *Sen
I like this idea.
On Wed, Jun 9, 2010 at 11:58 PM, Larry Seltzer wrote:
> I might be able to buy you one beer with the money, but it won’t be
> anything good.
>
>
>
> *From:* Thor (Hammer of God) [mailto:t...@hammerofgod.com]
> *Sent:* Wednesday, June 09, 2010 6:56 PM
> *To:* Larry Seltzer; nol
That wouldve been me. Can I have the royalties as some sort of discount?
chrz.
On Wed, Jun 9, 2010 at 11:53 PM, Larry Seltzer wrote:
>
>
> 10 years ago I wrote a book on Terminal Services for Windows 2000. Believe
> it or not, I still get trivial royalties on it, $6.81 for the first quarter
> o
so what are you saying? norton internet security 2010 is malware? that
protects against malware?
stop being such a troll.
On Mon, Jun 7, 2010 at 10:38 PM, Peter Besenbruch wrote:
> On Mon, 7 Jun 2010 21:31:03 +0100
> Benji wrote:
>
>> Im new to computers, what is wrong w
;
>
>
>
> On Mon, Jun 7, 2010 at 10:23 PM, Benji wrote:
>>
>> on an unrelated note, would anyone know how to uninstall this?
>>
>> thx intentrnets.
>>
>> On Mon, Jun 7, 2010 at 4:27 PM, T Biehn wrote:
>> > Actually,
>> > The code i
on an unrelated note, would anyone know how to uninstall this?
thx intentrnets.
On Mon, Jun 7, 2010 at 4:27 PM, T Biehn wrote:
> Actually,
> The code is clean (Yes I looked), other than him setting his website as the
> search provider for IE.
>
> -Travis
>
> On Mon, Jun 7, 2010 at 10:49 AM, wro
You should make a show about it.
On Tue, Jun 1, 2010 at 6:07 AM, Rob Fuller wrote:
> Couldn't this also be thwarted by having a MOTD? It generally displays
> before the bashrc if I'm not mistaken.
>
> --
> Rob Fuller | Mubix
> Room362.com | Hak5.org
>
>
>
> On Mon, May 31, 2010 at 8:47 PM, Jan Sc
aww shucks, I love you too
On Wed, May 26, 2010 at 9:31 PM, MustLive wrote:
> Hello Benji!
>
> It's good that you are drawing attention to my advisories, but very often
> your letters are unequal and not serious. So I've put you in my blacklist.
> I
> already wrote
oh cool, so you've moved from discovering leet xss vulnerabilities to
publishing old exploits?
I would offer you a sec. job, but unfortunately I think you're too
qualified.
On Sat, May 22, 2010 at 4:09 PM, MustLive wrote:
> Hello Full-Disclosure!
>
> I want to warn you about security vulnerabili
tree trousand dorrar?
On Tue, May 4, 2010 at 3:16 PM, wrote:
> Hello,
>
> 0days for sale in both DNS-SEC and IPv6. Bug is in specs. Only
> serious buyers, thanks.
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-di
Please forward information about this certification.
Benji
CE, CCNA, CCDA, CCNP, CCSP, CCVP, CCIP, CCDP, CCIE, CEH, GIAC, ECSA, LPT
(Unemployed)
On Sun, Apr 25, 2010 at 8:21 PM, jeff smith wrote:
> Wow, once again, scary shit...
>
> Are you going to exploit EVERY FUCKING ZIP archive N
tl;dr you're all supposedly wrong
On Thu, Apr 15, 2010 at 9:55 PM, MustLive wrote:
> Hello Jan, Valdis, Christian and Jeff!
>
> I'll answer at all your letters in one message. Even if I already banned
> Jan
> and he put my email to his blacklist, it's possible that he will read it in
> the list.
By this point, if these advisories arent automated, you're doing it wrong.
On Thu, Apr 15, 2010 at 12:24 PM, MustLive wrote:
> Hello Full-Disclosure!
>
> I want to warn you about security vulnerability in plugin CB Captcha
> (plug_cbcaptcha) for component Community Builder (com_comprofiler) for
>
nah, he'd be telling us how that was an easy way to find valid accounts.
-Benji
On Thu, Apr 8, 2010 at 6:30 PM, T Biehn wrote:
> If there were an account lockout after 5 tries would you be telling us
> about how there was a DOS vector on the same software?
>
> -Travis
>
&
Try squinting and turning your head at a 780o angle parallel with the moon.
On Tue, Apr 6, 2010 at 8:37 AM, BMF wrote:
> On Mon, Apr 5, 2010 at 8:36 PM, Scarf Pride Worldwide
> wrote:
> > Allegedly he "obstructed justice" by giving a false name.. most likely
> > didn't put money in the parking
Good, they have minds of their own.
On Fri, Apr 2, 2010 at 3:03 PM, T Biehn wrote:
> Can't hurt.
> I don't trust machines in DCs much less VPSs.
>
> An adversary with the resources and motivation to kill power, net, and
> jam GSM when they're pwning your house would probably be able to know
> ab
Nevermind, people take Kaminsky seriously and he doesn't even *have* a
website...
On Tue, Mar 30, 2010 at 7:52 PM, Benji wrote:
> You take someone who can't spell and has a website like that.
> seriously?
>
>
> On Tue, Mar 30, 2010 at 7:15 PM, Michael H
You take someone who can't spell and has a website like that. seriously?
On Tue, Mar 30, 2010 at 7:15 PM, Michael Holstein <
michael.holst...@csuohio.edu> wrote:
>
> > Any one got any ides how I would program a system to call me from a
> > voip network to alert me of a home security breach.
>
WHY WOULD YOU TRUST SOMEONE CALLED EVIL
FINGERS?!?!!!?!!!1ONEONEOMFGONE!!!ONETWO
On Tue, Mar 30, 2010 at 3:53 PM, T Biehn wrote:
> HELLO AND THANK YOU FOR YOUR NOTICE I WILL QUICKLY DOWNLOAD THESE
> APPLICATIONS AND ERADICATE MY EVIL STREAMS.
>
> On Sun, Mar 28, 2010 at 10:15 PM, evi
>>However, it was a trick question.
ZZINGG
On Sat, Mar 27, 2010 at 6:48 PM, Mr. Hinky Dink wrote:
> In your case, had you answered the question correctly I would have promised
> to never (again) blog about you arguing with Craig S. Wright.
>
> However, it
ked pasta. Might want to bear that in mind.
On Mon, Mar 22, 2010 at 9:55 PM, wrote:
> On Mon, 22 Mar 2010 20:30:34 -, Benji said:
> > to smoke. I was like the bounty hunter of the halls. Do you have hall
> > monitors at 'college' (is that the correct spelling?)? If
viously I didnt let it go to my
head, but I am quite proud of that moment.
On Mon, Mar 22, 2010 at 8:26 PM, wrote:
> On Mon, 22 Mar 2010 19:27:35 -, Benji said:
> > This seems absurd. Why would any organisation holding 18-27~ year olds
> need
> > staff?!
>
> If you have t
This seems absurd. Why would any organisation holding 18-27~ year olds need
staff?!
On Mon, Mar 22, 2010 at 6:59 PM, wrote:
> On Mon, 22 Mar 2010 18:20:04 -, "james o' hare" said:
> > On Mon, Mar 22, 2010 at 6:06 PM, wrote:
> > > On Mon, 22 Mar 2010 17:58:28 -, "james o' hare" said:
>
I would love to, can you do an article about it please? Ive just about
grasped email but I think I definitely have potential.
Much love,
Benji
On Sun, Mar 21, 2010 at 7:56 PM, MustLive wrote:
> *Hello Benji!*
>
> > oh dude, I've missed you.
>
> Really? :-)
>
> To
1) Acquire a knife
2) Acquire a lighter
3) Gouge face until you do not recognise self.
4) Acquire a shaver
5) Shave hair off
6) Cut ears off
7) Acquire plyers
8) Yank all teeth out
9) Walk to a bridge above water, attach shakles to legs
10) Gouge eyes out with knife
11) Burn finger tips off
12) Jum
oh dude, I've missed you.
On Wed, Mar 17, 2010 at 9:36 PM, MustLive wrote:
> Hello Full-Disclosure!
>
> Yesterday I wrote English version of my article SQL DB Structure Extraction
> vulnerabilities (http://websecurity.com.ua/4038/).
>
> There is such variety of Information Leakage vulnerabilities
Maybe we can get a definition of the Internet so I can fully grasp
what this fishing game is?
On 11 Mar 2010, at 08:58, "Anders Klixbull" wrote:
Thank you shawarma!
From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-
disclosure-boun...@lists.grok.org.uk] On Behalf Of Pradip Sha
If Yahoo has ninjas, what does Google have ?! @#!
Sent from my iPhone
On 2 Mar 2010, at 16:08, James Rankin wrote:
Mini Ninjas!
On 2 March 2010 16:06, wrote:
On Tue, 02 Mar 2010 09:01:59 EST, "Kain, Becki (B.)" said:
> Yahoo.com has assassins? Wow!
Not just assassins. Super secret ninja
http://crowdfavorite.com/ loads fine here.
On Mon, Mar 1, 2010 at 4:03 PM, Jan G.B. wrote:
> Hi there,
>
> I just noticed that authenticated users for the admin area of a wordpress
> blog may inject code into database queries, when the plugin "Analytics360"
> is activated.
>
> ### BASIC INFORMAT
Im curious as to how you chose the wording for this sentence, mainly the
'autistic' part?
"I never asked for my OS to become this big chatroom filled with a
bunch of autistic, idiotic facebook kids. I can't stand that."
On Thu, Feb 25, 2010 at 10:37 PM, John Q Public wrote:
> -BEGIN PGP SI
; Hash: SHA1
>
> I'm not a lawyer, and I assume Benji isn't either, but it's worth noting
> that Title 18 Section 1030, the Computer Fraud and Abuse Act of 1986,
> pretty much limits crimes to those intent on committing fraud or
> disclosing national secrets. Exposing per
situation worse for ACM. Hypothetically,
now you've displayed that a hole is there, someone could go and dump the
database saving them the time of even looking for a vulnerable site.
I'm just wondering what makes you so sure they wont do anything like that?
On Mon, Feb 22, 2010 at 7
I have a question..
I get the idea you've extracted the whole database, or as much as you can,
and you have approached the company? Im confused as to why you'd attract the
attention to yourself when you've broken quite a few laws. Sure, you can say
you havent given them any information, but your t
Where should I send the cheque so that the funds may be released?
On Fri, Feb 19, 2010 at 10:24 PM, Jonathan Barningham wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> man
>
> someone please help me
>
> On Fri, 19 Feb 2010 22:08:43 + Jonathan Barningham
> wrote:
> >I mean to say
Dude you are such a rebel.
"# Because Bullshit like this is unsaleable and i don't want to waste
time
# coordinating patches with this vendor this is a fulldisc
publishing."
Sent from my iPhone
On 17 Feb 2010, at 15:46, wirebonder 42
wrote:
# Exploit Title: Rising Online Virus Scann
Sorry to butt in, but may I also have a contract to be the agent for the
tickets for this comedy show?
Thanks
BenjiManagementCo - Sending Your (Security) Theatre GLOBAL
On Wed, Feb 10, 2010 at 7:27 PM, Craig S. Wright <
craig.wri...@information-defense.com> wrote:
> Please do not misquote. The
Xssed.com.
That is all.
Sent from my iPhone
On 2 Feb 2010, at 20:10, rockey killer wrote:
> network.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secu
and my mum.
On Thu, Jan 21, 2010 at 6:11 PM, Jeff Williams wrote:
> You just forgot kaminsky,
>
>
> 2010/1/21
>
> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> Fuck Gadi Evron, Fuck #phr...@efnet, Fuck anti-sec.com kiddiotz,
>> Fuck romeo, Fuck Fedz, Fuck Ratz and Fuck U
>>
>>
>> F
ed 5 keys, thus
pointing me towards what to look for?
On Fri, Jan 15, 2010 at 6:44 PM, Christian Sciberras wrote:
> No, that was actually configuration description; best of luck finding
> our facility.
>
> On Fri, Jan 15, 2010 at 7:42 PM, Benji wrote:
> > Actually you were boastin
Actually you were boasting, it was irrelevant to have what you have as a
security precausion. Infact, one could argue that you were making your setup
insecure by telling people how you're secured from the get go.
On Fri, Jan 15, 2010 at 6:38 PM, Christian Sciberras wrote:
> My question was mostly
yes, but scarier BECAUSE IT INVOLVES FACEBOOK ARGH!
On Wed, Jan 13, 2010 at 4:45 PM, Christian Sciberras wrote:
> I'm confused, isn't this just like XSRF (cross-site request forgery)?
>
> Regards,
> Chris.
>
>
> On Wed, Jan 13, 2010 at 4:33 PM, Ronen Z wrote:
> > Hi,
> >
> > A new type of vulner
*spelt
On Sun, Jan 10, 2010 at 9:21 PM, Jef Poskanzer wrote:
> It's spelled "synergy".
> ---
> Jef
>
> Jef Poskanzer j...@mail.acme.com http://acme.com/jef/
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/ful
Hah, I see what you did there.
Sent from my iPhone
On 11 Jan 2010, at 13:43, "Larry Seltzer"
wrote:
It’s harmless, he’s just blowing his own company’s horn.
Speaking of spam…
h, shall I click a tinyurl coming from a f-d poster?
n/n, pick one
this is email, not twitter. if you'
You didn't know that the Feds own hushmail?&€$#!!
Sent from my iPhone
On 7 Jan 2010, at 16:52, Jeffrey Walton wrote:
> Hi Robin,
>
> Suppose that acquiring the code requires you to agree to unfavorable
> terms of service hidden somewhere on the site, including agreeing to
> future (and possibly
did you just come out as ProSec then, and not the reciever of information
like you previously claimed?
"We had good lulz watching u for months.. trust me.. Even yr post reply
shows
how much we broke your heart and how pissed off you are.. take it easy bro..
don't take it to the heart.."
"What yo
Where is the upvote button?
Sent from my iPhone
On 21 Dec 2009, at 10:18, hackyourid...@googlemail.com wrote:
> Hello participants of Full-Distortion.
>
> I know you have nothing better to do than to read my emails, so let me
> tell you about these extremely important postings on my blog on the
Free dorrar?
Sent from my iPhone
On 11 Dec 2009, at 16:23, Freddie Vicious
wrote:
Hello list,
I offer a 0day exploit on Microsoft Internet Explorer, versions 8,
7, 6. Tested on Windows 2000/XP/2003/Vista/2008/7.
Serious offers only, no bullshit please :)
--
Best wishes,
Freddie Viciou
Just FYI, what you posted isn't code, but actually an error message. Just FYI.
On Wednesday, December 2, 2009, Chris wrote:
> r00f, you moron. Read the fucking code. Everything you need to know is in
> the fucking exploit. If you can't grasp it, you have no business running it.
>
>>"c1: error
I think we're missing the point here. The exploit didnt compile due to
his/her copy of gcc which apparently doesnt understand -fPIC
""c1: error: unrecognized command line option "-fPIC". Thus, obviously,
there's no chance it was ever going to work.
On Tue, Dec 1, 2009 at 7:47 PM, bk wrote:
>
>
>
Not to disappoint, but it doesn't look like it even compiled, might be
the reason it didn't work.
Sent from my iPhone
On 1 Dec 2009, at 11:59, r00f r00f wrote:
> I have a box with release 7.1
>
> uname -a gives back this :
>
> FreeBSD 7.1-RELEASE #0: Thu Jan 1 14:37:25 UTC 2009 i686 i686 i38
7.0 not vuln.
On Mon, Nov 30, 2009 at 10:49 PM, Ed Carp wrote:
> On 11/30/09, Kingcope wrote:
>
> > Systems tested/affected
> > **
> > FreeBSD 8.0-RELEASE *** VULNERABLE
> > FreeBSD 7.1-RELEASE *** VULNERABLE
> > FreeBSD 6.3-RELEASE *** NOT VULN
> > FreeBSD 4.9-R
201 - 263 of 263 matches
Mail list logo