[Full-disclosure] TA-Mapper v1.1: Application Pen-Testing Effort Estimator

2010-09-19 Thread Debasis Mohanty
Release: TA-Mapper v1.1 Brief Overview: Time and Attack Mapper (alternatively known as TA-Mapper) is an effort estimator tool for blackbox security assessment (or Penetration Testing) of applications. This tool provides more accurate estimation when compared to rough estimation. Penetration

[Full-disclosure] CS Smart Security Score Card

2010-05-26 Thread Debasis Mohanty
A bit late post... There are several instances where application stakeholders struggle hard to identify necessary security SDLC activities for their applications and products. Apparently cost has always been a key deciding factor while engaging security activities at various stages of SDLC.

[Full-disclosure] [Tool Release] TA-Mapper BETA: Application Pen-Testing Effort Estimator

2009-01-02 Thread Debasis Mohanty
Happy New Year To All! Time and Attack Mapper (alternatively known as TA-Mapper) is an effort estimator tool for blackbox security assessment (or Penetration Testing) of applications. This tool provides more accurate estimation when compared to rough estimation. Penetration testers who always has

[Full-disclosure] Microsoft Windows Server Service (MS08-067) Exploit

2008-11-16 Thread Debasis Mohanty
Having not found one (except msf) that reliably works against my own setup thought of writing my own MS08-067 exploit piece. Plugged the shellcode for win2k and win2k3[sp2]. No plans for updating the xp shellcode. Grab the python here: http://www.hackingspirits.com/vuln-rnd/vuln-rnd.html -d

Re: [Full-disclosure] Microsoft Windows Server Service (MS08-067) Exploit

2008-11-16 Thread Debasis Mohanty
[mailto:[EMAIL PROTECTED] Sent: 17 November 2008 08:46 To: Debasis Mohanty Cc: [EMAIL PROTECTED] Subject: Re: [Full-disclosure] Microsoft Windows Server Service (MS08-067) Exploit not really fair to say All the vulnerabilities/exploits listed here are all researched and discovered by me. on your page

[Full-disclosure] Adobe Reader Javascript Printf Buffer Overflow [ZeroDay] Exploit

2008-11-05 Thread Debasis Mohanty
Since past few weeks I was busy forking adobe stuffs, it didn't took me more than few hours to come up with this exploit. Thanks to coresecurity folks for their technical details which made my job easy. Grab it here... http://hackingspirits.com/vuln-rnd/vuln-rnd.html -d

[Full-disclosure] RealPlayer ierpplug.dll ActiveX Control BO (CVE-2007-5601) Exploit

2008-11-03 Thread Debasis Mohanty
Although can't release the exploit code for obvious reasons but thought of putting a video will be a good thing. Check for a bindshell exploit demo for RealPlayer ierpplug.dll ActiveX Control BO (CVE-2007-5601) vulnerability: http://coffeeandsecurity.com/resources.aspx -d

[Full-disclosure] Acrobat Reader (CVE-2007-5659) Download/Exec Exploit Demo video

2008-10-23 Thread Debasis Mohanty
Acrobat Reader Download/Exec Exploit Demo Video http://coffeeandsecurity.com/resources.aspx Due to hosting space/bandwidth constrain, I'll not keep the original version for longso grab it before it is gone. :) Don't forget to archive it -d

Re: [Full-disclosure] SecNiche : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos Vulnerability

2007-08-15 Thread Debasis Mohanty
No offence intended but if you take a little more effort of validating your work before posting publicly then you can save yourself from embarrassment. I don't see anything in the script that can bypass zone security and run successfully from internet zone. I am sure you have tested it locally

Re: [Full-disclosure] [Whitepaper SecNiche] Insecurities inImplementing Serialization in BISON

2007-08-02 Thread Debasis Mohanty
On Sat, 04 Aug 2007 01:17:36 Interesting! I thought time machine only appears in movies :) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Joey Mengele Sent: 02 August 2007 22:41 To: full-disclosure@lists.grok.org.uk; [EMAIL PROTECTED]; [EMAIL

Re: [Full-disclosure] [CVE 2007-3816] [Advisory] Vulnerability Facts Related JWIG Advisory

2007-07-22 Thread Debasis Mohanty
Hence kindly do not entertain any more bogus from secniche, also i don't understand what in the world are the CVE maintainers doing. this is not first time a CVE been assigned to a fake claims. Since FD has become a short cut to fame, history has proven that many clowns in the past had their

Re: [Full-disclosure] ActiveWeb Contentserver CMS Multiple Cross Site Scriptings

2007-07-13 Thread Debasis Mohanty
didn't find this in your list. Work for their online demo site not sure if it works in actual deployment -

Re: [Full-disclosure] Google Re-authentication Bypass with SID and LSID cookies

2007-06-28 Thread Debasis Mohanty
comments inline At this stage, ideally the session should be disabled and should be enabled only after the user re-authenticates himself. However, the session associated with SID and LSID cookies remain alive at the server side. That *certainly* doesn't prove a threat. It is by-design and

Re: [Full-disclosure] Static Code Analysis - Nuts and Bolts

2007-06-27 Thread Debasis Mohanty
What program(s) do you use in static code analysis? It doesn't matter if you are a hardcore grep+editor researcher or if you use complex frameworks: Tell me (and also the rest of the list) about it. Secure code review is one of the most mis-guided field where many security folks talks only

Re: [Full-disclosure] [ MDKSA-2007:129 ] - Updated jasper packages fix vulnerability

2007-06-22 Thread Debasis Mohanty
Last month while I was fuzzing an application using Jasper, I got this - The error message is Error 500: Request processing failed; nested exception is net.sf.jasperreports.engine.JRRuntimeException: net.sf.jasperreports.engine.JRException: Error executing SQL statement for :

Re: [Full-disclosure] [CVE-2007-1358] Apache Tomcat XSS vulnerability in Accept-Language header processing

2007-06-18 Thread Debasis Mohanty
the funny part is I hit this issue everytime I assess an application configured with tomcat and was under the impression that it is already a known issue... :) On 6/19/07, Mark Thomas [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2007-1358: Apache Tomcat XSS

Re: [Full-disclosure] Erratasec Research MD5

2007-05-19 Thread Debasis Mohanty
priceless!! On 5/18/07, David Maynor [EMAIL PROTECTED] wrote: dear lists, I've noticed a lot of people posting MD5 hashes on other mailing lists such as DailyDave to prove that they had an idea first. I'd like to lay down a claim that Robert and I thought up after our talk this weekend at

[Full-disclosure] Fix Update: Disable Google Desktop Link Integration with IE FireFox

2007-03-23 Thread Debasis Mohanty
- [Section 3] Two more methods to fix are added under the Permanent Fix Details. - [Section 4] Added fix details for FireFox Disabling GDS Desktop Link Integration in Google Pages Download Link - http://hackingspirits.com/vuln-rnd/vuln-rnd.html Regards, -d -Original Message- From: Debasis

Re: [Full-disclosure] tinyurl.com - Local Clipboard

2007-03-15 Thread Debasis Mohanty
So you can't make the statement that nothing happend with FF. Don't bother about Firefox, they did bothered to take care of basic security issues before creating the browser. Accessing the clipboard via a web page is a pretty old well known bad design issue with IE. Try this link with your IE4

Re: [Full-disclosure] tinyurl.com - Local Clipboard

2007-03-15 Thread Debasis Mohanty
It is sometimes interesting to see how typos can change the meaning. Correction - they did bother -Original Message- From: Rod Trent [mailto:[EMAIL PROTECTED] Sent: Friday, March 16, 2007 12:39 AM To: 'Debasis Mohanty'; [EMAIL PROTECTED]; [EMAIL PROTECTED]; full-disclosure

[Full-disclosure] Disabling Google Desktop Link Integration In Google Pages

2007-02-27 Thread Debasis Mohanty
GDS Desktop Link and Google.com Integration - Bad Design or Necessary Evil? The recent security advisory on Google Desktop Search (GDS) published by Watchfire did not really surprised me as I was expecting more like this in past 2 years. However, the fact that intrigued me to write this article

Re: [Full-disclosure] [WEB SECURITY] Overtaking Google Desktop

2007-02-22 Thread Debasis Mohanty
it becomes a matter of time before another vector of exploit (either through the browser or web application) allows similar access. There are already plenty out there for exploiting GDS, just that they are not disclosed. I found a similar one nearly a year ago where one can retrieve the

[Full-disclosure] Defeating Microsoft Office Genuine Advantage (OGA) Check

2007-01-30 Thread Debasis Mohanty
Some lame methods to defeat a lame attempt to *prevent* Piracy or illegal usage of software - http://hackingspirits.com/vuln-rnd/vuln-rnd.html -d ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

[Full-disclosure] Google AdWords Multiple HTTP response splitting vulnerabilities

2006-12-14 Thread Debasis Mohanty
Google AdWords Multiple HTTP response splitting (aka CRLF Injection) vulnerabilities http://hackingspirits.com/vuln-rnd/vuln-rnd.html regards, -d ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

Re: [Full-disclosure] Defeating Image-Based Virtual Keyboards andPhishing Banks (fwd)

2006-11-27 Thread Debasis Mohanty
More than a year Old (3rd August, 2005) - Defeating CITI-BANK Virtual Keyboard Protection http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0142.html http://hackingspirits.com/vuln-rnd/Defeat-CitiBank-VK.zip http://xforce.iss.net/xforce/xfdb/21727 Regards, -d -Original

Re: [Full-disclosure] Defeating Image-Based Virtual Keyboards andPhishing Banks (fwd)

2006-11-27 Thread Debasis Mohanty
-Original Message- From: Gadi Evron [mailto:[EMAIL PROTECTED] Sent: Monday, November 27, 2006 2:35 PM To: Debasis Mohanty Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Defeating Image-Based Virtual Keyboards andPhishing Banks (fwd) On Mon, 27 Nov 2006, Debasis

Re: [Full-disclosure] Microsoft Excel Embedded Shockwave Flash Object Flaw [Fix Released]

2006-11-23 Thread Debasis Mohanty
Finally MS released the fix for CVE-2006-3014 along with others - http://www.microsoft.com/technet/security/bulletin/ms06-069.mspx Regards, -d -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Debasis Mohanty Sent: Friday, October 06, 2006 1:02 AM

Re: [Full-disclosure] How to covert shellcode to HTML style ?

2006-11-09 Thread Debasis Mohanty
Lol !! I was just about to point out the same Erik ... Seen this couple of times in the past and a known technique :) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Knud Erik Højgaard Sent: Thursday, November 09, 2006 6:01 AM To: 李继辉 Cc:

Re: [Full-disclosure] [x0n3-h4ck.org] PayPal vulnerable to XSS

2006-11-06 Thread Debasis Mohanty
I found a similar one long back in the Expect header but did not bother to post... However, this bug is not associated with the paypal application but rather with the Apache server *version* on which it is hosted. This kind of XSS are usually called as - Unfiltered Header Injection in Apache.

[Full-disclosure] Multiple HTTP response splitting vulnerabilities in SHOP-SCRIPT

2006-10-23 Thread Debasis Mohanty
VI. Credits: Debasis Mohanty (aka Tr0y) www.hackingspirits.com For more vulnerabilities visit - http://hackingspirits.com/vuln-rnd/vuln-rnd.html ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

Re: [Full-disclosure] Windows Command Processor CMD.EXE BufferOverflow

2006-10-23 Thread Debasis Mohanty
Matthew Flaschen [EMAIL PROTECTED] to Peter, full-disclosure Aren't cross-zone urls disallowed by default, though? I agree with Matthew Brian. If cmd.exe can be run from a browser using file:// irrespective of cross-zone security boundaries then there are *much* other urgent things to be

Re: [Full-disclosure] McAfee EPO Buffer Overflow

2006-10-02 Thread Debasis Mohanty
An xtreamly neat work muts !! :) -d -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of muts Sent: Sunday, October 01, 2006 6:56 PM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] McAfee EPO Buffer Overflow

Re: [Full-disclosure] [USN-353-1] openssl vulnerabilities

2006-09-28 Thread Debasis Mohanty
Looks like everyone ON for openssl bug feast!! ;-) Is this different from SSL_get_shared_ciphers() buffer overflow (CVE-2006-3738)?? -d -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Martin Pitt Sent: Thursday, September 28, 2006 8:30 AM To: [EMAIL

RE: [Full-disclosure] (no subject)

2006-07-24 Thread Debasis Mohanty
How about a subject line?? -d From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Raphael BarkiSent: Monday, July 24, 2006 11:56 AMTo: full-disclosure@lists.grok.org.ukCc: [EMAIL PROTECTED]Subject: [Full-disclosure] (no subject) Hi, We are pleased to inform you that the

RE: [Full-disclosure] Advisory from AMIT concern BANTOWNE

2006-06-30 Thread Debasis Mohanty
IS YOUR *caps lock* DAMAGED BEYOND REPAIR?? -d -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of AMIT SECURITY Sent: Friday, June 30, 2006 10:45 PM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] Advisory from AMIT concern BANTOWNE

[Full-disclosure] Microsoft Excel File Embedded Shockwave Flash Object Exploit

2006-06-20 Thread Debasis Mohanty
/ 2006 -Public disclosure For more details visit - http://hackingspirits.com/vuln-rnd/vuln-rnd.html VI. CREDITS Debasis Mohanty (aka Tr0y) www.hackingspirits.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full

[Full-disclosure] Firefox (with IETab Plugin) Null Pointer Dereferences Bug

2006-05-17 Thread Debasis Mohanty
: 0192e7dc 668b10 mov dx,[eax] ds:0023:= For more vulnerabilities : http://hackingspirits.com/vuln-rnd/vuln-rnd.html Credits: Debasis Mohanty (aka Tr0y) www.hackingspirits.com ___ Full-Disclosure - We believe in it. Charter

[Full-disclosure] Firefox (with IETab Plugin) Null Pointer Dereferences Bug

2006-05-17 Thread Debasis Mohanty
: 0192e7dc 668b10 mov dx,[eax] ds:0023:= For more vulnerabilities : http://hackingspirits.com/vuln-rnd/vuln-rnd.html Credits: Debasis Mohanty (aka Tr0y) www.hackingspirits.com ___ Full-Disclosure - We believe in it. Charter: http

[Full-disclosure] Firefox (with IETab Plugin) Null Pointer Dereferences Bug

2006-05-17 Thread Debasis Mohanty
://hackingspirits.com/vuln-rnd/vuln-rnd.html Credits: Debasis Mohanty (aka Tr0y) www.hackingspirits.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http

RE: [Full-disclosure] RE: Panda Antivirus Enterprise Secure, Norton Antivirus 2005 and the virus I Love You

2006-05-07 Thread Debasis Mohanty
Singnature based analysis doesn't apply well incase of script based worms / virii. The issues here seems to be lack of feature to do an appropriate analysis of script based worms. Symantec is able to block it because, in addition to signature matching it is also trying to figure out what the

[Full-disclosure] PHPMyChat Authentication Bypass

2006-02-20 Thread Debasis Mohanty
PRODUCTS I have only tested this for PhpMyChat 0.14.5 but I guess the previous versions might also be affected. V. VENDOR http://phpmychat.sourceforge.net http://www.phpheaven.net/rubrique4.html VI. CREDITS Debasis Mohanty www.hackingspirits.com

RE: [Full-disclosure] Re: Re: Fun with Foundstone

2006-02-15 Thread Debasis Mohanty
Sure !! With the credits intact ;o) - Deb -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dave Korn Sent: Thursday, February 16, 2006 12:46 AM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] Re: Re: Fun with Foundstone Debasis Mohanty

[Full-disclosure] Article: Security Testing Demystified

2006-01-18 Thread Debasis Mohanty
be downloaded from - http://www.hackingspirits.com/eth-hac/papers/whitepapers.asp Feel free to mail me for any kind of queries or suggestions at - debasis [at] hackingspirits.com or debasis_mty [at] yahoo.com Regards, Debasis Mohanty www.hackingspirits.com

[Full-disclosure] FW: myspace - add hundreds of friends instantly and automatically with this awesome tool

2006-01-06 Thread Debasis Mohanty
Although I am not much familiar with myspace and have never used it but the samy's outbreak was really interesting and dragged my attention a little towards such worms. It seems 'samy' is not alone in this field and there are couple of bots seems to be still exploiting myspace.

RE: [Full-disclosure] FW: myspace - add hundreds of friends instantly and automatically with this awesome tool

2006-01-06 Thread Debasis Mohanty
PROTECTED] Sent: Saturday, January 07, 2006 1:30 AM To: Debasis Mohanty Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] FW: myspace - add hundreds of friends instantly and automatically with this awesome tool Debasis, it looks like the 'bot' simply automates the process

RE: [Full-disclosure] new attack technique? using JavaScript+XML+OWSPost Data

2005-12-22 Thread Debasis Mohanty
] [mailto:[EMAIL PROTECTED] On Behalf Of Gaurav Kumar Sent: Thursday, December 22, 2005 8:52 AM To: Debasis Mohanty Cc: full-disclosure@lists.grok.org.uk; [EMAIL PROTECTED] Subject: Re: [WEB SECURITY] RE: [Full-disclosure] new attack technique? using JavaScript+XML+OWSPost Data On 12/22/05, Debasis

RE: [Full-disclosure] new attack technique? using JavaScript+XML+OWSPost Data

2005-12-22 Thread Debasis Mohanty
? Is this a new topic ?? I mean are you done with your firewall and some weired trojan design :P - D -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Gaurav Kumar Sent: Thursday, December 22, 2005 10:23 PM To: Debasis Mohanty Cc: full-disclosure

RE: [Full-disclosure] new attack technique? using JavaScript+XML+OWSPost Data

2005-12-22 Thread Debasis Mohanty
/security-jobs/2003/Oct/0156.html hahaha Ethical Hacker omfg. You trying to be next fadia or wat ? Do you want me to post ur lame Firewall bypass vulnerabilities links which have been already founded years before?Basically u are an asshole. So stfu. On 12/22/05, Debasis Mohanty [EMAIL PROTECTED

RE: [Full-disclosure] new attack technique? usingJavaScript+XML+OWSPost Data

2005-12-22 Thread Debasis Mohanty
hursday, December 22, 2005 10:23 PM To: Debasis Mohanty Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] new attack technique? using _javascript_+XML+OWSPost Data typo- i am 22 and YOU ARE 27, so i am 5 years kidder than u. On 12/22/05, Gaurav Kumar [EM

RE: [Full-disclosure] new attack technique? usingJavaScript+XML+OWSPost Data

2005-12-22 Thread Debasis Mohanty
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Gaurav Kumar Sent: Thursday, December 22, 2005 11:10 PM To: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] new attack technique? usingJavaScript+XML+OWSPost Data All I have to say is that

RE: [Full-disclosure] about that new MySpace XSS worm

2005-12-20 Thread Debasis Mohanty
;o) I'll publish it sometime on my site - www.hackingspirits.com - D (aka T) -Original Message- From: Xavier [mailto:[EMAIL PROTECTED] Sent: Tuesday, December 20, 2005 1:36 AM To: Debasis Mohanty Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] about that new

RE: [Full-disclosure] about that new MySpace XSS worm

2005-12-19 Thread Debasis Mohanty
Hi, I read your blog. Find my comments inline - - Original Message - From: Xavier [EMAIL PROTECTED] To: full-disclosure@lists.grok.org.uk Sent: Sunday, December 18, 2005 8:19 AM Subject: [Full-disclosure] about that new MySpace XSS worm 1) There is a XSS vulnerability in MySpace.com,

RE: [Full-disclosure] about that new MySpace XSS worm

2005-12-19 Thread Debasis Mohanty
for vulnerabilities in Flash versions 6.X and 7.X. (See BugtraqID 15332) In other words, the "worm" creates a link to the malicious flash file in your MySpace profile. Whenever someone views your profile with a vulnerable version of Flash they become infected and the "worm" g

RE: [Full-disclosure] McAfee VirusScan vs Metasploit Framework v2.x

2005-12-09 Thread Debasis Mohanty
From: H D Moore Sent: Saturday, December 10, 2005 12:48 AM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] McAfee VirusScan vs Metasploit Framework v2.x Looks like some overzealous idiot at McAfee added Trojan signatures for 202 files in the latest version of the Metasploit

RE: [Full-disclosure] Most common keystroke loggers?

2005-12-02 Thread Debasis Mohanty
-Original Message- From: On Behalf Of Frank Knobbe Sent: Friday, December 02, 2005 11:05 PM To: [EMAIL PROTECTED] Cc: full-disclosure@lists.grok.org.uk Subject: re: [Full-disclosure] Most common keystroke loggers? Why wait for a click? The attacker can just record all screen activity in

RE: [Full-disclosure] Most common keystroke loggers?

2005-12-02 Thread Debasis Mohanty
The point that everyone seems to have out here is, all these User IDs / PINs etc are all stored in clear text in the web 'form fields'. These days attacks are much more sophisticated and stealth. The idea of X-x-X screen capture is bit outdated and can easily be fooled. Ex: If an user has to type

[Full-disclosure] FW: [MailServer Notification] Your .zip file has been blocked from entering the ScanSoft email environment.

2005-12-02 Thread Debasis Mohanty
Lol !! Never seen such settings in the content filters where the notification reveals any such file paths. Another funny statement is - Please rename your file to filename.zzp and resend to ensure delivery. - D -Original Message- From: System Attendant [mailto:[EMAIL PROTECTED] Sent:

RE: [Full-disclosure] Most common keystroke loggers?

2005-12-01 Thread Debasis Mohanty
-Original Message- From: Blue Boar Sent: Friday, December 02, 2005 12:15 AM To: [EMAIL PROTECTED] Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Most common keystroke loggers? Shannon Johnston wrote: Hi All, I'm looking for input on what you all believe the most

RE: [Full-disclosure] Virus infections

2005-11-23 Thread Debasis Mohanty
This sober *FBI/CIA* variant seems to have strike back with the intention to make *news* which it failed to make when it was originally released first time in the month of Feb (2005). I encountered it in the month of Feb and since there were no AV advisories around, I reverse engg it to find out

[Full-disclosure] Zone Labs Products Advance Program Control and OS Firewall (Behavioral Based) Technology Bypass Vulnerability

2005-11-07 Thread Debasis Mohanty
the following link: http://www.hackingspirits.com/vuln-rnd/vuln-rnd.html IX. CREDITS: Tr0y (a.k.a Debasis Mohanty) [EMAIL PROTECTED] http://www.hackingspirits.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure

RE: [Full-disclosure] Multiple Vendor Anti-Virus Software DetectionEvasion Vulnerability through forged magic byte

2005-10-25 Thread Debasis Mohanty
Hello Andrey, Few comments on this - Correct me if I am wrong, forged magic byte might not always be able to fool the AV in real scenario (especially EXEs) unless you are talking about Static Virus scanners. In past few years the AV scanning technology has improved a lot and has gone even beyond

RE: [Full-disclosure] Bypassing Personal Firewall, is it that* hard?

2005-10-04 Thread Debasis Mohanty
Hey AZ, Andrei Zlate-Podani wrote: A firewall has to do with network traffic. All this talk about bypassing firewall x or y using this trick or that one is sheer nonsense. I just noticed @bitdefender.com in your ID and I am sure you must be knowing better than me in all aspect as far as AV /

RE: [Full-disclosure] Different Claims by ZoneLabs on the Bypassing PersonalFirewall (Zone Alarm Pro) Using DDE-IPC issue

2005-10-03 Thread Debasis Mohanty
that the vendor wants to keep their EGO up-2-date by covering up this issue with their latest version 6.0 =)) Gud Luck !! -D -Original Message- From: Paul Laudanski [mailto:[EMAIL PROTECTED] Sent: Monday, October 03, 2005 9:06 PM To: Debasis Mohanty Cc: 'Zone Labs Security Team

RE: [Full-disclosure] Bypassing Personal Firewall, is it that* hard?

2005-10-03 Thread Debasis Mohanty
Sent: Monday, October 03, 2005 11:57 PM To: Zone Labs Security Team Cc: full-disclosure@lists.grok.org.uk; bugtraq@securityfocus.com Subject: [Full-disclosure] Bypassing Personal Firewall, is it that* hard? hello list, Lately 'Debasis Mohanty' was refreshing some old issues. Anyways

RE: [Full-disclosure] Bypassing Personal Firewall, is it that* hard?

2005-10-03 Thread Debasis Mohanty
and warns the user if some program (evil or trusted) is trying to become a system startup program. Sorry for that mistake had tooo much with Paul Zone Labs ;-) -D -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Debasis Mohanty Sent: Tuesday, October 04, 2005 12

RE: [Full-disclosure] Different Claims by ZoneLabs on the Bypassing PersonalFirewall (Zone Alarm Pro) Using DDE-IPC issue

2005-10-02 Thread Debasis Mohanty
the Solution section in the PoC where I have mentioned about the Upgrade. :) - D -Original Message- From: Paul Laudanski [mailto:[EMAIL PROTECTED] Sent: Sunday, October 02, 2005 11:43 PM To: Debasis Mohanty Cc: 'Zone Labs Security Team'; bugtraq@securityfocus.com; full-disclosure

RE: [Full-disclosure] Re: Bypassing Personal Firewall (Zone AlarmPro)Using DDE-IPC

2005-10-01 Thread Debasis Mohanty
messaging. - D -Original Message- From: Florian Weimer [mailto:[EMAIL PROTECTED] Sent: Sunday, October 02, 2005 12:11 AM To: Debasis Mohanty Cc: 'Thierry Zoller'; full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Re: Bypassing Personal Firewall (Zone AlarmPro)Using DDE

RE: [Full-disclosure] Re: Bypassing Personal Firewall (ZoneAlarmPro)Using DDE-IPC

2005-10-01 Thread Debasis Mohanty
Yeah TZ, This one will work but as long as an user's intervention is there but if you try to simulate key strokes using your code then this is prevented by current version of ZA. - D -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Thierry Zoller Sent:

RE: [Full-disclosure] Re: Bypassing Personal Firewall (ZoneAlarmPro)Using DDE-IPC

2005-10-01 Thread Debasis Mohanty
Hey TZ, I am not sure we are speaking about the same attack. When I was speaking about SendMessage() I was refering to the presentation at CCC2003, i.e shelling IE simulating a user through SendMessage() Api. As this wasn't clear in your previous reply so I got it wrong. Anyway thanks for

RE: [Full-disclosure] Re: Bypassing Personal Firewall (ZoneAlarmPro)Using DDE-IPC

2005-10-01 Thread Debasis Mohanty
: Thierry Zoller [mailto:[EMAIL PROTECTED] Sent: Sunday, October 02, 2005 1:06 AM To: Debasis Mohanty Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Re: Bypassing Personal Firewall (ZoneAlarmPro)Using DDE-IPC Dear Debasis, DM This one will work but as long as an user's

[Full-disclosure] Different Claims by ZoneLabs on the Bypassing PersonalFirewall (Zone Alarm Pro) Using DDE-IPC issue

2005-10-01 Thread Debasis Mohanty
from me then feel free to mail. Thanks Regds... Tr0y (aka Debasis Mohanty) www.hackingspirits.com -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Zone Labs Security Team Sent: Friday, September 30, 2005 5:13 AM To: bugtraq@securityfocus.com; full

RE: [Full-disclosure] Re: Bypassing Personal Firewall (Zone Alarm Pro)Using DDE-IPC

2005-09-30 Thread Debasis Mohanty
Paul Laudanski wrote: This exploit was tested by members at CastleCops and found to be untrue: Unfortunately not !! Besides Zone Alarm free version it has been tested for ZA Pro 3x and it works like a charm. Again Symantec SecurityFocus has probably tested this for ZA Pro 5.1. so they have

RE: [Full-disclosure] Re: Bypassing Personal Firewall (Zone Alarm Pro)Using DDE-IPC

2005-09-30 Thread Debasis Mohanty
, 2005 3:25 AM To: Debasis Mohanty Cc: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.uk; bugtraq@securityfocus.com Subject: RE: [Full-disclosure] Re: Bypassing Personal Firewall (Zone Alarm Pro)Using DDE-IPC On Sat, 1 Oct 2005, Debasis Mohanty wrote: Paul Laudanski wrote: This exploit

[Full-disclosure] Bypassing Personal Firewall (Zone Alarm Pro) Using DDE-IPC

2005-09-28 Thread Debasis Mohanty
can be downloaded from the following link: http://hackingspirits.com/vuln-rnd/vuln-rnd.html Cheers Tr0y (aka Debasis Mohanty) www.hackingspirits.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure

RE: [Full-disclosure] Microsoft Windows keybd_event validationvulnerability

2005-09-06 Thread Debasis Mohanty
* Due to an invalid keyboard input validation, its possible to send keys to any * application of the Desktop. Cross-Window access and emulation of key strokes on Windows are pretty old stuffs. You can see this in many joke programs and fake virus programs. They are there since Win 9x

[Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Debasis Mohanty
, 2005: Vendor was contacted but no response till today. Cheers, Debasis Mohanty (a.k.a Tr0y) www.hackingspirits.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia

RE: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Debasis Mohanty
:[EMAIL PROTECTED] Sent: Saturday, August 06, 2005 1:40 AM To: Debasis Mohanty Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection On Sat, 6 Aug 2005, Debasis Mohanty wrote: Recently I discovered a method to defeat the much hyped

RE: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard Protection

2005-08-05 Thread Debasis Mohanty
Sweet and Simple - This is how this program works. A brief on the algo~m is given below - Step1: Enumerate all the IE windows and look for the one with CitiBank Login screen (This step is invoked when an IE is opened and a partucular URL is requested) Step2: If found then Create a HTML object

[Full-disclosure] Indiatimes Shopping Cart XSS (Cross Site Scripting) Attacks

2005-07-29 Thread Debasis Mohanty
%20UNPLUG%20UR%20PC%20CABLE')/s criptproduct_rn=scriptalert('OR%20REBOOT%20IT')/scriptproduct_rn=scr iptalert('LOOSER%20!!')/script History: Vendor has been notified but there is no response and I guess neither they are going to respond. Cheers, Debasis Mohanty www.hackingspirits.com

RE: [Full-disclosure] Defeating Microsoft WGA Validation Check

2005-07-27 Thread Debasis Mohanty
$ download centre. Bad Luck ... ;o) There are still ways to circumvent WGA, I am currently working on it but can't comment anything at this point of time. Debasis Mohanty www.hackingspirits.com From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of goosee007Sent: Wednesday, July 27

RE: [Full-disclosure] Defeating Microsoft WGA Validation Check

2005-05-24 Thread Debasis Mohanty
not so much interested in the credits rather I am more interested in uncovering such issue to this community. Justin Allen (a.k.a. poedguy) Debasis Mohanty (a.k.a. Tr0y) www.hackingspirits.com -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Justin

RE: [Full-disclosure] Re: Defeating Microsoft WGA Validation Check

2005-05-24 Thread Debasis Mohanty
[EMAIL PROTECTED] wrote: In the article the representative analyze this hack and explain why (by microsoft's opinion...) it is not a threat for Microsoft. Also the article speaks about the rapidly expiration which is a point that Debasis Mohanty mistaken. I am absolutely not mistaken

[Full-disclosure] Defeating Microsoft WGA Validation Check

2005-05-23 Thread Debasis Mohanty
on their pirated versions of Win XP then do let me know if the installed product make noise after certain time period. Debasis Mohanty www.hackingspirits.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full

RE: [Full-disclosure] Unfiltered escape sequences in filenamescontained in ZIP archives wouldn't be escaped on displaying orlogging, and can also lead to bypass AV scanning

2005-03-15 Thread Debasis Mohanty
i guess, companies should know learn how to treat ppl. who write to them. For this, i've always admired Microsoft. (O; (no flames) -bipin This is something I must agree with you Bipin. Microsoft has always been polite and responsible atleast to whatever I have posted them in the past. To