Re: [Full-disclosure] WTF

2011-05-08 Thread Sagar Belure
Hi, On Sat, May 7, 2011 at 12:19 AM, Gustavo gustavorober...@gmail.com wrote: WTF ? notebook:~$ ping www.compusa.com PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data. 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019 ms notebook:~$ ping

Re: [Full-disclosure] WTF

2011-05-07 Thread Valdis . Kletnieks
On Fri, 06 May 2011 15:49:31 -0300, Gustavo said: WTF ? notebook:~$ ping www.compusa.com PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data. www.compusa.com and www.tigerdirect.com are Akamai'zed. They play DNS games to point you at the nearest Akamai cache server

Re: [Full-disclosure] WTF

2011-05-07 Thread Gino
Guess you got nulled On 05/06/2011 11:49 AM, Gustavo wrote: WTF ? notebook:~$ ping www.compusa.com PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data. 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019 ms notebook:~$ ping www.tigerdirect.com

Re: [Full-disclosure] WTF

2011-05-07 Thread Kevin Fealey
Works fine for me on Windows. C:\ping www.compusa.com Pinging e3531.b.akamaiedge.net [96.17.206.102] with 32 bytes of data: Reply from 96.17.206.102: bytes=32 time=15ms TTL=58 Reply from 96.17.206.102: bytes=32 time=16ms TTL=58 Reply from 96.17.206.102: bytes=32 time=16ms TTL=58 Reply from

[Full-disclosure] WTF

2011-05-06 Thread Gustavo
WTF ? notebook:~$ ping www.compusa.com PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data. 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019 ms notebook:~$ ping www.tigerdirect.com PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data. 64

Re: [Full-disclosure] WTF

2011-05-06 Thread Nick Boyce
On Fri, May 6, 2011 at 6:49 PM, Gustavo gustavorober...@gmail.com wrote: WTF ? notebook:~$ ping www.compusa.com PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data. 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019 ms Same here ... this time on

Re: [Full-disclosure] WTF

2011-05-06 Thread ksha
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/06/2011 11:15 PM, Nick Boyce wrote: On Fri, May 6, 2011 at 6:49 PM, Gustavo gustavorober...@gmail.com wrote: WTF ? notebook:~$ ping www.compusa.com PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data. 64 bytes from

Re: [Full-disclosure] WTF eEye Really?

2010-05-05 Thread Sébastien Duquette
Looks to me more like the unqualified person doing testing argument is used as an escape from their faux-pas. When you read the initial article, the author is clearly interested in the issue of crime being perpetrated by using these tools : Penetration tools clearly allow the breaking and

Re: [Full-disclosure] WTF eEye Really?

2010-05-05 Thread J Roger
And if the author is sincere and it was really his original intent, he should refrain from blogging from now on... I have a feeling his employer will see to that for the foreseeable future. At least in a professional context representing them as a company. If he really meant it as everyone

[Full-disclosure] WTF eEye Really?

2010-05-04 Thread Sec News
Did anyone else see this? http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands Penetration Tools Can Be Weapons in the Wrong Hands Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security, Vulnerability Management After a lifetime in the

Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Christian Sciberras
Load o' bull. On Tue, May 4, 2010 at 2:44 AM, Sec News secn...@gmail.com wrote: Did anyone else see this? http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands Penetration Tools Can Be Weapons in the Wrong Hands Author: Morey Haber Date: May

Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 For an interesting take on this see page xxxix in Ross Anderson's Security Engineering (the Legal Notice). Apparently the debate over whether or not to publish tools/techniques that could be used for evil (specifically with respects to crypto) dates

Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Marsh Ray
On 5/4/2010 12:37 PM, Justin C. Klein Keane wrote: For an interesting take on this see page xxxix in Ross Anderson's Security Engineering (the Legal Notice). Apparently the debate over whether or not to publish tools/techniques that could be used for evil (specifically with respects to

Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Georgi Guninski
On Mon, May 03, 2010 at 05:44:55PM -0700, Sec News wrote: Did anyone else see this? http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands are there any reliable caches for this url? search for the shit you quoted returns basically this thread and

Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Michal Zalewski
are there any reliable caches for this url? Attrition has an annotated, but otherwise verbatim copy: http://attrition.org/errata/sec-co/eeye-01.html /mz ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Mike Hale
Looks like he rewrote it and clarified what he meant to say. I think this is a lesson on why you really should proofread stuff and ask someone else to go over your writings before you publish something. On Mon, May 3, 2010 at 5:44 PM, Sec News secn...@gmail.com wrote: Did anyone else see this?

[Full-disclosure] WTF people?

2009-01-11 Thread Will McAfee
I have lurked for some time, and really, this list has become pathetic due to it's hiijacking by two or three trolls with nothing better to do than destroy the relevant signal to noise ratio. This list is not about MI5, the NSA, or Mossad unless there is something practical to be learned

Re: [Full-disclosure] WTF people?

2009-01-11 Thread sexyazngrl69
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 i find the surname mcafee to be a turn-on here on the security mailing list, mister good hacker:))) a/s/l? On Sun, 11 Jan 2009 16:49:20 -0500 Will McAfee sec- commun...@thegoodhacker.com wrote: I have lurked for some time, and really, this list has

Re: [Full-disclosure] WTF people?

2009-01-11 Thread Rants nRaves
If you want to solve the problem, then you and people like you need to: Step 1: Filter out n3td3v, urleet, etc so you never see their posts or replies to them. ie: filter the noise Step 2: Post something that you think is relevant to the list. ie: add to the signal Step 3: Profit! Notice there

Re: [Full-disclosure] WTF people?

2009-01-11 Thread Pete Licoln
sexyazngrl69 is a n3td3v alias, no doubt about it. Regards Pete ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WTF people?

2009-01-11 Thread sr.
amazing how every message becomes tainted with bullshit. On Sun, Jan 11, 2009 at 6:01 PM, sexyazngr...@mac.hush.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 pics? On Sun, 11 Jan 2009 17:48:53 -0500 waveroad waveroad waver...@gmail.com wrote: N3td3v other alias spotted.

Re: [Full-disclosure] WTF people?

2009-01-11 Thread sexyazngrl69
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 naive to think mi5 is gender biased:))) On Sun, 11 Jan 2009 18:36:56 -0500 Pete Licoln pete.lic...@gmail.com wrote: sexyazngrl69 is a n3td3v alias, no doubt about it. Regards Pete -BEGIN PGP SIGNATURE- Charset: UTF8 Version: Hush 3.0 Note:

Re: [Full-disclosure] WTF people?

2009-01-11 Thread Pete Licoln
What's the point with MI5 n3td3v ? Regards Pete ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WTF people?

2009-01-11 Thread sexyazngrl69
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 You tell me. On Sun, 11 Jan 2009 19:30:17 -0500 Pete Licoln pete.lic...@gmail.com wrote: What's the point with MI5 n3td3v ? Regards Pete -BEGIN PGP SIGNATURE- Charset: UTF8 Note: This signature can be verified at

Re: [Full-disclosure] WTF people?

2009-01-11 Thread waveroad waveroad
Why dont you post under your real nick aka n3tcr4p ? you think it make n3tcr4p kid more credible in some ways ? 0r m4yb3 5h4|| 1 5p34k |1k3 7h15 7o m4k3 you und3r574nd my p01n7 ? 1 don7 know wh3n 1 |ook 47 your w3b5173 1 wond3r . 2009/1/11 sexyazngr...@mac.hush.com -BEGIN PGP SIGNED