Re: [Full-Disclosure] Re: Followup to T-Mobile hack

2005-02-22 Thread Andrew Smith
More info on the hacking http://www.parishiltonsmobile.com/ On Tue, 22 Feb 2005 09:40:58 +0100 (CET), Feher Tamas [EMAIL PROTECTED] wrote: One top star reached Sunday morning expressed total outrage at Paris. Is Dubya a star...? (Maybe a shooting star. Won't last long.)

Re: [Full-Disclosure] How T-Mobil's network was compromised

2005-02-17 Thread Andrew Smith
Wait untill he's out (or earlier), a book will no doubt be written :-) ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] hushmail.com, is this true?

2005-01-25 Thread Andrew Smith
To me this suggests that, unlike most web based e-mail providers such as hotmail, hushmail does not send the user's I.P address in the headers of the e-mail address, but hushmail still logs IP addresses. ___ Full-Disclosure - We believe in it. Charter:

[Full-Disclosure] PHP Worms

2005-01-23 Thread Andrew Smith
I thought these had stopped? I'm still seeing thousands of them each day:

Re: Re[2]: [Full-Disclosure] Amazon.com is down

2005-01-14 Thread Andrew Smith
looks like an attempt to initiate a DDoS on Amazon from FD readers going to check if it's up or down :)) but you'd have to be a complete moron to think that that would work.. And if it truely was a joke (i hope to god not) then I do not beleive it is us that are Humour Impaired.. -- zxy_rbt2

Re: [Full-Disclosure] Microsoft AntiSpyware - First Impressions

2005-01-09 Thread Andrew Smith
I hate to say this.. but it's actually quite good. Picked up spyware i'd been forced to manually disable (because adaware+spybotsd didn't see it) and gave me an *option* to remove kazaa et al (as, whilst they contain spyware i may want to keep them). ___

Re: [Full-Disclosure] Santy Variant attacking about 50 PHP-applications

2005-01-06 Thread Andrew Smith
Also the spy.gif script: CENTER DIV STYLE=font-family: verdana; font-size: 25px; font-weight: bold; color: #F3A700;SPYKIDS PHP Command/Safemode Exploit 4.1/DIV BR DIV STYLE=font-family: verdana; font-size: 20px; font-weight: bold; color: #F3A700;Informação do sistema/DIV ?php // Ae galera se

Re: [Full-Disclosure] Santy Variant attacking about 50 PHP-applications

2005-01-03 Thread Andrew Smith
Covered on the F-Secure weblog, the DNS has been pointed at 127.0.0.2 so no more bots will be connecting. Just posting the source incase 5wk.com dies: #!/usr/bin/perl # # # # # # # # # ## # ### # # # #

Re: [Full-Disclosure] Just a thought (from an autoreply to another thread)

2005-01-01 Thread Andrew Smith
Indeed, but as mentioned in another FD post (something along the lines of don't mind me, just getting the xmas auto replies) how many do we know aren't honey pots? or being closely monitored? It could alll be an elaborate scheme.. On Fri, 31 Dec 2004 23:14:43 -0500, Byron L. Sonne [EMAIL

Re: [Full-Disclosure] YET AGAIN Automatic remote compromise of InternetExplorer Service Pack 2 XP SP2

2004-12-26 Thread Andrew Smith
About switching to FireFox: if you drive a car you might end up in a car-crash, changing cars doesn't prevent that. If 90% of people would be driving the exact same car, it's obvious most car-crashes will involve that car. Worst internet/rea life analogy ever. -- zxy_rbt2

[Full-Disclosure] Plesk 7 Cross-Site Scripting

2004-12-23 Thread Andrew Smith
Vendor: SW-Soft URL: http://www.sw-soft.com/ Version: Plesk 7.0.0 Risk: Cross-Site Scripting Description: Plesk is comprehensive server management software developed specifically for the Hosting Service Industry with the assistance of Web hosting professionals. Time tested tough in real world

[Full-Disclosure] Contact BankOne.com ?

2004-12-07 Thread Andrew Smith
Hi, Has anyone got any idea how i can contact BankOne.com or anyone that can for me? I don't have an account with them which apparently means my e-mails to them aren't SECURE. Thanks, Andrew Smith. -- zxy_rbt2 ___ Full-Disclosure - We believe

Re: [Full-Disclosure] Lycos Europe organizing a DDoS attack against spammers

2004-12-01 Thread Andrew Smith
A get to http://makelovenotspam.com/intl/static/ is what the screen saver does initially. I can not see this lasting long; 1) Whatever they say, they're breaking the law 2) They're DDoSing spammers, the people with millions of bots / gigabits of bandwidth under their control.. we can see now that

Re: [Full-Disclosure] this is fun?

2004-11-30 Thread Andrew Smith
..Or if you're fortunate enough to use Windows (?), the screen jumps around whilst the wav HEY EVERYONE, I'M LOOKING AT GAY PORNO loops. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Secret Vulns: Places of confusion

2004-11-21 Thread Andrew Smith
Ooh! A boast thread, goody! There are many vulnerabilities in many .gov websites, i think the fact that you might get arrested and/or labelled a terrorist deters most people. -- zxy_rbt2 ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-Disclosure] Why is IRC still around?

2004-11-20 Thread Andrew Smith
Sorry to offend those that use IRC legitimately (LOL - find something else to chat with your buddies), but why the hell are we not pushing to sunset IRC? because you can't, i'm not sure what you think IRC is.. but it isn't one network run by a few geeks. It's thousands of networks accross

Re: [Full-Disclosure] Why is IRC still around? (Because anything less would be uncivilized)

2004-11-20 Thread Andrew Smith
Well, fellow F-D'ers, thanks to the vast array of intelligence and experience found on this list, my rant about abolishing IRC has been proven to be far from a solution. I..can't tell if it's sarcasm or not, damn those trolls and their mind poisoning ways. -- zxy_rbt2

Re: [Full-Disclosure] Why is IRC still around?

2004-11-20 Thread Andrew Smith
Danny: there's not need to keep replying, this is a mailing list. Here's what happens: 1) Question posted. 2) Valid replies posted. 3) 30-40 others repeat replies at 2) 4) In come the trolls.. -- zxy_rbt2 ___ Full-Disclosure - We believe in it.

[Full-Disclosure] Click and Build eCommerce Platform Cross Site Scripting

2004-11-17 Thread Andrew Smith
ClickandBuild: http://apply.clickandbuild.com/ Online eCommerce platform. Vulnerability The vulnerability lies in the listPos variable in the script running at cashncarrion.co.uk. It does not properly secure user inputted variables, presumably as the user is not supposed to input the variable but

Re: [Full-Disclosure] dab@heise.de

2004-11-12 Thread Andrew Smith
Interesting, i haven't noticed any. I guess gmail is picking them up? On Fri, 12 Nov 2004 12:44:44 -0300, Jeff Donahue [EMAIL PROTECTED] wrote: Obviously this is usual, because the list is unmoderated... Either get a good AV or keep from clicking the executable attachments. ;) -

[Full-Disclosure] TRUSTe.org Cross-Site-Scripting Phishing oppurtunities

2004-11-08 Thread Andrew Smith
Website: http://truste.org Background: TRUSTe® is an independent, nonprofit organization dedicated to enabling individuals and organizations to establish trusting relationships based on respect for personal identity and information in the evolving networked world. Through extensive consumer and

Re: [Full-Disclosure] Undetectable Virus from CANADA ISP 69.197.83.68

2004-10-22 Thread Andrew Smith
Today I got e-mail from 69.197.83.68 CANADA ISP which has undetectable virus. This just means that you or your A/V hasn't updated their virus definitions. Try multiple A/V programs, this will cover a wider range of 'viruses'. Well I downloaded this file but I didn't run it because I know

Re: [Full-Disclosure] why o why did NASA do this.

2004-10-17 Thread Andrew Smith
Am i the only one that noticed the time stamps? These are 6 years old On Sun, 17 Oct 2004 01:17:59 -0600, Mike Diehl (Encrypted email preferred) [EMAIL PROTECTED] wrote: On Thursday, October 14, 2004 3:13 PM, Deigo Dude wrote: ftp://ftp.hq.nasa.gov/pub/nickname/ The list contains the

Re: [Full-Disclosure] Norton AntiVirus 2005 treats Radmin as a Virus ??!

2004-10-13 Thread Andrew Smith
That's not Radmin, that's a 'dropper' to silenty install radmin..intended almost always for use as a trojan. So of course NAV will pick it up as a virus. On Wed, 13 Oct 2004 11:38:36 +0200 (CEST), Feher Tamas [EMAIL PROTECTED] wrote: Ill Will wrote: oops...

Re: [Full-Disclosure] Quicky Analysis of a Proxy/Zombie Network

2004-10-13 Thread Andrew Smith
wow, interesting stuff. Never seen anything like that before :-) On Wed, 13 Oct 2004 13:40:35 +1300, VeNoMouS [EMAIL PROTECTED] wrote: there u go guys - Original Message - From: Gregory Gilliss [EMAIL PROTECTED] To: Steele [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Sent: Wednesday,

Re: [Full-Disclosure] Hacking into private files, my credit card purchases, personal correspondence or anything that is mine is trespassing and criminal.

2004-10-08 Thread Andrew Smith
This is the internet. This isn't your home, your car, your wallet. This is the internet. Offline analogies do not work. They also make my brain hurt, please do not use them. Whilst breaking a weak lock is criminal on the internet and in real life, it's also a hell of a lot easier to do on the

Re: [Full-Disclosure] Hacking into private files, my credit card purchases, personal correspondence or anything that is mine is trespassing and criminal.

2004-10-08 Thread Andrew Smith
Am i the only one concerned at the childish behavious on these mailing lists? I've not been reading for so long, but in my second or third email to these lists i've been told that someone 'doesn't care' about me and my 'weak brain'. And now this 'OK. You're wrong.' ? Is this neccesary? I beleive

[Full-Disclosure] Simple but Effective Spam Harvester Solutions

2004-10-08 Thread Andrew Smith
Not entirely sure if this is appropriate for full-disclosure. Ah Well. As you may well know there are programs that scour the internet looking for email addresses, some people attempt to thwart them writing emails like my_email (AT) mydomain (DOT) com. These don't really work, so i figured some

[Full-Disclosure] Research Machines(RM) Networks / Setup

2004-09-14 Thread Andrew Smith
Research Machines (RM) are The Leading Supplier of Software, Services and Systems to UK Education. Mainly seen in High Schools in the UK. The following was revealed too them well over 6 months ago. I received no reply from my email. a) Publicly Availiable Admin Tools b) Publicily Writable Status

[Full-Disclosure] Short Paper on the warez scene

2004-09-07 Thread Andrew Smith
Hi, I wrote a short paper/article on the warez scene for 2600 magazine (www.2600.com) It contains some valuable information about who is hacking you and why, thought this may interest some of you (especiall the many i've seen on here who have found an unknown FTP server on their computer). A scan