Re: [Full-disclosure] n3td3v is posting as ant-sec

2009-07-16 Thread Gichuki John Chuksjonia
Hehehe, netdev? For real?. He is the Anti-sec. I think thats wrong On Thu, Jul 16, 2009 at 1:35 PM, Benjamin Cancecance.consult...@gmail.com wrote: now we know who antisec are/is, i'm going to bed Charles Majola wrote: HAH! I knew it On Thu, Jul 16, 2009 at 2:54 PM,

Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!

2009-07-20 Thread Gichuki John Chuksjonia
hahaha, now u r releasing it I thought u guyz dont release or disclose vulnerabilities. ./Chuks On 7/20/09, Ant-Sec Movement anti.sec.movem...@gmail.com wrote: Dear Reader, In 48 hours, the anti-sec movement will publicly unveil working exploit code and full details for the zero-day

Re: [Full-disclosure] AntiSec PHHEER #1 (anti...@hushmail.com)

2009-08-09 Thread Gichuki John Chuksjonia
i thought the same thing. This guy shud get a life!!! On 8/9/09, Zloss aza...@gmail.com wrote: So what the heck are you doing dumbass ? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted

Re: [Full-disclosure] [Professional IT Security Providers - Exposed] Redspin, Inc. (C+)

2009-08-13 Thread Gichuki John Chuksjonia
Just read this. What happened to your blog, http://secreview.blogspot.com? On 8/11/09, secreview secrev...@hushmail.com wrote: We received 22 requests from different people to perform a review of Redspin! Their website can be found at http://www.redspin.com. We haven’t done a review of

Re: [Full-disclosure] http://secreview.blogspot.com -- end of life

2009-08-14 Thread Gichuki John Chuksjonia
Please bring it back. It was a nice blog, or send me an archive of the ut. Thankx ./Chuks On 8/13/09, secrev...@hushmail.me secrev...@hushmail.me wrote: Hi Everyone, We received a lot of emails from different people asking us what happened to our blog at http://secreview.blogspot.com.

Re: [Full-disclosure] Moar iProphet questions

2009-08-29 Thread Gichuki John Chuksjonia
Now, i think this is really wrong. There is no need of making fun of someone who is disabled by attacking n3td3v. On 8/29/09, Gary McKinnon john.wall...@hush.com wrote: iProphet (weev) Questions Sorry for being repetitive. FD is mostly hoarsechit and fucin around anyway (not that you do ANY

Re: [Full-disclosure] n3td3v's Twitter account hacked

2009-09-19 Thread Gichuki John Chuksjonia
Just saw that. Thot were new trolls by n3td3v pouring all the way to twitter. On 9/19/09, The Security Community thesecuritycommun...@gmail.com wrote: Someone evidently hacked into n3td3v's Twiiter account and is spewing nonsense. http://twitter.com/n3td3v Maybe it's some sort of botnet CC

Re: [Full-disclosure] Modifying SSH to Capture Login Credentials from Attackers

2009-09-29 Thread Gichuki John Chuksjonia
Thank you for this my.hndl. There are some issues i have been having and seems your methodology may work on Fedora and others OSs. Thankx ./Chuks On 9/30/09, maxigas maxi...@anargeek.net wrote: From: bo...@civ.zcu.cz bo...@civ.zcu.cz Subject: Re: [Full-disclosure] Modifying SSH to Capture

Re: [Full-disclosure] n3td3v mentioned in a book?

2009-10-04 Thread Gichuki John Chuksjonia
Maybe its not a Ban, maybe its a burn notice! On 10/4/09, full-censors...@hushmail.com full-censors...@hushmail.com wrote: if this guy is mentioned in a book and we banned him? http://f0rb1dd3n.com/links.php i'm calling for a serious review of whats going on with the ban list.

Re: [Full-disclosure] The Cyber War Conspiracy

2009-12-05 Thread Gichuki John Chuksjonia
K, full-disclos...@safe-mail.net or whoever you are, i think you are watching too much of 24 or even Spooks. Please quit and relax abit!!! ./Chuks On 12/5/09, Paul Schmehl pschmehl_li...@tx.rr.com wrote: --On December 4, 2009 10:44:20 PM -0600 valdis.kletni...@vt.edu wrote: On Fri, 04

Re: [Full-disclosure] Antisec for lulz - exposed (anti-sec.com)

2010-01-02 Thread Gichuki John Chuksjonia
One of the amazing thing about these hackers calling them antisec didn't have real hardening on their servers. Most of their servers had direct public ip on their Interfaces and even their user management was crappy. I remember when i heard of antisec i thot these guys were real gurus with more

Re: [Full-disclosure] Antisec for lulz - exposed (anti-sec.com)

2010-01-04 Thread Gichuki John Chuksjonia
Especially the ones working for governments, the surveillance and espionage etc, scares more On 1/4/10, netinfinity netinfinity.security...@gmail.com wrote: I couldn't agree more with Adriel. -- netinfinity ___ Full-Disclosure - We believe in

Re: [Full-disclosure] Unbanning Andrew Wallace to protect global information intelligence

2010-03-21 Thread Gichuki John Chuksjonia
waoh. very funny. On 3/21/10, Andrew Walberg andrew.walb...@rocketmail.com wrote: Hello. Everyone here has learned there lesson and has suffered because Andrew Wallace (n3td3v) has been banned. n3td3v is a multi-national organization of national security experts who have been driven to the

Re: [Full-disclosure] 10 OpenBSD facts and is timeline of Backdoor

2010-12-16 Thread Gichuki John Chuksjonia
God, i cant even understand half the shit he is saying? English so upside down! On 12/17/10, Christian Sciberras uuf6...@gmail.com wrote: HAHAHAHAHAH!! GOD so are funny you!11 2010/12/16 musnt live musntl...@gmail.com OpenBSD is Backdoor facts 1) Is we look to

Re: [Full-disclosure] LulzSec EXPOSED!

2011-06-06 Thread Gichuki John Chuksjonia
I think its just a bruteforce. On 6/6/11, Andreas Bogk andr...@andreas.org wrote: Excerpts from lulzfail's message of Mo Jun 06 08:39:42 +0200 2011: Lulzsec == pwnt I've seen the log you pasted to pastebin. Is this: * A timing attack on ssh passwords over the net? * Fake, to distract

Re: [Full-disclosure] Botnet using Plesk vulnerability and takedown

2013-06-08 Thread Gichuki John Chuksjonia
What happened to the link. On 6/8/13, kai k...@rhynn.net wrote: wget http://botslayer.ru/final_solution.txt i've registered this domain just to save incompetent shitheads who blindly run any code which is supposed to fix security problem. why have you included the non-existent domain in

Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure

2013-08-10 Thread Gichuki John Chuksjonia
One thing u gotta remember most of the Admins who handle webservers in a network are also developers since most of the organizations will always need to cut on expenses, and as we know, most of the developers will just look into finishing work and making it work. So if something doesn't run due to

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread Gichuki John Chuksjonia
How the hell did you ever think Google will honor this? By now they could be fixing this issue, they hell don't care about you. On 3/15/14, Georgi Guninski gunin...@guninski.com wrote: Is it possible with the help of Godwin's law this discussion moves offlist? -- guninski On Thu, Mar 13,

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Gichuki John Chuksjonia
Ooh goodie, where and what happened to N3td3v, he used to crack me up :D :D On 3/17/14, Mario Vilas mvi...@gmail.com wrote: ROFL [image: Inline image 1] On Mon, Mar 17, 2014 at 11:07 AM, T Imbrahim timbra...@techemail.comwrote: What drugs are you on Pedro Ribeiro I wonder ...? I