lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun May  1 21:33:45 2005
From: vulcanius at gmail.com (vulcanius)
Subject: Micky-dee's anyone?

Speaking of McD's. 

I might as well disclose a little info on the new wireless setups
they've installed. A while back I did some installations for them.
Basically they're running a setup designed by a company called
Wayport. If you ever venture into the back of a McD's they have two
servers running their PoS systems, accounting, surveillance, etc. I
forget the names of the servers but the system that's going to the
wireless is called CCD or CCCD if I remember correctly. The actual
wireless system uses DSL from BellSouth or another RBOC. They have a
small rackmounted CPU inside the wall-mounted case running Debian. I
was limited on time so don't bother asking me what kernel/services
it's running. Other than that they have the usual DSL filters, a
Sprint 4 port Hub mounted inside the case and I forget what wireless
router they are using. The wireless router is mounted above the
ceiling in front of the registers. Basically if your waiting in line
your standing right beneath it.

Also, to spoil your appetites for McD's wonderful burgers, while
running cables in the ceiling I had the joy of encountering no less
than 3 dead rats and more dead roaches than I could count.

Enjoy your food. 

If anyone has more time to do a little probing, post what you find.

On 5/1/05, n3td3v <xploitable@...il.com> wrote:
> On 5/1/05, James Tucker <jftucker@...il.com> wrote:
> > Er, Bank, McD's. The monetary values are not entirely dissimilar.
> >
> > XSS is XSS anyway, does it really matter where? Black hats are known
> > for their exploitation of "underestimated" weaknesses, so if one were
> > feeling philosophical, it could be expressed that this problem may be
> > more important than the 'bigger' issues.
> 
> You can't pick a better day than May the 1st to disclose a XSS
> vulnerability on a Mc Donands website than on May the 1st, and thats
> the point in this whole little affair.
> 
> Thanks, n3td3v
> 
> This is where I read Full-Disclosure:
> http://groups-beta.google.com/group/n3td3v
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ