lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 26 Jun 2011 04:53:40 -0700
From: t0hitsugu <tohitsugu@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Full-Disclosure Digest, Vol 76, Issue 48

Itd be pretty funny if it ended up that they were the ones who made these XD


------------------
>
> Message: 3
> Date: Sun, 26 Jun 2011 02:18:37 -0400
> From: Nathan Whitmore <nathanww@...il.com>
> Subject: [Full-disclosure] LulzCheck--a tool for checking account
>        security
> To: full-disclosure@...ts.grok.org.uk
> Message-ID: <BANLkTi=c1rSOPi0p40Fn9oux2HW2oA0FqQ@...l.gmail.com>
> Content-Type: text/plain; charset="windows-1252"
>
> So, apparently LulzSec is  over and done with. Even so, they?ve left a lot
> behind, in the form of more than 100,000 compromised passwords. Cearly,
this
> is still potentially a problem, especially considering password reuse.
>
> LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you
log
> into a website, it checks the username that you supply against an updated
> list of accounts that have been ?leaked? by LulzSec, and gives you a
warning
> if it finds your login in that list.
>
> Keep in mind, if you get a warning message, it *may not actually apply to
> the site that your are logging into. *Because people reuse logins, and the
> ultimate origin of some of the leaked usernames/passwords is unknown, it?s
> not really possible for LulzCheck to automatically pin down exactly what
> accounts you need to change.
>
> *LulzCheck can be downloaded at
http://userscripts.org/scripts/show/105484*
>
> --
> Any technology distinguishable from magic is by definition insufficiently
> advanced
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/f498d7c8/attachment-0001.html
>
> ------------------------------
>
> Message: 4
> Date: Sun, 26 Jun 2011 16:01:23 +0800
> From: Addy Yeow <ayeowch@...il.com>
> Subject: Re: [Full-disclosure] LulzCheck--a tool for checking account
>        security
> To: Nathan Whitmore <nathanww@...il.com>
> Cc: full-disclosure@...ts.grok.org.uk
> Message-ID: <BANLkTinbQ+Bd6AWk_vAJ87PCBqVVBXLhMw@...l.gmail.com>
> Content-Type: text/plain; charset="windows-1252"
>
> You can check searchable list of the leaked accounts at
> http://dazzlepod.com/lulzsec/final/
>
> On Sun, Jun 26, 2011 at 2:18 PM, Nathan Whitmore <nathanww@...il.com>
wrote:
>
> >
> > So, apparently LulzSec is  over and done with. Even so, they?ve left a
lot
> > behind, in the form of more than 100,000 compromised passwords. Cearly,
this
> > is still potentially a problem, especially considering password reuse.
> >
> > LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you
log
> > into a website, it checks the username that you supply against an
updated
> > list of accounts that have been ?leaked? by LulzSec, and gives you a
warning
> > if it finds your login in that list.
> >
> > Keep in mind, if you get a warning message, it *may not actually apply
to
> > the site that your are logging into. *Because people reuse logins, and
the
> > ultimate origin of some of the leaked usernames/passwords is unknown,
it?s
> > not really possible for LulzCheck to automatically pin down exactly what
> > accounts you need to change.
> >
> > *LulzCheck can be downloaded at
http://userscripts.org/scripts/show/105484
> > *
> >
> > --
> > Any technology distinguishable from magic is by definition
insufficiently
> > advanced
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
>
>
>
> --
> http://www.dazzlepod.com . http://twitter.com/dazzlepod
> We write elegant and minimal apps that works. We develop web apps with
> Django framework.
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/9f870ecb/attachment-0001.html
>
> ------------------------------
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
> End of Full-Disclosure Digest, Vol 76, Issue 48
> ***********************************************

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ