lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed Mar 29 17:41:21 2006
From: fd at g-0.org (GroundZero Security)
Subject: Hello everyone

>Are these old exploits documented anywhere. I guess maybe not otherwise we'd 
>have a lot more problems. I've googled around but aren't really sure what 
>else to search on other than "software exploits" but don't seem to be able 
>to find a really good one.

Sure there are quiet a lot of such databases out, for example http://www.cve.mitre.org/
or http://www.packetstormsecurity.org/ is a good resource.

If you are really serious about learning hacking, then the best resource for
information would be phrack.org, but its down so i went to google and found you a 
mirror: http://phrack.telegenetic.net/ there you find almost any form of bug explained
in detail, how they work, how to spot them and of course how to exploit them aswell.

A very good idea would be to learn C programming, as around 90% of the exploits 
are made in C so in order to fully understand them, you need C knowledge. Sure,
you could also write exploits in Perl or so, but thats lame and won't work in every case.
So if you do it, then right isn't it. Well, this should keep you busy for a while ;-)

-sk

----- Original Message ----- 
From: "Ian stuart Turnbull" <ian.t7@...mail.co.uk>
To: <fd@....org>
Cc: <full-disclosure@...ts.grok.org.uk>
Sent: Wednesday, March 29, 2006 6:15 PM
Subject: Re: [Full-disclosure] Hello everyone


> Thanks for this helpful informative post. I was expecting to be blasted as 
> an idiot idealist - to be frank, though hoping for just this sort of info. 
> Nice one.
> I guess as in most things in life - mind your own business and if you don't 
> you're liable to get punched in the nose. I think I liked it better when the 
> free T-Shirts were in vogue.
> 
> Sticking to my own LAN is a great idea though admittedly I expect there are 
> times when being inside won't work the same as if coming from the ether.
> 
> Not that I'd want to cross the line and test what you say I just read a 
> great article where a 13 year old bombed GRC.COM a few years back but due to 
> his age and that he hadn't commited more than $US 5,000 of damage the FBI 
> said they really didn't have the resources to bother with him.
> http://grc.com/dos/grcdos.htm
> 
> Are these old exploits documented anywhere. I guess maybe not otherwise we'd 
> have a lot more problems. I've googled around but aren't really sure what 
> else to search on other than "software exploits" but don't seem to be able 
> to find a really good one.
> 
> Again, thanks for your helpful email Groundzero.
> 
> Ian t
> 
> >From: "GroundZero Security" <fd@....org>
> >To: "Ian stuart Turnbull" <ian.t7@...mail.co.uk>
> >CC: <full-disclosure@...ts.grok.org.uk>
> >Subject: Re: [Full-disclosure] Hello everyone
> >Date: Wed, 29 Mar 2006 17:43:23 +0200
> >MIME-Version: 1.0
> >Received: from hosting.GroundZero-Security.com ([217.172.172.12]) by 
> >bay0-pamc1-f10.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.1830); Wed, 
> >29 Mar 2006 07:41:54 -0800
> >Received: from nuclearwinter (p5499E7FC.dip.t-dialin.net 
> >[84.153.231.252])by hosting.GroundZero-Security.com (8.13.1/8.13.1/SuSE 
> >Linux 0.7) with SMTP id k2TFgLw0020333;Wed, 29 Mar 2006 17:42:24 +0200
> >X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8=
> >References: <BAY112-F30FB06BA53D6D48F6B09A99D00@....gbl>
> >X-MSMail-Priority: Normal
> >X-Mailer: Microsoft Outlook Express 6.00.2800.1506
> >X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1506
> >Return-Path: fd@....org
> >X-OriginalArrivalTime: 29 Mar 2006 15:41:54.0612 (UTC) 
> >FILETIME=[4E2EEF40:01C65347]
> >
> >Hello,
> >
> >well the problem is, if you do access the System, you cross the line.
> >Even if its open or without password, but that is already illegal access.
> >
> >Sure you just want to be nice, but if one of the users you try to inform
> >gets angry, then he could still contact law enforcement. On the legal side, 
> >he
> >would be right as you accessed his System. Especially if its on a cooperate
> >network. Companies have a lot to loose if customer data or even source code
> >gets stolen, so even if you inform them of a bug, they can't be sure that 
> >you
> >didn't already copy things, unless they inform law officials to raid you.
> >
> >In the 90s, if you informed a Administrator of a vulnerability, you offten
> >received a present of some sort like a free t-shirt  :-) but those times 
> >changed.
> >At least i didnt hear of someone receiving a present for hacking in years
> >(contests don't count). Its a nice idea to inform the people the have 
> >vulnerabilities,
> >but you have to be carefull. If you just scan and tell them that port 139 
> >is open
> >then its fine as you didnt access the System and as far as i know port 
> >scanning
> >is still legal in most countries, but if you actually connect to a open 
> >share thats a
> >different story.
> >
> >A few years back there was also a discussion about whitehat worms which 
> >would
> >scan and patch vulnerable hosts, but its still illegal to hack a system and 
> >install
> >software, no matter if its to patch or not. Well i suggest you setup a 
> >little test
> >network and hack those Systems on your LAN. On that way you can learn
> >without breaking the law. You need to understand how bugs get exploited and
> >how to find vulnerabilities in code and how to write your own exploits.
> >Get some old daemons which are known to be vulnerable and where exploits
> >exist to get a better understanding. Just a few hints, hope that helps you 
> >out.
> >
> >good luck! (and dont trust any hacking certifications as that is just to 
> >make money)
> >
> >-sk
> >Http://www.groundzero-security.com
> >
> >----- Original Message -----
> >From: "Ian stuart Turnbull" <ian.t7@...mail.co.uk>
> >To: <full-disclosure@...ts.grok.org.uk>
> >Sent: Wednesday, March 29, 2006 5:05 PM
> >Subject: [Full-disclosure] Hello everyone
> >
> >
> > > I have just started in this "hacking" [ethical I should quickly add] and
> > > after much reading etc [and a forest more to do] I have a fundamental
> > > question I'd like to pose.
> > > After just a few hours of scanning (I have to start somewhere} I have
> > > located quite a few routers that have their manufacturers password still 
> >set
> > > not to mention loads of Windows machines that have port 139 open AND 
> >have
> > > write access to the whole of the C: Drive in some instances.
> > >
> > > My question - since it is these machines that I understand will be the
> > > computers that the hacker will use to hide him/her self and given that 
> >there
> > > are tools around - just that I don't know of one yet - WHY doesn't 
> >someone
> > > send a message to these machines that the owner will see and ASK them
> > > politely to close up these holes? Perhaps something along the "net send"
> > > command.
> > > I'm sure they would love to be enligtened. i.e. their banking info etc 
> >won't
> > > be stolen.
> > >
> > > If given the knowledge I'd be happy to devote a day or so doing just 
> >this.
> > > Currently I don't yet have enough skills.
> > >
> > > Yes, I know someone somewhere must have asked this question, though I
> > > haven't found any instance of it, so please don't flame me. I am here to
> > > LEARN from obviously well instructed and knowledgeable people.
> > >
> > > Also, forgive me if I appear naive - at this point I admit I definately 
> >am
> > > but that will change in time to come.
> > >
> > > I'd love to help make the internet a safer place. It is a truly great
> > > invention but for a few darksided individuals. Just because one has the
> > > knowledge doesn't mean they have to ruin it for others !!
> > >
> > > _________________________________________________________________
> > > Are you using the latest version of MSN Messenger? Download MSN 
> >Messenger
> > > 7.5 today! http://join.msn.com/messenger/overview
> > >
> > > _______________________________________________
> > > Full-Disclosure - We believe in it.
> > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > > Hosted and sponsored by Secunia - http://secunia.com/
> > >
> 
> _________________________________________________________________
> Are you using the latest version of MSN Messenger? Download MSN Messenger 
> 7.5 today! http://join.msn.com/messenger/overview
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ