[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <C2CAA635.1FE2D%simon@snosoft.com>
Date: Mon, 23 Jul 2007 18:38:45 -0400
From: Simon Smith <simon@...soft.com>
To: <joey.mengele@...hmail.com>, <codeshepherd@...il.com>,
<websecurity@...appsec.org>, <full-disclosure@...ts.grok.org.uk>
Subject: Re: Am I missing anything ?
You are right with respect to your RFI comment... But as far as me learning
anything, don't count on it. I am after all an ignorant jackass remember?
On 7/23/07 6:32 PM, "Joey Mengele" <joey.mengele@...hmail.com> wrote:
> But I am right, am I not? Just pointing out what everyone else was
> thinking already :)
>
> Anyway, if you are implying I am immature because of my ad homonym,
> please refer to the following:
>
> http://archives.neohapsis.com/archives/fulldisclosure/2007-
> 01/0380.html
>
> You should have learned from KF by now the infosec mantra 'live by
> the niggerdong, die by the niggerdong'
>
> J
>
> On Mon, 23 Jul 2007 18:17:53 -0400 Simon Smith <simon@...soft.com>
> wrote:
>> Kid, your posts continue to clearly demonstrate your immaturity.
>>
>> http://www.security-express.com/archives/fulldisclosure/2007-
>> 07/0404.html
>> http://archives.neohapsis.com/archives/fulldisclosure/2007-
>> 07/0372.html
>> http://seclists.org/fulldisclosure/2007/Jul/0369.html
>> http://seclists.org/fulldisclosure/2007/Jul/0402.html
>>
>> Its too bad that you're such a coward man...
>>
>>
>>
>>
>> On 7/23/07 5:51 PM, "Joey Mengele" <joey.mengele@...hmail.com>
>> wrote:
>>
>>> Doesn't RFI stand for remote file inclusion you ignorant
>> jackass?
>>>
>>> J
>>>
>>> On Mon, 23 Jul 2007 17:20:56 -0400 Simon Smith
>> <simon@...soft.com>
>>> wrote:
>>>> Local and Remote file inclusion, yes, you are actually missing
>> a
>>>> bunch of
>>>> things.. ;)
>>>>
>>>>
>>>> On 7/23/07 1:20 PM, "Deeflàn Chakravarthÿ"
>> <codeshepherd@...il.com>
>>>> wrote:
>>>>
>>>>> Hi All,
>>>>> Just wondered if I am missing anything important. Am
>> planning
>>>> to give
>>>>> talk on web security.
>>>>> Is there any other technique other than the following I have
>> to
>>>> speak
>>>>> about ?
>>>>>
>>>>> 1)XSS
>>>>> 2)CSRF
>>>>> 3)SQL Injection
>>>>> 4)AJAX/JSON hijacking
>>>>> 5)HTTP response splitting
>>>>> 6)RFI
>>>>> 7)CRLF
>>>>> 8)MITM
>>>>>
>>>>> Thanks
>>>>> Deepan
>>>>>
>>>>> _______________________________________________
>>>>> Full-Disclosure - We believe in it.
>>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>
>>>>
>>>> _______________________________________________
>>>> Full-Disclosure - We believe in it.
>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>
>>> --
>>> Not making enough money? Click here to get free info on medical
>> jobs
>>>
>> http://tagline.hushmail.com/fc/Ioyw6h4d93UCWauNfldnj1w6hNlG5GkZoypo
>> FUtlgi140Vz
>>> qsFboKh/
>>>
>
> --
> Click to get a free credit repair consultation, raise your FICO score
> http://tagline.hushmail.com/fc/Ioyw6h4d7lz4ao5ZGQpPej5hG4nLRpsNA5J5BBwM8QupVOr
> uN77l3H/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists