Full Disclosure mailing list archives

Re: Hello everyone


From: "GroundZero Security" <fd () g-0 org>
Date: Wed, 29 Mar 2006 18:42:37 +0200

Are these old exploits documented anywhere. I guess maybe not otherwise we'd 
have a lot more problems. I've googled around but aren't really sure what 
else to search on other than "software exploits" but don't seem to be able 
to find a really good one.

Sure there are quiet a lot of such databases out, for example http://www.cve.mitre.org/
or http://www.packetstormsecurity.org/ is a good resource.

If you are really serious about learning hacking, then the best resource for
information would be phrack.org, but its down so i went to google and found you a 
mirror: http://phrack.telegenetic.net/ there you find almost any form of bug explained
in detail, how they work, how to spot them and of course how to exploit them aswell.

A very good idea would be to learn C programming, as around 90% of the exploits 
are made in C so in order to fully understand them, you need C knowledge. Sure,
you could also write exploits in Perl or so, but thats lame and won't work in every case.
So if you do it, then right isn't it. Well, this should keep you busy for a while ;-)

-sk

----- Original Message ----- 
From: "Ian stuart Turnbull" <ian.t7 () hotmail co uk>
To: <fd () g-0 org>
Cc: <full-disclosure () lists grok org uk>
Sent: Wednesday, March 29, 2006 6:15 PM
Subject: Re: [Full-disclosure] Hello everyone


Thanks for this helpful informative post. I was expecting to be blasted as 
an idiot idealist - to be frank, though hoping for just this sort of info. 
Nice one.
I guess as in most things in life - mind your own business and if you don't 
you're liable to get punched in the nose. I think I liked it better when the 
free T-Shirts were in vogue.

Sticking to my own LAN is a great idea though admittedly I expect there are 
times when being inside won't work the same as if coming from the ether.

Not that I'd want to cross the line and test what you say I just read a 
great article where a 13 year old bombed GRC.COM a few years back but due to 
his age and that he hadn't commited more than $US 5,000 of damage the FBI 
said they really didn't have the resources to bother with him.
http://grc.com/dos/grcdos.htm

Are these old exploits documented anywhere. I guess maybe not otherwise we'd 
have a lot more problems. I've googled around but aren't really sure what 
else to search on other than "software exploits" but don't seem to be able 
to find a really good one.

Again, thanks for your helpful email Groundzero.

Ian t

From: "GroundZero Security" <fd () g-0 org>
To: "Ian stuart Turnbull" <ian.t7 () hotmail co uk>
CC: <full-disclosure () lists grok org uk>
Subject: Re: [Full-disclosure] Hello everyone
Date: Wed, 29 Mar 2006 17:43:23 +0200
MIME-Version: 1.0
Received: from hosting.GroundZero-Security.com ([217.172.172.12]) by 
bay0-pamc1-f10.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.1830); Wed, 
29 Mar 2006 07:41:54 -0800
Received: from nuclearwinter (p5499E7FC.dip.t-dialin.net 
[84.153.231.252])by hosting.GroundZero-Security.com (8.13.1/8.13.1/SuSE 
Linux 0.7) with SMTP id k2TFgLw0020333;Wed, 29 Mar 2006 17:42:24 +0200
X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8=
References: <BAY112-F30FB06BA53D6D48F6B09A99D00 () phx gbl>
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1506
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1506
Return-Path: fd () g-0 org
X-OriginalArrivalTime: 29 Mar 2006 15:41:54.0612 (UTC) 
FILETIME=[4E2EEF40:01C65347]

Hello,

well the problem is, if you do access the System, you cross the line.
Even if its open or without password, but that is already illegal access.

Sure you just want to be nice, but if one of the users you try to inform
gets angry, then he could still contact law enforcement. On the legal side, 
he
would be right as you accessed his System. Especially if its on a cooperate
network. Companies have a lot to loose if customer data or even source code
gets stolen, so even if you inform them of a bug, they can't be sure that 
you
didn't already copy things, unless they inform law officials to raid you.

In the 90s, if you informed a Administrator of a vulnerability, you offten
received a present of some sort like a free t-shirt  :-) but those times 
changed.
At least i didnt hear of someone receiving a present for hacking in years
(contests don't count). Its a nice idea to inform the people the have 
vulnerabilities,
but you have to be carefull. If you just scan and tell them that port 139 
is open
then its fine as you didnt access the System and as far as i know port 
scanning
is still legal in most countries, but if you actually connect to a open 
share thats a
different story.

A few years back there was also a discussion about whitehat worms which 
would
scan and patch vulnerable hosts, but its still illegal to hack a system and 
install
software, no matter if its to patch or not. Well i suggest you setup a 
little test
network and hack those Systems on your LAN. On that way you can learn
without breaking the law. You need to understand how bugs get exploited and
how to find vulnerabilities in code and how to write your own exploits.
Get some old daemons which are known to be vulnerable and where exploits
exist to get a better understanding. Just a few hints, hope that helps you 
out.

good luck! (and dont trust any hacking certifications as that is just to 
make money)

-sk
Http://www.groundzero-security.com

----- Original Message -----
From: "Ian stuart Turnbull" <ian.t7 () hotmail co uk>
To: <full-disclosure () lists grok org uk>
Sent: Wednesday, March 29, 2006 5:05 PM
Subject: [Full-disclosure] Hello everyone


I have just started in this "hacking" [ethical I should quickly add] and
after much reading etc [and a forest more to do] I have a fundamental
question I'd like to pose.
After just a few hours of scanning (I have to start somewhere} I have
located quite a few routers that have their manufacturers password still 
set
not to mention loads of Windows machines that have port 139 open AND 
have
write access to the whole of the C: Drive in some instances.

My question - since it is these machines that I understand will be the
computers that the hacker will use to hide him/her self and given that 
there
are tools around - just that I don't know of one yet - WHY doesn't 
someone
send a message to these machines that the owner will see and ASK them
politely to close up these holes? Perhaps something along the "net send"
command.
I'm sure they would love to be enligtened. i.e. their banking info etc 
won't
be stolen.

If given the knowledge I'd be happy to devote a day or so doing just 
this.
Currently I don't yet have enough skills.

Yes, I know someone somewhere must have asked this question, though I
haven't found any instance of it, so please don't flame me. I am here to
LEARN from obviously well instructed and knowledgeable people.

Also, forgive me if I appear naive - at this point I admit I definately 
am
but that will change in time to come.

I'd love to help make the internet a safer place. It is a truly great
invention but for a few darksided individuals. Just because one has the
knowledge doesn't mean they have to ruin it for others !!

_________________________________________________________________
Are you using the latest version of MSN Messenger? Download MSN 
Messenger
7.5 today! http://join.msn.com/messenger/overview

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


_________________________________________________________________
Are you using the latest version of MSN Messenger? Download MSN Messenger 
7.5 today! http://join.msn.com/messenger/overview


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: