Full Disclosure mailing list archives

Re: Flash that simulates virus scan


From: scott <redhowlingwolves () bellsouth net>
Date: Thu, 01 Nov 2007 00:09:06 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It would be nice if the people who ridicule pdp would actually do some
research in the field of JS exploits before passing judgement.

Two places I can think of are RSnake's blog at http://ha.ckers.org/
and also the forum: http://sla.ckers.org/forum/
You might learn something regarding the dangers of XSS.

Cheers,
Scott
reepex wrote:
dont you listen to pdp ever? the government uses xss and bruteforces
remote desktop logins

http://seclists.org/fulldisclosure/2007/Oct/0417.html

pdp: "military grade exploits? :) dude, I am sorry man.. but you are living
in some kind of a dream world. get real, most of the military hacks
are as simple as bruteforcing the login prompt.. or trying something
as simple as XSS."

------

pdp is an hero and a computer security expert and based on his fans
from the list he is the greatest researched since lcamtuf. his word =
gold



On 11/1/07, jf <jf () danglingpointers net> wrote:
must be on one of the .gov red teams ;]


On Wed, 31 Oct 2007, reepex wrote:

Date: Wed, 31 Oct 2007 16:56:20 -0500
From: reepex <reepex () gmail com>
To: Joshua Tagnore <joshua.tagnore () gmail com>,
full-disclosure () lists grok org uk
Subject: Re: [Full-disclosure] Flash that simulates virus scan

resulting to se in a pen test cuz you cant break any of the actual
machines?

lulz

On 10/31/07, Joshua Tagnore <joshua.tagnore () gmail com> wrote:
List,

Some time ago I remember that someone posted a PoC of a small site that
had a really nice looking flash animation that "performed a virus
scan" and
after the "virus scan" was finished, the user was prompted for a
"Download
virus fix?" question. After that, of course, a file is sent to the
user and
he got infected with some malware. Right now I'm performing a
penetration
test, and I would like to target some of the users of the corporate
LAN, so
I think this approach is the best in order to penetrate to the LAN.

I searched google but failed to find the URL, could someone send it to
me ? Thanks!

Cheers,
--
Joshua Tagnore
_______________________________________________
Full-Disclosure - We believe in it.
Charter:
http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHKVFfxajqy/aNaRsRAtfEAKC8sRWj8i4IQGQ0jEnjFveg0T9SLACfeykj
ptS9bqw+XU+R9KQaSkcVdpM=
=+wFb
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: