Full Disclosure mailing list archives
Anonymous surfing my ass!
From: full-disclosure () lists netsys com (Charles 'core' Stevenson)
Date: Sun, 14 Jul 2002 12:25:27 -0600
Hasty flames are counterproductive. Let us not be so quick to judge. Speaking from personal experience, I would imagine that most people's first few advisories are bound to lack clarity/details. Additionally one must remember not to hit that reply button instantly after reading a post that triggers anger/hostility. I myself am guilty of all the aforementioned shortcomings. But hey we're human aren't we? Nor should a man be in a hurry to publish his advisory the instant his proof-of-concept exploit works. Sitting on a bug for a little while will afford the time to polish the advisory and/or exploit. The discloser must determine the fundamental pieces of information every advisory should have and a format which puts the bottom-line-up-front. In this fashion the discloser can take pride in knowing, whether the bug was trivial to exploit or a work of art, that all of those who read it will walk away with a clear understanding of the problem, impact, solution, etc.. Take a look at security focus's vuln-help advisory template. peace, core Steve wrote:
You would think that the email sent to the list would have contained more information. Based on the email sent, one would might not even bother clicking on the link. And for those of us who happen to be checking email on Windoze boxes, clicking on random Internet links probably isn't the brightest thing to do from IE unless you have bothered to disable all the various active scripting etc....... How seriously would you take an email that simply said "click here www.clicktobeowned.com"I think if you at least clicked the advisory link (http://spoor12.edup.tudelft.nl/SkyLined%20v4.2/?Advisories/Anonymous surfing, NOT! ) it would help relieve some of your ignorance. What he's reffering to is a getting script (usually javascript) through the filters and executing on the 'anonymous' person's machine. If a site can do that they can save cookies to the machine, thereby breaking the anonymity. It's not really cross site scripting, though the techniques used to get it through are similar. Right now 'cross site scripting' seems to be the buzz word attached to any security breach involving scripts. Something we have to live with I guess. Anyway, whatever it's called SkyLined seems to be the l33test at it ;) - Blazde _______________________________________________ Full-Disclosure - We believe in it. Full-Disclosure () lists netsys com http://lists.netsys.com/mailman/listinfo/full-disclosure _______________________________________________ Full-Disclosure - We believe in it. Full-Disclosure () lists netsys com http://lists.netsys.com/mailman/listinfo/full-disclosure
Current thread:
- Counseling not to use Windows (was Re: Ano, (continued)
- Counseling not to use Windows (was Re: Ano Ron DuFresne (Jul 14)
- Counseling not to use Windows (was Re: Ano Chris L. Mason (Jul 15)
- Counseling not to use Windows (was Re: Ano David F. Skoll (Jul 15)
- w32.frethem.k@mm and good reading Mark J. Walborn (Jul 15)
- security through obsolescence??!@?! KF (Jul 15)
- security through obsolescence??!@?! Charles 'core' Stevenson (Jul 15)
- security through obsolescence??!@?! martin f krafft (Jul 15)
- w32.frethem.k@mm and good reading Ron DuFresne (Jul 15)
- w32.frethem.k@mm and good reading Nathan Fain (Jul 16)
- Anonymous surfing my ass! Ron DuFresne (Jul 14)
- Anonymous surfing my ass! Charles 'core' Stevenson (Jul 14)