[FD] Barracuda Networks Message Archiver 650 - Persistent Input Validation Vulnerability (BNSEC 703)

2014-07-18 Thread Vulnerability Lab
Document Title: === Barracuda Networks Message Archiver 650 - Persistent Input Validation Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=751 https://www.barracuda.com/support/knowledgebase/50160013lXe Barracuda Network

[FD] Microsoft MSN HBE - Blind SQL Injection Vulnerability

2014-07-18 Thread Vulnerability Lab
Document Title: === Microsoft MSN HBE - Blind SQL Injection Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1183 Video: http://www.vulnerability-lab.com/get_content.php?id=1282 Vulnerability Magazine: http://vulnerability-

[FD] KL-001-2014-002 : Microsoft XP SP3 BthPan.sys Arbitrary Write Privilege Escalation

2014-07-18 Thread KoreLogic Disclosures
Title: Microsoft XP SP3 BthPan.sys Arbitrary Write Privilege Escalation Advisory ID: KL-001-2014-002 Publication Date: 2014-07-18 Publication URL: https://www.korelogic.com/Resources/Advisories/KL-001-2014-002.txt 1. Vulnerability Details Affected Vendor: Microsoft Affected Product: B

[FD] KL-001-2014-003 : Microsoft XP SP3 MQAC.sys Arbitrary Write Privilege Escalation

2014-07-18 Thread KoreLogic Disclosures
Title: Microsoft XP SP3 MQAC.sys Arbitrary Write Privilege Escalation Advisory ID: KL-001-2014-003 Publication Date: 2014.07.18 Publication URL: https://www.korelogic.com/Resources/Advisories/KL-001-2014-003.txt 1. Vulnerability Details Affected Vendor: Microsoft Affected Product: MQ

[FD] Strong Security Processes Require Strong Privacy Protections

2014-07-18 Thread coderman
"Strong Security Processes Require Strong Privacy Protections" A request for all security conscious organizations handling vulnerability reports to deploy privacy enhancing technologies. --- With the Snowden disclosures and Google's Project Zero on the minds of security professionals everywhere,

Re: [FD] Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government | PandoDaily

2014-07-18 Thread Liz Gossell
The weak point of Tor has always been exit nodes. Anyone who operates one is going to have access to the comms passing through the node. I’m sure if someone really wanted to eavesdrop Tor traffic they’d just DoS other exit nodes and run a significant number of alternative ones so that users don’

Re: [FD] Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government | PandoDaily

2014-07-18 Thread Olaf Rühenbeck
Hey there, > Funding doubled, so engineering some back doors? I guess what you might be witnessing here is the fact that theres not one "big bad us gov", but multiple partys which might or might not agree on mass survilance and collection. Therefore one party is funding research in anonymization s

Re: [FD] Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government | PandoDaily

2014-07-18 Thread Rikairchy
To my knowledge, TOR could easily be subverted. If you attack all your known exit nodes, you can force your own nodes to have a higher priority due to the relativity low traffic compared to those under attack. You could then tag unencrypted packets and follow them back to the initiating computer.

Re: [FD] Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government | PandoDaily

2014-07-18 Thread Jack Morgan
Also, remember that Tor was developed as a weapon to be used against advanced threats and States of some power, as a way of providing discontents of means of communicating and resisting authority. Its one of those plans that backfired against the US government when it started to be used to avoid it

Re: [FD] Mining website blacklists

2014-07-18 Thread surivaton surivaton
go check the AMCA blacklist of australia from wikileaks: http://wikileaks.org/wiki/Australian_government_secret_ACMA_internet_censorship_blacklist,_18_Mar_2009 be warned 99/100 of those links are child porn. On 7/16/14, Paredes wrote: > Hey, > > It's useful trick to use website black lists to >

Re: [FD] Should it be better ...

2014-07-18 Thread Pablo
Another possible consequence: This 'link-friendly' advisories lets the originator (a person, an institution or a fake of anyone of those) track the individual that routinely click on that links. Maybe just to build a list of people (IP->ISP->Country->Client of the ISP->Your home) interested in

Re: [FD] Jamming WiFi tracking beacons

2014-07-18 Thread Rikairchy
I'm thinking of picking up a few Raspberry Pis, I was wondering if they could be used as a way to track devices that search for wifi (unless this is passive only), and recognise "friendly" devices while notifying an administrator of foreign devices detected. Could this have any real world applicati

Re: [FD] Jamming WiFi tracking beacons

2014-07-18 Thread Eric Rand
R-pi doesn't come with a built-in wifi adapter, so you'll need to get some add-ons to do that--and keeping in mind that there's only one USB controller for all the networking and suchlike, there's a decided limit to the amount of bandwidth that they can handle. Listening for connects is very doabl

Re: [FD] Jamming WiFi tracking beacons

2014-07-18 Thread Rikairchy
I thought the B+ model was four ports, two controllers. I'm not interested in modifying (or even providing) a connection so much as looking for unrecognised devices. I had the idea of using them in a mesh, with only one actually connected to a live network. I thought it might be a way of listening

Re: [FD] Jamming WiFi tracking beacons

2014-07-18 Thread Eric Rand
I hadn't seen the specs on the B+ model yet; mea culpa. I think that the aircrack suite contains most of the functionality you're looking for; seeding other sensors around with a mesh topology might be a little bit of a challenge, but should still be doable. On 07/17/2014 08:05 PM, Rikairchy wrot