[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: Re: [Full-disclosure] Full-Disclosure Digest, Vol 76, Issue 48
From: t0hitsugu <tohitsugu () gmail ! com>
Date: 2011-06-26 11:53:40
Message-ID: BANLkTikuOhSN6JJOv3hfNfyxeND8GiSfiw () mail ! gmail ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
Itd be pretty funny if it ended up that they were the ones who made these XD
------------------
>
> Message: 3
> Date: Sun, 26 Jun 2011 02:18:37 -0400
> From: Nathan Whitmore <nathanww@gmail.com>
> Subject: [Full-disclosure] LulzCheck--a tool for checking account
> security
> To: full-disclosure@lists.grok.org.uk
> Message-ID: <BANLkTi=c1rSOPi0p40Fn9oux2HW2oA0FqQ@mail.gmail.com>
> Content-Type: text/plain; charset="windows-1252"
>
> So, apparently LulzSec is over and done with. Even so, they?ve left a lot
> behind, in the form of more than 100,000 compromised passwords. Cearly,
this
> is still potentially a problem, especially considering password reuse.
>
> LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you
log
> into a website, it checks the username that you supply against an updated
> list of accounts that have been ?leaked? by LulzSec, and gives you a
warning
> if it finds your login in that list.
>
> Keep in mind, if you get a warning message, it *may not actually apply to
> the site that your are logging into. *Because people reuse logins, and the
> ultimate origin of some of the leaked usernames/passwords is unknown, it?s
> not really possible for LulzCheck to automatically pin down exactly what
> accounts you need to change.
>
> *LulzCheck can be downloaded at
http://userscripts.org/scripts/show/105484*
>
> --
> Any technology distinguishable from magic is by definition insufficiently
> advanced
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/f498d7c8/attachment-0001.html
>
> ------------------------------
>
> Message: 4
> Date: Sun, 26 Jun 2011 16:01:23 +0800
> From: Addy Yeow <ayeowch@gmail.com>
> Subject: Re: [Full-disclosure] LulzCheck--a tool for checking account
> security
> To: Nathan Whitmore <nathanww@gmail.com>
> Cc: full-disclosure@lists.grok.org.uk
> Message-ID: <BANLkTinbQ+Bd6AWk_vAJ87PCBqVVBXLhMw@mail.gmail.com>
> Content-Type: text/plain; charset="windows-1252"
>
> You can check searchable list of the leaked accounts at
> http://dazzlepod.com/lulzsec/final/
>
> On Sun, Jun 26, 2011 at 2:18 PM, Nathan Whitmore <nathanww@gmail.com>
wrote:
>
> >
> > So, apparently LulzSec is over and done with. Even so, they?ve left a
lot
> > behind, in the form of more than 100,000 compromised passwords. Cearly,
this
> > is still potentially a problem, especially considering password reuse.
> >
> > LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you
log
> > into a website, it checks the username that you supply against an
updated
> > list of accounts that have been ?leaked? by LulzSec, and gives you a
warning
> > if it finds your login in that list.
> >
> > Keep in mind, if you get a warning message, it *may not actually apply
to
> > the site that your are logging into. *Because people reuse logins, and
the
> > ultimate origin of some of the leaked usernames/passwords is unknown,
it?s
> > not really possible for LulzCheck to automatically pin down exactly what
> > accounts you need to change.
> >
> > *LulzCheck can be downloaded at
http://userscripts.org/scripts/show/105484
> > *
> >
> > --
> > Any technology distinguishable from magic is by definition
insufficiently
> > advanced
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
>
>
>
> --
> http://www.dazzlepod.com . http://twitter.com/dazzlepod
> We write elegant and minimal apps that works. We develop web apps with
> Django framework.
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/9f870ecb/attachment-0001.html
>
> ------------------------------
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
> End of Full-Disclosure Digest, Vol 76, Issue 48
> ***********************************************
[Attachment #5 (text/html)]
<p>Itd be pretty funny if it ended up that they were the ones who made these XD </p>
<p>------------------<br>
><br>
> Message: 3<br>
> Date: Sun, 26 Jun 2011 02:18:37 -0400<br>
> From: Nathan Whitmore <<a \
href="mailto:nathanww@gmail.com">nathanww@gmail.com</a>><br> > Subject: [Full-disclosure] \
LulzCheck--a tool for checking account<br> > security<br>
> To: <a href="mailto:full-disclosure@lists.grok.org.uk">full-disclosure@lists.grok.org.uk</a><br>
> Message-ID: <BANLkTi=<a \
href="mailto:c1rSOPi0p40Fn9oux2HW2oA0FqQ@mail.gmail.com">c1rSOPi0p40Fn9oux2HW2oA0FqQ@mail.gmail.com</a>><br>
> Content-Type: text/plain; charset="windows-1252"<br>
><br>
> So, apparently LulzSec is over and done with. Even so, they?ve left a lot<br>
> behind, in the form of more than 100,000 compromised passwords. Cearly, this<br>
> is still potentially a problem, especially considering password reuse.<br>
><br>
> LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you log<br>
> into a website, it checks the username that you supply against an updated<br>
> list of accounts that have been ?leaked? by LulzSec, and gives you a warning<br>
> if it finds your login in that list.<br>
><br>
> Keep in mind, if you get a warning message, it *may not actually apply to<br>
> the site that your are logging into. *Because people reuse logins, and the<br>
> ultimate origin of some of the leaked usernames/passwords is unknown, it?s<br>
> not really possible for LulzCheck to automatically pin down exactly what<br>
> accounts you need to change.<br>
><br>
> *LulzCheck can be downloaded at <a \
href="http://userscripts.org/scripts/show/105484*">http://userscripts.org/scripts/show/105484*</a><br>
><br>
> --<br>
> Any technology distinguishable from magic is by definition insufficiently<br>
> advanced<br>
> -------------- next part --------------<br>
> An HTML attachment was scrubbed...<br>
> URL: <a href="http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/f498d \
7c8/attachment-0001.html">http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/f498d7c8/attachment-0001.html</a><br>
><br>
> ------------------------------<br>
><br>
> Message: 4<br>
> Date: Sun, 26 Jun 2011 16:01:23 +0800<br>
> From: Addy Yeow <<a href="mailto:ayeowch@gmail.com">ayeowch@gmail.com</a>><br>
> Subject: Re: [Full-disclosure] LulzCheck--a tool for checking account<br>
> security<br>
> To: Nathan Whitmore <<a href="mailto:nathanww@gmail.com">nathanww@gmail.com</a>><br>
> Cc: <a href="mailto:full-disclosure@lists.grok.org.uk">full-disclosure@lists.grok.org.uk</a><br>
> Message-ID: <<a \
href="mailto:BANLkTinbQ%2BBd6AWk_vAJ87PCBqVVBXLhMw@mail.gmail.com">BANLkTinbQ+Bd6AWk_vAJ87PCBqVVBXLhMw@mail.gmail.com</a>><br>
> Content-Type: text/plain; charset="windows-1252"<br>
><br>
> You can check searchable list of the leaked accounts at<br>
> <a href="http://dazzlepod.com/lulzsec/final/">http://dazzlepod.com/lulzsec/final/</a><br>
><br>
> On Sun, Jun 26, 2011 at 2:18 PM, Nathan Whitmore <<a \
href="mailto:nathanww@gmail.com">nathanww@gmail.com</a>> wrote:<br> ><br>
> ><br>
> > So, apparently LulzSec is over and done with. Even so, they?ve left a lot<br>
> > behind, in the form of more than 100,000 compromised passwords. Cearly, this<br>
> > is still potentially a problem, especially considering password reuse.<br>
> ><br>
> > LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you log<br>
> > into a website, it checks the username that you supply against an updated<br>
> > list of accounts that have been ?leaked? by LulzSec, and gives you a warning<br>
> > if it finds your login in that list.<br>
> ><br>
> > Keep in mind, if you get a warning message, it *may not actually apply to<br>
> > the site that your are logging into. *Because people reuse logins, and the<br>
> > ultimate origin of some of the leaked usernames/passwords is unknown, it?s<br>
> > not really possible for LulzCheck to automatically pin down exactly what<br>
> > accounts you need to change.<br>
> ><br>
> > *LulzCheck can be downloaded at <a \
href="http://userscripts.org/scripts/show/105484">http://userscripts.org/scripts/show/105484</a><br>
> > *<br>
> ><br>
> > --<br>
> > Any technology distinguishable from magic is by definition insufficiently<br>
> > advanced<br>
> ><br>
> > _______________________________________________<br>
> > Full-Disclosure - We believe in it.<br>
> > Charter: <a \
href="http://lists.grok.org.uk/full-disclosure-charter.html">http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
> > Hosted and sponsored by Secunia - <a \
href="http://secunia.com/">http://secunia.com/</a><br> > ><br>
><br>
><br>
><br>
> --<br>
> <a href="http://www.dazzlepod.com">http://www.dazzlepod.com</a> . <a \
href="http://twitter.com/dazzlepod">http://twitter.com/dazzlepod</a><br> > We write elegant \
and minimal apps that works. We develop web apps with<br> > Django framework.<br>
> -------------- next part --------------<br>
> An HTML attachment was scrubbed...<br>
> URL: <a href="http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/9f870 \
ecb/attachment-0001.html">http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/9f870ecb/attachment-0001.html</a><br>
><br>
> ------------------------------<br>
><br>
> _______________________________________________<br>
> Full-Disclosure - We believe in it.<br>
> Charter: <a href="http://lists.grok.org.uk/full-disclosure-charter.html">http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
> Hosted and sponsored by Secunia - <a \
href="http://secunia.com/">http://secunia.com/</a><br> ><br>
> End of Full-Disclosure Digest, Vol 76, Issue 48<br>
> ***********************************************<br>
</p>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic