[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    Re: [Full-disclosure] Full-Disclosure Digest, Vol 76, Issue 48
From:       t0hitsugu <tohitsugu () gmail ! com>
Date:       2011-06-26 11:53:40
Message-ID: BANLkTikuOhSN6JJOv3hfNfyxeND8GiSfiw () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Itd be pretty funny if it ended up that they were the ones who made these XD


------------------
>
> Message: 3
> Date: Sun, 26 Jun 2011 02:18:37 -0400
> From: Nathan Whitmore <nathanww@gmail.com>
> Subject: [Full-disclosure] LulzCheck--a tool for checking account
>        security
> To: full-disclosure@lists.grok.org.uk
> Message-ID: <BANLkTi=c1rSOPi0p40Fn9oux2HW2oA0FqQ@mail.gmail.com>
> Content-Type: text/plain; charset="windows-1252"
>
> So, apparently LulzSec is  over and done with. Even so, they?ve left a lot
> behind, in the form of more than 100,000 compromised passwords. Cearly,
this
> is still potentially a problem, especially considering password reuse.
>
> LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you
log
> into a website, it checks the username that you supply against an updated
> list of accounts that have been ?leaked? by LulzSec, and gives you a
warning
> if it finds your login in that list.
>
> Keep in mind, if you get a warning message, it *may not actually apply to
> the site that your are logging into. *Because people reuse logins, and the
> ultimate origin of some of the leaked usernames/passwords is unknown, it?s
> not really possible for LulzCheck to automatically pin down exactly what
> accounts you need to change.
>
> *LulzCheck can be downloaded at
http://userscripts.org/scripts/show/105484*
>
> --
> Any technology distinguishable from magic is by definition insufficiently
> advanced
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/f498d7c8/attachment-0001.html
>
> ------------------------------
>
> Message: 4
> Date: Sun, 26 Jun 2011 16:01:23 +0800
> From: Addy Yeow <ayeowch@gmail.com>
> Subject: Re: [Full-disclosure] LulzCheck--a tool for checking account
>        security
> To: Nathan Whitmore <nathanww@gmail.com>
> Cc: full-disclosure@lists.grok.org.uk
> Message-ID: <BANLkTinbQ+Bd6AWk_vAJ87PCBqVVBXLhMw@mail.gmail.com>
> Content-Type: text/plain; charset="windows-1252"
>
> You can check searchable list of the leaked accounts at
> http://dazzlepod.com/lulzsec/final/
>
> On Sun, Jun 26, 2011 at 2:18 PM, Nathan Whitmore <nathanww@gmail.com>
wrote:
>
> >
> > So, apparently LulzSec is  over and done with. Even so, they?ve left a
lot
> > behind, in the form of more than 100,000 compromised passwords. Cearly,
this
> > is still potentially a problem, especially considering password reuse.
> >
> > LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you
log
> > into a website, it checks the username that you supply against an
updated
> > list of accounts that have been ?leaked? by LulzSec, and gives you a
warning
> > if it finds your login in that list.
> >
> > Keep in mind, if you get a warning message, it *may not actually apply
to
> > the site that your are logging into. *Because people reuse logins, and
the
> > ultimate origin of some of the leaked usernames/passwords is unknown,
it?s
> > not really possible for LulzCheck to automatically pin down exactly what
> > accounts you need to change.
> >
> > *LulzCheck can be downloaded at
http://userscripts.org/scripts/show/105484
> > *
> >
> > --
> > Any technology distinguishable from magic is by definition
insufficiently
> > advanced
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
>
>
>
> --
> http://www.dazzlepod.com . http://twitter.com/dazzlepod
> We write elegant and minimal apps that works. We develop web apps with
> Django framework.
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/9f870ecb/attachment-0001.html
>
> ------------------------------
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
> End of Full-Disclosure Digest, Vol 76, Issue 48
> ***********************************************

[Attachment #5 (text/html)]

<p>Itd be pretty funny if it ended up that they were the ones who made these XD </p>
<p>------------------<br>
&gt;<br>
&gt; Message: 3<br>
&gt; Date: Sun, 26 Jun 2011 02:18:37 -0400<br>
&gt; From: Nathan Whitmore &lt;<a \
href="mailto:nathanww@gmail.com">nathanww@gmail.com</a>&gt;<br> &gt; Subject: [Full-disclosure] \
LulzCheck--a tool for checking account<br> &gt;        security<br>
&gt; To: <a href="mailto:full-disclosure@lists.grok.org.uk">full-disclosure@lists.grok.org.uk</a><br>
 &gt; Message-ID: &lt;BANLkTi=<a \
href="mailto:c1rSOPi0p40Fn9oux2HW2oA0FqQ@mail.gmail.com">c1rSOPi0p40Fn9oux2HW2oA0FqQ@mail.gmail.com</a>&gt;<br>
 &gt; Content-Type: text/plain; charset=&quot;windows-1252&quot;<br>
&gt;<br>
&gt; So, apparently LulzSec is  over and done with. Even so, they?ve left a lot<br>
&gt; behind, in the form of more than 100,000 compromised passwords. Cearly, this<br>
&gt; is still potentially a problem, especially considering password reuse.<br>
&gt;<br>
&gt; LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you log<br>
&gt; into a website, it checks the username that you supply against an updated<br>
&gt; list of accounts that have been ?leaked? by LulzSec, and gives you a warning<br>
&gt; if it finds your login in that list.<br>
&gt;<br>
&gt; Keep in mind, if you get a warning message, it *may not actually apply to<br>
&gt; the site that your are logging into. *Because people reuse logins, and the<br>
&gt; ultimate origin of some of the leaked usernames/passwords is unknown, it?s<br>
&gt; not really possible for LulzCheck to automatically pin down exactly what<br>
&gt; accounts you need to change.<br>
&gt;<br>
&gt; *LulzCheck can be downloaded at <a \
href="http://userscripts.org/scripts/show/105484*">http://userscripts.org/scripts/show/105484*</a><br>
 &gt;<br>
&gt; --<br>
&gt; Any technology distinguishable from magic is by definition insufficiently<br>
&gt; advanced<br>
&gt; -------------- next part --------------<br>
&gt; An HTML attachment was scrubbed...<br>
&gt; URL: <a href="http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/f498d \
7c8/attachment-0001.html">http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/f498d7c8/attachment-0001.html</a><br>


&gt;<br>
&gt; ------------------------------<br>
&gt;<br>
&gt; Message: 4<br>
&gt; Date: Sun, 26 Jun 2011 16:01:23 +0800<br>
&gt; From: Addy Yeow &lt;<a href="mailto:ayeowch@gmail.com">ayeowch@gmail.com</a>&gt;<br>
&gt; Subject: Re: [Full-disclosure] LulzCheck--a tool for checking account<br>
&gt;        security<br>
&gt; To: Nathan Whitmore &lt;<a href="mailto:nathanww@gmail.com">nathanww@gmail.com</a>&gt;<br>
&gt; Cc: <a href="mailto:full-disclosure@lists.grok.org.uk">full-disclosure@lists.grok.org.uk</a><br>
 &gt; Message-ID: &lt;<a \
href="mailto:BANLkTinbQ%2BBd6AWk_vAJ87PCBqVVBXLhMw@mail.gmail.com">BANLkTinbQ+Bd6AWk_vAJ87PCBqVVBXLhMw@mail.gmail.com</a>&gt;<br>
 &gt; Content-Type: text/plain; charset=&quot;windows-1252&quot;<br>
&gt;<br>
&gt; You can check searchable list of the leaked accounts at<br>
&gt; <a href="http://dazzlepod.com/lulzsec/final/">http://dazzlepod.com/lulzsec/final/</a><br>
&gt;<br>
&gt; On Sun, Jun 26, 2011 at 2:18 PM, Nathan Whitmore &lt;<a \
href="mailto:nathanww@gmail.com">nathanww@gmail.com</a>&gt; wrote:<br> &gt;<br>
&gt; &gt;<br>
&gt; &gt; So, apparently LulzSec is  over and done with. Even so, they?ve left a lot<br>
&gt; &gt; behind, in the form of more than 100,000 compromised passwords. Cearly, this<br>
&gt; &gt; is still potentially a problem, especially considering password reuse.<br>
&gt; &gt;<br>
&gt; &gt; LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you log<br>
&gt; &gt; into a website, it checks the username that you supply against an updated<br>
&gt; &gt; list of accounts that have been ?leaked? by LulzSec, and gives you a warning<br>
&gt; &gt; if it finds your login in that list.<br>
&gt; &gt;<br>
&gt; &gt; Keep in mind, if you get a warning message, it *may not actually apply to<br>
&gt; &gt; the site that your are logging into. *Because people reuse logins, and the<br>
&gt; &gt; ultimate origin of some of the leaked usernames/passwords is unknown, it?s<br>
&gt; &gt; not really possible for LulzCheck to automatically pin down exactly what<br>
&gt; &gt; accounts you need to change.<br>
&gt; &gt;<br>
&gt; &gt; *LulzCheck can be downloaded at <a \
href="http://userscripts.org/scripts/show/105484">http://userscripts.org/scripts/show/105484</a><br>
 &gt; &gt; *<br>
&gt; &gt;<br>
&gt; &gt; --<br>
&gt; &gt; Any technology distinguishable from magic is by definition insufficiently<br>
&gt; &gt; advanced<br>
&gt; &gt;<br>
&gt; &gt; _______________________________________________<br>
&gt; &gt; Full-Disclosure - We believe in it.<br>
&gt; &gt; Charter: <a \
href="http://lists.grok.org.uk/full-disclosure-charter.html">http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
 &gt; &gt; Hosted and sponsored by Secunia - <a \
href="http://secunia.com/">http://secunia.com/</a><br> &gt; &gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; --<br>
&gt; <a href="http://www.dazzlepod.com">http://www.dazzlepod.com</a> . <a \
href="http://twitter.com/dazzlepod">http://twitter.com/dazzlepod</a><br> &gt; We write elegant \
and minimal apps that works. We develop web apps with<br> &gt; Django framework.<br>
&gt; -------------- next part --------------<br>
&gt; An HTML attachment was scrubbed...<br>
&gt; URL: <a href="http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/9f870 \
ecb/attachment-0001.html">http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20110626/9f870ecb/attachment-0001.html</a><br>


&gt;<br>
&gt; ------------------------------<br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; Full-Disclosure - We believe in it.<br>
&gt; Charter: <a href="http://lists.grok.org.uk/full-disclosure-charter.html">http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
 &gt; Hosted and sponsored by Secunia - <a \
href="http://secunia.com/">http://secunia.com/</a><br> &gt;<br>
&gt; End of Full-Disclosure Digest, Vol 76, Issue 48<br>
&gt; ***********************************************<br>
</p>



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic