Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: XSS Worm XSS Security Information Portal (cross-site-scripting-securityxssworm.com)
Date: Mon Nov 19 2007 - 01:43:37 CST
# 0day exploit for Paul Schmehl
# based on information provided by Paul Schmehl
echo pauls > /hack/edu/utdallas.edu/known.addresses
googledump.pl --email-addresses --context-links --referers --extended-links
-keywords "Paul","Schmehl","utdallas.edu", "pauls", "paulsutdallas","
socialgrab.pl --known-address "paulsutdallas.edu" --real-name "Paul
infopull.pl --pgp-search --whois --domaintools --usenet --trackers --irclog
--mirrors --listserv --known-addresses="paulsutdallas.edu"
echo "Paul Schmehl" >> /hack/TO-DO/pauls.at.utdallas.dot.edu
On 11/19/07, Paul Schmehl <paulsutdallas.edu> wrote:
> --On November 19, 2007 3:34:23 AM +0000 worried security
> <worriedsecuritygooglemail.com> wrote:
> > The forth most important rule to becoming a security professional,
> > always use a throw-away e-mail account so it doesn't matter of script
> > kids hi-jack your e-mail account with the next cross-site scripting
> > vulnerablity that gets posted to the public mailing lists.
> You forgot the most important rule of all. Pay no heed to bozos who post
> anonymously and don't even have a job in security. Their advice is
> usually worth just as much as their reputation.
> Paul Schmehl (paulsutdallas.edu)
> Senior Information Security Analyst
> The University of Texas at Dallas
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
Francesco Vaj [CISSP - GIAC]
CSS Security Researcher
aim: XSS Cross Site
XSS Cross Site Scripting Attacks
Web 2.0 Application Security Information Blog (tm) 2007
"Vaj, bella vaj."
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/