Re: [Full-disclosure] Erratasec Research MD5



priceless!!



On 5/18/07, David Maynor <david.a.maynor@xxxxxxxxx> wrote:
dear lists,

I've noticed a lot of people posting MD5 hashes on other mailing lists such
as DailyDave to prove that they had an idea first. I'd like to lay down a
claim that Robert and I thought up after our talk this weekend at Toorcon
seattle.

d2a027361bc41528c9415ecccdbcb1a7

This MD5 is to prove that I was the first to mention the subject of the
newest Erratasec research: Click-logging.

Let me backtrack a bit... I just got back from Toorcon seattle. It was a lot
of fun. I got to see all sorts of fun people, with badass talks. The best
one of course was mine and Roberts on sniffing wireless traffic. I find it
truly amazing that people in the security space still use wireless at all!
If I'm not sniffing you or sidejacking your google maps request to send you
to the wrong denny's, then I will for sure be using my infamous kernel
exploits on your box. Then send you the screen video capture of it. Think of
it like shooting you in the face, but with wireless. Wireless bullets. If I
wasn't already one of the top influential hackers of 2006, that would be
proof right there.

After we gave our talk, I got to thinking. Robert and I were sitting around
sidejacking and Robert asked me "David, what other old techniques can we
rehash, rebrand and rejuvinate to talk about at the next con?" Then I
thought back to the sweet days of keylogging, and it came to me..
Click-Logging. If someone installs a rootkit or "trojan horse program" on
your system, they can read what you're doing.. but not ALL of what we do is
typed!! Like when I punch the monkey, that's with my mouse. Or whenn I make
web pages in frontpage, that was WITH MY MOUSE! So naturally, we want to
record all mosue strokes into our trojan horse program. We call this
Click-Logging, and it's going to be our next major relase at all the
conferences. That's just a taste. There is a lot more to come.

David Maynor
CTO, ErrataSec
http://www.erratasec.com



_______________________________________________
Full-Disclosure - We believe in it.
Charter:
http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Relevant Pages

  • [Full-disclosure] Erratasec Research MD5
    ... I've noticed a lot of people posting MD5 hashes on other mailing lists such ... claim that Robert and I thought up after our talk this weekend at Toorcon ... newest Erratasec research: Click-logging. ... one of course was mine and Roberts on sniffing wireless traffic. ...
    (Full-Disclosure)
  • Re: App dev on Pocket PC device
    ... >I responded to Robert regarding his suggestion but never heard back from ... I'm working on a response. ... >We're currently using wireless service from Nextel and Verizon ... >> please indicate which newsgroup and message). ...
    (microsoft.public.pocketpc.developer)
  • Re: wireless connection
    ... Robert ... >> allow all wireless connections. ...
    (microsoft.public.windows.server.sbs)
  • Re: App dev on Pocket PC device
    ... I responded to Robert regarding his suggestion but never heard back from ... Upload route/delivery data from and SQLserver into the device wirelessly. ... We're currently using wireless service from Nextel and Verizon ... > please indicate which newsgroup and message). ...
    (microsoft.public.pocketpc.developer)