lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
From: isergevsky at hushmail.com (isergevsky@...hmail.com)
Subject: remote kernel exploits?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello dear community fellows,

There have been many rumours regarding tcp/ip implementation vulnerabilities in both Linux and BSD (Free and Open) operating systems.
One of these days, while updating my underground news by social engineering a script kid, i was able to learn that the underground is in posession of a couple of headers, claimly being part of two exploits for the vulnerabilities above. From those headers and discussions with the kid i learnt the following:

- - the persons that found/coded these go by the name 'Ac1dB1tch3z'
- - are blackhat hackers
- - they hate security groups like ADM/TESO
- - they are formed by at least 3 members: t3kn10n, t3kn0h0e and n0n3

Kids from the hacking/warrez scene are very scared by these guys as some already managed to get their boxes deleted with no further notice. It seems that 'Ac1dB1tch3z' are the 'Delta Force' of the (in)famous PROJECT MAYHEM (as one guy in #phrack@...et stated). I will attach to my e-mail the headers i managed to get.

Sincerely Yours,
Ivan

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wl8EARECAB8FAj175wIYHGlzZXJnZXZza3lAaHVzaG1haWwuY29tAAoJEMfRnqqodk8T
y7IAn2zTTbzjhAJyMPB7n1fUIVf6XKWwAJ9nDGQD/zin++dEYnd/S7quUz976Q==
=PTDZ
-----END PGP SIGNATURE-----




Get your free encrypted email at https://www.hushmail.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ