lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: theblackfist at hushmail.com (theblackfist@...hmail.com)
Subject: Ac1d, B1tch3z, and Hype: WhiteHats Among Us: Volume I   - a Black Paper

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[ Ac1d, B1tch3z, and Hype: WhiteHats Among Us: Volume I ]---------------
[ Author: The Drugged Prophet ]-----------------------------------------

"I stay high to separate truth from lie."

THE TRUTH IS OUR WEAPON OF CHOICE.

There is an emerging blackhat movement with motivation to destroy the
security industry completely and totally. However, many of the uprising
hackers/groups are merely using the blackhat idealogy as a conduit to
further their status among peers and/or gain respect. Posers have
flourished; they must now be destroyed.

THIS IS THE TRUTH.
OPEN YOU EYES.
OPEN YOUR MIND.

There has been a steadily growing rumor of a multiple OS, remote TCP/IP
stack exploit authored by a group of individuals named: Ac1dB1tch3z.
Many security enthusiasts have accepted this myth as truth. However,
what is self-proclaimed as truth should never be so readily accepted.
This supposed exploit, the embodiment of what every hacker yearns for,
is a lie. It is being used as a ploy and gimmick by a team of
self-proclaimed blackhats to gain almost instantaneous recognition and
fame amongst their peers. Many are cowering in fear because their
networks have been hacked. It seems curious that so many are so willing
to accept this exploit as the only possible means of intrusion onto
their systems. This exploit is non-existent. The hype generated behind
this scheme is mostly from the poser group known as Phrack High Council
(PHC). Many individuals active in this collective are still whitehats,
though proclaiming otherwise to gain or retain their status in the
hacker scene. Many are claiming to have been attacked by Ac1dB1tch3z,
or are claiming to have seen first-hand evidence of the fictitious
exploit's existence. These are lies.

THINK FOR YOURSELF.
LISTEN TO YOURSELF.
USE LOGIC.

The person that initially conceived the Ac1dB1tch3z lie will remain
anonymous due to our uncertainty of his allegiance. However, he
is the primary force driving this lie into mainstream communication
channels and is the main courier for their reputation of possessing
the ability to hack supposedly secure systems via kernel exploitation.
We know the truth; it is our weapon.

LIES, LIES EVERYWHERE, AND NOT A DROP OF TRUTH TO DRINK.

The following list is neither complete nor authoritative and will
be regularly altered.

- ------------------------------------------------------------------------

THE NEVERENDING LIST OF POSERS:

drater
jimjones
m4t
shiftee
anakata
d1m
nwonknu
halfdead

- ------------------------------------------------------------------------

MOTIV8ION:

drater - GOBBLES, need I say more?
jimjones - Qualys, GOBBLES buttslut, sheep.
m4t - no skill, just suqz diq to gain acceptance from peers.
shiftee - sheep.
anakata - QNX security pioneer. h4h4h4.
d1m - sheep.
nwonknu - GOBBLES buttslut, afraid to lose acceptance from scene.
halfdead - sheep.

- ------------------------------------------------------------------------

SPREAD THE TRUTH.


(c) 2002. Distribute this, unmodified, to every available niche of the
          Internet imaginable.


EOF
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wmEEARECACEFAj2ErAkaHHRoZWJsYWNrZmlzdEBodXNobWFpbC5jb20ACgkQ1BkBAbac
GLwHRQCdGZtCcvXIoZPhCF8RxJd9fAY7gUkAoK9QhQCAG1Cjo2qlGBrFy3Fh6Ook
=9H5a
-----END PGP SIGNATURE-----




Get your free encrypted email at https://www.hushmail.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ