lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: zeroboy at arrakis.es (zero)
Subject: Re: Trojan author revealed (was: Re: 
 ProFTPD-1.2.9rc2 remote root exploit)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 16:15 24/10/2003 -0700, mitch_hurrison@...lip.com wrote:

>Now who, on God's green earth, would recognise shellcode from
>an obscure exploit that was published months ago. If they
>didn't have it fresh in memory?

hahahaha


>So I think it's rather obvious either zeroboy, or one of his
>friends is responsible for this trojan. And he has some sort of
>rancune towards GOBBLES. Either that or he
>has a serious hardon for memorising hex opcode buffers.

lol

As Cael said... well just search a bit.. it's not very hard.
Stop blaming ppl ... it just starts stupid flames not needed.

>With regards,
>Mitch

Regards Mitch


www.citfi.org
www.podergeek.com
**********************************
"The further backward you look, the further forward you can see" Winston 
Churchill
"Access is GOD..."

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>

iQA/AwUBP5nEVw0R8jZM93x8EQLQ3QCeLB3Fk/9LMIHXMXkMcoSvjQfFFAgAoKw2
EweEpV434amUbMvZHslaf5iz
=mIG/
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ