lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: putasnews at terra.es (.)
Subject: pipeupadmin

On Fri, 31 Oct 2003 16:31:41 +0100
allan.vanleeuwen@...ngemail.nl wrote:

> Euhm .. I think he was asking for SOURCE code of this very publicly
> available exploit.

does anyone have the source or exe of pipeupadmin/pipeupsam? ... source OR exe
... i only know where is the exe 

have a nice day 

> 
> -----Original Message-----
> From: . [mailto:putasnews@...ra.es] 
> Sent: vrijdag 31 oktober 2003 16:05
> To: full-disclosure@...ts.netsys.com
> Subject: Re: [Full-Disclosure] pipeupadmin
> 
> 
> try on google
> 
> it's easy
> http://content.443.ch/pub/security/blackhat/WinNT%20and%202K/pipeup/W2KPipeU
> p/
> http://www.xillioncomputers.com/modules.php?name=Downloads&d_op=MostPopular
> 
> 
> On Fri, 31 Oct 2003 13:46:38
> +1000r"Ivan Coric" <ivan.coric@...kcoverqld.com.au> wrote:
> 
> > does anyone have the source or exe of pipeupadmin/pipeupsam?
> > 
> > thanks
> > Ivan
> > 
> > 
> > 
> >
> ***************************************************************************
> > Messages included in this e-mail and any of its attachments are those
> > of the author unless specifically stated to represent WorkCover
> Queensland.
> > The contents of this message are to be used for the intended purpose only
> and
> > are to be kept confidential at all times. This message may contain
> privileged
> > information directed only to the intended addressee/s. Accidental receipt
> of
> > this information should be deleted promptly and the sender notified. This
> > e-mail has been scanned by Sophos for known viruses. However, no warranty
> nor
> > liability is implied in this
> >
> respect.********************************************************************
> **
> > 
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> 
> -- 
> ============================
> it's so easy to forget me
> 
> 
> -- 
> ============================
> it's so easy to forget me
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> ===========================================================
> De informatie opgenomen in dit bericht kan vertrouwelijk zijn en is alleen
> bestemd voor de geadresseerde. Indien u dit bericht onterecht ontvangt,
> wordt u verzocht de inhoud niet te gebruiken en de afzender direct te
> informeren door het bericht te retourneren. Hoewel Orange maatregelen heeft
> genomen om virussen in deze email of attachments te voorkomen, dient u ook
> zelf na te gaan of virussen aanwezig zijn aangezien Orange niet
> aansprakelijk is voor computervirussen die veroorzaakt zijn door deze
> email..
> 
> The information contained in this message may be confidential and is
> intended to be only for the addressee. Should you receive this message
> unintentionally, please do not use the contents herein and notify the sender
> immediately by return e-mail. Although Orange has taken steps to ensure that
> this email and attachments are free from any virus, you do need to verify
> the possibility of their existence as Orange can take no responsibility for
> any computer virus which might be transferred by way of this email.
> ===========================================================
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


-- 
============================
it's so easy to forget me


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ