lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon Sep 12 17:49:52 2005
From: xploitable at gmail.com (n3td3v)
Subject: Automated mass abuse of form mailers

The VXer on the project I speak of doesn't require that the user reads
the message, however for added exploit code, this would be useful that
the mail is opened.

The likeliness of the mail being opened from a sender as
"NO-REPLY@...L-KNOWN-TV-OR-NEWS-PAPER-NETWORK.COM is strong.

The Yahoo thing -did- bypass filters, however, it doesn't matter where
the data goes. The VXer (evil hacker) just wants to slow down the
*Branded network* and internet backbones.

The result the VXer is after isn't that of disruption to individual
inboxes, as specified in Yahoo's case. VXers in this case, would be
targeting the wider affect on e-communications.

The ideal for the VXer would be to cause a delay/ denial [of service]
to many networks and users. A major slow down in e-communications
however would be the most realistic affect from such an attack, than a
[denial].

International hackers have been working on this since 2004.

Cyber security peoples should be reading this and not taking it as a
funny, but looking at the real possibilities posed by determined
Vxers, hackers, variant authors to slow down back bone carrriers, by
sending unsolicited bytes of data from zombified machines.

# End
-- 
http://www.geocities.com/n3td3v

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ