lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat Jan 7 12:07:24 2006 From: infosecbofh at gmail.com (InfoSecBOFH) Subject: Re: WMF round-up, updates and de-mystification uhh huh. Sure its not using sigs.... but it still does not prevent every known/unknown variation of the problem. Gotta love it when the dumb ass pivx employees start to flame using their gmail accounts.... On 1/5/06, Piotr Bania <bania.piotr@...il.com> wrote: > >for what it is worth. I am able to modify versions of the WMF exploit > >and bypass products like that POS pvix crap as well as the current > >available snort sigs... > > First of all, you have no idea what about you are really talking about, > the prevention library mentioned in last mail DOES NOT rely on ANY > signatures.I really advice you to study, before you will talk about > things you really don't understand. > > Anyway, I must confess I'm under impression of yours "bypassing snort > sigs" mad skillz, ph33r. > > EOT > > best regards, > Piotr Bania > > -- > -------------------------------------------------------------------- > Piotr Bania - <bania.piotr@...il.com> - 0xCD, 0x19 > Fingerprint: 413E 51C7 912E 3D4E A62A BFA4 1FF6 689F BE43 AC33 > http://www.piotrbania.com - Key ID: 0xBE43AC33 > -------------------------------------------------------------------- > > - "The more I learn about men, the more I love dogs." >
Powered by blists - more mailing lists