lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri Mar 31 22:12:27 2006
From: n3td3v at gmail.com (n3td3v)
Subject: Re: RSA HAVE CRACKED PHISHING, NO SERIOUSLY

Is that the same as hacking someones "domain", accepting the Gmail
confirmation to say you're allowed to send from a Gmail account with that
hacked domain, then delete all forensic logs from the hacked domain and then
go back to your Gmail account, where you can continue to send your inflamed
FD comments from as very@...keddomain.com. Figures.

On 3/31/06, php0t <very@...rivate.com> wrote:
>
>  If you kept your word (and didn't post my emails back to the list), it'd
> be better. :)
>
>  -----Original Message-----
> *From:* n3td3v [mailto:n3td3v@...il.com]
> *Sent:* Friday, March 31, 2006 10:47 PM
> *To:* php0t; full-disclosure@...ts.grok.org.uk
> *Subject:* Re: [Full-disclosure] Re: RSA HAVE CRACKED PHISHING, NO
> SERIOUSLY
>
> Why don't you just "filter" me like "the experts" have told you to do? Or
> haven't you worked out the technical background architecture of Outlook and
> Thunderbird yet? Figures.
>
> On 3/31/06, php0t <very@...rivate.com> wrote:
> >
> >  For real, please keep your word.
> >
> >
> >  -----Original Message-----
> > *From:* full-disclosure-bounces@...ts.grok.org.uk [mailto:full-disclosure-bounces@...ts.grok.org.uk
> > ] *On Behalf Of *n3td3v
> > *Sent:* Friday, March 31, 2006 9:55 PM
> > *To:* full-disclosure@...ts.grok.org.uk
> > *Subject:* [Full-disclosure] Re: RSA HAVE CRACKED PHISHING, NO SERIOUSLY
> >
> > This is funny as well, http://news.com.com/5208-1029-0.html?forumID=1&threadID=15591&messageID=131539&start=-1&reply=true
> >  I almost choked on my big mac after reading this one, the guy thinks if
> > you take down a site, the phisher's script doesn't deploy another premade
> > site straight away on another host. lol, maybe the RSA have miscalculated
> > the pre plainning and programming of a phishing attack backend before its
> > carried out. I guess they just thought phishing was down to "dumb
> > criminals".
> >
> > On 3/31/06, n3td3v <n3td3v@...il.com> wrote:
> > >
> > >  Check out this article, and I really did spill my hard earned
> > > Starbucks right down my front when I looked at this article:
> > > http://news.com.com/5208-1029-0.html?forumID=1&threadID=15591&messageID=131433&start=-1
> > >
> > >
> >
> >
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060331/b65a72a9/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ