lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 11 Feb 2007 07:00:40 +0100
From: "Tyop?" <tyoptyop@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: "0day was the case that they gave me"

On 2/11/07, kcope <kingcope@....net> wrote:
> "Alla pisteua gia sena,
> Alla phantasomouna,
> Nomisa pos magapouses,
> Kai geliomouna.
> Alla pisteua gia sena,
> Alla phantasomouna,
> Nomisa pos magapouses,
>
> Kai geliomouna."
>
> http://www.com-winner.com/0day_was_the_case_that_they_gave_me.pdf
> http://www.com-winner.com/Alla_pisteua.mp3
> http://www.com-winner.com/anothernicesong.mp3
>
> G0 f3tch y0ur Sol10 r00tkitz :)

$ uname -a
SunOS **** 5.9 Generic******* sun4u sparc SUNW,Ultra-Enterprise
$ ./ex.sh

SunOS 5.10/5.11 in.telnetd Remote Exploit by Kingcope kingcope@....net
./sunos <host> <account>
./sunos localhost bin
maya ^-^ ./ex.sh localhost adm

SunOS 5.10/5.11 in.telnetd Remote Exploit by Kingcope kingcope@....net

ALEX ALEX

Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.


SunOS 5.9

login: not working?
Password:
asd
Login incorrect
login: Password:

Login incorrect
login: login: ^C^C^C^C^C^C
login:
login:
login: asd
Password:

^C^C^C
^Z
$

Ok. Someone have a Sol10?

-- 
GUASCONI Vincent
French Student.
http://altmylife.blogspot.com [Fr]

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ