lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 08 Feb 2008 22:23:01 -0500 From: "Joey Mengele" <joey.mengele@...hmail.com> To: <openphugu@...il.com>,<fulldisc@...ll.org> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Some Hashes Dear Openphugu, LOLOLOL. This list is called "full disclosure" not "whine like a fucking dumb faggot about hashes". Go fuck yourself. J "LOL" - Adolf Hitler On Fri, 08 Feb 2008 21:13:12 -0500 Maxim <fulldisc@...ll.org> wrote: >This list is called "full-disclosure", not "hash-disclosure" >posting the hashes is *not* full-disclosure. > >http://www.gossamer-threads.com/lists/fulldisc/full- >disclosure/57864?#57864 > > >On Fri, 2008-02-08 at 18:39 -0700, Open Phugu wrote: >> OpenBSD 4.1 sshd remote root exploit (on the default install!): >> >> SHA1(screwtheo.tar)=ad1bc1f05afa2cc3ccadb18fabb985394c02ce8d >> MD5(screwtheo.tar)= cee67df76eaa0706e666cd5c0b8b711c >> >> OpenSSH exploit for linux >> >SHA1(screwtheo_linux.tar)=cb6816de43df87193050a497a83cd8f7ab721fbd >> MD5(screwtheo_linux.tar)=8d65c90d40975556b199a3e1028a5a51 > > >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.grok.org.uk/full-disclosure-charter.html -- Need cash? Click to get a cash advance. http://tagline.hushmail.com/fc/Ioyw6h4dP5JNxuFBnkTUQ8yfGoCoIkOF9tap8Godjb9zncIVOpQuvu/ >Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists