lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 5 May 2008 13:40:09 -0400
From: "Garrett M. Groff" <groffg@...design.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Re: HD Moore

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

These sorts of emails, while perhaps very accurate, only encourage a
barrage of emails concerning our apparent involvement in a large
governmental conspiracy and/or our "script kiddiness." I think ignoring
such emails from netdev are in order, tempting as they are to respond to.


- ----- Original Message ----- 
From: Nate McFeters 
To: Valdis.Kletnieks@...edu 
Cc: n3td3v ; full-disclosure@...ts.grok.org.uk 
Sent: Monday, May 05, 2008 1:24 PM
Subject: Re: [Full-disclosure] HD Moore


More importantly than any of this is how great it is for vulnerability
research.  Makes it much easier to encode shell code, etc.  Plus the
msfpescan features are bad assery.  Of course, n3td3v has no ideas what
these features are for so he thinks it's a script kiddy tool.

Andrew, you're so predictably boring... is there not something you have
expertise on that you can talk about?

Obviously you're not in the right place on this list.

Nate

 
On 5/5/08, Valdis.Kletnieks@...edu <Valdis.Kletnieks@...edu> wrote: 
On Sun, 04 May 2008 16:27:49 BST, n3td3v said:
> On Fri, May 2, 2008 at 9:32 AM, Nate McFeters <nate.mcfeters@...il.com>
> wrote: 
> > Oh that... Yeah, shame on hd... Maybe he was busy updating metasploit
> > so that real researchers have a great vulnerability development
> > framework, or something else that provided some worth to people.
>
> Maybe he was busy updating Metasploit so that script kids have a great
> vulnerability development framework.
>
> He should stop providing them with a great vulnerability development
> framework.  

There's 2 really great uses for metasploit for white hat security guys:

1) When you're handed a /16 or two during a pen test, and need a quick way
to poke a whole bunch of machines for a vulnerability, it's hard to
roll-your-own
exploit tester as fast as you can chinese-menu one in metasploit.

2) It's a *great* tool for impressing on a PHB just how easy it is to
launch
an exploit for something at one of the unsecured systems he's responsible
for.


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/






- ---------------------------------------------------------------------------
- -----


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.2 (Build 2014) - not licensed for commercial use: www.pgp.com

wj8DBQFIH0YySGIRT5oVahwRAnosAJ4hHPGYV1fW2rVb6BdAv8YTXqfvzgCcCLWE
46UCD/zeo++7hxpDyT2icsM=
=klVh
-----END PGP SIGNATURE-----

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ