lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 3 Aug 2008 22:36:09 +0100
From: n3td3v <xploitable@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Media backlash begins against HD Moore and
	I)ruid

On Sun, Aug 3, 2008 at 9:43 PM, solemn <sohlow@...il.com> wrote:
> lol. i <3s u, n3td3v.
>

Yes, they are both a bunch of fucking faggots.

He is an elite haxor after all, why would he leave the DNS for his own
company vulnerable, or did he over look something so obvious to check
before releasing the exploit to the wild, or is he not as elite as he
makes out to be and actually didn't think to check DNS infrastructure
linked to his company.

The faggot tried to say nothing at his company was compromsied so he
has nothing to be blamed for, no HD Moore was a fucking faggot who
should have checked out AT&T wasn't vulnerable.

He has no excuse for what happened, he is a global international
hacker leading the release of the exploit code, its his entire
responsibility to make sure his company is secure, even if the servers
that were vulnerable were owned by AT&T.

The AT&T servers are still on his watch, because he is responsible for
the global international release of the exploit code.

So if HD Moore thinks he's off the hook for his company's website
getting hacked via AT&T, think again, you were hacked HD Moore and its
all your fucking fault.

Fucking lamer. Don't go talking shit on your blog that it had
absolutely nothing to do with you, every single server on the internet
that gets compromised because of your irresponsible showing off by
releasing the exploit code when asked not to is all your fucking
fault.

Look, mommy and daddy I built a sandcastle, come look at what I built!
Thats the fucking mentality you had when you released the exploit code
without the permission of the security industry you fat American
Austin Texas fuckhead.

All the best,

n3td3v

> On Sat, Jul 26, 2008 at 1:19 PM, n3td3v <xploitable@...il.com> wrote:
>> Joel Hruska from Ars Technica has said HD Moore and I)ruid are
>> "enterprising little children".
>>
>>
>> New DNS exploit now in the wild and having a blast
>> http://arstechnica.com/news.ars/post/20080726-new-dns-exploit-now-in-the-wild-and-having-a-blast.html
>>
>>
>> All the best,
>>
>> n3td3v
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ