lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <021601c2f237$2f3a05d0$1500000a@scientech.com.ve>
Date: Mon, 24 Mar 2003 14:57:13 -0400
From: Rafael Nuñez <rnunez@...entech.com.ve>
To: <bugtraq@...urityfocus.com>, <vulnwatch@...nwatch.org>
Subject: WebDav Exploit ffs

I've been receiving a bunch of emails concerning if the exploit that I sent
to the list (iis_txt.c ) was focus on WebDav Vuln.. Of course Not (was a
totally different one, based on the old *.asp like iistart.asp).  If David
Litchfield read the 1st one he prolly cried.

Regarding this I'm sending the WebDav exploit tested 100% by me

Best Regards

Note: don't ask for the binary one.. Please compile yourself.

-----------------------------------------------------
Rafael Núñez
Senior Research Scientist
Latin American Security & Intelligence Operations
Scientech de Venezuela
-----------------------------------------------------
[w] http://www.scientech.com.ve
[e] rnunez@...entech.com.ve
----------------------------------------------------
Tlf.:(58-212) 952.42.66
Fax:(58-212) 951.36.35
----------------------------------------------------

Download attachment "wbr.c" of type "application/octet-stream" (9314 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ