lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <004901c2fc27$d0973610$0100a8c0@grotedoos>
Date: Sun, 6 Apr 2003 12:32:24 +0200
From: "Berend-Jan Wever" <SkyLined@...p.tudelft.nl>
To: <bugtraq@...urityfocus.com>, <full-disclosure@...ts.netsys.com>,
   <vulndiscuss@...nwatch.org>,
   "Windows NTBugtraq Mailing List" <NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM>
Subject: Seti@...e exploit

I'm only human... here's the attachment. :P

It's a stripped version with the really cool features yanked out, but I'm sure you can code those yourself... You've got to ask yourself a question though: Could there be a remote compromise in the exploit itself ? Script kiddies beware...

Last minute notice:
Seti@...e has finally produced fixed versions, that's why the advisory was released today.
Content of type "text/html" skipped

Download attachment "spaceinvader.tbz2" of type "application/octet-stream" (8359 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ