lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <GHEFJMBHFOBFAGPPPPDDMEJGEKAA.harshul@ealcatraz.com>
Date: Tue, 5 Aug 2003 09:55:25 -0000
From: "Harshul Nayak \(ealcatraz\)" <harshul@...catraz.com>
To: "Rego Security" <regosec@...uctive.com>, <bugtraq@...urityfocus.com>
Cc: <security-basics@...urityfocus.com>, <incidents@...urityfocus.com>,
   <submissions@...ketstormsecurity.org>, <full-disclosure@...ts.netsys.com>
Subject: RE: (no subject)




The c program is not an exploit code. It's a malicious code.

For x86 architechture:

#include<stdio.h>
main()
{
asm("jmp .");
}

The following is the disassembly of the above code:

Dump of assembler code for function main:
0x8048430 <main>: push   %ebp
0x8048431 <main+1>: mov    %esp,%ebp
0x8048433 <main+3>: jmp    0x8048433 <main+3>
0x8048435 <main+5>: pop    %ebp
0x8048436 <main+6>: ret
0x8048437 <main+7>: nop
0x8048438 <main+8>: nop
0x8048439 <main+9>: nop
0x804843a <main+10>: nop
0x804843b <main+11>: nop
0x804843c <main+12>: nop
0x804843d <main+13>: nop
0x804843e <main+14>: nop
0x804843f <main+15>: nop
End of assembler dump.


0x8048433 <main+3>: jmp    0x8048433 <main+3>
The jmp instruction jumps to its own address, so the process will never end.

(ezhilan)
Copyright © 2002 Sintelli
http://www.sintelli.com

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com]On Behalf Of Rego
Security
Sent: Sunday, August 03, 2003 10:29 PM
To: bugtraq@...urityfocus.com
Cc: security-basics@...urityfocus.com; incidents@...urityfocus.com;
submissions@...ketstormsecurity.org; full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] (no subject)


----------------------------[ REGO
SECURITY ]---------------------------------


Affected systems: Linux (all versions)
Vunerability type: DoS

This vunerability may lead to a system being unstable and lacking of fucking
performance. (no shit!)

"If you want to fuck go fuck a whore"

sit and fuck
& .!.

Thanks,
    Rego Security @ your service


Included is 7350marsapio.c
Compile with gcc -o 7350marsapio 7350marsapio.c
(yeah kiddies we know who you are)

--
__________________________________________________________
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup

CareerBuilder.com has over 400,000 jobs. Be smarter about your job search
http://corp.mail.com/careers


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ