lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <700628997DDD824BB8BC8F0E32DA3F42566045@tareco.sia.pt>
Date: Fri, 3 Oct 2003 16:57:27 +0100
From: Vitor Ventura <vventura@....pt>
To: 'Thor Larholm' <thor@...x.com>,
	Brett Moore <brett.moore@...urity-assessment.com>,
	bugtraq@...urityfocus.com
Subject: RE: Process Killing - Playing with PostThreadMessage


I've done a test with softice to check if the pskill of sysinternals sends
any WM_QUIT to the process that you want to kill, the breakpoint didn't
break so I guess these are two diferent things, with the same objective.

-----Original Message-----
From: Thor Larholm [mailto:thor@...x.com] 
Sent: quinta-feira, 2 de Outubro de 2003 18:39
To: Brett Moore; bugtraq@...urityfocus.com
Subject: Re: Process Killing - Playing with PostThreadMessage


Feel free to correct me if I am wrong, but isn't this also how the PSKill
application from SysInternals work?

http://www.sysinternals.com/ntw2k/freeware/pskill.shtml



Regards
Thor Larholm
PivX Solutions, LLC - Senior Security Researcher


----- Original Message ----- 
From: "Brett Moore" <brett.moore@...urity-assessment.com>
To: <bugtraq@...urityfocus.com>
Sent: Wednesday, October 01, 2003 10:28 PM
Subject: Process Killing - Playing with PostThreadMessage


> ======================================================================
> ===
> = Process Killing - Playing with PostThreadMessage
> =
> = brett.moore@...urity-assessment.com
> = http://www.security-assessment.com
> =
> = Originally posted: October 02, 2003
> =========================================================================
<snip http://msgs.securepoint.com/cgi-bin/get/bugtraq0310/23.html>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ