lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1101855926.2318.19.camel@fedora.l33tsecurity.com>
Date: Tue, 30 Nov 2004 18:05:26 -0500
From: John <JohnH@...netops.com>
To: full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com
Subject: [Fwd: RE: Remote Mercury32 Imap exploit]

This message was sent to me off list.

JohnH

Return-Path: <muts@...er.net.il>
Delivered-To: johnh@...netops.com
Received: (qmail 32367 invoked by uid 0); 30 Nov 2004 20:45:22 -0000
X-Original-To: JohnH@...netops.com
Received: from mail.secnetops.com [65.124.23.4] by localhost with POP3
	(fetchmail-6.2.2) for root@...alhost (single-drop); Tue, 30 Nov 2004
	15:45:21 -0500 (EST)
Received: from localhost (localhost [127.0.0.1]) by beast.secnetops.com
	(Postfix) with ESMTP id 6912D4F5CF for <JohnH@...netops.com>; Tue, 30 Nov
	2004 15:44:27 -0500 (EST)
Received: from beast.secnetops.com ([127.0.0.1]) by localhost
	(beast.secnetops.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id
	82497-08 for <JohnH@...netops.com>; Tue, 30 Nov 2004 15:44:18 -0500 (EST)
Received: from balder.inter.net.il (balder.inter.net.il [192.114.186.15])
	by beast.secnetops.com (Postfix) with ESMTP id 01F934F56E for
	<JohnH@...netops.com>; Tue, 30 Nov 2004 15:44:17 -0500 (EST)
Received: from yourpzoi4n8rpr (genie01-214-228.inter.net.il
	[80.230.214.228]) by balder.inter.net.il (Mirapoint Messaging Server MOS
	3.3.7-GR) with ESMTP id DWS06139 (AUTH muts); Tue, 30 Nov 2004 22:42:18
	+0200 (IST)
Message-Id: <200411302042.DWS06139@...der.inter.net.il>
From: "muts" <muts@...er.net.il>
To: "'John'" <JohnH@...netops.com>
Subject: RE: [Full-Disclosure] Remote Mercury32 Imap exploit
Date: Tue, 30 Nov 2004 22:42:15 +0200
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <1101843133.2318.14.camel@...ora.l33tsecurity.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
Thread-Index: AcTXE1258ug/cpQqTxuBuP4L/E1JiQACUR4Q
X-DSPAM-Result: Innocent
X-DSPAM-Confidence: 0.9997
X-DSPAM-Probability: 0.0000
X-DSPAM-Signature: !DSPAM:41acdba2852751676515747!
X-Virus-Scanned: by amavisd-new at secnetops.com
X-Spam-Checker-Version: SpamAssassin 3.0.1 (2004-10-22) on
	beast.secnetops.com
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00 autolearn=ham 
	version=3.0.1
Content-Transfer-Encoding: 7bit

Re John, 

Then you're obviously not a "Whitehat" :)

BUT, your point is taken, and I will not release any more half baked sploits
into the wild.

Cheers, 

Muts

-----Original Message-----
From: John [mailto:JohnH@...netops.com] 
Sent: Tuesday, November 30, 2004 9:32 PM
To: muts
Subject: RE: [Full-Disclosure] Remote Mercury32 Imap exploit

The only point I see is, If you are going to do something you might as
well do it correctly or not do it at all. If you get popular in the
doing so, then so be it.

John

On Tue, 2004-11-30 at 14:06, muts wrote:
> Re Johnh,
> 
> If I'm not mistaken, the point isn't to get a *working exploit* out to the
> public, but more of a proof of concept to point out a vulnerability.
> The only reason to release a *fully* working exploit out to the wild would
> be to get popular amongst the script kiddies. Well done, you're popular
now
> :)
> 
> Muts
> 
>  
> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com
> [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of JohnH
> Sent: Tuesday, November 30, 2004 7:38 AM
> To: full-disclosure@...ts.netsys.com
> Cc: bugtraq@...urityfocus.com
> Subject: [Full-Disclosure] Remote Mercury32 Imap exploit
> 
> Here you go guys. A fully working Remote Mercury32 Imap exploit. This will

> work on any windows OS. 100% universal.
> 
> Only reason I am posting this is because im sick of seeing non working 
> exploits released and WHITEHAT.CO.IL likes to do this.
> 
> Cheers,
> 
> 
> Johnh@...netops.com
> VIST: www.secnetops.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ