lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <734063a30603031852s3c3531d9r80f395fa52baaaa8@mail.gmail.com>
Date: Sat, 4 Mar 2006 04:52:44 +0200
From: "Alexander Hristov" <joffer@...il.com>
To: "ad@...poverflow.com" <ad@...poverflow.com>
Cc: Full Disclosure <full-disclosure@...ts.grok.org.uk>,
	bugtraq@...urityfocus.com
Subject: Re: DSplit - Tiny AV signatures Detector


Clamav detects it and can unrar it with the unrar module

On 3/3/06, ad@...poverflow.com <ad@...poverflow.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> DSplit is the small brother of an old tool known as UKsplitter wich is
> now abandonned, does not work in vmware, fails to run under windows 2003.
>
> DSplit has been coded for persons like me, targeted by AV firms and
> I'm not
> responsible of the bad uses of it, I recall this method is known since
> a long time and it's up to the AV firms to review their detections
> software.
>
> http://heapoverflow.com/dem0s/Dsplit-patching_DFind_on_Symantec_Corporate.htm
> http://getdsplit.class101.org
>
> usual critics , flames, can be directly sent to the Recycle Bin :>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (MingW32)
>
> iQIVAwUBRAiMwa+LRXunxpxfAQKMvxAAyymzCo/aupOnqB6XFC7hK45IrbW8J+LQ
> a3oO/p/AFNMZdFUw8fo22n4N+gEeZd1iqHzYyvpuyfp4w9bvy5MXVE5SC8ZTneuN
> n3Ci6PCQGfF/b6pk+XeyJ1aZsUOjA36TIxSG+g12rERpGLmYNba3NLVUw5P0h9uS
> 6HupomFeRa1Bzf8yKTDOWhbNcaogR93hzeHgaqJoUe4sxJFiSfFZ0uC+yATBLcnB
> oNgTBIUXqpGJGpoO7+F6odgX0pn2w4xX2/xnyWEvKc2Lv9YO8sMhRGh8o6SC/q8p
> KJ+w2PaRPGcAt0PFD3XkSf1N9ntrXpx2bYrQP0DqOiRYNCPmnvBLyKkPeEvERzNc
> e+dCPw3iMC2/t1IB0DAS78ZNC7ORJv+6jc/TZ19IXYHuyfbMMrSWYaw2mJwJp71x
> 7HwGN8b58fBAVrEh7OU8WOhRb4LBNeDISIV44pY32b16rG3MamaYjEFwDs18h+TI
> 2Pjsu5Sygs1WeD1u4gx4QrCO5Pb9H8GRzYYhxauv0YijhapACNQjQE2/IJov3fOa
> uf91+aJWEBViWK/hXPBbyBznYySmDm/qs6aiz9nvUws9IK82AvdXGAAKtK1dN52L
> xjRZI1kS0YrITdyXswXnE/CFL4pHlU//PlTUNnY1WfA4jZ9Wz1OxHsNnsV3BNdNF
> 0Uu/0R6ycOo=
> =Ce/n
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>


--
Best Regards,
Aleksander Hristov < root at securitydot.net > < http://securitydot.net >
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ