lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <af2a70080802081803x7c8e8222pc51c01e4314cc1b@mail.gmail.com> Date: Fri, 8 Feb 2008 19:03:11 -0700 From: "Open Phugu" <openphugu@...il.com> To: BugTraq <bugtraq@...urityfocus.com> Subject: Some interesting hashes OpenBSD 4.1 sshd remote root exploit (on the default install!): SHA1(screwtheo.tar)=ad1bc1f05afa2cc3ccadb18fabb985394c02ce8d MD5(screwtheo.tar)= cee67df76eaa0706e666cd5c0b8b711c OpenSSH exploit for linux SHA1(screwtheo_linux.tar)=cb6816de43df87193050a497a83cd8f7ab721fbd MD5(screwtheo_linux.tar)=8d65c90d40975556b199a3e1028a5a51