lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200207161811.51984.sert@snosoft.com>
From: sert at snosoft.com (John Scimone)
Subject: solaris 9 playpen

I like this idea, if I had more time this week I would volunteer, however, 
when the research goes underway on that overflow please keep the list 
updated, it will be nice to read some useful information on the list for 
once.
G'day.
-sert

Secure Network Operations
www.snosoft.com

On Tuesday 16 July 2002 10:04 pm, Len Rose wrote:
> Who would be interested in access to a sparc machine
> running solaris 9 for exploit testing? I'm thinking
> about allowing access to a few people who would like
> to work on things like examining the buffer overflow in
> solaris 9 rcp :)
>
> Access would be granted on the basis of obtaining full
> and legitimate contact information, phone numbers, etc.
>
> We'd also need IP addresses for firewall filters, etc.
>
> Just thought I'd throw the idea out there.
>
> Contact me off list and I'll collect information..
>
> Len
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Full-Disclosure@...ts.netsys.com
> http://lists.netsys.com/mailman/listinfo/full-disclosure


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ