lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <F225BLSAQV6uPDVniSn000000a6@hotmail.com> From: defender242 at hotmail.com (crap producer) Subject: tradecraft and subversion >I consider myself a non-criminal blackhat You're no blackhat. You're just a programmer out of a few hundreds of thousands. >To my credit I've created some private stock tools to break NFR, Dragon, >and RealSecure NIDS sensors, and also crafted some network >tools to DoS >FW-1 and Cisco routers. Most of those are ancient history, recently I've >had a dramatic skill increase with >cryptographic algorithms and a greatly >enhanced ability with C due to >coding about 20,000 lines in the last 6 >months or so. Private stock? Why tell us then? Show off your outdated skills? >but due to the recent corporate ownership and the loss of Blue Boar, >well, >screw that. Your crap wouldn't make its way to *any* kind of moderated list, not even vuln-dev. Which explains your presence here. >Project "SPAT": Server Protocol Automated Tester. You must be kidding me. You really think exploits for initiator-side bugs are not being written already? And why you want to exploit the bug one time in ten anyway? Why would the client crash? You're not skilled enough to write working exploits yet? >Project "xxtleet" (pronounced "zeetleet"): That crap aint steganography. Its just some gayass uselessly space consuming ascii armoring. And I thought you said your skills in crypto increased dramaticaly. Hell, I can't imagine what it looked like before. _________________________________________________________________ Send and receive Hotmail on your mobile device: http://mobile.msn.com
Powered by blists - more mailing lists