lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.SGI.4.44.0208270423360.184460-101000@hexeris> From: aliver at xexil.com (aliver@...il.com) Subject: Take the trash-talker challenge! oooookkaaaay, Seems there is a vocal clique' of self-important, non-code-posting folks who want to make personal attacks against me. You claim my skills are weak? Let's make it a little more fun an interesting shall we? I posted xxt.c on this list a few days back. Attached is a file which I've encrypted using my utility. If my detractors would like to prove what a silly ass I am then they should feel free to reverse the encrypted message into plaintext. I'll post the key in one week so that any third party can verify any claims to have sucessfully decoded the message. Furthermore, I challenge anyone to write a working exploit which would render a root shell when xxt is SUID root. If you succeed I will: 1. Publically acknowledge your victory. 2. Send you $50. If you don't, then I'll consider you full of shit and you can go on posting garbage like what I've already seen, but your credibility will be even lower than it already is (if that is possible). aliver -------------- next part -------------- A non-text attachment was scrubbed... Name: message.out Type: application/octet-stream Size: 256 bytes Desc: Encrypted message Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20020827/301cd7c8/message.obj
Powered by blists - more mailing lists