lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.SGI.4.44.0208270423360.184460-101000@hexeris>
From: aliver at xexil.com (aliver@...il.com)
Subject: Take the trash-talker challenge!

oooookkaaaay,
	Seems there is a vocal clique' of self-important, non-code-posting
folks who want to make personal attacks against me. You claim my skills
are weak? Let's make it a little more fun an interesting shall we? I
posted xxt.c on this list a few days back. Attached is a file which I've
encrypted using my utility. If my detractors would like to prove what a
silly ass I am then they should feel free to reverse the encrypted message
into plaintext. I'll post the key in one week so that any third party can
verify any claims to have sucessfully decoded the message. Furthermore, I
challenge anyone to write a working exploit which would render a root
shell when xxt is SUID root. If you succeed I will:

1. Publically acknowledge your victory.
2. Send you $50.

If you don't, then I'll consider you full of shit and you can go on
posting garbage like what I've already seen, but your credibility will be
even lower than it already is (if that is possible).

aliver
-------------- next part --------------
A non-text attachment was scrubbed...
Name: message.out
Type: application/octet-stream
Size: 256 bytes
Desc: Encrypted message
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20020827/301cd7c8/message.obj

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ