lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200208272044.46030.nc@stormvault.net>
From: nc at stormvault.net (Nicolas Couture)
Subject: Take the trash-talker challenge!

On Tuesday 27 August 2002 07:35 am, aliver@...il.com wrote:
> oooookkaaaay,
> 	Seems there is a vocal clique' of self-important, non-code-posting
> folks who want to make personal attacks against me. You claim my skills
> are weak? Let's make it a little more fun an interesting shall we? I
> posted xxt.c on this list a few days back. Attached is a file which I've
> encrypted using my utility. If my detractors would like to prove what a
> silly ass I am then they should feel free to reverse the encrypted message
> into plaintext. I'll post the key in one week so that any third party can
> verify any claims to have sucessfully decoded the message. Furthermore, I
> challenge anyone to write a working exploit which would render a root
> shell when xxt is SUID root. If you succeed I will:
>
> 1. Publically acknowledge your victory.
> 2. Send you $50.
>
> If you don't, then I'll consider you full of shit and you can go on
> posting garbage like what I've already seen, but your credibility will be
> even lower than it already is (if that is possible).
>
> aliver


Feel free to post xxt.c again as some of us like me probably sent it in the 
trash can.

	--Nicolas

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ