[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200209081311.g88DBJg42766@mailserver4.hushmail.com>
From: isergevsky at hushmail.com (isergevsky@...hmail.com)
Subject: remote kernel exploits?
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello dear community fellows,
There have been many rumours regarding tcp/ip implementation vulnerabilities in both Linux and BSD (Free and Open) operating systems.
One of these days, while updating my underground news by social engineering a script kid, i was able to learn that the underground is in posession of a couple of headers, claimly being part of two exploits for the vulnerabilities above. From those headers and discussions with the kid i learnt the following:
- - the persons that found/coded these go by the name 'Ac1dB1tch3z'
- - are blackhat hackers
- - they hate security groups like ADM/TESO
- - they are formed by at least 3 members: t3kn10n, t3kn0h0e and n0n3
Kids from the hacking/warrez scene are very scared by these guys as some already managed to get their boxes deleted with no further notice. It seems that 'Ac1dB1tch3z' are the 'Delta Force' of the (in)famous PROJECT MAYHEM (as one guy in #phrack@...et stated). I will attach to my e-mail the headers i managed to get.
Sincerely Yours,
Ivan
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com
wl8EARECAB8FAj175wIYHGlzZXJnZXZza3lAaHVzaG1haWwuY29tAAoJEMfRnqqodk8T
y7IAn2zTTbzjhAJyMPB7n1fUIVf6XKWwAJ9nDGQD/zin++dEYnd/S7quUz976Q==
=PTDZ
-----END PGP SIGNATURE-----
Get your free encrypted email at https://www.hushmail.com
Powered by blists - more mailing lists