lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <200211291746.gATHk2qt056708@mailserver3.hushmail.com>
From: es at hush.com (es@...h.com)
Subject: [ElectronicSouls] - Reinventing the Wheel

-----BEGIN PGP SIGNED MESSAGE-----

Dear List,

As many of you have witnessed, we recently published a tool for
bruteforcing (or, as we Immortal Blackhats like to call it, bf'ing --
not to be confused with "butt f ucking") offsets in exploits.  Here's
another way for doing it, if you've only been given binaries for the
exploits, and the machine doesn't have a compiler. :>

# cat run.sh
#!/bin/sh
#
# [ElectronicSouls]
# BruteForce for local exploits
# (C) BrainStorm

clear

echo ""
echo ""
echo "  ((( [ElectronicSouls] ExploitBruteForce )))"
echo ""
echo "Enter the name of the exploit binary (has to be in the same dir) :";read b1n
echo "Exploit Binary : $b1n"
echo ""
echo "You may want to add any syntax:";read stuff
echo "Extra Syntax : $stuff"
echo ""
echo "Initializing brute force mode ..."
echo ""

ES=-5000
O=01

while [ $ES -lt 12000 ]
do
echo $ES
ES=`expr $ES + 1`
./$b1n $ES $stuff
echo " *** KungF00 !!"

done
echo "fear my tekneeq.."

#

The Electronic Souls Crew
[ElectronicSouls] (c) 2002

"Yeah dude, I'm oldschool... my mom bought me a gameboy for Christmas
 when I was nine years old..."

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify

wlMEARECABMFAj3np+sMHGVzQGh1c2guY29tAAoJEN5nGqhGcjltgssAoIvOlWRdcqyw
vrVNAfYaQlw6lEEUAJwMmnByc8hR7e204BCfWGeVyuLVEQ==
=xERM
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2 

Big $$$ to be made with the HushMail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ