lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200211290615.gAT6Fmmm048646@mailserver2.hushmail.com>
From: es at hush.com (es@...h.com)
Subject: [ElectronicSouls] - Advances in Binary Auditing

-----BEGIN PGP SIGNED MESSAGE-----

Dear List,

Recently we have engaged in indepth conversations with Halvar,
concerning binary auditing techniques.  While he stressed the ease that
IDA Pro allows, we believe that using tools written by others makes one
a scriptkiddie, so as an attempt to seperate ourselves from those kids
who use point-and-click binary auditing tools for windows, we have
written our own tool that works much better.

# cat ESxploiting-alpha.sh
#!/bin/sh
#
# ESxploit
# (C) BrainStorm - ElectronicSouls
#
# Local BufferOverflow testing application.
#
#

clear

echo ""
echo ""
echo "        E l e c t r o n i c - S o u l s "
echo "                E S x p l o i t "
echo " _____________________________________________ "
echo " *** Local BufferOverflow testing application. "
echo " *** (C) BrainStorm [ElectronicSouls] "
echo " _____________________________________________ "
echo ""
echo ""

echo " *** Please enter the path of the binary you want to test:"
echo " *** usage: <path> <binary> - like: /usr/sbin/ blah"
echo ""
echo "";read b0f
echo ""
echo " *** We now check $b0f for a BufferOverflow..."
echo ""

ES=-5000
O=05
while [ $ES -lt 12000 ]
do
echo $ES
ES=`expr $ES + 1`
./ESxploit $ES $b0f

echo " *** Trying next Offset.... "
done

#

Rest easy.

The Electronic Souls Crew
[ElectronicSouls] (c) 2002

"Yickity yickity yack."
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify

wlMEARECABMFAj3nBiIMHGVzQGh1c2guY29tAAoJEN5nGqhGcjlts3UAnRB5SZtZnuVC
cgTn5tDXdkh9GyW5AKCd7vaXv6vdjInxdg+l4MoJBS2EDQ==
=GME3
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2 

Big $$$ to be made with the HushMail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ