lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030109073631.19198.qmail@web14708.mail.yahoo.com>
From: anoncoder at yahoo.com (Jack Ahz)
Subject: Re: Gary Coleman Works for Globalintersec!

> ...if you are going to harass me at least harass me about SNOSOFT...

Thank you kindly, sir. I don't mind if I do! But we'll save that for another
post.

> http://www.globalintersec.com/staff.html

Let's look at that... If you knew how to read English, you would see that the
only explicit profiles exist for the Board of Directors. None of the
consultants are listed.

> Second in regards to your comments on
> http://www.globalintersec.com/adv/sudo-2002041701.txt 
> what part of that advisory jives with hudo?
> http://packetstormsecurity.org/0211-exploits/hudo.c

Uhh.... it's the same prompt expansion bug.

>  > Even Mr. FC could have crafted up an exploit in less than 8 months IF 
>  > THAT WERE THE CASE.
> If I remember fc did create an exploit... I think I saw a log of it on 
> being exploited eurocompton or something.... maybe I am wrong though. 
> something like fc.angelfire.com I forget maybe it was geocities...

That was my intimation. I know that fc did create an exploit, and it took him a
very long time!

> What will all stop? You will stop being harassing me if I stop what? I 
> had NOTHING to do with the golobalintersec sudo or ssh advisories...

You now have the option to repent of your sins and be electrocuted on the
premises.

> Well since I am such a fraud I will contribute yet another fake exploit 
> with fake gdb output and fake results... maybe you guys can go through 
> the code to HPUX ftpd and point out how this is not exploitable...I 
> wouldn't know I have never seen it.
> 
> This could have something to do with 
> http://files.ruca.ua.ac.be/pub/depot/sw11/PHNE_20714.text
> 
> But then again... I could be a fraud.
> 
> -KF


Yeah, all I needed to see was the reference to ioctl() in that piece of code to
know that you aren't capable of writing it!

Yours truly,
Jack

__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ