lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3E372FD9.2080203@snosoft.com>
From: dotslash at snosoft.com (KF)
Subject: [Secure Network Operations, Inc.] Full
 Disclosure != Exploit Release

Day Jay wrote:
> First of all, 
> 
> In my humble opinion: SNOSOFT hasn't offered anything
> useful in terms of full disclosure. Where are the
> advisories?

I will be the first to admidt I have not been the best at organising a 
proper advisory repository but there are plenty of them out there...

I was one of those people that assumed bugtraq would not "change" and 
that when it came time for me to place all my work in a nice advisory 
database I could go there an retrieve my information.... because of that 
I did not take the time to make pretty ISS and eEye style 
advisories...and you can not find them on our page but they were made 
available.... SRT2002 should work just fine in any search engine.

Heres a few randomly...

http://cert.uni-stuttgart.de/archive/bugtraq/2002/06/msg00032.html
http://www.opennet.ru/base/sco/988181601_2005.txt.html
http://www.opennet.ru/base/sco/988181601_1997.txt.html
http://www.opennet.ru/base/sco/988181601_1979.txt.html

> I know alot of people are going to love the fact that
> Snosoft stopped trying to release exploits, but I know
> some script kids that are going to be devastated about
> this.

You mean like you and the rest of your buddies? Was it not you that 
mailed me a few days ago because we took the httpd offline and you could 
not get a copy of iosmash.c. You seemed to value our resources at that 
point in time...

->Return-Path: <d4yj4y@...oo.com>
->Date: Mon, 13 Jan 2003 11:36:51 -0800 (PST)
->From: Day Jay <d4yj4y@...oo.com>
->Subject: Re: [Full-Disclosure] Re: Gary Coleman Works for
->Globalintersec!
->To: KF <dotslash@...soft.com>

->looking for the freebsd exploit on the syskey...
->Also, checking to see if any new exploits were posted
->on the site....

kinda ironic I think...

> But at least, Snosoft can now call themselves
> Blackhats. Wohoo, another blackhat added to the list.
> PHC up, hoes down.

Better scratch that out... hats do not fit very well on my afro.

-KF



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ