[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030129035152.64366.qmail@web13115.mail.yahoo.com>
From: d4yj4y at yahoo.com (Day Jay)
Subject: [Secure Network Operations, Inc.] Full Disclosure != Exploit Release
ok,
do you honestly think that I didn't have a copy of
that already? Like I don't know how to search google?
Hmmmm, ok, yeah, I'm so lame I need to send you an
e-mail to get an exploit for something that was
released like months ago. I think you may be
lost...hmmm, you may be a victim of social
engineering, I recommend checking your machine for
viruses/worms/trojans.
Anyway, let it be known that you stopped releasing
exploits because of the darkside looming over your
shoulders. Just admit it.
By they way, in terms of talent-> EEYE blows Snosoft
out of the water with a blink of an eeye.
Dude, just close SNOW and become an independant
consultant. Don't act like some big security company,
like some big player in the game.
->To: KF <dotslash@...soft.com>
->looking for the freebsd exploit on the syskey...
->Also, checking to see if any new exploits were
posted
->on the site....
kinda ironic I think...
> But at least, Snosoft can now call themselves
> Blackhats. Wohoo, another blackhat added to the
list.
> PHC up, hoes down.
Better scratch that out... hats do not fit very well
on my afro.
--- KF <dotslash@...soft.com> wrote:
> Day Jay wrote:
> > First of all,
> >
> > In my humble opinion: SNOSOFT hasn't offered
> anything
> > useful in terms of full disclosure. Where are the
> > advisories?
>
> I will be the first to admidt I have not been the
> best at organising a
> proper advisory repository but there are plenty of
> them out there...
>
> I was one of those people that assumed bugtraq would
> not "change" and
> that when it came time for me to place all my work
> in a nice advisory
> database I could go there an retrieve my
> information.... because of that
> I did not take the time to make pretty ISS and eEye
> style
> advisories...and you can not find them on our page
> but they were made
> available.... SRT2002 should work just fine in any
> search engine.
>
> Heres a few randomly...
>
>
http://cert.uni-stuttgart.de/archive/bugtraq/2002/06/msg00032.html
>
http://www.opennet.ru/base/sco/988181601_2005.txt.html
>
http://www.opennet.ru/base/sco/988181601_1997.txt.html
>
http://www.opennet.ru/base/sco/988181601_1979.txt.html
>
> > I know alot of people are going to love the fact
> that
> > Snosoft stopped trying to release exploits, but I
> know
> > some script kids that are going to be devastated
> about
> > this.
>
> You mean like you and the rest of your buddies? Was
> it not you that
> mailed me a few days ago because we took the httpd
> offline and you could
> not get a copy of iosmash.c. You seemed to value our
> resources at that
> point in time...
>
> ->Return-Path: <d4yj4y@...oo.com>
> ->Date: Mon, 13 Jan 2003 11:36:51 -0800 (PST)
> ->From: Day Jay <d4yj4y@...oo.com>
> ->Subject: Re: [Full-Disclosure] Re: Gary Coleman
> Works for
> ->Globalintersec!
> ->To: KF <dotslash@...soft.com>
>
> ->looking for the freebsd exploit on the syskey...
> ->Also, checking to see if any new exploits were
> posted
> ->on the site....
>
> kinda ironic I think...
>
> > But at least, Snosoft can now call themselves
> > Blackhats. Wohoo, another blackhat added to the
> list.
> > PHC up, hoes down.
>
> Better scratch that out... hats do not fit very well
> on my afro.
>
> -KF
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
http://lists.netsys.com/full-disclosure-charter.html
__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com
Powered by blists - more mailing lists