lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030213211936.67343.qmail@web13102.mail.yahoo.com>
From: d4yj4y at yahoo.com (Day Jay)
Subject: Unusual request

Pauli Shore,

I attached 2 html files that you can use to run your
tests. Just access these html files through a web
browser locally and the rest is self-explanatory and
edumacational-even simple people like you will
understand.

For the rest of you jews: be nice to Paul. Just
because he Schmels don't mean he's all that bad.

PS: Paul: try an advanced G00000LE search next time. 

d4yj4y
day to the motherfucking jay

 


--- Paul Schmehl <pauls@...allas.edu> wrote:
> The net is filled with so much junk now, it's
> getting harder to find
> what you need.  I am looking for an exploit that
> will give you "root" on
> an unpatched IIS box by simply typing a string in
> the address line in
> your browser.  I know I've seen it before, but I
> can't seem to find it
> amongst all the vulns for IIS and all the web logs
> that show up when you
> google.
> 
> I need this for a "security roadshow" that we're
> putting together, so I
> can demonstrate how easy it is to break in to an
> unpatched box.  Can
> anybody point me in the right direction?
> 
> I don't want exploit code.  This is just a simple
> string that you enter
> into the URL box in a browser.  It's at least two or
> three years old, I
> know.
> 
> -- 
> Paul Schmehl (pauls@...allas.edu)
> Adjunct Information Security Officer
> The University of Texas at Dallas
> http://www.utdallas.edu/~pauls/
> AVIEN Founding Member
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
http://lists.netsys.com/full-disclosure-charter.html


__________________________________________________
Do you Yahoo!?
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030213/aa647d0d/d4yj4y_iis_cgi.html
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030213/aa647d0d/d4yj4y_iis_malformed.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ