lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <004901c2fc27$d0973610$0100a8c0@grotedoos>
From: SkyLined at edup.tudelft.nl (Berend-Jan Wever)
Subject: Seti@...e exploit

I'm only human... here's the attachment. :P

It's a stripped version with the really cool features yanked out, but I'm sure you can code those yourself... You've got to ask yourself a question though: Could there be a remote compromise in the exploit itself ? Script kiddies beware...

Last minute notice:
Seti@...e has finally produced fixed versions, that's why the advisory was released today.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030406/f6242ad6/attachment.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: spaceinvader.tbz2
Type: application/octet-stream
Size: 8359 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030406/f6242ad6/spaceinvader.obj

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ