lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200304061837.h36IbDs3079279@mailserver2.hushmail.com> From: defaillance at hushmail.com (defaillance@...hmail.com) Subject: Re: IIS 5.0 Webdav Rootkit -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Now what does this "bundle" has to do with a rootkit ? afaik rootkits intercept calls () hide files and process and more... your package is simply a few batch file to automate the process of having nc listening on a port and launching the compiled exploit ! Am i missing something on your post or this is just a way to provide clueless wanna be with some recent exploit ? Mattī -----BEGIN PGP SIGNATURE----- Version: Hush 2.2 (Java) Note: This signature can be verified at https://www.hushtools.com/verify wmAEARECACAFAj6Qc9UZHGRlZmFpbGxhbmNlQGh1c2htYWlsLmNvbQAKCRAAqpYJlh8f xbppAJ4tva/CGRu4IfBAWzWCDJrb9CrtgQCdEme0e5YYq+r7hJuZ3+nwX+T7jTU= =311X -----END PGP SIGNATURE----- Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Big $$$ to be made with the HushMail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427