lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BAY2-F110LfgzBscdTf00003e0b@hotmail.com>
From: democow8086 at hotmail.com (democow ....)
Subject: Bogus Viral Test - NO HARMFULL CONTENT

i like your style, i like your e-mail address and i like you.. sometimes i 
feel so paralyzed with humor i need a reality check and this my friend was 
it.. not one file/virus name matched any of hotmails junk mail signatures.. 
i assumed that the new! ones would get by but.. the rest :( i am humbled
/*
Failure to obtain
permission from exploitlabs.com to recreate such a test will be prossecuted
to the full extent of the law
*/

i think that means you

-democow

>From: "morning_wood" <se_cur_ity@...mail.com>
>To: <full-disclosure@...ts.netsys.com>
>Subject: [Full-Disclosure] Bogus Viral Test - NO HARMFULL CONTENT
>Date: Fri, 30 May 2003 19:09:56 -0700
>
>======================================
>This is an exploitlabs.com false positive email agent test
>======================================
>BEGIN
>--------------
>Win32.Palyh.A (New!)
>Win32.Fizzer (New!)
>Win32/SQLSlammer.Worm
>Win32.Sobig
>Win32.Lirva.A
>Win32.Yaha.K
>Win32.Bugbear  (Also known as Win32/Bugbear.Worm, WORM_NATOSTA.A,
>Worm/Tanatos, Win32.Bugbear.A@mm, Win32/Bugbear.A, )
>Win32.Klez.H  (Also known as Win32/Klez.H.Worm, WORM_KLEZ.G and
>Win32.Klez.H@mm)
>JDBGMGR.EXE Hoax
>Win32.Nimda.A   (Also known as W32/Nimda@MM)
>Win32.Nimda.E  (also known as Win32.Nimda.C Worm)
>Win32.Magistr.29188   (Also known as W32/Magistr.B, Win32.Magistr.B@mm and
>I-Worm Magistr.b)
>Win32.Sircam.137216
>Win32.Hybris
>Win32.Auric.A (Also known as Win32/Auric.A.Worm)
>Win32.Holar.F (Also known as Win32/Holar.F.Worm, W32/Holar.h@MM (McAFee))
>Win32.Naco.B (Also known as W32/Meldrood.B@mm (F-Secure), Win32/Naco.Worm,
>I-Worm.Nocana.b (Kaspersky))
>Win32.Fibot.022 (Also known as Backdoor.IRC.Bot (Symantec),
>Win32/IRCBot.26624.Trojan)
>Win32.Lovgate.L (Also known as W32.HLLW.Lovgate.I@mm (Symantec),
>W32/Lovgate.I@M (McAFee), Win32/LovGate.L.Worm)
>Win32.Melare.Worm (Also known as W32.Ahlem.A@mm (Symantec), I-Worm.Melare
>(Kaspersky), Win32/Melare.Worm, W32/Melare@MM (McAfee))
>Win32.Thaprog (Also known as W32/Gant.b@MM (McAfee), W32.HLLW.Redist@mm
>(Symantec), Win32/Thaprog.Worm)
>Win32.Cult.H (Also known as Win32/Cult.C1.Worm, W32/Cult.worm.gen (McAfee),
>W32.HLLW.Cult.C@mm (Symantec))
>Win32.Sobig.B (Also known as W32.HLLW.Mankx@mm (Symantec), I-Worm.Palyh
>(Kaspersky) , Win32.Palyh.A, WORM_PALYH.A (Trend), Win32/Palyh.A.Worm ,
>W32/Palyh@MM (McAfee), I-Worm.Sobig.b (Kaspersky), Win32/Sobig.B.Worm,
>W32/Sobig.b@MM (McAfee), W32.SoBig.B@mm (Symantec))
>Win32.Lovgate.I (Also known as W32.HLLW.Lovgate.H@mm (Symantec),
>I-Worm.LovGate.F (Kaspersky))
>----------
>END
>
>
>
>
>This was a text only message  with NAMES only.
>
>This test is a idea and concept by Donnie Werner of exploitlabs.com to test
>the false positive reporting of current email AV agents. This test, and its
>proceedures are the exclusive property of Donnie Werner and exploitlabs.com
>and may not be used without express writen consent. Failure to obtain
>permission from exploitlabs.com to recreate such a test will be prossecuted
>to the full extent of the law as provided by the governing country of  the
>originating attempted test, the users ISP and DNS providers.
>
>Donnie Werner
>exploitlabs.com
>
>
>"Chew on that Nick -n- ms Jimi"
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.netsys.com/full-disclosure-charter.html

_________________________________________________________________
The new MSN 8: smart spam protection and 2 months FREE*  
http://join.msn.com/?page=features/junkmail


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ