lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BB057432.16938%adf@code511.com>
From: adf at code511.com (adf--at--Code511.com)
Subject: impending 0day

Please admin rule the list it's getting more and more lam'
I don't think the aim of the list is to replace "firewall for dummies"
books, or I discovered 0d4y'z it's l33t.

Let me know (off list) if I'm wrong , and I'll sign off, but those past 40's
mails are getting under the level of the real FD mailing list and really
useless. Are those posters are sponsered by sf or top "sec sites" to
discredit full disclosure?

Save k's, think before posting,

deepquest
------------
Look I have 0d4yz:
% cp /bin/sh . >       % cc -o usr usr.c >       % set path=(. $path) >
% setenv IFS / >       % rdist
Mar  7 1994  7:17AM


Le 5/06/03 8:54 PM, ??morning_wood?? <se_cur_ity@...mail.com> a ?crit?:

> Do any of you realize how hard it is to investigate a 0day im realasing
> today??? ( hell I discovered it 20 minuts ago )
> 
> 
> DONT FRET YOUL GET 1 OUT OF THE 3 REAL INFO TODAY
> 
> http://exploitlabs.com "saving Full Disclosure'a ass from boredom"
> 
> 
> 



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ