lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BAY2-F124sJ3Ih7jtrS00008ade@hotmail.com> From: benjaminlmatlock at hotmail.com (Ben Matlock) Subject: modifying shadowchode exploit I took a look at the output of the released Cisco exploit and added 2 lines to make it generate random payload. More could be done. Ben _________________________________________________________________ The new MSN 8: advanced junk mail protection and 2 months FREE* http://join.msn.com/?page=features/junkmail -------------- next part -------------- A non-text attachment was scrubbed... Name: shadowchode.c Type: application/octet-stream Size: 2850 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030719/6bb05532/shadowchode.obj