lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: dhtml at hush.com (dhtml@...h.com)
Subject: DCOM RPC exploit  (dcom.c)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


From: "Chris Paget" <chrisp@...software.com>
>
> <sarcasm>
>
> I'd just like to thank FlashSky, Benjurry, and H D Moore for releasing
this
> code.  Really guys, sterling job.  Now the skript kiddies and VXers
have got
> virtually no work to do in order to write a worm that exploits this.
>
> </sarcasm>
>
> Personally, I'm tempted to set up my firewall to NAT incoming requests
on port
> 135 to either www.metasploit.com or www.xfocus.org.  I know this is
the
> full-disclosure list, but working exploit code for an issue this huge
is taking
> it a bit far, especially less than 2 weeks after the advisory comes
out.
>
> Cheers, fellas.  When the worm comes out, I'll be thinking of you.
>
> Chris


This shall be taken as the official stance of your employer ngssoftware.com
from whence you post. Otherwise the standard disclaimer would apply.

Or perhaps you are just new there after the spotlight of the "shatter
attack" dimmed down.

-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.3

wkYEARECAAYFAj8jNzIACgkQTAj0ZSCgbx7lWQCgvK1MgnOfrHWI4M2y6Gip5CbhMI8A
oJ33gRJgEcJe4oLFkqYRUfi3n1Wq
=vrfn
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ