lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: harshul at (Harshul Nayak (ealcatraz))
Subject: (no subject)

The c program is not an exploit code. It's a malicious code.

For x86 architechture:

asm("jmp .");

The following is the disassembly of the above code:

Dump of assembler code for function main:
0x8048430 <main>: push   %ebp
0x8048431 <main+1>: mov    %esp,%ebp
0x8048433 <main+3>: jmp    0x8048433 <main+3>
0x8048435 <main+5>: pop    %ebp
0x8048436 <main+6>: ret
0x8048437 <main+7>: nop
0x8048438 <main+8>: nop
0x8048439 <main+9>: nop
0x804843a <main+10>: nop
0x804843b <main+11>: nop
0x804843c <main+12>: nop
0x804843d <main+13>: nop
0x804843e <main+14>: nop
0x804843f <main+15>: nop
End of assembler dump.

0x8048433 <main+3>: jmp    0x8048433 <main+3>
The jmp instruction jumps to its own address, so the process will never end.

Copyright ? 2002 Sintelli

-----Original Message-----
[]On Behalf Of Rego
Sent: Sunday, August 03, 2003 10:29 PM
Subject: [Full-Disclosure] (no subject)

----------------------------[ REGO
SECURITY ]---------------------------------

Affected systems: Linux (all versions)
Vunerability type: DoS

This vunerability may lead to a system being unstable and lacking of fucking
performance. (no shit!)

"If you want to fuck go fuck a whore"

sit and fuck
& .!.

    Rego Security @ your service

Included is 7350marsapio.c
Compile with gcc -o 7350marsapio 7350marsapio.c
(yeah kiddies we know who you are)

Sign-up for your own FREE Personalized E-mail at has over 400,000 jobs. Be smarter about your job search

Powered by blists - more mailing lists