lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Sea1-DAV20Odutox7ny00001dd7@hotmail.com>
From: jeremiahcornelius at hotmail.com (Jeremiah Cornelius)
Subject: MsBlaster Source?

Subject: [Full-Disclosure] MsBlaster Source?


> Can anyone, who is obviously better at coding then I, verify the rumours
that the following link, is the source to msblaster?
>

This is Xteam's posting of a MSBlaster cleaner - I think.  I don't
read/speak Chinese of any dialect!

Xteam is the source to the immediate antecedent to the dcom.c exploit used
in MSBlaster.  This code was refined, and posted at the illmob site.

Blaster uses the exploit, but adds a transport mechanism and payload.

See my timeline post to this list and MORNING_W00D for details...

-- 
Jeremiah Cornelius, CISSP, CCNA, MCSE
farm9.com Security


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ