lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030921090517.GA6059@sourcefire.com>
From: bmc at snort.org (Brian)
Subject: Snort and SourceFire Compromised

On Sat, Sep 20, 2003 at 10:46:14PM -0700, joeypork@...hmail.com wrote:
> Hey, has anyone else seen this:
> 
> http://www.phrack.nl/phrack62/p62-0x0d.txt
> 
> It looks like the PHC folks are at it again, the above is an article
> on "sneeze", a new script that will generate traffic to trigger on every
> snort rule. 
> 
> Also, appended to the end of the article is the home dirs of everyone
> at Sourcefire/Snort. You can see what is in Marty's directory, etc. Go
> check it out. 

Yes, this was a LONG time ago.  Note that ALL of the date timestamps are 
dashed out.  Gee, I wonder why.  As well as normal incident response,
the entire snort team did a major audit of snort at that time for anything 
injected.

BTW, for those of you wanting the original sneeze, its still available 
online at http://snort.sourceforge.net/sneeze-1.0.tar 

-brian


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ