lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20031130043216.GA39107@rsc.cx>
From: vord at rsc.cx (vordhosbn)
Subject: #hackphreak lecture series

HELLO,

Recently A DEMONSTRATION OF FORMAT STRING AND FRAME POINTER OVERWRITING EXPLOITATION
was given by neonfreon (neonfreon[at]exploit[dot]us) on the UNDERNET IRC network
in #hackphreak. This is the first in a series of lectures [hopefully] and we invite
all from the comp-sec industry to enjoy them. I will continue to post links to
and logs of these lectures as they are completed, and also will keep this list up
to date should anyone care to attend.

attached is the log of the afformentioned lecture which is also accessable via
the following URL: http://vord.rsc.cx/lecture01-neonfreon.log

thank you for for your time.

--
vordhosbn
vord[at]rsc[dot]cx
http://vord.rsc.cx/

=======================================================================
[*] Please avoid sending me Word or PowerPoint attachments.
 |----> See: http://www.fsf.org/philosophy/no-word-attachments.html
 `----> See: http://www.gnu.org/philosophy/kevin-cole-response.html
=======================================================================
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031129/c577faec/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ