lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <317250854.20040201010251@Sniff-em.com>
From: Thierry at Sniff-em.com (Thierry)
Subject: MyDoom download info

NF>that xxxxx employs people who think
NF>there is integrity in both publicly
NF>distributing viruses

I read F u l l - D i s c l o s u r e
not restricted Disclosure.

I applaud the person who posted the B variant, for me the only chance
to "analyse" that one.

NF> after repackaging them with a "dropper" that makes them not immediately 
NF> detectible.

Let's call this "NAME of File" detection, shall we? It goes like this :
MyDoomA.exe = MyDoomA virus - MyDoomB.exe = MyDoomB virus

Quit the whining and post something productive.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ