lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040210143056.B25319@positron.mit.edu>
From: rsw at jfet.org (Riad S. Wahby)
Subject: Re: Re: DoomJuice.A, Mydoom.A source code

Frank Knobbe <frank@...bbe.us> wrote:
> I think what raises concern is that your buddy Ian Martin describes you
> as a "H4x0r gra|\|d3".

A fine blend of friendly needling and liberal application of the
time-honored ever-puerile l33tification process yields 100%
high-quality humor every time.  :-)

> As for the code, have you tried catching the bug with a honeypot? I
> heard of people using netcat listening on port 3127 to catch the bug...

To be honest, I didn't expect this to work, but before I left my
office last night I decided I may as well try it.  To my great
surprise, I came in this morning and found that I had "caught one"
within minutes of opening the port.  Quite im(de?)pressive.

-- 
Riad Wahby
rsw@...t.org
MIT VI-2 M.Eng


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ