lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: broyds at rogers.com (Bill Royds)
Subject: Re: Empty emails example

  I was disclosing a possible reconnaissance of compromised hosts. Perhaps
you don't like full disclosure of attacks, only exploits?

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of gabriel
rosenkoetter
Sent: February 29, 2004 3:53 PM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] Re: Empty emails example

On Sat, Feb 28, 2004 at 03:23:47PM -0500, Bill Royds wrote:
> I am still getting a lot of empty emails and noticed a peculiar
similarity.
> All of them use a compromised or open relay home hispeed network
connection
> to bounce the message.

In what way is this disclosure of a system security vulnerability?

There are places for this discussion, but they are not
Full-Disclosure. Please take this elsewhere.

-- 
gabriel rosenkoetter
gr@...ipsed.net


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ