lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0c8601c403a3$310c2a90$7702a8c0@officeeagle>
From: pauls at utdallas.edu (Paul Schmehl)
Subject: Z***ING EMAILS !

----- Original Message ----- 
From: "http-equiv@...ite.com" <1@...ware.com>
To: <full-disclosure@...ts.netsys.com>
Sent: Saturday, March 06, 2004 10:31 AM
Subject: [Full-Disclosure] Z***ING EMAILS !
>
> The seems to be a lot of excitement at the moment regarding .zip
> files and emails. What if the actual .zip file is the email or
> the email is the actual .zip file:
>
> MIME-Version: 1.0
> Content-Type: application/x-zip-compressed
> Content-Transfer-Encoding: binary
> X-Source: 06.03.04 http://www.malware.com
>
> PK...   .   ?.?S?.?.  D      malware.exe?.[L.f.?_
Qk.
> .?..Z#?002
?????..?, ?^U.lQ
>
/\b(Content-Type:\s.*application/x-zip-compressed)/ REJECT We don't allow
zips

Paul Schmehl
pschmehl@...global.net
http://www.utdallas.edu/~pauls/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ