lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <405326E1.7030107@immunitysec.com> From: dave at immunitysec.com (Dave Aitel) Subject: Book of unreleased exploits? -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Thanks for your interest in Shellcoders! The book is not simply a listing of new exploits. It does contain new exploits to highlight some of the techniques in the chapters. Specifically, I have a new CDE remote, and Sinan has some kernel exploits in the advanced chapters, and there are 0day "techniques" throughout some of the chapters. There were several goals with this book: 1. Not make it a collection of Phrack papers 2. Not make it confusing to the reader by bouncing between architectures 3. To try to provide a coherent progression from easy to advanced. While we do cover Windows, Solaris, and Tru64 in some detail, the beginner's chapters of the book are written for Linux. We felt that by staying with one, widely available, platform, we could make the book understandable to readers who had not had experience writing exploits previously. This is why we have so many people on the book - each of us is good at presenting some things, and we were able to bounce things off each other. If you're curious about me in particular, I run a mailing list "The Daily Dave" where I post my advisories and comments on information security technology linked off of www.immunitysec.com. I posted two advisories to it yesterday, for example. Thanks, Dave Aitel Immunity, Inc. David Cohen wrote: Coworker is telling me this is some sort of compendium of unreleased exploits. Figuring that the average exploit would take up about 5 pages of printed text, and the book at 650 pages, that would lead me to infer that it has somehwere around 130 new exploits. WTF? What is the point of this other than to force people to buy exploits? Im speculating that this is mostly going to be lame XSS bugs and rewrites of existing exploits. Anyone know for sure? I've never heard of any of these guys, but one of these jokers has to be on this mailing list. David -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFAUybhzOrqAtg8JS8RAm/PAJ94Xq01KRFUOoISeDwWU4PpPos5vACdEhMI b8WncJGfwHcF66O4djWYzYg= =mrVl -----END PGP SIGNATURE-----
Powered by blists - more mailing lists