lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.58.0404231120320.18999@wotan.suse.de>
From: krahmer at suse.de (Sebastian Krahmer)
Subject: THCIISSLame exploit

On Thu, 22 Apr 2004, Feher Tamas wrote:

> Hello,
> 
> >THC is a hacker group, not a cracker group.
> 
> Publishing root exploit source code is free speech and is protected.
> 
> Publishing the binary is VX-ing and is criminal. That is very clear.
Wheres the V in "exploit"? Its maybe EXing...

> 
> BTW, AV software only alert on binaries. AV firm research labs refuse to 
> investigate malware in source code format, even if you send them a 
> sample of a brand new one.
> 
> To share knowledge with security researchers does not require 
> releasing binary executables, professional testers can compile the 
> source code for themselves. Avoid releasing binaries and you will not
I doubt that. At least it probably doesnt apply to 100%. What for is
impact?

regards,
Sebastian

-- 
~
~ perl self.pl
~ $_='print"\$_=\47$_\47;eval"';eval
~ krahmer@...e.de - SuSE Security Team
~


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ