lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <40893FBB.8000608@comcast.net>
From: marklist at comcast.net (Mark)
Subject: THCIISSLame exploit - now without binary

johnny cyberpunk wrote:

> hi all,
> 
> i understand now the point, what i made wrong.
> THC has updated the website immediately and now only the *.c
> files are available for download.
> i really had no clue about the problem, that releasing an exploit with a
> compiled
> binary is same as VX code. i'm really sorry for that.
> 
> cheers,
> johnny cyberpunk/thc

I just can't help to laugh at the irony in this..... With a
binary people are limited to eploiting systems one by one.
Now that the source is available, how long do you think it
will take to turn this into a Slammer scale worm???



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ