lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <40EF6935.A1887DB@deaddrop.org>
From: shrdlu at deaddrop.org (Etaoin Shrdlu)
Subject: Re: Full-Disclosure digest, Vol 1 #1758 - 11 msgs

magickal1 wrote:
> 
> There is a 0day bind exploit out there,  does anyone have any info on
> it?

Nah, but it seems to involve the root servers somehow. Here are some
(compromised machines/interested parties):

65.29.12.218
69.50.167.29
68.142.68.20
69.42.80.13
68.192.148.177
69.141.82.21

I doubt the innocence of all but the first two (one of which claims to be
win2k, and the other seems to be freebsd).

--
...because as an industry we've tried to make security seem easier
than it actually is. We want to make it like driving a car when it's
more like flying an airplane.
             Chris Brenton (at 08:22 -0400 19 Apr 2004 on NANOG)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ