lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200408261533.i7QFXifx011244@mailserver2.hushmail.com>
From: infohacking at hush.com (Hugo Vazquez Carapez )
Subject: !SPAM! Automated ssh scanning

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

"And yes, they logged in and became root in no time. But I thought the
kernel compiled from the latest debian woody kernel-source could be
considered to be save. But I was wrong! So I posted the tools used by
the attackers to this list and also to the debian security team."

Dear Richard,
You must be very new and a huge clueless moron... not only you're evidencing
your low skills but you're wasting time + bandwidth

"But they managed to become root on this machine due to a kernel(?) exploit!
Should I then consider any woody system to be insecure to let people
work at?"

kernel eh?

Please take a quick look into isec.pl and take your time to read some
of their advisories. After you've done that, sit down, make some coffee
and learn that there are more bugs in the actual linux kernels which
are not disclosed yet.


"So I posted the tools used by the attackers to this list and also to
the debian security team."

WoW! Just normal tools, no ultra secret toolz. Be aware that this email
is part of the e-jihad tactical strategie to collaps the Internet

Have a nice day

DISCLOSURE TIMELINE
26/08/2004 Initial lame email
26/08/2004 Big laugh of debian security team
26/08/2004 Public disclosure
26/08/2004 We rehack iberia.com

Infohacking e-JIHAD Team <www.infohacking.com>
Hugo Vazquez Carapez aka "Fishface"
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkEuA8QACgkQPMMEGI9aoaezrgCfbDdC2LJU64IFND1WNqqLxaAUxFAA
oIHCQRdXrdP4epy4acntw0HseNMa
=PDyB
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
secure FREE email: http://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
http://www.hushmail.com/services-messenger?l=434

Promote security and make money with the Hushmail Affiliate Program: 
http://www.hushmail.com/about-affiliate?l=427


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ