lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <BAEFKJBBCIPAKCGNHICFGEKJEKAA.kruse@krusesecurity.dk>
From: kruse at krusesecurity.dk (Peter Kruse)
Subject: SV: SV: JPEG GDI+ (MS04-028) Exploit @    http://home.zccn.net/mm2004

 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

>i wouldn't say so:
>
>\wget -vv home.zccn.net/mm2004/mu/msmsgs.exe
>--16:45:13--  http://home.zccn.net/mm2004/mu/msmsgs.exe
>           => `msmsgs.exe'
>Resolving home.zccn.net... 218.89.171.197
>Connecting to home.zccn.net[218.89.171.197]:80... connected.
>HTTP request sent, awaiting response... 200 OK
>Length: 58,280 [application/octet-stream]
>
>100%[====================================>] 58,280         6.85K/s 
>   ETA 00:00

Yes, confirmed. It's back online.

Regards
Peter Kruse
http://www.csis.dk

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBQWgEnHxYZNa+g/pgEQLE5wCgpbq/HINFxBfzlhbQC8KgE7Sd55wAoPm8
ina9i3Z/PNR+YJM5MrwLQwMT
=vQxG
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ