lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2bf34a3e0412010911a1d9abe@mail.gmail.com>
From: jxt.lists at gmail.com (JxT)
Subject: Remote Mercury32 Imap exploit

I do believe script kiddies generate revenue for most security
professionals/companies.  So your point is a mute one.   If you'd like
to step down off your almighty white hat throne and get in the real
world you might realize that.  Everyone is always quick to complain
about security this, security that.  Yet you need the bad guy to keep
the good guy working.  No threat ? No paycheck ?
 

blah blah yack yack... flame away  >/dev/toaster




On Wed, 1 Dec 2004 13:40:24 +0100, barabas mutsonline <barbsie@...il.com> wrote:
> JohnH,
> 
> Your l33t skillz amaze us. It's very smart of you to post a working
> exploit here. More of your customers will require your help and
> scriptkiddies will generate revenue for (blackhat) companies like
> yours.
> In fact you are right, it's very easy to find vulnerabilities...the
> really hard part is to write shellcode. DAmn, I've been looking all
> over the net to find some small universal portbinding shellcode, but
> I'm just not smart enough.
> I guess you need NSA skillz for that .
> Thanks, now I can rip your shellcode and replace all those lame
> calc.exe shellcodes ;-)
> 
> RESPTEC!
> 
> Barabas
> 
> 
> 
> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com
> [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of JohnH
> Sent: Tuesday, November 30, 2004 7:38 AM
> To: full-disclosure@...ts.netsys.com
> Cc: bugtraq@...urityfocus.com
> Subject: [Full-Disclosure] Remote Mercury32 Imap exploit
> 
> Here you go guys. A fully working Remote Mercury32 Imap exploit. This will
> work on any windows OS. 100% universal.
> 
> Only reason I am posting this is because im sick of seeing non working
> exploits released and WHITEHAT.CO.IL likes to do this.
> 
> Cheers,
> 
> Johnh@...netops.com
> VIST: www.secnetops.com
> 
> <Super l33t sploit h3r3>
> 
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ