lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BAY17-F490C30C454DB92FF7600AD6B50@phx.gbl>
From: u_should_work_at_mcdonalds at hotmail.com (swallow mycum)
Subject: k-otik kiddies are really whores

k-otik whores should stop linking their script kiddie site thx.
you are just whores getting fame from other people works, so go get a 
driving license and drive taxis

leaking exploits will never make you smarter, go code some hello world

posts by k-otik, all linking their kiddie site:

http://lists.netsys.com/pipermail/full-disclosure/2004-April/020050.html
EXPLOIT for eMule <= 0.42d IRC Buffer Overflow !

http://lists.netsys.com/pipermail/full-disclosure/2004-April/020521.html
Windows Lsasrv lsass Remote EXPLOIT (MS04-011)
"i tested on win2k eng, crash and reboot :-/"
fucking kiddie

http://lists.netsys.com/pipermail/full-disclosure/2004-April/020549.html
"Windows Lsasrv.dll RPC buffer overflow Remote Exploit (MS04-011) "

http://lists.netsys.com/pipermail/full-disclosure/2004-May/021151.html
Sasser Worm ftpd Remote Buffer Overflow Exploit (port 5554)
"there is a remote buffer overflow in the sasser's ftp server (port 5554), 
look the sploit on k-otik"
nah really i wont open your kiddie site.

http://lists.netsys.com/pipermail/full-disclosure/2004-May/021819.html
CVS Entry Line Overflow EXPLOIT ...

http://lists.netsys.com/pipermail/full-disclosure/2004-May/022011.html
The author of the Randex Worm family Busted !!
"The author of the Randex family worms Busted in Canada, below the news (in 
french) ..."
yea it was on all the news sites here in canada one day before

http://lists.netsys.com/pipermail/full-disclosure/2004-June/022560.html
Re : Subversion <= 1.04 Heap Overflow ExploiT ?
"is this exploit for this vulnerability ??"
in other words: open my site and i give ya a blowjob

http://lists.netsys.com/pipermail/full-disclosure/2004-July/024027.html
MS04-020 Exploit - Windows NT/2000 POSIX Subsystem Privilege Escalation
"another MS exploit :-)"
proud to know how to copy paste code?

http://lists.netsys.com/pipermail/full-disclosure/2004-July/024061.html
Windows 2K/XP Task Scheduler remote .job EXPLOIT (MS04-022)

http://lists.netsys.com/pipermail/full-disclosure/2004-September/026781.html
Microsoft Windows MS04-028 JPEG Overflow Shellcoded Exploit

http://lists.netsys.com/pipermail/full-disclosure/2004-September/026784.html
Windows MS04-028 JPEG Overflow Shellcoded Exploit

http://lists.netsys.com/pipermail/full-disclosure/2004-September/026898.html
MS04-028 Jpeg EXPLOIT with Reverse and Bind shell ...

http://lists.netsys.com/pipermail/full-disclosure/2004-November/028605.html
[Advisory + Exploit] SlimFTPd <= 3.15
"hey kiddy, if you dont know how to modify exploits and make them work...i 
think you are the real asshole ;-)"
HAHAHAH kotik kiddies saying it, funny. stfu

http://lists.netsys.com/pipermail/full-disclosure/2004-November/029377.html
Winamp vulnerability : technical study and Exploit released
"exploit and technical study of the Winamp flaw posted by k-otik"
yea by you, and btw it's just copy paste


are your technical comments just the "heh" "really dangerous" or "game 
over!" at the end of your mails? assholes, if you wanna a hint you can 
prolly buy driving licenses online.

_________________________________________________________________
FREE pop-up blocking with the new MSN Toolbar - get it now! 
http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ