lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1105555430.9780.12.camel@localhost.localdomain> From: khermansen at ht-technology.com (Kristian Hermansen) Subject: T-Mobile Hacker and server vulnerabilities Does anyone have specifics on how this hacker Jacobson exploited flaws in the T-Mobile server applications to gain entry to the back-end database? Was it some gross oversight on T-Mobile's part or something more obscure that admins should know about? The Secret Service seems to believe that either his skills or his underground connections will allow him to be their personal slut for the next few years. http://www.securityfocus.com/news/10271 Oh, and if anyone has some of the celebrity pictures that he snarfed from the database I would care for a link! -- Kristian Hermansen <khermansen@...technology.com> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050112/975b39c4/attachment.bin