lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <6.2.0.14.0.20050804092155.039b9dd0@pop.frh.utn.edu.ar>
Date: Fri Aug  5 01:07:28 2005
From: fernando at frh.utn.edu.ar (Fernando Gont)
Subject: Fernando Gont remote command
	execution	and big mouth vulnerability

At 08:40 a.m. 04/08/2005, you wrote:

> > FYI, my website is http://www.gont.com.ar .
> > My site does not contan scripts, and is hosted on an OpenBSD server.
>
>Umm, let's see this:
>http://64.233.167.104/search?q=cache:KplpfqgJV_MJ:gont.com.ar/tools/+dig+site:gont.com.ar&hl=es&client=firefox-a

Search on hypermart.net, portland.co.uk, xoom.com, freeservers.com. And 
many others. Lots of (mine) old accounts non-maintained, full of bullshit, 
and full of test scripts.

The link was simply removed because I just don't have the access/need to 
have a look at the script. My only site is gont.com.ar, which has been 
"online" for people to download the new versions of my drafts before they 
show up in the internet-drafts directory.

I may find more of those scripts on some floppies in my room's floor, and 
send them to you, so that you can waste your time, while the real problem 
that was raised here continues to be ignored.

If I were any of the involved organizations/companies, I'd certainly pay 
people to do the same thing you're doing: adding non-sensical noise.

Kindest regards,

--
Fernando Gont
e-mail: fernando@...t.com.ar || fgont@....org





Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ