lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <b7a807650511240338p2ec81231u2d53961396fd0c99@mail.gmail.com>
Date: Thu Nov 24 11:38:24 2005
From: unknown.pentester at gmail.com (pagvac)
Subject: Window's O/S

OK, so here is where creativity kicks in.

Anyone has any interesting ideas for exploiting this bug as an attack vector?

On 11/24/05, Sibillano Fabio <Fabio.Sibillano@...ileasing.it> wrote:
>
> > Confirmed on Windows XP SP2 (English Version).
>
> Italian version too...
>
> weird!
>
>
>
>
> The information contained in this e-mail may be privileged,
> confidential, and protected from disclosure. If you are not
> the intended recipient, you are hereby notified that any
> dissemination, distribution or duplication of this communication
> is strictly prohibited. If you have received this communication
> in error, please notify the sender immediately and delete all copies .
>
>
>


--
pagvac (Adrian Pastor)
www.ikwt.com - In Knowledge We Trust

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ