lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed Dec  7 14:18:35 2005
From: wesleymcgrew at gmail.com (Robert Wesley McGrew)
Subject: Oh noes, the 0x90 NOP crew have been NOP'd!

Hah.  That's a weird script anyways.  Who's crazy enough to punch in
their password into some guys' "analyzer" knowing good and well it
could be used against them or at least wind up in someone's private
wordlist?

On 12/7/05, cranium pain <coardump@...il.com> wrote:
>
>  ---------------------------------------
>  !!!0-Day Alert  0-Day Alert!!!
>  ---------------------------------------
>  Who Is Vulnerable:   0x90.org
>  Who Are They:         Developers of Web Based security tools
>  Impact:                    Red Faces For l33t Haxxors
>  Time Line:               Today
>  ---------------------------------------
>
>  0x90.org is a site ran by a bunch of hacker wanna-be's that write stuff to
> audit web sites and web applications, stuff like XXS / Java script
> injection, HTML injection and SQL injection.
>
>  They are also the proud developers of Absynth. No, not that favorite
> alchoholic beverage that you use to intoxicate helpless females on a
> Saturday night, dulling their senses so that you can more easily social
> engineer them in to believeing that you are really a hot sex puppy and a mad
> leet haxxor that speaks at all the cons while wearing your "I read your
> mail" t-shirt, rather than the noob you are!
>
>  Absynth is the web auditing tool which is commonly used by many CCISP
> certified security professionals and professional penetration testers, 99%
> of whom release top notch, serious remote 0day exploits to the community
> daily.
>
>  Well, these jokers obviously never run their tools on their own web site,
> as such they have left their self open to some injection flaws of their own:
>
>  POC:
>  --------
>
>  POST http://www.0x90.org/passwd/index.php?password=">Oh
> Noooeeessssss!!!
>
>
>  doh..
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>


--
Robert Wesley McGrew
http://cse.msstate.edu/~rwm8/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ