lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20051215073553.67733.qmail@web25221.mail.ukl.yahoo.com>
Date: Thu Dec 15 07:36:01 2005
From: steve_r125 at yahoo.co.uk (Steve Russell)
Subject: [U] RE: Famous n3td3v quotes - The Director's
	Cut

> On 12/14/05, Nelson Castillo <nelsoneci@...il.com>
wrote:
> Isn't it trolling?

> -----Original Message-----
> From: full-disclosure-bounces@...ts.grok.org.uk
> [mailto:full-disclosure-bounces@...ts.grok.org.uk]
> On Behalf Of n3td3v
> Sent: Wednesday, December 14, 2005 8:56 PM
> To: Nelson Castillo;
> full-disclosure@...ts.grok.org.uk
> Subject: Re: [Full-disclosure] Famous n3td3v quotes
> - The Director's Cut
> 
> No, thats a different thing from social engineering
> to gather intelligence on
> an individual over an instant message. You should
> learn more on intelligence
> gathering techniques, go read a book or something. 

--- "Stoltz, Eric CIV"
<eric.stoltz@...i.sig54.army.mil> wrote:
> Classification:  UNCLASSIFIED
> 
> Technically Social Engineering is the elevation of
> access or status through
> the falsification of identity when communicating
> with an individual.  It is
> basically hacking the human element.  Congrats
> n3td3v someone asks a serious
> question and you insult them.   You are single
> handedly making this list a
> waste of time to read.
> 
> 
> ----------------
> 
> Eric Stoltz
> 
> Network Administrator
> 
> 54th Signal
> 
> Camp Taji, Iraq
> 
> DSN: 318-834-3051
>
> Classification:  UNCLASSIFIED
> 
> If this e-mail is marked FOR OFFICIAL USE ONLY it
> may be exempt from
> mandatory disclosure under FOIA. DoD 5400.7R, "DoD
> Freedom of Information Act
> Program", DoD Directive 5230.9, "Clearance of DoD
> Information for Public
> Release", and DoD Instruction 5230.29, "Security and
> Policy Review of DoD
> Information for Public Release" apply.

FYI n3td3v, that's going to hurt - end of story - it's
going to whether you like it or not.

And just in case you missed it...

Received: from DATA-01.taji.sig54.army.mil
(data-01.taji.sig54.army.mil [214.13.166.211]) by
lists.grok.org.uk (Postfix) with ESMTP id 3BC07D05 for
<full-disclosure@...ts.grok.org.uk>; Thu, 15 Dec 2005
04:59:14 +0000 (GMT)

Output from ARIN WHOIS
Search results for: 214.13.166.211

OrgName:    DoD Network Information Center 
OrgID:      DNIC
Address:    3990 E. Broad Street
City:       Columbus
StateProv:  OH
PostalCode: 43218
Country:    US

Don't mess with the big boys kid... Now you've been
informed by someone that knows.
And before you say anything - yes I know what's it
like to ~mess~ with the DoD.

Regards (with a friendly warning)
-Steve


	
	
		
___________________________________________________________ 
Yahoo! Messenger - NEW crystal clear PC to PC calling worldwide with voicemail http://uk.messenger.yahoo.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ