lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <43BD159B.6090702@gmail.com>
Date: Thu Jan  5 12:52:20 2006
From: bania.piotr at gmail.com (Piotr Bania)
Subject: RE: WMF round-up, updates and de-mystification

 >for what it is worth.  I am able to modify versions of the WMF exploit
 >and bypass products like that POS pvix crap as well as the current
 >available snort sigs...

First of all, you have no idea what about you are really talking about, 
the prevention library mentioned in last mail DOES NOT rely on ANY 
signatures.I really advice you to study, before you will talk about 
things you really don't understand.

Anyway, I must confess I'm under impression of yours "bypassing snort 
sigs" mad skillz, ph33r.

EOT

best regards,
Piotr Bania

-- 
--------------------------------------------------------------------
Piotr Bania - <bania.piotr@...il.com> - 0xCD, 0x19
Fingerprint: 413E 51C7 912E 3D4E A62A  BFA4 1FF6 689F BE43 AC33
http://www.piotrbania.com  - Key ID: 0xBE43AC33
--------------------------------------------------------------------

               - "The more I learn about men, the more I love dogs."

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ