lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060110164037.20792.qmail@web25506.mail.ukl.yahoo.com>
Date: Tue Jan 10 16:42:07 2006
From: wh1t3h4t3 at yahoo.co.uk (Micheal Turner)
Subject: Re: SCO Openserver 5.0.x exploit

http://seclists.org/lists/bugtraq/2006/Jan/0018.html
..
http://prdelka.blackart.org.uk/exploitz/prdelka-vs-SCO-termshx.c

Wow im so popular, RoD hEDoR is the second person who
wants to be ME, including RST member copy + pasting my
sudo exploit! RoD hEDoR, you forgot to mention (like
in my header) that the return address in the exploit
is for SCO Openserver 5.0.7. 

*****************************************************************
          S U P P O R T   N O N E   D I S C L O S U R
E           
*****************************************************************
                  DONT GIVE FIREARMS TO KIDZ.



		
___________________________________________________________ 
To help you stay safe and secure online, we've developed the all new Yahoo! Security Centre. http://uk.security.yahoo.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ