lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060122213425.8731.qmail@web27407.mail.ukl.yahoo.com>
Date: Sun Jan 22 21:34:32 2006
From: crash_x31337 at yahoo.co.uk (crash-x gay)
Subject: private imap4d exploit

Don't lie crash-x we all know you  ripped the code off rave and changed the printf()'s to make it look  like yours. You even admit to changing it again now!!!
  
  ravecool wrote this code - crash-x is a code thief!!! rave deserves the credit for this exploit as he is the real hacker here.
  
  >On 1/22/06 crash-x <crash.ix_at_gmail.com>   wrote:
      >>On 1/22/06, str0ke <str0ke_at_milw0rm.com> wrote:  
  >> My bad.  
  >>  
  >> printf("[!] mailutils imapd4d universal(?) exploit 0.5 by crash-x /  
  >> unl0ck / scozar\n");  
  
  >Oops sorry, my bad. I wrote the code a long time ago. I probably  
  >changed the printf a while ago.  
   

		
---------------------------------
To help you stay safe and secure online, we've developed the all new Yahoo! Security Centre.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060122/7927fe48/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ