lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <da791dc20601230223h42f65ebao7e2463f060e21992@mail.gmail.com>
Date: Mon Jan 23 10:23:20 2006
From: coardump at gmail.com (cranium pain)
Subject: All you WMF haxxors are belong to...... Mr Moore

WMF Exploit vulnerable?

[*] Starting Reverse Handler.
[*] Waiting for connections to http://0.0.0.0:80/
[*] Got connection from 0.0.0.0:443 <-> 1.1.1.1:42121
[*] Sending Stage (2834 bytes)
[*] Sleeping before sending dll.
[*] Uploading dll to memory (69643), Please wait...
[*] Upload completed
meterpreter> Out of memory during "large" request for 2147487744 bytes,
total sbrk() is 17950720 bytes at
/home/framework/lib/Pex/Meterpreter/Packet.pm line 509


509:  $res -1 if ($res >= 0 and not defined(recv($fd, $tempBuffer,
$tempBufferLength, 0)));

--

"haxxoring haxxors for fun and fun"
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060123/9ae6dc71/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ