lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <41011d980603151943t58776a66t46c234306a82613a@mail.gmail.com>
Date: Thu Mar 16 03:43:54 2006
From: i.m.crazy.frog at gmail.com (crazy frog crazy frog)
Subject: Internet Explorer 0day

oh no!!
time to learn lynx.
--
ting ding ting ding ting ding
ting ding ting ding ding
i m crazy frog :)
"oh yeah oh yeah...
 another wannabe, in hackerland!!!"


On 3/15/06, rembrandt@...erlin.de <rembrandt@...erlin.de> wrote:
> > HUH?
> >
> > You mean like when they added basic HTTP CONNECT back in October of 2004?
> >
> > http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/nc/socks.c.diff?r1=1.8&r2=1.9&f=h
> >
> > http://www.openbsd.org/plus37.html
> > "Add support for the HTTP proxy CONNECT method to nc(1)."
> >
> > Has had SOCKS4/5 for quite a while before that.
>
> Just to point it out clearly:
>
> http://www.openbsd.org/39.htm
> nc(1) now supports HTTP Proxy authentication, making it very useful as a
> ssh ProxyCommand.
>
> Kind regards,
> Rembrandt
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ