lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6450e99d0603222208g3d5655f2s4709dfb0538e6d76@mail.gmail.com>
Date: Thu Mar 23 06:08:22 2006
From: ivanhec at gmail.com (Ivan .)
Subject: Re: Re: Links to Google's cache of 626
	FrSIRTexploits

or http://www.securiteam.com/exploits/

Ivan

On 3/23/06, KF (lists) <kf_lists@...italmunition.com> wrote:
> heres an even shorter command.
>
> lynx http://www.milw0rm.com
>
> -KF
>
> Dave Korn wrote:
>
> >Ivan . wrote:
> >
> >
> >>Dave,
> >>
> >>I couldn't get wget 'http://www.elsenot.com/frsirt-google.html' grep
> >>-o 'href="[^"]*"' frsirt-google.html | cut -d '"' -f 2 > list.txt
> >>to work, so I did
> >>
> >>
> >
> >  Just wanna point out that I had those as two separate commands on separate
> >lines, did you really do them on one line like that?  That won't work,
> >although removing 'frsirt-google.html' from the grep command and putting a
> >bar between it and the wget ought to work.  If not, what went wrong?
> >
> >
> >
> >> the first link times out
> >>
> >>
> >
> >  Yep, that one had a typo, somehow a digit got mangled off the IP address:
> >
> >--------------------<snip>--------------------
> ><a
> >href=http://72.14.03.104/search?q=cache:HG1c4HzNGuYJ:www.frsirt.com/exploits/20050621.p33r-b33r.c.php+site:frsirt.com+p33r&hl=en&ct=clnk&cd=2
> >--------------------<snip>--------------------
> >  That '03' should be '203' like all the others.
> >
> >
> >
> >>and a few others, also  a few return error
> >>pages saying there isn't a cached page.
> >>
> >>
> >
> >  The cached versions are going to be expiring fairly pronto, so rush and
> >get it now everyone!
> >
> >
> >    cheers,
> >      DaveK
> >
> >
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ