lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <004301c65504$ddbc67a0$650ba8c0@DORKA>
Date: Fri Mar 31 21:51:22 2006
From: very at unprivate.com (php0t)
Subject: Re: RSA HAVE CRACKED PHISHING, NO SERIOUSLY

If you kept your word (and didn't post my emails back to the list), it'd
be better. :)

-----Original Message-----
From: n3td3v [mailto:n3td3v@...il.com] 
Sent: Friday, March 31, 2006 10:47 PM
To: php0t; full-disclosure@...ts.grok.org.uk
Subject: Re: [Full-disclosure] Re: RSA HAVE CRACKED PHISHING, NO
SERIOUSLY


Why don't you just "filter" me like "the experts" have told you to do?
Or haven't you worked out the technical background architecture of
Outlook and Thunderbird yet? Figures.


On 3/31/06, php0t <very@...rivate.com> wrote: 

For real, please keep your word.

 

-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk
<mailto:full-disclosure-bounces@...ts.grok.org.uk> ] On Behalf Of n3td3v
Sent: Friday, March 31, 2006 9:55 PM
To: full-disclosure@...ts.grok.org.uk
<mailto:full-disclosure@...ts.grok.org.uk> 
Subject: [Full-disclosure] Re: RSA HAVE CRACKED PHISHING, NO SERIOUSLY


This is funny as well, http://news.com.com/5208-1029-0.html?forumID=1
<http://news.com.com/5208-1029-0.html?forumID=1&threadID=15591&messageID
=131539&start=-1&reply=true>
&threadID=15591&messageID=131539&start=-1&reply=true  I almost choked on
my big mac after reading this one, the guy thinks if you take down a
site, the phisher's script doesn't deploy another premade site straight
away on another host. lol, maybe the RSA have miscalculated the pre
plainning and programming of a phishing attack backend before its
carried out. I guess they just thought phishing was down to "dumb
criminals". 


On 3/31/06, n3td3v <n3td3v@...il.com> wrote: 

Check out this article, and I really did spill my hard earned Starbucks
right down my front when I looked at this article:
http://news.com.com/5208-1029-0.html?forumID=1
<http://news.com.com/5208-1029-0.html?forumID=1&threadID=15591&messageID
=131433&start=-1> &threadID=15591&messageID=131433&start=-1 


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060331/5e500e93/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ