lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <009601c6553d$5c9b85a0$650ba8c0@DORKA>
Date: Sat Apr  1 04:35:47 2006
From: very at unprivate.com (php0t)
Subject: Re: RSA HAVE CRACKED PHISHING, NO SERIOUSLY

 
  Dear technically challenged netdev,
 
1) 'Is that the same as...' - ummm... you probably IMAGINED a different
email to which you replied to
2) The address is legit, it isn't 'hacked'. It has a story why I use it
here, but it's not like anybody cares.
3) http://www.ietf.org/rfc/rfc0821.txt - the world is bigger than gmail
believe it or not.
4) If I sent the email from gmail, it would show in the headers.
5) If it was a spoofed email only used for subscription, the FD posts
sent to it would not get back to me
6) The email in question wasn't even an FD comment, it went straight to
your inbox to avoid bugging others who still don't have you filtered
(like me, until this very email). What did you do? Post it right back to
the list. Nice.
 
  Sure, everybody can filter, so can I. The thing is, i never NEEDED to,
because there hasn't been anybody dropping such ignorance in my mailbox
so often. I was hoping that you would either turn normal or keep your
word and leave the list.
Since the trolling just goes on, it's grep -v for you, especially after
this stupid bullcrap you made up and decided to share with the probably
not-so-interested list members. I responded this time because 1) it was
a personal attack based on nothing, and 2) because it's my last email
that has the word netdev in it. (sent or received ;]) - and i can keep
my word, unlike 'some people'.
 
php0t
 
 

-----Original Message-----
From: n3td3v [mailto:n3td3v@...il.com] 
Sent: Friday, March 31, 2006 11:12 PM
To: php0t; full-disclosure@...ts.grok.org.uk
Subject: Re: [Full-disclosure] Re: RSA HAVE CRACKED PHISHING, NO
SERIOUSLY


Is that the same as hacking someones "domain", accepting the Gmail
confirmation to say you're allowed to send from a Gmail account with
that hacked domain, then delete all forensic logs from the hacked domain
and then go back to your Gmail account, where you can continue to send
your inflamed FD comments from as very@...keddomain.com. Figures.


On 3/31/06, php0t <very@...rivate.com> wrote: 

If you kept your word (and didn't post my emails back to the list), it'd
be better. :)


-----Original Message-----
From: n3td3v [mailto: n3td3v@...il.com <mailto:n3td3v@...il.com> ] 
Sent: Friday, March 31, 2006 10:47 PM
To: php0t; full-disclosure@...ts.grok.org.uk
<mailto:full-disclosure@...ts.grok.org.uk> 
Subject: Re: [Full-disclosure] Re: RSA HAVE CRACKED PHISHING, NO
SERIOUSLY


Why don't you just "filter" me like "the experts" have told you to do?
Or haven't you worked out the technical background architecture of
Outlook and Thunderbird yet? Figures. 


On 3/31/06, php0t <very@...rivate.com> wrote: 

For real, please keep your word.

 

-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk
<mailto:full-disclosure-bounces@...ts.grok.org.uk> ] On Behalf Of n3td3v
Sent: Friday, March 31, 2006 9:55 PM
To: full-disclosure@...ts.grok.org.uk
<mailto:full-disclosure@...ts.grok.org.uk> 
Subject: [Full-disclosure] Re: RSA HAVE CRACKED PHISHING, NO SERIOUSLY


This is funny as well, http://news.com.com/5208-1029-0.html?forumID=1
<http://news.com.com/5208-1029-0.html?forumID=1&threadID=15591&messageID
=131539&start=-1&reply=true>
&threadID=15591&messageID=131539&start=-1&reply=true  I almost choked on
my big mac after reading this one, the guy thinks if you take down a
site, the phisher's script doesn't deploy another premade site straight
away on another host. lol, maybe the RSA have miscalculated the pre
plainning and programming of a phishing attack backend before its
carried out. I guess they just thought phishing was down to "dumb
criminals". 


On 3/31/06, n3td3v <n3td3v@...il.com> wrote: 

Check out this article, and I really did spill my hard earned Starbucks
right down my front when I looked at this article:
http://news.com.com/5208-1029-0.html?forumID=1
<http://news.com.com/5208-1029-0.html?forumID=1&threadID=15591&messageID
=131433&start=-1> &threadID=15591&messageID=131433&start=-1 



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/




-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060401/1272e25f/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ