lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3a166c090603312034r2f4bd419l3ea27c1de220c47f@mail.gmail.com>
Date: Sat Apr  1 05:34:27 2006
From: n3td3v at gmail.com (n3td3v)
Subject: n3td3v group calls on RSA to clarify their
	stance

No one actually knows how RSA are carrying out their database attacks yet,
hence the reason I called for clarity on the issue. But I really am suspect
about the exact technical setup of the attacks that the RSA are carrying out
against fake logins and their databases. Theres no way however they could
carry out world wide attacks on hundreds of fake login targets, without the
use of more than one ip host. And whats the definition of a bot network,
isn't it more than one computer used to send data? In which case you would
need to define the RSA as using a bot network to send their fake raw data to
fake world wide phishing targets. And if they are, is it ok for everyone
else to join in. No I didn't say I had a botnet, and I didn't say I was
attacking anything, all I asked was for RSA to clarify their stance, to make
it clear that its ok or not ok for everyone to join in the attacks they
recommended via the Cnet news article as  a good method to beat phishers.

On 4/1/06, Morning Wood <se_cur_ity@...mail.com> wrote:
>
> >*while RSA are carrying out these attacks, is it legally OK for hackers
> to
> >"HELP OUT" the RSA by pointing a few of our bot net's at some Yahoo and
> >eBay
> >fake login web pages that we know about and feed them with fake username
> >and
> >password data. We don't want to end up in jail, but since the RSA are
> doing
> >it, so we can tell our lawyers that the RSA recommended the tactic to
> us.*
> >*Much regards,*
> >*n3td3v international security group*
>
> so... the "n3td3v group" has "a few [of our ] botnets"  did I hear this
> right? ( *blink* )
> somehow I dont think RSA is using "botnets", which BTW are ILLEGAL in
> *most*
> countries
> ( yes, including your precious UK )
>
> I just want to thank the biggest security group ( lol ) for using teh
> botz!!!
> I am sure Yahoo-Inc, Google, EBay, Microsoft and FooBarBlehCo will thank
> you publicly on CNN so we will know how n3td3v group saved us all with
> botnets!!!
>
> thanks b0td3v gr0upz,
> MW
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060401/3a100e22/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ