lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3a166c090603311846i641294cj9471350f23190ff2@mail.gmail.com>
Date: Sat Apr  1 03:47:01 2006
From: n3td3v at gmail.com (n3td3v)
Subject: n3td3v group calls on RSA to clarify their stance

As eBay attacks
http://news.com.com/Phishers+set+hidden+traps+on+eBay/2100-7349_3-6056687.html?tag=nefd.top
and
other phishing continues world-wide we ask the RSA to clarify further their
comments *" RSA Security's newly acquired Cyota overwhelms phishing sites
with fake usernames, passwords and credit card info."
*
http://news.com.com/Fighting+fraud+by+baiting+phishers/2100-1029_3-6056317.html?tag=my
on
a Cnet news article that its legally OK for the security community to join
in RSA tactics by flooding phishing logins with "garbage data".
http://groups.google.com/group/n3td3v/browse_thread/thread/9529a0dd97661fc5/1d88d9c423f4a7c6#1d88d9c423f4a7c6
but
*while RSA are carrying out these attacks, is it legally OK for hackers to
"HELP OUT" the RSA by pointing a few of our bot net's at some Yahoo and eBay
fake login web pages that we know about and feed them with fake username and
password data. We don't want to end up in jail, but since the RSA are doing
it, so we can tell our lawyers that the RSA recommended the tactic to us.*
*Much regards,*
*n3td3v international security group*
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060401/9c01f87e/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ