lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4490ACD7.1030507@sec-consult.com>
Date: Thu Jun 15 01:45:06 2006
From: research at sec-consult.com (Bernhard Mueller)
Subject: All new anti-cyber terror website

You have to look more carefully, there actually ARE some 0day techniques
described on the page.

"If the buffer limit set by the program can be increased, then your
enterprise class software is compromised, along with data held on local
hosts."

also known as 'buffer limit exaltation' or 'memory allocation widening'
attacks.

Q-Ball wrote:
> The promised 0-days are about as real as n3td3v himself.
> 
> On 6/15/06, *Aaron Gray* <angray@...b.net <mailto:angray@...b.net>> wrote:
> 
>     Yes, but where are the promised zerodays ?
>      
>     vaporware ?
> 
>     ----- Original Message -----
>     *From:* n3td3v <mailto:n3td3v@...il.com>
>     *To:* full-disclosure@...ts.grok.org.uk
>     <mailto:full-disclosure@...ts.grok.org.uk> ; n3td3v@...glegroups.com
>     <mailto:n3td3v@...glegroups.com>
>     *Sent:* Wednesday, June 14, 2006 6:03 PM
>     *Subject:* [Full-disclosure] All new anti-cyber terror website
> 
>     ===============
>      
>     For public distribution.
>      
>     ===============
>      
>     New website launched.
>      
>     ===============
>      
>     n3td3v group launched a new website last night and is ready for web
>     traffic.
>      
>     ===============
>      
>     We pride ourselves in our continued work with the underworld at
>     Google and Yahoo.
>      
>     ===============
>      
>     We are a professional group of users with good intentions.
>      
>     ===============
>      
>     Learn more about the all new n3td3v website today.
>      
>     ===============
>      
>     Is your corporation Google or Yahoo? Have you ever wondered who is
>     behind your security incidents?...
>      
>     ===============
>      
>     Its time for n3td3v, its time for http://n3td3v.googlepages.com
>      
>     ===============
>      
>     Remember to click on the security, intelligence and network link(s)
>     at the top of the website!
>      
>     ===============
>      
>     Many Thanks,
>      
>     ===============
>      
>     n3td3v
> 
>     ------------------------------------------------------------------------
> 
>     _______________________________________________
>     Full-Disclosure - We believe in it.
>     Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>     Hosted and sponsored by Secunia - http://secunia.com/
> 
>     ------------------------------------------------------------------------
> 
>     No virus found in this incoming message.
>     Checked by AVG Free Edition.
>     Version: 7.1.394 / Virus Database: 268.8.4/363 - Release Date:
>     13/06/2006
> 
> 
>     _______________________________________________
>     Full-Disclosure - We believe in it.
>     Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>     Hosted and sponsored by Secunia - http://secunia.com/
> 
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ