lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a7b0e6800608091145t34f59061p8cec9e574330ef0b@mail.gmail.com>
Date: Wed, 9 Aug 2006 13:45:08 -0500
From: "Matt Davis" <stackinjection@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Exploit for MS06-040 Out?

Thanks.  What threw me for a loop was that I consider CANVAS et. al.
to be security tools... not hacker tools.  So, I wasn't thinking of
those applications when I read that.

I didn't see any mention of exploit code at the usual places.

On 8/9/06, H D Moore <fdlist@...italoffense.net> wrote:
> Core Impact and Canvas both have exploits out. Metasploit technically has
> one, but it hasn't been completed/released yet.
>
> -HD
>
> On Wednesday 09 August 2006 13:10, Matt Davis wrote:
> > Did I completely miss exploit code being released in the wild for that
> > vulnerability?
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>


-- 
email:  mjd [AT] mattdavis [DOT] biz
AIM:  MattJDavis  MSN:  Matt.J.Davis@...mail.com
ICQ:  4632557     G-Talk:  MatthewJDavis@...il.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ