lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 20 Oct 2007 14:53:14 -0500
From: phioust <phioust@...il.com>
To: full-disclosure@...ts.grok.org.uk, "state@...ia.fr" <State@...ia.fr>, 
	"pdp (architect)" <pdp.gnucitizen@...glemail.com>, 
	"ad@...poverflow.com" <ad@...poverflow.com>
Subject: Re: Madness? This is KWICKFIX!!!!!!

While taking massive amounts of lsd and eating popsicles I have been
contemplating ways of stopping "xss" from bypassing my miltary grade
firewall
(openbsd with all the remote network stack 0day patched ). I have came up
with a revolutionary idea called "intrusion prevention system". Since we all
know ( especially pdp architect based on his posts ) that "firewalls" are
not made to parse out application specific data ( like xss ) we need
something else that can quickly search the application data coming into our
network and drop them based on a set of rules. Using my new idea advanced
techniques such as <script>alert(document.cookie)</script> and other wild
ideas made by 3 phd professors learning perl will be stopped before anyones
facebook or myspace account can be stolen.

This new technology will be prevented at blackhat las vegas along with my
new book 'IPS: the way of the future'. I will be accepting paypal donations
and doing a book signing after my talk for all those interested.

On 10/20/07, full-disclosure@....hush.com <full-disclosure@....hush.com>
wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> I did not get this spam.  Perhaps my internet relay mail provider
> does a better job of xss firewalling me from spam.
>
> On Sat, 20 Oct 2007 15:27:57 -0400 phioust <phioust@...il.com>
> wrote:
> >did anyone else get this? I am only signed up for this list so I
> >figured it
> >was 'targetted spam'
> >
> >On 10/20/07, admin@...ckfix.org. <admin@...ckfix.org.> wrote:
> >>
> >> Have you searched the internet countless times looking for a way
> >to
> >> "hack?" Maybe you have searched for a way to download programs,
> >games, or
> >> movies for free? Or maybe you have searched for a friendly,
> >helpful,
> >> community that offers all that plus more? Well search no more,
> >you have
> >> struck gold. Well not quite gold, better… Kwickfix.org! Here at
> >> Kwickfix.org we have forums for countless discussions to be held
> >daily. We
> >> have a 'warez' section with endless amounts of safe secure
> >downloads for
> >> your favorite TV shows, Movies, Games, Programs, and more. But
> >what we
> >> really are known for is not our download section, but our
> >notorious
> >> underground hacking section. Hack online games, your friends,
> >and get
> >> passwords to any site! We offer numerous easy to follow
> >tutorials and
> >> programs for you to become a 'hacker' in no time. Don't believe
> >us? Why not
> >> come to Kwickfix.org and see for yourself. Stuck on a problem?
> >Ask any of
> >> our staff members or a tech genius member. Thanks, The Kwickfix
> >Management
> -----BEGIN PGP SIGNATURE-----
> Note: This signature can be verified at https://www.hushtools.com/verify
> Charset: UTF8
> Version: Hush 2.5
>
> wpwEAQECAAYFAkcaWZQACgkQqTTbVuUWvbITTwQAnoA10GSOxJ1qkRoQ3YmOeCpB18F9
> PbWhRC6I84iy577AjJrCW11nVgW6YlClpQWhU7jE1nUpD3Eked+nVQw9xxVIuAONfseK
> RsOsAaXpWAqjmV9ybjAuGLMjuYuQKDg4qV1p+KTYxuY0077DuHGjbGnn5M7h1T622kgj
> 09Nnn5M=
> =S3G/
> -----END PGP SIGNATURE-----
>
>
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ