lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <473B99A0.3080902@gmail.com>
Date: Thu, 15 Nov 2007 01:58:08 +0100
From: shadown <shadown@...il.com>
To: full-disclosure@...ts.grok.org.uk, 'BugTraq' <bugtraq@...urityfocus.com>
Subject: Some hashes for the record

Hi,

First of all I ask for apologies if this bothers somebody, but I just
need a place to record this just in case.

This are the hashes that belong to four PoC files of vulnerabilities
that affect at least Microsoft Windows XP SP2 and Windows Vista default
installation full updated (md5, sha-1, sha-256)
I've already reported this bugs indirectly to Microsoft.

Vuln1:
054db96684f145bea246b12f9bf04abf
1f394c8d164365f4b73c46e6fe13a370bdf084b5
430216171b44c520cb3719df1205fd64c83659c149a99032757e8c15e316de43

Vuln2:
3a393a10121f7ae73d237931ad687e2f
d2e2d3c7425ba64b4617fa9975230c1bb1e549e8
49041cf72bef115ceca83f6406c09323f1fcbbebe65ada3389316f93ecd71a59

Vuln3:
e165db3fe9ac8ebb1a71eefe51024f8c
3f78c2207b71f565a827fa168b52d5a4c14af9be
e73ba604e673e859156121a39ffd2b420a3f2e96e93882b64830152d4fbf3425

Vuln4:
15882225d87d397b469361a16cb3a2d8
d57edb57b9c280e3e6fbc803c80f7c44e7ea6df2
bab65d04f6c76cd045bfc951ec1ad996c95195b65fb8107d24bc4dd9ad2835ed

Cheers,
  Sergio

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ