lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 13 Dec 2007 12:43:36 -0600
From: reepex <reepex@...il.com>
To: "Morning Wood" <se_cur_ity@...mail.com>, full-disclosure@...ts.grok.org.uk
Subject: Re: Microsoft FTP Client Multiple Bufferoverflow
	Vulnerability

so are you now admitting your "vulnerability" was worthless?

On Dec 13, 2007 12:02 PM, Morning Wood <se_cur_ity@...mail.com> wrote:

> im so hurt now... you make me feel so small compared to your great worx
> MrReepass
> stfu kthnx
>
>
> ----- Original Message -----
> From: "reepex" <reepex@...il.com>
> To: "Morning Wood" <se_cur_ity@...mail.com>;
> <full-disclosure@...ts.grok.org.uk>
> Sent: Wednesday, December 12, 2007 9:01 PM
> Subject: Re: [Full-disclosure] Microsoft FTP Client Multiple
> Bufferoverflow
> Vulnerability
>
>
> > wow thats quite impressive.. you couldnt exploit a basic overflow and
> two
> > years later someone else did
> >
> > you must be quite proud. Did you tell your family and co workers about
> > this
> > great finding? I hear tipping point and idefense are hiring you should
> > forward them this set of emails.
> >
> > On Dec 12, 2007 2:38 AM, Morning Wood <se_cur_ity@...mail.com> wrote:
> >
> >> One of my first advisories and was rediscovered later, turned into a
> >> viable
> >> exploit 2 years after by another researcher.
> >>
> >>
> >>
> http://framework.metasploit.com/exploits/view/?refname=windows:ftp:netterm_netftpd_user
> >>
> >>
> >>
> http://metasploit.com:55555/EXPLOITS?MODE=SELECT&MODULE=%6e%65%74%74%65%72%6d%5f%6e%65%74%66%74%70%64%5f%75%73%65%72%5f%6f%76%65%72%66%6c%6f%77
> >>
> >> *hugz*
> >>
> >>
> >> ----- Original Message -----
> >> From: "reepex" <reepex@...il.com>
> >> To: "Morning Wood" <se_cur_ity@...mail.com>;
> >> <full-disclosure@...ts.grok.org.uk>
> >> Sent: Tuesday, December 11, 2007 1:58 PM
> >> Subject: Re: [Full-disclosure] Microsoft FTP Client Multiple
> >> Bufferoverflow
> >> Vulnerability
> >>
> >>
> >> > are you serious?
> >> >
> >> >
> >>
> http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2003-07/0259.html
> >> >
> >> > I guess you are a 'brain dead india wannabe sec researcher' also?
> >> >
> >> >
> >> > On Dec 11, 2007 6:22 AM, Morning Wood <se_cur_ity@...mail.com> wrote:
> >> >
> >> >> advisories like this are typical of brain dead India wannabe sec
> >> >> researchers
> >> >> nuff said
> >> >>
> >> >> _______________________________________________
> >> >> Full-Disclosure - We believe in it.
> >> >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >> >> Hosted and sponsored by Secunia - http://secunia.com/
> >> >>
> >> >
> >>
> >> _______________________________________________
> >> Full-Disclosure - We believe in it.
> >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >> Hosted and sponsored by Secunia - http://secunia.com/
> >>
> >
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ