lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <1202523192.3057.2.camel@x60.swill.org> Date: Fri, 08 Feb 2008 21:13:12 -0500 From: Maxim <fulldisc@...ll.org> To: Open Phugu <openphugu@...il.com> Cc: Full-Disclosure <full-disclosure@...ts.grok.org.uk> Subject: Re: Some Hashes This list is called "full-disclosure", not "hash-disclosure" posting the hashes is *not* full-disclosure. http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/57864?#57864 On Fri, 2008-02-08 at 18:39 -0700, Open Phugu wrote: > OpenBSD 4.1 sshd remote root exploit (on the default install!): > > SHA1(screwtheo.tar)=ad1bc1f05afa2cc3ccadb18fabb985394c02ce8d > MD5(screwtheo.tar)= cee67df76eaa0706e666cd5c0b8b711c > > OpenSSH exploit for linux > SHA1(screwtheo_linux.tar)=cb6816de43df87193050a497a83cd8f7ab721fbd > MD5(screwtheo_linux.tar)=8d65c90d40975556b199a3e1028a5a51 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists