[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <dd4f86000803280925l7797425an6ccd3ddcc5de84a9@mail.gmail.com>
Date: Fri, 28 Mar 2008 10:25:25 -0600
From: "Andreas Selvicki" <drsynack@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: What's going on about Pangolin
Let's see the source please.
On 3/26/08, zwell@...u.com <zwell@...u.com> wrote:
>
> I've just read the discussion from here, seriously, I don't know what's
> going on.
>
> I've coded it since 2005 and never release it until this year. And I
> really do not know why it be treated as a backdoor.
>
> If you think it is a backdoor, so please do a reverse engineering on it.
> You can capture the network packet, you can list all the strings in it, even
> you can hook APIs in it. Do anything you like to make sure whether it's
> backdoor or not.
>
> BTW, I packeted it through UPX to reduce the size. And some people focused
> on "http://www.nosec.org/web/index.txt", which is used in ORACLE injection
> mode when the target database is in intranet so we can use some store-procs
> to make the target to visit our website then we can receive the internet
> address that is mapped to outside. Anybody who is good at oracle injection
> should know this.
>
> Really, I wanna know why!!!
>
> < div class="w134">
>
> ------------------------------
> 2008年薪水翻倍技巧<http://doc.go.sohu.com/200802/5e1b674ab8183f3db8baba8ee4c6dd53.php>
> *用搜狗拼音写邮件,体验更流畅的中文输入>><http://goto.mail.sohu.com/goto.php3?code=mailadt-ta>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists