[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <006601c8aed7$118c2ce0$686b880a@softpro.corp>
Date: Mon, 5 May 2008 13:40:09 -0400
From: "Garrett M. Groff" <groffg@...design.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Re: HD Moore
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
These sorts of emails, while perhaps very accurate, only encourage a
barrage of emails concerning our apparent involvement in a large
governmental conspiracy and/or our "script kiddiness." I think ignoring
such emails from netdev are in order, tempting as they are to respond to.
- ----- Original Message -----
From: Nate McFeters
To: Valdis.Kletnieks@...edu
Cc: n3td3v ; full-disclosure@...ts.grok.org.uk
Sent: Monday, May 05, 2008 1:24 PM
Subject: Re: [Full-disclosure] HD Moore
More importantly than any of this is how great it is for vulnerability
research. Makes it much easier to encode shell code, etc. Plus the
msfpescan features are bad assery. Of course, n3td3v has no ideas what
these features are for so he thinks it's a script kiddy tool.
Andrew, you're so predictably boring... is there not something you have
expertise on that you can talk about?
Obviously you're not in the right place on this list.
Nate
On 5/5/08, Valdis.Kletnieks@...edu <Valdis.Kletnieks@...edu> wrote:
On Sun, 04 May 2008 16:27:49 BST, n3td3v said:
> On Fri, May 2, 2008 at 9:32 AM, Nate McFeters <nate.mcfeters@...il.com>
> wrote:
> > Oh that... Yeah, shame on hd... Maybe he was busy updating metasploit
> > so that real researchers have a great vulnerability development
> > framework, or something else that provided some worth to people.
>
> Maybe he was busy updating Metasploit so that script kids have a great
> vulnerability development framework.
>
> He should stop providing them with a great vulnerability development
> framework.
There's 2 really great uses for metasploit for white hat security guys:
1) When you're handed a /16 or two during a pen test, and need a quick way
to poke a whole bunch of machines for a vulnerability, it's hard to
roll-your-own
exploit tester as fast as you can chinese-menu one in metasploit.
2) It's a *great* tool for impressing on a PHB just how easy it is to
launch
an exploit for something at one of the unsecured systems he's responsible
for.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
- ---------------------------------------------------------------------------
- -----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.2 (Build 2014) - not licensed for commercial use: www.pgp.com
wj8DBQFIH0YySGIRT5oVahwRAnosAJ4hHPGYV1fW2rVb6BdAv8YTXqfvzgCcCLWE
46UCD/zeo++7hxpDyT2icsM=
=klVh
-----END PGP SIGNATURE-----
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists