lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4b6ee9310805201748l6a1617c8tefefba578ad3555d@mail.gmail.com>
Date: Wed, 21 May 2008 01:48:21 +0100
From: n3td3v <xploitable@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: n3td3v says don't let EUSecWest Cisco IOS
	presentation go ahead

If you don't listen to n3td3v and Gadi Evron, at least we know we
tried to avert what we see is going to happen.

It won't be our necks on the line, it will be heads within government
which will be rolling who decided to ignore us and that this
presentation was a good idea.

This is a last minute plea to MI5, the UK Security Service to stop
this presentation going ahead.

I will hold you responsible in later threads if n3td3v and Gadi
Evron's fears become reality.

The Security Service (MI5) is responsible for protecting the United
Kingdom against threats to national security. This website provides
information about the Security Service, the threats it counters, links
to sources of security advice and details of careers with the Service.
http://www.mi5.gov.uk/

For those of you who haven't heard, Sebastian Muniz of CORE Security
will release a proof of concept rootkit for Cisco's IOS. Wanting to
know more I contacted him, and he agreed to answer questions about his
work.
http://eusecwest.com/sebastian-muniz-da-ios-rootkit.html

All the best,

n3td3v

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ