[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4b6ee9310812301210s3d70be0o545a619ad161ff16@mail.gmail.com>
Date: Tue, 30 Dec 2008 20:10:16 +0000
From: n3td3v <xploitable@...il.com>
To: "Elazar Broad" <elazar@...hmail.com>, full-disclosure@...ts.grok.org.uk
Subject: Re: Creating a rogue CA certificate
Aiding script kids to get credit card numbers out of folks e-commerce
purchases. I'm sure the U.S secret service have a special interest in
this vulnerability, as so much of their time nowadays is taken up
following up on internet carders and shutting them down.
On Tue, Dec 30, 2008 at 5:03 PM, Elazar Broad <elazar@...hmail.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> SSL/PKI is only as strong as the weakest CA...
>
> For those of you who haven't been following this, here you go:
>
> http://www.win.tue.nl/hashclash/rogue-ca/
> http://www.phreedom.org/research/rogue-ca/md5-collisions-1.0.ppt
>
> Enjoy and Happy New Years!
>
> elazar
> -----BEGIN PGP SIGNATURE-----
> Charset: UTF8
> Version: Hush 3.0
> Note: This signature can be verified at https://www.hushtools.com/verify
>
> wpwEAQECAAYFAklaVFQACgkQi04xwClgpZh4TQP+ODe2/jTHhOrLbKtoSJhZInX+lJXt
> LMkU/xlYK1Au/f1E5KhXt43uMWYSeC/M0njQRPLyrDfihFlLsmAxGK/97kRQfxEttbcN
> R0q1BL+WmbiGNglujzSWHqMSkn20r12itVfGP77nEbGYbjidV1BXxFNR2QQwLHZhGLWe
> gVO/5Zg=
> =+Pm+
> -----END PGP SIGNATURE-----
>
> --
> Click for free info on getting an MBA, $200K/ year potential.
> http://tagline.hushmail.com/fc/PnY6qxsZwUN6299xt0fJO8HvJUKovV4hcZ7MH3I6KbhlC0IDsYiG8/
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists