lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <f5dc671001011648k5602880cued8c76dec6df94b@mail.gmail.com>
Date: Sat, 2 Jan 2010 00:48:43 +0000
From: Benji <me@...ji.com>
To: Glafkos Charalambous <info@...osec.org.uk>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Antisec for lulz - exposed (anti-sec.com)

did you just come out as ProSec then, and not the reciever of information
like you previously claimed?


"We had good lulz watching u for months.. trust me.. Even yr post reply
shows
how much we broke your heart and how pissed off you are.. take it easy bro..
don't take it to the heart.."

"What you are about to read is the complete destruction of the "Anti-Sec"
group. An organization know as "ProSec" contacted us with reports containing
information about the entire group and how it was operating. We don't know
who they are, they appear to be well-funded and top notch security experts
and what they have done against the group is invaluable to us and others
that they have and or would have been targeted."

So, how are you funded? Tell us more about ProSec please.

On Sat, Jan 2, 2010 at 12:38 AM, Glafkos Charalambous
<info@...osec.org.uk>wrote:

> Does it really hurt that much? Did you by any change notice any "summer"
> dates on the exposure?
>
> Don't feed us with your crap anymore kid.. jail shell break? grsec local
> root exploit? hypocrite!
>
> We had good lulz watching u for months.. trust me.. Even yr post reply
> shows
> how much we broke your heart and how pissed off you are.. take it easy
> bro..
> don't take it to the heart..
>
> You have to agree at one part though.. everyone had a good new year LULZ
> including yr closest friends (we have logs too) :]
>
> ps: You tell us security experts while at the same time you are calling
> your
> darkmindz site security experts ?
>    You said you only rm -rf security sites while you rm'ed makosolutions
> with no obvious reason.. you are a big lie and full of crap.. u know that..
> everyone else does..
>
> Nothing else to say.. move on with your life and your studies.. "_ATLEAT_"
> have a happy new year..
>
> With luv,
> iStoleYourBoxes
> ^_^
>
>
> -----Original Message-----
> From: full-disclosure-bounces@...ts.grok.org.uk
> [mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of
> stealthetv@...hmail.com
> Sent: Friday, January 01, 2010 6:12 AM
> To: full-disclosure@...ts.grok.org.uk
> Subject: Re: [Full-disclosure] Antisec for lulz - exposed (anti-sec.com)
>
> Like seriously omg, omfg! =O
>
> You think you really got romeo figured out, exposed, owned and shit?
>
> romeo did not use a proxy, almost everyone i know, knew that romeo
> is from Saudi Arabia, and yet none of you 'well-funded top notch
> security experts' (lmao) were able to ever get anywhere near the
> guy, like omg wtf dude...
>
> oh wow you can has recovery of files, but did you ever figure out
> how you guys got pwnt in the first place? NO LOL.
>
> tell us mr sec expert, tell us how did asta loose there server and
> dignity infront of everyone after they saw what kinda shit you guys
> do on there, better yet, tell us what happened to your OWN server
> like 10 times in a row, wiped once, wiped twice, wiped thrice, etc.
> lulz rawr much?
>
> What else did your expert forensic investigation tell you?, other
> than using recovery tools and strings, do your really think you got
> any skills in there? doooo eeeet and tell us how the hackers got in
> -_-
>
>
> "With the use of sleuthkit in our investication we validated the
> existance of the hax directory and the ll.tar
> file on /dev/sdb2"
>
> OMG IT TAKES SO MUCH SKILLS TO VALIDATE THAT, RESPECT.. lol -_-
>
> k, very cool story, bro.. very cool story, now i am talking from a
> completely viewer perspective here, do not count me in any sides or
> anything, but from what i can see, the kid got your shit owned last
> summer in his summer break being bored and shit, took you the bunch
> of well-funded, top notch, awesome security experts all year long
> to come up with this.. the audience requests more!, get romeo
> behind bars and let the world see it or atleast, ATLEAT figure out
> how the dude got into your servers, that should be a whole lot of
> help to the security industry right? should not be hard really, you
> got his intel figured out, you got a whole connection between
> 'romeo' and 'Faisal Hourani', a good list of dynamic IP's from a
> Saudi Arabian ISP, do it already and take down anti-sec for lyfe!
>
> eh, good luck and everything with the destruction etc etc, but let
> me remind you:
>
> "The reason that we decided to start looking into this subject, was
> to see how and why my dedicated hosting
> server was compromised despite the fact that it was secure enough
> to provide access to the outside world."
>
> ....10,000 lines later, a year and loads of experts behind your
> back and you still cant figure out the 'how' :]
>
> Much Love,
> iStoleTheTV
> <3
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ