lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4BDF2DC6.6020509@ntlworld.com>
Date: Mon, 03 May 2010 21:10:46 +0100
From: Jacqui Caren-home <jacqui.caren@...world.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: go public to avoid jail

PsychoBilly wrote:
> The_UT went to jail because his Gonzales m8 kindly supplied irc logs 

A *long* time ago I found a buffer overflow issue with a MAC web server
reported to devs but no takeup. With only a few hundred web requests I
could take down a web server. Noddy stuff today but in those days (macs)
were considered almost bulletproof.

I published this and one "fanboi" said it could not be done. He offered
to host a web server and PAY me to demonstrate the process. I declined
to run the demo but sent him the script and told him how to run it and
what to expect. A few weeks later I emailed him and asked if he had run
it - he did not reply - a followup email bounced as "user unknown".

The reason I was not prepared to run the demo for him against his systems
- rdns gave a US DOD domain.

Moral: never play with (or against) a DOD BOFH - escpecialy a mac fanboi!

Jacqui

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ