lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100531151655.4cea2c43@nolife>
Date: Mon, 31 May 2010 15:16:55 +0200
From: MustDie <mustdieplease@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: DoS vulnerabilities in Firefox,
 Internet  Explorer, Chrome and Opera

On Mon, 31 May 2010 14:41:52 +0200
"Jan G.B." <ro0ot.w00t@...glemail.com> wrote:
> 
> Hi 1337 r3s34|2ch3|2,
> 
> Yeah, you're right! Bash should analyse the bash script, given
> parameters to programs and alike and then change the amount to a
> reasonable value of 100000000 decimals.
> 
> Btw - have you yet alerted the world of fork bombs, at all?! We're
> waiting in awe.
> 
> Regards

D'oh! This Must*Die* thing really messed you up ;)

I thought the irony was obvious enough in my answer to the OP - seems like I was wrong !
Yet I think you're right Jan, fork bombs might be an interesting field.
Maybe my favourite sec expert could look further into it and share some even more interesting discovers, letting XSS and CSRF apart for some time.
My dear MustLive, let's start with an exercise, pretending your brain is a Turing machine, have it running :
---
i = 0;
while (true) {
	i++;
}
---

Should keep him busy for some time. Plus we might be witnesses of the first human brain overflow in history of Mankind - how _cool_ is that ?

-NL

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ