lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAPGeVWP9oDhJzTyE=D6qz6SPkjoep0qrNQ+xDiXKCBKtTDNmkg@mail.gmail.com> Date: Fri, 8 Jul 2011 19:55:35 +0000 From: Sanguinarious Rose <SanguineRose@...ultusTerra.com> To: full-disclosure@...ts.grok.org.uk Subject: Re: XerXes DoS tool Leak. not so 0day now! -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hello, I hate to break it to you but that isn't the tool used by jester. I wrote it during research on possibilities on how his tool functioned. There is allot of bugs since it was more of a hack together of code rather then being 100% viable. I designed it to run using torsocks wrapper (http://code.google.com/p/torsocks/) with a 2nd copy running to cycle the tor nodes due to me being lazy at wanting to code SOCKS5 in C. If you do some beta runs per above how to use it you find it doesn't switch tor exit nodes either. I also found out latter the null byte, "\0", was not required for it to have the same effects. - - William Welna -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iF4EAREIAAYFAk4XYW0ACgkQdBwqj+jihCWGtwD+N6hUtr+aXj8xJVZjKvdX1wes Uxr4DOyWuXVQmhkjXv8A/20bdh5tMA2wVqrSPdtJCvZzuU1Tgii/+Isopskxp1Qv =qWIU -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists