[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALCvwp7dCn8pSTKDjQ=v+J+KLLb1nd53DkA=c7REh0Tm6bJTRA@mail.gmail.com>
Date: Thu, 6 Oct 2011 11:19:12 +1100
From: xD 0x41 <secn3t@...il.com>
To: Juan Sacco <juansacco@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: New open source Security Framework
as i said again stop the lies.'
Take a look if you want:
<?xml version="1.0" encoding="UTF-8"?>
<Module>
<Exploit NameXML="Free Float FTP Server"
CodeName="FreeFloatFTPServer.py" Platform="windows" Service="ftp"
Type="remote" RemotePort="21" LocalPort="" ShellcodeAvailable="R"
ShellPort="4444" SpecialArgs="">
</Exploit>
<Information Author="Blake" Date="August 23 2011" Vulnerability="N/A">
Free Float FTP Server USER Command Remote Buffer Overflow Exploit
when parsing the command 'USR', which leads to a stack based overflow.
Also Free Float FTP Server allow remote anonymous login by default
exploiting these issues could allow an attacker to compromise the
application, access or modify data.
</Information>
JSacco
I did, and i also looked at hyour git src to.
screw u and the pack,. until it is pro, i wont b near it, and, it wont EVER
b pro, with YOU runnin it,. who will give u GOOD stuff, for 2bux.. fool.
and you dare lie, anyone can check what i just saw, and, thats him, plain
out lying about his stuff, instead of just, admitting, "ok well, it is new,
and, could be, fixed alittle..any siggestions are welcome..."
as, i did give him already one in PM... but now, pfft. stop ccing me pls.
xd
On 6 October 2011 11:16, Juan Sacco <juansacco@...il.com> wrote:
> Hey.. I already gave you an answer about this.
>
> AGAIN. For the last time.
> I respect the author's name of all the exploits added to Exploit Pack, like
> you suggest in a terrible and way.. Insulting and posting like 10 mail to
> the this list. I will add a " # Thank you [AUTHOR NAME ] for let us use your
> public script " in the top of all new exploit added to Exploit Pack
> Framework.
>
> ** Also, I created a mailing list to discuss this kind of things, report
> bugs and much more ( But sorry, NO INSULTING is allowed there ) **
>
> As other people told you stop doing chatting here. This is not a forum.
>
> JSacco
>
> On Wed, Oct 5, 2011 at 8:57 PM, xD 0x41 <secn3t@...il.com> wrote:
>
>> <Information Author="Blake" Date="August 23 2011" Vulnerability="N/A">
>> Free Float FTP Server USER Command Remote Buffer Overflow Exploit
>> when parsing the command 'USR', which leads to a stack based overflow. Also Free Float FTP Server allow remote anonymous login by default
>> exploiting these issues could allow an attacker to compromise the application, access or modify data.
>> </Information>
>>
>>
>> erm, sorry this dont count, it should be IN the code, not, after running it :P
>> thats bs mate, and i wont agree with your crap, until you see my point really. It is, something you write, compared to running thwe GUI..
>>
>>
>> xd
>>
>>
>>
>> On 6 October 2011 10:47, Juan Sacco <juansacco@...il.com> wrote:
>>
>>> Hey,
>>> Its really a shame that you didn't even take like 2 minutes to watch the
>>> source code of Exploit Pack before create an opinion.
>>> This can't be a copy of CANVAS. Canvas is made on Python. Exploit Pack
>>> JAVA. See the diference? Also, please take a look at the interface design,
>>> both are really different. Show me where Exploit Pack is similar to Canvas!
>>> I think you spent too much time looking for Waldo :-D
>>>
>>> We respect the exploit author and that is why I add them at the first
>>> line of the XML file
>>> You should run the program before creating this crappy post with your
>>> nonsense opinions ( Harassing the free work of others, you wrote lke 5 - 6
>>> insulting posts in like.. 2 minutes?.. Dude go find a girl, come on )
>>>
>>> Take a look if you want:
>>>
>>> <?xml version="1.0" encoding="UTF-8"?>
>>> <Module>
>>>
>>> <Exploit NameXML="Free Float FTP Server" CodeName="FreeFloatFTPServer.py" Platform="windows" Service="ftp" Type="remote" RemotePort="21" LocalPort="" ShellcodeAvailable="R" ShellPort="4444" SpecialArgs="">
>>> </Exploit>
>>>
>>> <Information Author="Blake" Date="August 23 2011" Vulnerability="N/A">
>>> Free Float FTP Server USER Command Remote Buffer Overflow Exploit
>>> when parsing the command 'USR', which leads to a stack based overflow. Also Free Float FTP Server allow remote anonymous login by default
>>> exploiting these issues could allow an attacker to compromise the application, access or modify data.
>>> </Information>
>>>
>>> JSacco
>>>
>>> On Wed, Oct 5, 2011 at 8:16 PM, xD 0x41 <secn3t@...il.com> wrote:
>>>
>>>> Heya jeff,
>>>> The author is clearly not smart.
>>>> He is copying other codes, this is a plain rip off of canvas...hehe...
>>>> and same with his insect pro... he stole metasplit for tht one, then he
>>>> wants repect, when we see him removing simplly one line wich would atleast
>>>> say a ty and, show [ppl who writes, is maybe sometimes stabler than other
>>>> authors, it would be better to have this in, not out.. he should be able to
>>>> see thats how it works with exploit code/pocs in general... sometimes, if i
>>>> see php code from one person, i will tend to look, but if it was from an
>>>> unknown person, i prolly wouldnt.
>>>> But this (open sauce) project, i will download and waste 5minutes on.
>>>> Then illm go back to Backbox and BT5 and things wich work :)
>>>> hehe
>>>> (this guy is really mad about his app... and i mean, dang mad angry! I
>>>> will buy some tissues and send to him, that is my donation for his app)
>>>> :))
>>>> xd
>>>>
>>>>
>>>> On 6 October 2011 08:59, Jeffrey Walton <noloader@...il.com> wrote:
>>>>
>>>>> On Wed, Oct 5, 2011 at 5:32 AM, root <root_@...ertel.com.ar> wrote:
>>>>> > - * @author Stefan Zeiger (szeiger@...ocode.com)
>>>>> > - print " Written by Blake "
>>>>> > - <Information Author="Blake" Date="August 23 2011"
>>>>> Vulnerability="N/A">
>>>>> >
>>>>> > +#Exploit Pack - Security Framework for Exploit Developers
>>>>> > +#Copyright 2011 Juan Sacco http://exploitpack.com
>>>>> > +#
>>>>> > +#This program is free software: you can redistribute it and/or
>>>>> modify
>>>>> > it under the terms of the
>>>>> > +#GNU General Public License as published by the Free Software
>>>>> > Foundation, either version 3
>>>>> > +#or any later version.
>>>>> > +#
>>>>> > +#This program is distributed in the hope that it will be useful, but
>>>>> > WITHOUT ANY WARRANTY;
>>>>> > +#without even the implied warranty of MERCHANTABILITY or FITNESS FOR
>>>>> A
>>>>> > PARTICULAR
>>>>> > +#PURPOSE. See the GNU General Public License for more details.
>>>>> > +#
>>>>> > +#You should have received a copy of the GNU General Public License
>>>>> > along with this program.
>>>>> > +#If not, see http://www.gnu.org/licenses/
>>>>> GPL V3 - they had to encumber it to set it free?
>>>>>
>>>>> _______________________________________________
>>>>> Full-Disclosure - We believe in it.
>>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> Full-Disclosure - We believe in it.
>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>
>>>
>>>
>>>
>>> --
>>> _________________________________________________
>>> Insecurity Research - Security auditing and testing software
>>> Web: http://www.insecurityresearch.com
>>> Insect Pro 2.5 was released stay tunned
>>>
>>>
>>>
>>
>
>
> --
> _________________________________________________
> Insecurity Research - Security auditing and testing software
> Web: http://www.insecurityresearch.com
> Insect Pro 2.5 was released stay tunned
>
>
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists