lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <7F6A1A84-3AF8-4108-913B-7D8EE59B6231@gmail.com> Date: Tue, 25 Oct 2011 23:08:57 -0700 From: Andrew Farmer <andfarm@...il.com> To: adam <adam@...sy.net> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: I know its old, but what the heck does this do... (exposing a tool...) On 2011-10-25, at 19:15, adam wrote: > http://home.no/exploited/exploits/kmodaxx.c (almost[?] identical code, > claims to be a remote kernel root exploit) > http://www.securitylab.ru/forum/forum32/topic3728/?PAGEN_1=2 (very similar > code, claims to be an IIS exploit) > http://seclists.org/fulldisclosure/2003/Jun/456 (didn't read entire thread, > code is mentioned though) > > I'm sure there's more, but this kinda reminds me of that leaked "private > exploit" on pastebin a few weeks back (you know, the one that was nice > enough to create a _local_ root account), and insisted that it was private > private private and specifically said NOT to leak it. Well, I'll give it this -- it's one of the smaller Perl IRC bots I've seen in a while. ;) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists