lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALCvwp4xBdTjGxoD=cRU8R8GeLboPK_3Y0vUvGhPHQqobi7Tbw@mail.gmail.com>
Date: Sat, 12 Nov 2011 14:15:35 +1100
From: xD 0x41 <secn3t@...il.com>
To: baqstabz <baqstabz@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Microsoft Windows vulnerability in TCP/IP
 Could Allow Remote Code Execution (2588516)

unleash the dragons and let you see what a 10k botnet feels like.

unleash away son :)
another, hider...
always have some bs to say, but, your just jealous... as most lame
botnet owners, are.. ddos, is yo9ur no.1 skill, and only reason your
here, is to try get the .cpp scanner, and thats that.
so you go stfu, and, believe me, 10k, is nothing.
youcome out , and show yourself, and, your bum will be much worse off than b4.
now, dont play with adults, go jack some net...lame d0skid.


On 12 November 2011 13:42, baqstabz <baqstabz@...il.com> wrote:
> Judging by your posts I would go out on the edge and say that you have about
> as much chance of having 0-day (yes, that is including xxs) as your mommy.
> face it lol
>
> Now please, stfu son, you're sounding like a total tardlump; otherwise we
> will have to unleash the dragons and let you see what a 10k botnet feels
> like.
>
>
> On 11/11/2011 23:26, xD 0x41 wrote:
>>
>> Indeeed.
>> Seeing how the wolves are, i ceertainly would bnot release it.
>> i am only saying, I am using cpp, and windows, and, the exploit
>> bypasses all protections, but, since you guys dont have the actual
>> real poc for it, i guess, i would not be saying anything more, and,
>> ill be leaving it, for the proper poc author, to make that choice,
>> wich, personally, i would never handout to a bunch of disrepectful
>> people, as i see, when this is, nothing, i habve held onto, atleast 2
>> GOOd MS 0days for years, you rally think, i will handout the right way
>> todo this ?
>> pfft..   yer right, lets go hand everyone the ms bug :PP ofc, why
>> would i ever not want a 10 k botnet up in a day...  hell yea!
>> i would neverm, give more about this, on this topic, because, i have
>> seen how people are now on this list and, saddens me that half of you
>> do not have a brain. unfortunately..and, saince i dont wish to break
>> any deals made with ms etc, then, i cannot say anything, i dont know,
>> why this is hard to understand..and, i will NOT handout a working
>> scanner, regardless...
>> and, believe it, it does NOT take 49days atall to exploit... theres
>> alot, you dont know..yet.
>>
>> dont ask me further, please.
>> i should never have even said anything, again, i wont make that
>> mistake again, the proof, will as always be n the pudding...
>> later.
>>
>>
>> On 12 November 2011 10:17, Michal Zalewski<lcamtuf@...edump.cx>  wrote:
>>>>
>>>> next time, i wont say shit, and, believe it.
>>>
>>> Well it's just that the attack you are describing will be thwarted by
>>> setting a sticky bit on /tmp, and you have not demonstrated otherwise.
>>>
>>> /mz
>>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ