lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4EC841FA.6020802@fibertel.com.ar>
Date: Sat, 19 Nov 2011 20:55:38 -0300
From: root <root_@...ertel.com.ar>
To: unlisted-recipients:; (no To-header on input)
CC: full-disclosure@...ts.grok.org.uk
Subject: Re: Ubuntu 11.10 now unsecure by default

You say there are at least 10 configurations mistakes specific to Ubuntu
that allows you to "exploit" it. Care to name one?

If you can't, maybe you can name other, more secure Linux distro in
which your 10 ways do not work.

Fedora do not count as it is unusable.

On 11/19/2011 06:18 PM, GloW - XD wrote:
> dude, you have GOT to be kidding.
> I can exploit Ubuntu 2011 server and client about 10 ways, and
> probably same with half this list, it is INDED entry level, or, just
> stop handding it out on magazines with "how to use ubuntu! Move to
> easy linux now!" promos, and then your words have merit.
> 
> 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ