lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CALCvwp41pi5FFMMZ+XBSoiKz5fS073MoEeF10m0uAGajNA8gkA@mail.gmail.com> Date: Mon, 21 Nov 2011 09:24:09 +1100 From: xD 0x41 <secn3t@...il.com> To: Memory Vandal <memvandal@...il.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Ubuntu 11.10 now unsecure by default ou is gotta be kidding, go & learn windows lamer. guest user in disabled by default in windows unlike ubuntu. i have I have just said that, the f**king deature has been here for ages in m$ , are you stupid ? anyhow, yes, exactly, it has been in windows for fucking years... thats exactly what i tried to say, idiot. On 20 November 2011 18:01, Memory Vandal <memvandal@...il.com> wrote: > > >> On Sun, Nov 20, 2011 at 2:46 AM, xD 0x41 <secn3t@...il.com> wrote: >> Ok well how about lets put it simply... >> >> MS have had a Guest user, i believe it is MSUSER*** since what, 1970 >> ? I know locally, i could possibly manipulate registry keys and make >> this user 'login' ready... but at this point i have local ax, so a. we >> know ms guest user cannot be touched remotely , or is someone putting >> up theyre own 0day wich can remotely change ms's inbuilt user... (as i >> thought, no one will answer that bit... there is no way to exploit >> it). >> > > you is gotta be kidding, go & learn windows lamer. guest user in disabled by > default in windows unlike ubuntu. i have seen a lot people like you claiming > to be security experts when they dont know windows which even any office > clerk do. > > MemoryVandal > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists