lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CALCvwp44MbCHtNWGiw7gAi0eSvkgMqW2ZYPyxkjJBV69qAmm1Q@mail.gmail.com> Date: Mon, 21 Nov 2011 09:26:14 +1100 From: xD 0x41 <secn3t@...il.com> To: Memory Vandal <memvandal@...il.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Ubuntu 11.10 now unsecure by default You need to scrape up on your English, i clearly stated things here, do not try and bend any rules, I simply stated , this feature has been in MS for years... and yea, so what, ?? Its disabled by default, that doesnt mean it still is not there, idiotx2. YOU learn english. I have nothing to proove... I wont open my arse for Valdis or his nerd squad,... ill help those who sincerely ask it. bye now chump. On 20 November 2011 18:01, Memory Vandal <memvandal@...il.com> wrote: > > >> On Sun, Nov 20, 2011 at 2:46 AM, xD 0x41 <secn3t@...il.com> wrote: >> Ok well how about lets put it simply... >> >> MS have had a Guest user, i believe it is MSUSER*** since what, 1970 >> ? I know locally, i could possibly manipulate registry keys and make >> this user 'login' ready... but at this point i have local ax, so a. we >> know ms guest user cannot be touched remotely , or is someone putting >> up theyre own 0day wich can remotely change ms's inbuilt user... (as i >> thought, no one will answer that bit... there is no way to exploit >> it). >> > > you is gotta be kidding, go & learn windows lamer. guest user in disabled by > default in windows unlike ubuntu. i have seen a lot people like you claiming > to be security experts when they dont know windows which even any office > clerk do. > > MemoryVandal > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists