lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <7D8E00B7FC6E87438AEE9091E655D9FE1D16A4FA@MB01.corp.ponderosatel.com> Date: Fri, 29 Mar 2013 16:25:22 +0000 From: Daniel Sichel <daniels@...derosatel.com> To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk> Subject: Donkey Kick Exploit > I could go thru this list and make money turning all you assholes in... > > I found a flaw in my front door's lock. It's called a "donkey kick" and is quite > effective on 98% of all door locks. > > you guys slay me. > > > > FOAD Do you have proof of concept code on the donkey kick thing? I am developing in a new environment Basic Replay ApplY (BRAY) using HEap EnhancEd HArdWare (HEEHAW) and am very interested in your 'sploit. Thanks Dan S. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/