lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 11 Jul 2013 23:42:28 +0900
From: アドリアンヘンドリック
 <unixfreaxjp22@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: nginx 1.3.9/1.4.0 x86 brute force remote
	exploit (CVE-2013-2028)

I would like to personally thanked KingCope for this PoC. A great work for
the GREATER good impact.
Still peeking on the code for tests BUT with very happy feeling,because if
this works very well (which I know it will be) then (say) 80+% of the
Malware Exploit Kit servers and Malware proxy servers & infectors which
mostly are running on NGNIX are ALL affected (hahaha!)

A vulnerability for the good guys, and ZERO f*ckin DAY for those bad guys!
Seriously. I am saying this out loud in the Full Disclosure maillist for
all of the good guys to know and bad guys to start to sweat!!
(not provoking anything) (grins)

---
Hendrik ADRIAN / @unixfreaxjp
#MalwareMUSTDie.org,NPO


*king cope* isowarez.isowarez.isowarez at googlemail.com
<full-disclosure%40lists.grok.org.uk?Subject=Re%3A%20%5BFull-disclosure%5D%20nginx%201.3.9/1.4.0%20x86%20brute%20force%20remote%20exploit%0A%09%28CVE-2013-2028%29&In-Reply-To=%3CCAFB%3DmGALhq9YhFjFZNMG6kzPjU09KUBMVWpa2Q6%2BfXAKNt8dKQ%40mail.gmail.com%3E>
*Wed Jul 10 17:43:56 BST 2013*
------------------------------

(see attachment)

Kingcope
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130710/6d71d416/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ngxunlock.pl
Type: application/octet-stream
Size: 23381 bytes
Desc: not available
URL: <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130710/6d71d416/attachment.obj>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ