[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAhuQpPJx=FfptOZQO5Hw5m0OJtgVMbZektowhBuh61t2oO5AA@mail.gmail.com>
Date: Thu, 11 Jul 2013 23:42:28 +0900
From: アドリアンヘンドリック
<unixfreaxjp22@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: nginx 1.3.9/1.4.0 x86 brute force remote
exploit (CVE-2013-2028)
I would like to personally thanked KingCope for this PoC. A great work for
the GREATER good impact.
Still peeking on the code for tests BUT with very happy feeling,because if
this works very well (which I know it will be) then (say) 80+% of the
Malware Exploit Kit servers and Malware proxy servers & infectors which
mostly are running on NGNIX are ALL affected (hahaha!)
A vulnerability for the good guys, and ZERO f*ckin DAY for those bad guys!
Seriously. I am saying this out loud in the Full Disclosure maillist for
all of the good guys to know and bad guys to start to sweat!!
(not provoking anything) (grins)
---
Hendrik ADRIAN / @unixfreaxjp
#MalwareMUSTDie.org,NPO
*king cope* isowarez.isowarez.isowarez at googlemail.com
<full-disclosure%40lists.grok.org.uk?Subject=Re%3A%20%5BFull-disclosure%5D%20nginx%201.3.9/1.4.0%20x86%20brute%20force%20remote%20exploit%0A%09%28CVE-2013-2028%29&In-Reply-To=%3CCAFB%3DmGALhq9YhFjFZNMG6kzPjU09KUBMVWpa2Q6%2BfXAKNt8dKQ%40mail.gmail.com%3E>
*Wed Jul 10 17:43:56 BST 2013*
------------------------------
(see attachment)
Kingcope
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130710/6d71d416/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ngxunlock.pl
Type: application/octet-stream
Size: 23381 bytes
Desc: not available
URL: <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130710/6d71d416/attachment.obj>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists