lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 11 Jul 2013 09:49:50 -0500
From: Grandma Eubanks <tborland1@...il.com>
To: アドリアンヘンドリック
 <unixfreaxjp22@...il.com>
Cc: Full-Disclosure mailing list <full-disclosure@...ts.grok.org.uk>
Subject: Re: nginx 1.3.9/1.4.0 x86 brute force remote
 exploit (CVE-2013-2028)

There are already exploits for this vulnerability. This is just taking an
entirely different approach for internally accessible systems then what's
available, for a reason I can't yet discern.


On Thu, Jul 11, 2013 at 9:42 AM, アドリアンヘンドリック <unixfreaxjp22@...il.com>wrote:

> I would like to personally thanked KingCope for this PoC. A great work for
> the GREATER good impact.
> Still peeking on the code for tests BUT with very happy feeling,because if
> this works very well (which I know it will be) then (say) 80+% of the
> Malware Exploit Kit servers and Malware proxy servers & infectors which
> mostly are running on NGNIX are ALL affected (hahaha!)
>
> A vulnerability for the good guys, and ZERO f*ckin DAY for those bad guys!
> Seriously. I am saying this out loud in the Full Disclosure maillist for
> all of the good guys to know and bad guys to start to sweat!!
> (not provoking anything) (grins)
>
> ---
> Hendrik ADRIAN / @unixfreaxjp
> #MalwareMUSTDie.org,NPO
>
>
> *king cope* isowarez.isowarez.isowarez at googlemail.com
> <full-disclosure%40lists.grok.org.uk?Subject=Re%3A%20%5BFull-disclosure%5D%20nginx%201.3.9/1.4.0%20x86%20brute%20force%20remote%20exploit%0A%09%28CVE-2013-2028%29&In-Reply-To=%3CCAFB%3DmGALhq9YhFjFZNMG6kzPjU09KUBMVWpa2Q6%2BfXAKNt8dKQ%40mail.gmail.com%3E>
> *Wed Jul 10 17:43:56 BST 2013*
> ------------------------------
>
> (see attachment)
>
> Kingcope
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130710/6d71d416/attachment.html>
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: ngxunlock.pl
> Type: application/octet-stream
> Size: 23381 bytes
> Desc: not available
> URL: <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130710/6d71d416/attachment.obj>
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ