It won't.
The whole point is to have full local access to hard-drives (from a locked
workstation for eg), to modify/read things in it.
The loaded environment IS a live environment. I would say: almost a copy of
the install CD loaded from the hard-drive.
What you can do is : take the SAM, modify
anyway.
Don't get me wrong , I'd love to see whoever deserves it go down ;)
Keep up the good work!
On Apr 24, 2013 8:03 AM, Georgi Guninski gunin...@guninski.com wrote:
On Tue, Apr 23, 2013 at 05:12:17PM +0200, Gregory Boddin wrote:
You have to think about end-users as well ... Those are impacted
That's indeed not rocket science.
Nobody should release their disclosure/exploit (or give hint about it) in
the wild before letting the vendor fix it.
There's already enough blackhats out there selling/using those.
I sure hope I am not the only person in the list who wishes responsible
. Check their disclaimers.
On Tue, Apr 23, 2013 at 04:14:53PM +0200, Gregory Boddin wrote:
That's indeed not rocket science.
Nobody should release their disclosure/exploit (or give hint about it) in
the wild before letting the vendor fix it.
There's already enough blackhats out
What's the cookie expiration time ? Does the server's session overlap it ?
If it's pretty long :
Catch someone's computer backup (happy cloud) , import cookies - same
effect .
If yes, I say it's a valid note ;)
On 8 April 2013 18:19, Chris Roussel la...@lavabit.com wrote:
Dear Hackers,
That would be lovely, we're already taking 12 like that a day, don't bring
it here...
I guess he's trying to call Anonymous for revenge
On Mar 27, 2013 9:57 AM, Bryan Baldwin br...@katofiad.co.nz wrote:
On 03/27/13 16:21, Jerry dePriest wrote: