[Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!
Dear Reader, In 48 hours, the anti-sec movement will publicly unveil working exploit code and full details for the zero-day OpenSSH vulnerability we discovered. It will be posted to the Full-Disclosure security list. Soon, the very foundations of Information Technology and Information Security will be unearthed as millions upon million of systems running ANY version of OpenSSH are compromised by wave after wave of script-kiddie and malicious hacker. Within 10 hours of the initial release of the OpenSSH 0-day exploit code, anti-sec will be unleashing powerful computer worm source code with the ability to auotmatically find and compromise systems running any and all versions of OpenSSH. This is an attack against all White Hat Hackers who think that running a Penetration Test simply searching for known vulnerabilities is all they have to do in order to receive their payment. Anti-sec will savor the moment when White Hat Hackers are made to look like fools in the eyes of their clients. Sincerely, -anti-sec ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!
hahaha, now u r releasing it I thought u guyz dont release or disclose vulnerabilities. ./Chuks On 7/20/09, Ant-Sec Movement anti.sec.movem...@gmail.com wrote: Dear Reader, In 48 hours, the anti-sec movement will publicly unveil working exploit code and full details for the zero-day OpenSSH vulnerability we discovered. It will be posted to the Full-Disclosure security list. Soon, the very foundations of Information Technology and Information Security will be unearthed as millions upon million of systems running ANY version of OpenSSH are compromised by wave after wave of script-kiddie and malicious hacker. Within 10 hours of the initial release of the OpenSSH 0-day exploit code, anti-sec will be unleashing powerful computer worm source code with the ability to auotmatically find and compromise systems running any and all versions of OpenSSH. This is an attack against all White Hat Hackers who think that running a Penetration Test simply searching for known vulnerabilities is all they have to do in order to receive their payment. Anti-sec will savor the moment when White Hat Hackers are made to look like fools in the eyes of their clients. Sincerely, -anti-sec -- -- Gichuki John Ndirangu, I.T Security Analyst and Penetration Tester infosig...@inbox.com {FORUM}http://lists.my.co.ke/pipermail/security/ http://nspkenya.blogspot.com/ http://chuksjonia.blogspot.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] n3td3v making ass of himself on twitter
Reminds me of that song from collegehumor.com We didn't start the flamewar First post... Fucking gay... Second post... Go away snip All of you can suck my dick!!! 8D heheheh, good times On Sat, Jul 18, 2009 at 12:22 AM, ghostgho...@gmail.com wrote: Feel free to shut the fuck up, because no one cares about YOU or NETDEV. You're current posts polluting this list is just as bad as anything he has ever posted. MATCHING WITS WITH A RETARD IS NOT NEWS WORTHY. On Fri, Jul 17, 2009 at 2:30 PM, Ureleeturel...@gmail.com wrote: lol. u r such an idiot. i call u a kid because u r much younger than i. thats y ur a kid. o, and cause u live @ home w/ ur mom and make false accusations all day on the twitter. why did i say what i said? cause u do it all day on twitter, make false accusations, and lie. i gave u a dose of ur own medicine. not very nice is it? i dont know if u r ant sec, i dont know if ur anti-sec, i dont know if u r hdmoore, i dont know you from adam. i still STILL dont care either. n3td3v isnt a group. n3td3v is ur name, ur online name. the fact that u have a group with 10 people on it that like u, and 3950 more that watch u to see how much u make a full of yourself is hilarious. you are a self-righteous troll who talks about himself in the 3rd person and is so stuck up his own ass that you had to give your group ur own name. u conceited wh0re. u dont have a career, no one cares about ur life, and your reputation is shot to hell. ur targeted because u target others. u are being smeared because u smear others. like i always have, i call u out about ur lies. am i stalking u on twitter? nope, u invited me. you dumbazz. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Anti-Sec - We're not really Anti-Sec! Sorry Hackforums. It was all a big joke by anonymous!
*gay voice* I'm stunned On Thu, Jul 16, 2009 at 11:37 PM, Ronny Lawsonronnylaw...@gmail.com wrote: Gee, we didn't see that coming or anything. On Jul 16, 2009, at 2:32 PM, Ant-Sec Movement wrote: Yes, that's right, we're not really Anti-Sec. We have no 0-day exploits. We did not hack ImageShack or Blackhat-forums or Astalavista. That was the real Anti-Sec whomever they are. It was all a big joke. But our goal was achieved. We caused a huge stir on Hackforums.net. We've made them look like utter fools. Geez, some of them are like Let's go to the authorities! Mummy and Daddy I wanna go to authorities because my hacking forum has been threatened. What a bunch of wimps. You're on a hacking website. You've gotta expect these things. It's all part of the deal. We've proved one thing...none of you on Hackforums.net should be there...not even Jesse Labrocca. He should spend more time with his family rather then worry about a silly little hacking forum. Or maybe spend more time on your money-making business. Silly person. Sincerely, Anonymous People ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!
Are people viewing this as a credible threat, or just FUD? This claim that ANTI-SEC has a 0-day remote exploit for OpenSSH spanning multiple versions is consistent with the logs that have been released documenting these attacks. Many people seem to have written those off as brute force attacks, but as far as I'm concerned the jury is still out. On Mon, Jul 20, 2009 at 2:52 AM, Gichuki John Chuksjoniachuksjo...@gmail.com wrote: hahaha, now u r releasing it I thought u guyz dont release or disclose vulnerabilities. ./Chuks On 7/20/09, Ant-Sec Movement anti.sec.movem...@gmail.com wrote: Dear Reader, In 48 hours, the anti-sec movement will publicly unveil working exploit code and full details for the zero-day OpenSSH vulnerability we discovered. It will be posted to the Full-Disclosure security list. Soon, the very foundations of Information Technology and Information Security will be unearthed as millions upon million of systems running ANY version of OpenSSH are compromised by wave after wave of script-kiddie and malicious hacker. Within 10 hours of the initial release of the OpenSSH 0-day exploit code, anti-sec will be unleashing powerful computer worm source code with the ability to auotmatically find and compromise systems running any and all versions of OpenSSH. This is an attack against all White Hat Hackers who think that running a Penetration Test simply searching for known vulnerabilities is all they have to do in order to receive their payment. Anti-sec will savor the moment when White Hat Hackers are made to look like fools in the eyes of their clients. Sincerely, -anti-sec -- -- Gichuki John Ndirangu, I.T Security Analyst and Penetration Tester infosig...@inbox.com {FORUM}http://lists.my.co.ke/pipermail/security/ http://nspkenya.blogspot.com/ http://chuksjonia.blogspot.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!
FUD as it seems to be synonymous with FTW these days. Stupid kids, they are all alike. On Mon, Jul 20, 2009 at 3:51 PM, Ben Greenfieldb...@struxural.com wrote: Are people viewing this as a credible threat, or just FUD? This claim that ANTI-SEC has a 0-day remote exploit for OpenSSH spanning multiple versions is consistent with the logs that have been released documenting these attacks. Many people seem to have written those off as brute force attacks, but as far as I'm concerned the jury is still out. On Mon, Jul 20, 2009 at 2:52 AM, Gichuki John Chuksjoniachuksjo...@gmail.com wrote: hahaha, now u r releasing it I thought u guyz dont release or disclose vulnerabilities. ./Chuks On 7/20/09, Ant-Sec Movement anti.sec.movem...@gmail.com wrote: Dear Reader, In 48 hours, the anti-sec movement will publicly unveil working exploit code and full details for the zero-day OpenSSH vulnerability we discovered. It will be posted to the Full-Disclosure security list. Soon, the very foundations of Information Technology and Information Security will be unearthed as millions upon million of systems running ANY version of OpenSSH are compromised by wave after wave of script-kiddie and malicious hacker. Within 10 hours of the initial release of the OpenSSH 0-day exploit code, anti-sec will be unleashing powerful computer worm source code with the ability to auotmatically find and compromise systems running any and all versions of OpenSSH. This is an attack against all White Hat Hackers who think that running a Penetration Test simply searching for known vulnerabilities is all they have to do in order to receive their payment. Anti-sec will savor the moment when White Hat Hackers are made to look like fools in the eyes of their clients. Sincerely, -anti-sec -- -- Gichuki John Ndirangu, I.T Security Analyst and Penetration Tester infosig...@inbox.com {FORUM}http://lists.my.co.ke/pipermail/security/ http://nspkenya.blogspot.com/ http://chuksjonia.blogspot.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!
wasn't anti-sec the one fighting against guys who share exploits with the world so script kiddies use them? lol, now those guys will kill them selfs! ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [USN-805-1] Ruby vulnerabilities
=== Ubuntu Security Notice USN-805-1 July 20, 2009 ruby1.8, ruby1.9 vulnerabilities CVE-2009-0642, CVE-2009-1904 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: libruby1.8 1.8.4-1ubuntu1.7 ruby1.8 1.8.4-1ubuntu1.7 Ubuntu 8.04 LTS: libruby1.8 1.8.6.111-2ubuntu1.3 ruby1.8 1.8.6.111-2ubuntu1.3 Ubuntu 8.10: libruby1.8 1.8.7.72-1ubuntu0.2 libruby1.9 1.9.0.2-7ubuntu1.2 ruby1.8 1.8.7.72-1ubuntu0.2 ruby1.9 1.9.0.2-7ubuntu1.2 Ubuntu 9.04: libruby1.8 1.8.7.72-3ubuntu0.1 libruby1.9 1.9.0.2-9ubuntu1.1 ruby1.8 1.8.7.72-3ubuntu0.1 ruby1.9 1.9.0.2-9ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: It was discovered that Ruby did not properly validate certificates. An attacker could exploit this and present invalid or revoked X.509 certificates. (CVE-2009-0642) It was discovered that Ruby did not properly handle string arguments that represent large numbers. An attacker could exploit this and cause a denial of service. (CVE-2009-1904) Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.7.diff.gz Size/MD5:50134 5f4a5f8b0673daefc2d23f8a6c26de5b http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.7.dsc Size/MD5: 1037 bd31d154e2bf758ba2f4c70d4fb701de http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4.orig.tar.gz Size/MD5: 4308915 2994203e0815ea978965de34287c5ea2 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/irb1.8_1.8.4-1ubuntu1.7_all.deb Size/MD5: 207960 63fd11d90068191477668a8b94093133 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/rdoc1.8_1.8.4-1ubuntu1.7_all.deb Size/MD5: 272810 244403ec49ffed4bc7b6edfb42bdf3c1 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ri1.8_1.8.4-1ubuntu1.7_all.deb Size/MD5: 758734 40b1ddeeacc1edda07d86fbc80f9fa24 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-elisp_1.8.4-1ubuntu1.7_all.deb Size/MD5: 182718 ec46c528f8647433fb627568f26b2d8e http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/ruby1.8-examples_1.8.4-1ubuntu1.7_all.deb Size/MD5: 214970 f28c3d8c6c50dfb8c4a0d02c2e29221c amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-1ubuntu1.7_amd64.deb Size/MD5: 1041246 3d3c6df2d9abfa229fb2ac46545592dd http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-1ubuntu1.7_amd64.deb Size/MD5: 1508222 adae95adb02ac3c57fcafb4ee17fae16 http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-1ubuntu1.7_amd64.deb Size/MD5: 718734 384c516841a05e15436d6ce962901dd0 http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8_1.8.4-1ubuntu1.7_amd64.deb Size/MD5: 189960 e3bd07da796d8a7b898c1ffabd957afb http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libdbm-ruby1.8_1.8.4-1ubuntu1.7_amd64.deb Size/MD5: 170390 3793c0fa4350318de80fc4894567606a http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libgdbm-ruby1.8_1.8.4-1ubuntu1.7_amd64.deb Size/MD5: 171572 b2ed8ff5dc43d05c6a604c340a8c0eb6 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libopenssl-ruby1.8_1.8.4-1ubuntu1.7_amd64.deb Size/MD5: 275240 e45db5b9a283e609e301533ee807e04c http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libreadline-ruby1.8_1.8.4-1ubuntu1.7_amd64.deb Size/MD5: 171018 2c4f774419fa7c5e7bc8f7dc6c868d82 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.8/libtcltk-ruby1.8_1.8.4-1ubuntu1.7_amd64.deb Size/MD5: 1798814 81a0b86c8ca778f4f42e20d58e0b20e5 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8-dbg_1.8.4-1ubuntu1.7_i386.deb Size/MD5: 871448 4d6f830a139d5667e4baadaff5ef0386 http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/libruby1.8_1.8.4-1ubuntu1.7_i386.deb Size/MD5: 1421876 65f3ea4868bbe4c84ecb69aa3638dfbc http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.8/ruby1.8-dev_1.8.4-1ubuntu1.7_i386.deb Size/MD5:
Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploit code - 48 hours until it is publicly released!
1) Register 'Anti-Sec *' with Free Mail Provider 2) Claims to Full Disclosure 3) 4) PROFIT. On Mon, Jul 20, 2009 at 10:16 AM, BlackHawkhawkgot...@gmail.com wrote: wasn't anti-sec the one fighting against guys who share exploits with the world so script kiddies use them? lol, now those guys will kill them selfs! ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploitcode - 48 hours until it is publicly released!
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 the level of ignorance on this list is overwhelming at times. the individual posting as [anti.sec.movem...@gmail.com] is not affiliated with, nor is a representative of, the anti-sec movement. he is simply a troll. stop indulging this cockfag, and maybe he'll fuck off. it _is_ possible, even probable, that there is an openssh exploit circulating among anti-sec groups -- we've seen evidence of this in several logs that have been shared (not just those posted to Full- Disclosure). but no anti-sec group has ever even bragged about having $EXPLOIT, and they've certainly never shared $EXPLOIT code. so there's really no reason for you skiddies to get your panties in a twist since you'll never see the exploit code, and there's no need for whitehats to incite fear and paranoia in their community -- you should only be worried if you are being targeted by anti-sec. oh, right -- that's most of you on this list. do your research and know your shit. stop believing everything you read. -BEGIN PGP SIGNATURE- Charset: UTF8 Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 3.0 wpwEAQMCAAYFAkpkox4ACgkQacHgESW3wZpb2AP/bnmxzy16/EbkTEpesiRV+S70kZ95 wOSsayUMxjdah82320O9ihHqGn+23V4ps5pJb4okns354Xp4J05z12WhKL3uCYwy8/IV OdEqJXF4M8BsRwmZcPbNU7Qs+QPmFYPpVSRuaMq2bJCF8jNsFyazk226zUWWDssFPOKV RPWJn6E= =0bZq -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] A brief message on the topic of Anti-Sec
Hi, My name is DeadlyData. I enjoy long walks on the beach, getting pizzas delivered to my house when my d0x were dropped, and having anal sex with my buddy Sean/TD Debug. My 1337 hack group The Defaced (thedefaced.org) has been making threats and being homo- erotic on F-D. I'm sure you've seen the email from anti.sec.movem...@gmail.com that said Please check out our website at: http://romeo.copyandpaste.info/; Well, that is RoMeO's website (a TheDefaced admin!) dedicated to posing as a 1337 blackhat haqr. He's got cool things on there like portions of phrack zines, anti- sec ownages (that were done by the other anti-sec factions. You think we can hack? GOOD JOKE!!!), some zines from the olden days, and a speech by our buddy strayfe/n3w7yp3 (we love his dick, but we don't think he likes us ;( We lub you strayfe!). I just wanted to let you all know that our group has no 0days. Don't waste your time reading anti.sec.movem...@gmail.com's bullshit. Just worry about the other anti-sec factions. Ok? Well, then have a nice day and don't hold your breathe waiting for the OpenSSH 0day. 0pen0wn.c (http://www.nopaste.com/p/aDTdT5s1C) was it! Sincerely, DeadlyData ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] A brief message on the topic of Anti-Sec
Ok? Well, then have a nice day and don't hold your breathe waiting for the OpenSSH 0day. 0pen0wn.c (http://www.nopaste.com/p/aDTdT5s1C) was it! ya the hex encoded irc bot rm -rf ? :) 2009/7/20 the.defa...@hushmail.com Hi, My name is DeadlyData. I enjoy long walks on the beach, getting pizzas delivered to my house when my d0x were dropped, and having anal sex with my buddy Sean/TD Debug. My 1337 hack group The Defaced (thedefaced.org) has been making threats and being homo- erotic on F-D. I'm sure you've seen the email from anti.sec.movem...@gmail.com that said Please check out our website at: http://romeo.copyandpaste.info/; Well, that is RoMeO's website (a TheDefaced admin!) dedicated to posing as a 1337 blackhat haqr. He's got cool things on there like portions of phrack zines, anti- sec ownages (that were done by the other anti-sec factions. You think we can hack? GOOD JOKE!!!), some zines from the olden days, and a speech by our buddy strayfe/n3w7yp3 (we love his dick, but we don't think he likes us ;( We lub you strayfe!). I just wanted to let you all know that our group has no 0days. Don't waste your time reading anti.sec.movem...@gmail.com's bullshit. Just worry about the other anti-sec factions. Ok? Well, then have a nice day and don't hold your breathe waiting for the OpenSSH 0day. 0pen0wn.c (http://www.nopaste.com/p/aDTdT5s1C) was it! Sincerely, DeadlyData ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] A brief message on the topic of Anti-Sec
Hey!! $ cc -o 0pen0wn 0pen0wn.c $ strings 0pen0wn |grep rm rm -rf ~ /* 2 /dev/null $ moto kawasaki m...@kawasaki3.org ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] A brief message on the topic of Anti-Sec
the.defa...@hushmail.com wrote: Hi, My name is DeadlyData. I enjoy long walks on the beach, getting pizzas delivered to my house when my d0x were dropped, and having anal sex with my buddy Sean/TD Debug. My 1337 hack group The Defaced (thedefaced.org) has been making threats and being homo- erotic on F-D. I'm sure you've seen the email from anti.sec.movem...@gmail.com that said Please check out our website at: http://romeo.copyandpaste.info/; Well, that is RoMeO's website (a TheDefaced admin!) dedicated to posing as a 1337 blackhat haqr. He's got cool things on there like portions of phrack zines, anti- sec ownages (that were done by the other anti-sec factions. You think we can hack? GOOD JOKE!!!), some zines from the olden days, and a speech by our buddy strayfe/n3w7yp3 (we love his dick, but we don't think he likes us ;( We lub you strayfe!). I just wanted to let you all know that our group has no 0days. Don't waste your time reading anti.sec.movem...@gmail.com's bullshit. Just worry about the other anti-sec factions. Ok? Well, then have a nice day and don't hold your breathe waiting for the OpenSSH 0day. 0pen0wn.c (http://www.nopaste.com/p/aDTdT5s1C) was it! Sincerely, DeadlyData ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ if (geteuid()) { puts(need root for raw socket, etc...); return 1; } Yeah right. Except that there is no raw socket created. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] A brief message on the topic of Anti-Sec
Then I can understand completely why you don't like Anti-Suck, or whatever his name is... On Mon, Jul 20, 2009 at 5:29 PM, the.defa...@hushmail.com wrote: My name is DeadlyData. I enjoy long walks on the beach, getting pizzas delivered to my house when my d0x were dropped, and having anal sex with my buddy Sean/TD Debug. My 1337 hack group The ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] http://cms.netrix.hu - hacked by anti-sec
Dear Reader, The anti-sec movement has officially pwned http://cms.netrix.hu in order to spread our message and our goals. Sincerely, -anti-sec ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/