Re: [Full-disclosure] NMAP Vulnerable to attack
Yeah, it's an intentional JOKE to MustLive who's been posting web stuffs. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NMAP Vulnerable to attack
How ironic... On Fri, Sep 10, 2010 at 11:07 PM, valdis.kletni...@vt.edu wrote: On Fri, 10 Sep 2010 22:52:46 +0200, Stefano Angaran said: I think that was a joke You're new here, aren't you? :) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- HONEY: I want to… put some powder on my nose. GEORGE: Martha, won’t you show her where we keep the euphemism? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] NMAP Vulnerable to attack
Hello full disclosure!! I like to warn you about vulnerability in many is systems. In using this nmap I find vulnerability: c:\nmap -sSV -P0 c:\win95\system\nmap.exe The c:\win95\system\nmap.exe application cannot be run in Win32 mode. This is confirmed in Linux: # ./nmap -sSV -P0 /usr/speling/Собака/bin/nmap Segmentation fault ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NMAP Vulnerable to attack
On Fri, 10 Sep 2010 16:32:16 EDT, musnt live said: c:\nmap -sSV -P0 c:\win95\system\nmap.exe # ./nmap -sSV -P0 /usr/speling/Собака/bin/nmap That's not a vulnerability, that's a fucktard who's running security tools without a clue how to properly invoke them. Unless of course you want to make the very reasonable argument that the fucktard *is* the security vulnerability. pgpd8nSzkcnIY.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NMAP Vulnerable to attack
I think that was a joke Il 10/09/2010 22:48, valdis.kletni...@vt.edu ha scritto: On Fri, 10 Sep 2010 16:32:16 EDT, musnt live said: c:\nmap -sSV -P0 c:\win95\system\nmap.exe # ./nmap -sSV -P0 /usr/speling/Собака/bin/nmap That's not a vulnerability, that's a fucktard who's running security tools without a clue how to properly invoke them. Unless of course you want to make the very reasonable argument that the fucktard *is* the security vulnerability. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NMAP Vulnerable to attack
On Fri, 10 Sep 2010 22:52:46 +0200, Stefano Angaran said: I think that was a joke You're new here, aren't you? :) pgp4e6HJsqGE3.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NMAP Vulnerable to attack
This isn't a vulnerability, also the stuff below, not really English. Good luck next time though! Andrew On 9/10/2010 4:32 PM, musnt live wrote: Hello full disclosure!! I like to warn you about vulnerability in many is systems. In using this nmap I find vulnerability: c:\nmap -sSV -P0 c:\win95\system\nmap.exe The c:\win95\system\nmap.exe application cannot be run in Win32 mode. This is confirmed in Linux: # ./nmap -sSV -P0 /usr/speling/Собака/bin/nmap Segmentation fault ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NMAP Vulnerable to attack
I agree, it is not a very useful bug On Fri, Sep 10, 2010 at 8:48 PM, valdis.kletni...@vt.edu wrote: On Fri, 10 Sep 2010 16:32:16 EDT, musnt live said: c:\nmap -sSV -P0 c:\win95\system\nmap.exe # ./nmap -sSV -P0 /usr/speling/Собака/bin/nmap That's not a vulnerability, that's a fucktard who's running security tools without a clue how to properly invoke them. Unless of course you want to make the very reasonable argument that the fucktard *is* the security vulnerability. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- Ali MEZGANI Network Engineering/Security http://securfox.wordpress.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] NMAP Vulnerable to attack
I've been reading FD for some time but never posted, that seemed quite an opportunity to jump in the conversation without saying nonsenses ^^ Il 10/09/2010 23:07, valdis.kletni...@vt.edu ha scritto: On Fri, 10 Sep 2010 22:52:46 +0200, Stefano Angaran said: I think that was a joke You're new here, aren't you? :) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/